Skip to main content

Securing DICOM Format Image Archives Using Improved Chaotic Cat Map Method

  • Conference paper
Advances in Computing and Information Technology

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 177))

Abstract

In healthcare industry, the patient’s medical data plays a vital role because diagnosis of any ailments is done by using those data. The high volume of medical data leads to scalability and maintenance issues when using healthcare provider’s onsite picture archiving and communication system (PACS) and network oriented storage system. Therefore a standard is needed for maintaining the medical data and for better diagnosis. Since the medical data reflects in a similar way to individuals personal information, secrecy should be maintained. Maintaining secrecy can be done by encrypting the data, but as medical data involves images and videos, traditional text based encryption/decryption schemes are not adequate for providing confidentiality. In this paper, we propose a method for securing the DICOM format medical archives by providing a better confidentiality. Our contribution in this method is of twofold: (1) Development of Chaotic based Arnold Cat Map for encryption/decryption of DICOM files and (2) Applying diffusion for those encrypted files. By applying this method, the secrecy of medical data is maintained and is tested with various DICOM format image archives by studying the following parameters i) PSNR-for quality of images and ii) Key-for security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Teng, C.-C., Mitchell, J., Walker, C., Swan, A., Davila, C., Howard, D., Needham, T.: A Medical Image Archive Solution in the Cloud, pp. 431–434. IEEE (2010), doi:10.1109/ICSESS.2010.5552343

    Google Scholar 

  2. Wang, D., Zhang, Y.-B.: Image encryption algorithm based on s-boxes substitution and chaos random sequence. In: International Conference on Computer Modeling and Simulation (2009), doi:10.1109/ICCMS.2009.26

    Google Scholar 

  3. Peterson, G.: Arnolds Cat Map. Math. 45 Linear Algebra (Fall 1997)

    Google Scholar 

  4. Chen, G., Maob, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Science Direct (2003), doi:10.1016/j.chaos.2003.12.022

    Google Scholar 

  5. Kashyap, S., Karthik, K.: Authenticating encrypted data, pp. 1–5. IEEE (2010), doi:10.1109/NCC.2011.5734696

    Google Scholar 

  6. Struss, K.: A Chaotic Image Encryption. Mathematics Senior Seminar 4901 (Spring 2009)

    Google Scholar 

  7. Wong, K.-W., Kwok, B.S.-H.: An Efficient Diffusion Approach for Chaos-based Image Encryption. In: 3rd International Conference Physics and Control, Physcon (2007)

    Google Scholar 

  8. Wong, K.-W., Kwok, B.S.-H., Law, W.-S.: A Fast Image Encryption Scheme based on Chaotic Standard Map. In: Cryptography and Security Conference, vol. 372(15), pp. 2645–2652 (2006), Cited as arXiv:cs/0609158v1

    Google Scholar 

  9. Ling, B., Liu, L., Zhang, J.: Image encryption algorithm based on chaotic map and S-DES, pp. 41–44. IEEE (2010), doi:10.1109/ICACC.2010. 5486998

    Google Scholar 

  10. Kocarev, L., Jakimoski, G., Stojanovski, T., Parlit, U.: From chaotic maps to encryption schemes. In: Proceedings of the 1998 IEEE International Symposium on Circuits and Systems, ISCAS 1998, vol. 4, pp. 514–517 (1998), doi:10.1109/ISCAS.1998.698968

    Google Scholar 

  11. Sharma, M.: Image encryption techniques using chaotic schemes: A review. International Journal of Engineering Science and Technology 2(6), 2359–2363, 1–10 (2010) ISSN: 0975-5462

    Google Scholar 

  12. Asim, M., Jeoti, V.: Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme, pp. 65–69. IEEE (2007), doi:10.1109/ICSCN.2007.350697

    Google Scholar 

  13. Lian, S., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Science Direct, Physica A: Statistical Mechanics and its Applications 351(2-4), 645–661 (2005)

    Article  Google Scholar 

  14. Ren, S., Gao, C., Dai, Q., Fei, X.: Attack to an Image Encryption Algorithm based on Improved Chaotic Cat Maps. In: 3rd International Congress on Image and Signal Processing, CISP 2010, pp. 533–536 (2010), doi:10.1109/CISP.2010.5647659

    Google Scholar 

  15. Mao, Y., Chen, G.: Chaos-Based image encryption (2005), http://www.open-image.org/725publication/journal/CBIE.pdf

  16. Zhang, Y.-B.: Chaos based cryptography. An alternative to algebraic cryptography (2008)

    Google Scholar 

  17. Zhu, Z., Zhai, K., Wang, B., Liu, H., Jiang, H.: Research on Chaos-based Message Digest Method for Medical Images, pp. 1–510. IEEE (2009), doi:1109/CISP.2009.5301139

    Google Scholar 

  18. Zhu, Y., Zhou, Z., Yang, H., Pan, W., Zhang, Y.: A Chaos-Based Image Encryption Algorithm Using Wavelet Transform, pp. 1037–1040. IEEE (2010), doi:10.1109/IEMBS.2010.5628061

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Arun Fera .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arun Fera, M., Jaganathan, S. (2013). Securing DICOM Format Image Archives Using Improved Chaotic Cat Map Method. In: Meghanathan, N., Nagamalai, D., Chaki, N. (eds) Advances in Computing and Information Technology. Advances in Intelligent Systems and Computing, vol 177. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31552-7_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-31552-7_34

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-31551-0

  • Online ISBN: 978-3-642-31552-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics