Abstract
The present scenario of the medical field is that sending the healthcare images through the internet is so far exposed to security threats. Hence, there is a need for an efficient and secure procedure to exchange healthcare images over the Internet. The Digital Image and Communication in Medicine (DICOM) provides security features for image header information but not for the pixel information. Hence to send the pixel information in a highly secured manner, the pixels need to be encrypted by using a suitable encryption algorithm. The number of pixel changing rate (NPCR) and the unified averaged changed intensity (UACI) are well-known encryption evaluation metrics to analyse the differential attack in image encryption. These two values are used to calculate the average number of pixel changes and intensity changes between two encrypted images before and after modifying any one pixel in a plaintext image respectively. If these two values are high, then the image encryption can resist the differential attacks. In this paper, a theoretical value of NPCR and UACI are computed for DICOM image encryption concerning different significant levels. An encryption algorithm with Gould transform, RC5, logistic map and DNA Diffusion is proposed for DICOM image to increase the NPCR, and UACI value and this method offered an efficient security strategy for DICOM pixel information. Finally, the computed theoretical value of NPCR and UACI are compared with the existing and proposed algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Armbrust, L.J.: PACS and image storage. Vet. Clin. N. Am. - Small Anim. Pract. 39, 711–718 (2009). https://doi.org/10.1016/j.cvsm.2009.04.004
Bidgood, W.D., Horii, S.C.: Introduction to the ACR-NEMA DICOM standard. Radiographics 12, 345–355 (1992). https://doi.org/10.1148/radiographics.12.2.1561424
Mishra, S.K., Kapoor, L., Singh, I.P.: Telemedicine in India: current scenario and the future. Telemed. J. E Health 15, 568–575 (2009). https://doi.org/10.1089/tmj.2009.0059
Raghupathi, B.W., Tan, J.: Strategic IT applications in health care. Commun. ACM 45, 56–61 (2002)
Alfalou, A., Brosseau, C., Abdallah, N., Jridi, M.: Assessing the performance of a method of simultaneous compression and encryption of multiple images and its resistance against various attacks. Opt. Express 21, 8025–8043 (2013)
Moumen, A., Bouye, M., Sissaoui, H.: New secure partial encryption method for medical images using graph coloring problem. Nonlinear Dyn. (2015). https://doi.org/10.1007/s11071-015-2253-4
Vinoth Kumar, C., Natarajan, V., Poonguzhali, P.: Secured patient information transmission using reversible watermarking and DNA encryption for medical images. Appl. Math. Sci. 9, 2381–2391 (2015). https://doi.org/10.12988/ams.2015.53219
Pareek, N.K., Patidar, V.: Medical image protection using genetic algorithm operations. Soft. Comput. 20, 763–772 (2014). https://doi.org/10.1007/s00500-014-1539-7
Khan, M.A., Ali, A., Jeoti, V., et al.: A chaos-based substitution box (S-Box) design with improved differential approximation probability (DP). Iran J. Sci. Technol. Trans. Electr. Eng. 42, 219 (2018). https://doi.org/10.1007/s40998-018-0061-9
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4, 3–72 (1991). https://doi.org/10.1007/BF00630563
Biham, E., Shamir, A.: Differential cryptanalysis of the full 16-round DES. In: Brickell, Ernest F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48071-4_34
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, Burton S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). https://doi.org/10.1007/BFb0052259
Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35, 408–419 (2008). https://doi.org/10.1016/j.chaos.2006.05.011
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21, 749–761 (2004)
Huang, C.K., Nien, H.H.: Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 282, 2123–2127 (2009). https://doi.org/10.1016/j.optcom.2009.02.044
Kumar, A., Ghose, M.K.: Extended substitution-diffusion based image cipher using chaotic standard map. Commun. Nonlinear Sci. Numer. Simul. 16, 372–382 (2011)
