Time Efficient Image Encryption-Decryption for Visible and COVID-19 X-ray Images Using Modified Chaos-Based Logistic Map

基于改进混沌逻辑映射的可见光和 COVID-19 X 射线图像高效加密解密

阅读:1

Abstract

In this pandemic situation, radiological images are the biggest source of information in healthcare and, at the same time, one of the foremost troublesome sources to analyze. Clinicians now-a-days must depend to a great extent on therapeutic image investigation performed by exhausted radiologists and some of the time analyzed and filtered themselves. Due to an overflow of patients, transmission of these medical data becomes frequent and maintaining confidentiality turns out to be one of the most important aspects of security along with integrity and availability. Chaos-based cryptography has proven a useful technique in the process of medical image encryption. The specialty of using chaotic maps in image security is its capability to increase the unpredictability and this causes the encryption robust. There are large number of literature available with chaotic map; however, most of these are not useful in low-precision devices due to their time-consuming nature. Taking into consideration of all these facts, a modified encryption technique is proposed for 2D COVID-19 images without compromising security. The novelty of the encryption procedure lies in the proposed design which is split into mainly three parts. In the first part, a variable length gray level code is used to generate the secret key to confuse the intruder and subsequently it is used as the initial parameter of both the chaotic maps. In the second part, one-stage image pixels are shuffled using the address code obtained from the sorting transformation of the first logistic map. In the final stage, a complete diffusion is applied for the whole image using the second chaotic map to counter differential and statistical attack. Algorithm validation is done by experimentation with visual image and COVID-19 X-ray images. In addition, a quantitative analysis is carried out to ensure a negligible data loss between the original and the decrypted image. The strength of the proposed method is tested by calculating the various security parameters like correlation coefficient, NPCR, UACI, and key sensitivity. Comparison analysis shows the effectiveness for the proposed method. Implementation statistics shows time efficiency and proves more security with better unpredictability.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。