Advertisement

An Improved Chaos Based Medical Image Encryption Using DNA Encoding Techniques

  • Abhrajyoti DasEmail author
  • Abhilash Kumar Das
  • Nirmalya Kar
Conference paper
  • 74 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 1192)

Abstract

Medical Image protection is one of the primary concerns of health care services. There has been a lot of research in this field in the past decade. But unfortunately, in India, the implementation is very poor and unstructured. In this paper, a secured model for MRI image encryption and decryption using DNA Encoding and Logistic Chaotic Map is proposed. Initially a key is generated using logistic map function to generate a sequence K1,i this sequence is multiplied with a factor of 255, another sequence K2,i generated from Linear Feedback Right Shift Register (LFRSR) using an initial seed value, then both the sequences are XORed to form the key. After the key is generated the sequence is again XORed with the 8-bit image pixel of the MRI Image. The generated cipher is then converted into a DNA sequence using DNA Encoding. The generated text of DNA sequence is then passed to the network. This sequence is extremely secure and robust, the Root Mean Square Error (RMSE) value measured between the original and encrypted sequence is very high.

Keywords

Logistic map function Linear Feedback Right Shift Register (LFRSR) DNA Encoding Pseudo random sequence Digital Imaging and Communications in Medicine (DICOM) 

References

  1. 1.
    Rohith, S., Hari Bhat, K.N., Nandini Sharma, A.: Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In: 2014 International Conference on Advances in Electronics Computers and Communications, pp. 1–6. IEEE (2014)Google Scholar
  2. 2.
    Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: DNA chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850–858 (2017)CrossRefGoogle Scholar
  3. 3.
    Belazi, A., Talha, M., Kharbech, S., Xiang, W.: Novel medical image encryption scheme based on chaos and DNA encoding. IEEE Access 7, 36667–36681 (2019)CrossRefGoogle Scholar
  4. 4.
    Shankar, K., Elhoseny, M., Chelvi, E.D., Lakshmanaprabu, S.K., Wu, W.: An efficient optimal key based chaos function for medical image security. IEEE Access 6, 77145–77154 (2018)CrossRefGoogle Scholar
  5. 5.
    Prabhavathi, K., Sathisha, C.P., Ravikumar, K.M.: Region of interest based selective medical image encryption using multi Chaotic system. In: 2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), pp. 1–5. IEEE (2017)Google Scholar
  6. 6.
    Kamble, P.R., Patil, S.: Enhancing security of electronic patient record with tamper detection. In: 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1–5. IEEE (2018)Google Scholar
  7. 7.
    Das, P., Deb, S., Kar, N., Bhattacharya, B.: An improved DNA based dual cover steganography. Procedia Comput. Sci. 46, 604–611 (2015)CrossRefGoogle Scholar
  8. 8.
    Bharghavi, G., Kumar, P.S., Geetha, K., Devi, N.S.: An implementation of SLICE algorithm to enforce security for medical images using DNA approach. In: 2018 International Conference on Communication and Signal Processing (ICCSP), pp. 0984–0988. IEEE (2018)Google Scholar
  9. 9.
    Abdel-Nabi, H., Al-Haj, A.: Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th International Conference on Information and Communication Systems (ICICS), pp. 147–152. IEEE (2017)Google Scholar
  10. 10.
    Parameshachari, B.D., Panduranga, H.T., Naveenkumar, S.K.: Partial encryption of medical images by dual DNA addition using DNA encoding. In: 2017 International Conference on Recent Innovations in Signal Processing and Embedded Systems (RISE), pp. 310–314. IEEE (2017)Google Scholar
  11. 11.
    Yan-Bin, Z., Qun, D.: A new digital chaotic sequence generator based on logistic map. In: 2011 Second International Conference on Innovations in Bio-inspired Computing and Applications, pp. 175–178. IEEE (2011)Google Scholar
  12. 12.
    Deb, S., Bhuyan, B., Gupta, NCh.: Design and analysis of LFSR-based stream cipher. In: Mandal, J.K., Saha, G., Kandar, D., Maji, A.K. (eds.) Proceedings of the International Conference on Computing and Communication Systems. LNNS, vol. 24, pp. 631–639. Springer, Singapore (2018).  https://doi.org/10.1007/978-981-10-6890-4_61CrossRefGoogle Scholar
  13. 13.
    Cisse, I.I., Kim, H., Ha, T.: A rule of seven in Watson-Crick base-pairing of mismatched sequences. Nat. Struct. Mol. Biol. 19(6), 623 (2012)CrossRefGoogle Scholar
  14. 14.
    Yu, H., Wu, G.-S.: The compounded chaotic sequence research in image encryption algorithm. In: 2009 WRI Global Congress on Intelligent Systems, vol. 3, pp. 252–256. IEEE (2009)Google Scholar
  15. 15.
    Kar, N., Mandal, K., Bhattacharya, B.: Improved chaos-based video steganography using DNA alphabets. ICT Express 4(1), 6–13 (2018)CrossRefGoogle Scholar
  16. 16.
    Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Center for Biomedical Image Computing & Analytics (CBICA). http://braintumorsegmentation.org/
  18. 18.

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Abhrajyoti Das
    • 1
    Email author
  • Abhilash Kumar Das
    • 1
  • Nirmalya Kar
    • 1
  1. 1.Department of Computer Science and EngineeringNIT AgartalaJiraniaIndia

Personalised recommendations