Skip to main content

An Image Mathcrypt - A Flawless Security via Flawed Image

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2019)

Abstract

The present scenario of the medical field is that sending the healthcare images through the internet is so far exposed to security threats. Hence, there is a need for an efficient and secure procedure to exchange healthcare images over the Internet. The Digital Image and Communication in Medicine (DICOM) provides security features for image header information but not for the pixel information. Hence to send the pixel information in a highly secured manner, the pixels need to be encrypted by using a suitable encryption algorithm. The number of pixel changing rate (NPCR) and the unified averaged changed intensity (UACI) are well-known encryption evaluation metrics to analyse the differential attack in image encryption. These two values are used to calculate the average number of pixel changes and intensity changes between two encrypted images before and after modifying any one pixel in a plaintext image respectively. If these two values are high, then the image encryption can resist the differential attacks. In this paper, a theoretical value of NPCR and UACI are computed for DICOM image encryption concerning different significant levels. An encryption algorithm with Gould transform, RC5, logistic map and DNA Diffusion is proposed for DICOM image to increase the NPCR, and UACI value and this method offered an efficient security strategy for DICOM pixel information. Finally, the computed theoretical value of NPCR and UACI are compared with the existing and proposed algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Armbrust, L.J.: PACS and image storage. Vet. Clin. N. Am. - Small Anim. Pract. 39, 711–718 (2009). https://doi.org/10.1016/j.cvsm.2009.04.004

    Article  Google Scholar 

  2. Bidgood, W.D., Horii, S.C.: Introduction to the ACR-NEMA DICOM standard. Radiographics 12, 345–355 (1992). https://doi.org/10.1148/radiographics.12.2.1561424

    Article  Google Scholar 

  3. Mishra, S.K., Kapoor, L., Singh, I.P.: Telemedicine in India: current scenario and the future. Telemed. J. E Health 15, 568–575 (2009). https://doi.org/10.1089/tmj.2009.0059

    Article  Google Scholar 

  4. Raghupathi, B.W., Tan, J.: Strategic IT applications in health care. Commun. ACM 45, 56–61 (2002)

    Article  Google Scholar 

  5. Alfalou, A., Brosseau, C., Abdallah, N., Jridi, M.: Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Opt. Express 21, 8025–8043 (2013)

    Article  Google Scholar 

  6. Moumen, A., Bouye, M., Sissaoui, H.: New secure partial encryption method for medical images using graph coloring problem. Nonlinear Dyn. (2015). https://doi.org/10.1007/s11071-015-2253-4

    Article  MathSciNet  MATH  Google Scholar 

  7. Vinoth Kumar, C., Natarajan, V., Poonguzhali, P.: Secured patient information transmission using reversible watermarking and DNA encryption for medical images. Appl. Math. Sci. 9, 2381–2391 (2015). https://doi.org/10.12988/ams.2015.53219

    Article  Google Scholar 

  8. Pareek, N.K., Patidar, V.: Medical image protection using genetic algorithm operations. Soft. Comput. 20, 763–772 (2014). https://doi.org/10.1007/s00500-014-1539-7

    Article  Google Scholar 

  9. Khan, M.A., Ali, A., Jeoti, V., et al.: A chaos-based substitution box (S-Box) design with improved differential approximation probability (DP). Iran J. Sci. Technol. Trans. Electr. Eng. 42, 219 (2018). https://doi.org/10.1007/s40998-018-0061-9

    Article  Google Scholar 

  10. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4, 3–72 (1991). https://doi.org/10.1007/BF00630563

    Article  MathSciNet  MATH  Google Scholar 

  11. Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, Ernest F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_34

    Chapter  Google Scholar 

  12. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, Burton S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052259

    Chapter  Google Scholar 

  13. Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35, 408–419 (2008). https://doi.org/10.1016/j.chaos.2006.05.011

    Article  MathSciNet  MATH  Google Scholar 

  14. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21, 749–761 (2004)

    Article  MathSciNet  Google Scholar 

  15. Huang, C.K., Nien, H.H.: Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 282, 2123–2127 (2009). https://doi.org/10.1016/j.optcom.2009.02.044

    Article  Google Scholar 

  16. Kumar, A., Ghose, M.K.: Extended substitution-diffusion based image cipher using chaotic standard map. Commun. Nonlinear Sci. Numer. Simul. 16, 372–382 (2011)

    Article  MathSciNet  Google Scholar 

  17. Khanzadi, H., Eshghi, M., Borujeni, S.E.: Arab J. Sci. Eng. 39, 1039 (2014). https://doi.org/10.1007/s13369-013-0713-z