Khanzadi, H., Eshghi, M., Borujeni, S.E.: Arab J. Sci. Eng. 39, 1039 (2014). https://doi.org/10.1007/s13369-013-0713-z
Liao, X., Lai, S., Zhou, Q.: A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process. 90, 2714–2722 (2010). https://doi.org/10.1016/j.sigpro.2010.03.022
Zhang, Q., Guo, L., Wei, X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52, 2028–2035 (2010). https://doi.org/10.1016/j.mcm.2010.06.005
Kaur, M., Kumar, V.: Arab J. Sci. Eng. 43, 8127 (2018). https://doi.org/10.1007/s13369-018-3355-3
Palacios-Luengas, L., Pichardo-Méndez, J.L., DÃaz-Méndez, J.A., et al.: Arab J. Sci. Eng. 44, 3817 (2019)
Zhu, Z., Zhang, W., Wong, K., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. (Ny) 181, 1171–1186 (2011)
Praveenkumar, P., Kerthana Devi, N., Ravichandran, D., et al.: Transreceiving of encrypted medical image – a cognitive approach. Multimed. Tools Appl. 77, 8393–8418 (2018). https://doi.org/10.1007/s11042-017-4741-7
Wang, X., Liu, C.: A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed. Tools Appl. 76, 6229–6245 (2017)
Wu, Y., Member, S., Noonan, J.P., Member, L.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidisc. J. Sci. Technol. J. Sel. Areas. Telecommun. 1, 31–38 (2011)
Le, H.M., Aburdene, M.F.: The discrete Gould transform and its applications. In: Proceedings of SPIE-the Image Processing: Algorithms and Systems, Neural Networks, and Machine Learning. International Society for Optics (2006). http://doi.org/10.1117/12.643278
Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., Rayappan, J.B.B.: Triple chaotic image scrambling on RGB - a random image encryption approach. Secur. Commun. Netw. 8, 3335–3345 (2015). https://doi.org/10.1002/sec.1257
Sathishkumar, G.A., Bhoopathybagan, K., Sriraam, N., Venkatachalam, S.P., Vignesh, R.: A novel image encryption algorithm using two chaotic maps for medical application. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds.) CCSIT 2011. CCIS, vol. 133, pp. 290–299. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-17881-8_28
Mahmood, A., Dony, R., Areibi, S.: An adaptive encryption based genetic algorithms for medical images. In: 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), pp. 1–6 (2013). https://doi.org/10.1109/mlsp.2013.6661920
Fu, C., Zhang, G., Bian, O., et al.: A novel medical image protection scheme using a 3-Dimensional chaotic system. PLoS ONE 9, e115773 (2014). https://doi.org/10.1371/journal.pone.0115773
Lima, J.B., Madeiro, F., Sales, F.J.R.: Encryption of medical images based on the cosine number transform. Signal Process Image Commun. 35, 1–8 (2015)
Parvees, M.Y.M., Samath, J.A., Bose, B.P.: Secured medical images - a chaotic pixel scrambling approach. J. Med. Syst. 40, 232 (2016). https://doi.org/10.1007/s10916-016-0611-5
Cao, W., Zhou, Y., Chen, C.L.P., Xia, L.: Medical image encryption using edge maps. Signal Process. 132, 96–109 (2017). https://doi.org/10.1016/j.sigpro.2016.10.003
Ravichandran, D., Praveenkumar, P., Balaguru Rayappan, J.B., Amirtharajan, R.: Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 72, 170–184 (2016). https://doi.org/10.1016/j.compbiomed.2016.03.020
Ravichandran, D., Praveenkumar, P., Rayappan, J.B.B., Amirtharajan, R.: DNA chaos blend to secure medical privacy. IEEE Trans. Nanobiosci. 16(8), 850–858 (2017). https://doi.org/10.1109/TNB.2017.2780881
Acknowledgements
Authors wish to express their sincere thanks to acknowledging SASTRA Deemed University, Thanjavur, India for extending infrastructural support to carry out this work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Anushiadevi, R., Venkatesh, V., Amirtharajan, R. (2019). An Image Mathcrypt - A Flawless Security via Flawed Image. In: Shankar Sriram, V., Subramaniyaswamy, V., Sasikaladevi, N., Zhang, L., Batten, L., Li, G. (eds) Applications and Techniques in Information Security. ATIS 2019. Communications in Computer and Information Science, vol 1116. Springer, Singapore. https://doi.org/10.1007/978-981-15-0871-4_2
Download citation
DOI: https://doi.org/10.1007/978-981-15-0871-4_2
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0870-7
Online ISBN: 978-981-15-0871-4
eBook Packages: Computer ScienceComputer Science (R0)