Cyclic-Shift Chaotic Medical Image Encryption Algorithm Based on Plain Text Key-Stream

نویسندگان

  • Yin Dai
  • Huanzhen Wang
  • Haoran Sun
چکیده

With the growing popularity of the Internet and the fast expanding to a variety of medical equipment, medical imaging technology has become increasingly sophisticated, especially the telemedicine is increasing rapidly. Therefore, in the process of transmission and storage of medical image, it is very important to encrypt it. However, compared with ordinary images, medical images contain patient information, which means more data, more rich content and the ability to resist tampering and anti-cutting requires higher. Traditional image chaotic encryption algorithm encrypts the image with preset key value,which leads to a high correlation and a relatively low sensitivity to the secret key. Therefore, the traditional image encryption algorithm cannot meet the needs of the medical image. In this regard, a cyclic shift-Chaotic Medical Image Encryption Algorithm Based on plain text keystream is proposed. According to an established rules to obtain the required encryption of the plain text key-stream of medical image and then use this key to do Scrambling operation by using cyclic shift and Diffusion operation by using skew tent mapping, to ensure that the encryption process is closely related to medical image. The experimental results show that this algorithm has certain advantages in the statistical performance, the sensitivity and the anti-attack ability of the algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

Enhancement and Analysis of Chaotic Image Encryption Algorithms

The focus of this paper is to improve the level of security and secrecy provided by the chaotic map based image encryption.An encryption algorithm based on the Logistic and the Henon maps is proposed. The algorithm uses chaotic iteration to generate the encryption keys, and then carries out the XOR and cyclic shift operations on the plain text to change the values of image pixels. Chaotic Map L...

متن کامل

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryptio...

متن کامل

A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps

The chaos based cryptographic algorithms have suggested several advantages over the traditional encryption algorithms such as high security, speed, reasonable computational overheads and computational power. This paper introduces an efficient chaos-based stream cipher, composing two chaotic logistic maps and a large enough external secret key for image encryption. The external secret key is use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016