    Article  Google Scholar 

  18. Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90, 2714–2722 (2010). https://doi.org/10.1016/j.sigpro.2010.03.022

    Article  MATH  Google Scholar 

  19. Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52, 2028–2035 (2010). https://doi.org/10.1016/j.mcm.2010.06.005

    Article  MathSciNet  MATH  Google Scholar 

  20. Kaur, M., Kumar, V.: Arab J. Sci. Eng. 43, 8127 (2018). https://doi.org/10.1007/s13369-018-3355-3

    Article  Google Scholar 

  21. Palacios-Luengas, L., Pichardo-Méndez, J.L., Díaz-Méndez, J.A., et al.: Arab J. Sci. Eng. 44, 3817 (2019)

    Article  Google Scholar 

  22. Zhu, Z., Zhang, W., Wong, K., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. (Ny) 181, 1171–1186 (2011)

    Article  Google Scholar 

  23. Praveenkumar, P., Kerthana Devi, N., Ravichandran, D., et al.: Transreceiving of encrypted medical image – a cognitive approach. Multimed. Tools Appl. 77, 8393–8418 (2018). https://doi.org/10.1007/s11042-017-4741-7

    Article  Google Scholar 

  24. Wang, X., Liu, C.: A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed. Tools Appl. 76, 6229–6245 (2017)

    Article  Google Scholar 

  25. Wu, Y., Member, S., Noonan, J.P., Member, L.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidisc. J. Sci. Technol. J. Sel. Areas. Telecommun. 1, 31–38 (2011)

    Google Scholar 

  26. Le, H.M., Aburdene, M.F.: The discrete Gould transform and its applications. In: Proceedings of SPIE-the Image Processing: Algorithms and Systems, Neural Networks, and Machine Learning. International Society for Optics (2006). http://doi.org/10.1117/12.643278

  27. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Triple chaotic image scrambling on RGB - a random image encryption approach. Secur. Commun. Netw. 8, 3335–3345 (2015). https://doi.org/10.1002/sec.1257

    Article  Google Scholar 

  28. Sathishkumar, G.A., Bhoopathybagan, K., Sriraam, N., Venkatachalam, S.P., Vignesh, R.: A novel image encryption algorithm using two chaotic maps for medical application. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds.) CCSIT 2011. CCIS, vol. 133, pp. 290–299. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-17881-8_28

    Chapter  Google Scholar 

  29. Mahmood, A., Dony, R., Areibi, S.: An adaptive encryption based genetic algorithms for medical images. In: 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), pp. 1–6 (2013). https://doi.org/10.1109/mlsp.2013.6661920

  30. Fu, C., Zhang, G., Bian, O., et al.: A novel medical image protection scheme using a 3-Dimensional chaotic system. PLoS ONE 9, e115773 (2014). https://doi.org/10.1371/journal.pone.0115773

    Article  Google Scholar 

  31. Lima, J.B., Madeiro, F., Sales, F.J.R.: Encryption of medical images based on the cosine number transform. Signal Process Image Commun. 35, 1–8 (2015)

    Article  Google Scholar 

  32. Parvees, M.Y.M., Samath, J.A., Bose, B.P.: Secured medical images - a chaotic pixel scrambling approach. J. Med. Syst. 40, 232 (2016). https://doi.org/10.1007/s10916-016-0611-5

    Article  Google Scholar 

  33. Cao, W., Zhou, Y., Chen, C.L.P., Xia, L.: Medical image encryption using edge maps. Signal Process. 132, 96–109 (2017). https://doi.org/10.1016/j.sigpro.2016.10.003

    Article  Google Scholar 

  34. Ravichandran, D., Praveenkumar, P., Balaguru Rayappan, J.B., Amirtharajan, R.: Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 72, 170–184 (2016). https://doi.org/10.1016/j.compbiomed.2016.03.020

    Article  Google Scholar 

  35. Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: DNA chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850–858 (2017). https://doi.org/10.1109/TNB.2017.2780881

    Article  Google Scholar 

Download references

Acknowledgements

Authors wish to express their sincere thanks to acknowledging SASTRA Deemed University, Thanjavur, India for extending infrastructural support to carry out this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Anushiadevi, R., Venkatesh, V., Amirtharajan, R. (2019). An Image Mathcrypt - A Flawless Security via Flawed Image. In: Shankar Sriram, V., Subramaniyaswamy, V., Sasikaladevi, N., Zhang, L., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2019. Communications in Computer and Information Science, vol 1116. Springer, Singapore. https://doi.org/10.1007/978-981-15-0871-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0871-4_2

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0870-7

  • Online ISBN: 978-981-15-0871-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics