Username   Password       Forgot your password?  Forgot your username? 


Hybrid Chaotic Encryption Algorithm for Securing DICOM Systems

Volume 15, Number 5, May 2019, pp. 1436-1444
DOI: 10.23940/ijpe.19.05.p20.14361444

Ge Jiaoa,b,c, Sheng Zhoua, Lang Lia,b, and Yi Zoua,b

aCollege of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
bHunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
cSchool of Environment Protection and Safety Engineering, University of South China, Hengyang, 421002, China


(Submitted on February 8, 2019; Revised on April 11, 2019; Accepted on May 23, 2019)


The DICOM system contains patients' personal privacy and may present a risk of information leakage in telemedicine diagnostics. In order to solve the security problem of the DICOM system, we propose a medical image encryption method based on the cross-diffusion of the logistic map and the Chebyshev map. We first parse the DICOM image and read the data elements, and then we use the logistic map and the Chebyshev map to generate a key. Then, we cross-use these two sequences for further image encryption diffusion. Finally, we conduct in-depth experiments and comparisons with existing algorithms to validate the characteristics of high security and low correlation of adjacent pixels of the proposed encryption algorithm.

References: 20

    1. K. Wong, B. Kwok, and C. Yuen, “An Efficient Diffusion Approach for Chaos-based Image Encryption,” Chaos, Solitons & Fractals, Vol. 41, No. 5, pp. 2652-2663, 2009
    2. A. Akhshani, S. Behnia, A. Akhavan, H. Abu Hassan, and Z. Hassan, “A Novel Scheme for Image Encryption based on 2D Piecewise Chaotic Maps,” Optics Communications, Vol. 283, No. 17, pp. 3259-3266, 2010
    3. C. Fu, W. H. Meng, Y. F. Zhan, Z. L. Zhu, F. C. M. Lau, C. K. Tse, et al., “An Efficient and Secure Medical Image Protection Scheme based on Chaotic Maps,” Computers in Biology and Medicine, Vol. 43, No. 8, pp. 1000-1010, 2013
    4. Y. Zhou, L. Bao, and C. Chen, “A New 1D Chaotic System for Image Encryption,” Signal Processing, Vol. 97, pp. 172-182, 2014
    5. A. Kanso and M. Ghebleh, “An Efficient and Robust Image Encryption Scheme for Medical Applications,” Communications in Nonlinear Science and Numerical Simulation, Vol. 24, No. 1, pp. 98-116, 2015
    6. C. Fu, G. Zhang, O. Bian, W. M. Lei, and H. F. Ma, “A Novel Medical Image Protection Scheme using a 3-Dimensional Chaotic System,” PloS One, Vol. 9, No. 12, pp. e115773, 2014
    7. M. Boussif, N. Aloui, and A. Cherif, “Smartphone Application for Medical Images Secured Exchange based on Encryption using the Matrix Product and the Exclusive Addition,” IET Image Processing, Vol. 11, No. 11, pp. 1020-1026, 2017
    8. J. Yoon and H. Kim, “An Image Encryption Scheme with a Pseudorandom Permutation based on Chaotic Maps,” Communications in Nonlinear Science and Numerical Simulation, Vol. 15, No. 12, pp. 3998-4006, 2010
    9. S. Seyedzadeh and S. Mirzakuchaki, “A Fast Color Image Encryption Algorithm based on Coupled Two-Dimensional Piecewise Chaotic Map,” Signal Processing, Vol. 92, No. 5, pp. 1202-1215, 2012
    10. T. Xiang, C. Y. Yu, J. Y. Qu, and X. S. Luo, “Research on the Security of DICOM Medical Images based on Improved AES Encryption Algorithm,” Dianzi Xuebao (Acta Electronica Sinica), Vol. 40, No. 2, pp. 406-411, 2012
    11. M. F. Pasha, S. Supramaniam, K. K. Liang, M. A. Amran, B. A. Chandra, and R. Mandava, “An Android-based Mobile Medical Image Viewer and Collaborative Annotation: Development Issues and Challenges,” International Journal of Digital Content Technology and its Applications (JDCTA), No. 6, pp. 208-217, 2012
    12. D. Ravichandran, P. Praveenkumar, J. Rayappan, and R. Amirtharajan, “Chaos based Crossover and Mutation for Securing DICOM Image,” Computers in Biology and Medicine, Vol. 72, pp. 170-184, 2016
    13. J. Chandrasekaran and S. Thiruvengadam, “A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images,” Security and Communication Networks, No. 3, pp. 1-12, 2017
    14. M. Rostami, A. Shahba, S. Saryazdi, and H. Nezamabadi-pour, “A Novel Parallel Image Encryption with Chaotic Windows based on Logistic Map,” Computers & Electrical Engineering, Vol. 62, pp. 384-400, 2017
    15. V. Patidar, N. Pareek, G. Purohit, and K. K. Sud, “Modified Substitution-Diffusion Image Cipher using Chaotic Standard and Logistic Maps,” Communications in Nonlinear Science and Numerical Simulation, Vol. 15, No. 10, pp. 2755-2765, 2010
    16. G. Jiao, X. Peng, and K. Duan, “Image Encryption with the Cross Diffusion of Two Chaotic Maps,” KSII Transactions on Internet and Information Systems, Vol. 13, No. 2, pp. 1064-1079, 2019
    17. Y. Dai and X. Wang, “Medical Image Encryption based on a Composition of Logistic Maps and Chebyshev Maps,” in Proceedings of 2012 IEEE International Conference on Information and Automation, pp. 210-214, 2012
    18. H. Lai, M. Orgun, J. Pieprzyk, J. Li, M. X. Luo, J. H. Xiao, et al., “High-Capacity Quantum Key Distribution using Chebyshev-Map Values Corresponding to Lucas Numbers Coding,” Quantum Information Processing, Vol. 15, No. 11, pp. 4663-4679, 2016
    19. M. Parvees, J. Samath, and B. Bose, “Secured Medical Images a Chaotic Pixel Scrambling Approach,” Journal of Medical Systems, Vol. 40, No. 11, pp. 232, 2016
    20. M. Dzwonkowski, M. Papaj, and R. Rykaczewski, “A New Quaternion-based Encryption Method for DICOM Images,” IEEE Transactions on Image Processing, Vol. 24, No. 11, pp. 4614-4622, 2015


    Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

    This site uses encryption for transmitting your passwords.