Search WWW Search inass.org
»Journal Description
»Topics
»Call for Papers and Reviewers
»Author Guidelines
»Contents & Papers
»Call for Special Issues
»SCOPUS
 
»IEEE CIS
»INNS
»IEEE IS
DOI: http://dx.doi.org/10.22266/ijies2017.0228.12

2D Chaotic Map Based on 2D Adaptive Grey Wolf Algorithm for Ultra Sound Medical Image Security

Author(s):

Srinivas Koppu1*,Madhu Viswanatham V2


Affiliations:

1School of Information Technology and Engineering,VIT University, Vellore, India
2School of Computing Science and Engineering,VIT University, Vellore, India







Abstract:

In this paper, we have proposed a chaos-based visual encryption method that can be applied to Ultra Sound Medical Images. We used adaptive Grey Wolf Optimization (GWO) to archive Ultra Sound Medical Image encryption. The robustness of the proposed image encryption are measured by various security attacks such as key sensitivity, histogram analysis, adjacent pixel autocorrelation, chi-square test, etc. Moreover, analytical outcomes are compared with the conventional algorithms like Genetic Algorithm (GA) and GWO. The experimental result shows that the proposed method is faster with low complexity.


Keywords:

Chaotic encryption, Chaotic decryption, 2DCM, GWO, Modified GWO.


Full Text:




References:
  1. S. Mitra,and B.U. Shankar,"Medical image analysis for cancer management in natural computing framework", Information Sciences,Vol. 306, pp.111-131,2015.
  2. United States Department of Health and Human Services. HIPPA: medical privacy—national standards to protect the privacy of personal health information. Available from http://www.hhs .gov/ocr/hippa
  3. X.Y. Wang,Y.Q. Zhang and L.T. Liu,"An enhanced sub-image encryption method", Optics and Lasers in Engineering, vol. 86, pp. 248-254, November, 2016.
  4. H. Hofbauer and A. Uhl, "Identifying deficits of visual security metrics for images", Signal Processing: Image communication , Vol. 46,pp.60-75,2016.
  5. X. Wu,D. Wang, J. Kurths, and H.Kan, "A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system", Information Sciences 349, pp. 137-153,2016.
  6. S.Mirjalilii,S.M and A.Lewis,”Grey wolf Optimizer," Advances in Engineering Software 69 (2014): 46-61.
  7. E. Biham and A. Shamir, “Differential cryptanalysis of the data encryption standard”, Springer Science & Business Media, 2012.
  8. W.C Barker, and E.B Barker,"SP 800-67 Rev. 1. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher", (2012).
  9. B. Nicholas, "News and views: RSA algorithm in the public domain; Woz joins the Inventors Hall of Fame; entangled photons mean faster, smaller ICs; BEHEMOTH mothballed; Advanced Encryption Standard selected; SGI releases SDK as open source; WSDL spec released", Dr. Dobb’s Journal of Software Tools, Vol.25, No. 12, 2000.
  10. A.Das and A.Adhikari,”An Efficent Multi-use Multi-Secret Sharing Scheme based on Hash Function”, Appliead Mathematics Letters”,Vol. 23, pp.993-996,2000.
  11. K. Martin,R. Lukac and K.N. Plataniotis, "Efficient encryption of wavelet-based coded color images", Pattern Recognition,Vol. 38, No. 7, pp. 1111-1115,2005.
  12. M.Naor, and A. Shamir, "Visual Cryptography, ‘‘Advances in Cryptology Eurocrypt 94,Lecture Notes in Computer Science 950: 1.
  13. J.X. Chen, Z.L. Zhu, C.Fu, H.Yu, and L.B.Zhang, "A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism ”, Communications in Nonlinear Science and Numerical Simulation, Vol.20, No. 3,pp.846-860,2015.
  14. C.F.Lin,W.T. Chang and C.Y.Li,"A Chaos based Visual Encryption Mechanism in-JPEG Medical Images",Journal of Medical and Biological Engineering, Vol.27,No.3,pp.144-149, 2007.
  15. https://en.wikipedia.org/wiki/Chaos_theory.
  16. Y. Li, L.Liang, Z.Su, and J.Jiang,"A new video encryption algorithm for H. 264", In 2005 5th International Conference on Information Comm unications & Signal Processing, pp. 1121-1124. IEEE, 2005.
  17. K.D. Rao,"A robust and secure scheme for image communication over wireless channels", In 2005 IEEE 7th CAS Symposium on Emerging Technologies: Circuits and Systems for 4G Mobile Wireless Communications, pp. 88-91. IEEE, 2005.
  18. K.W. Tang and W.K. Tang,"A chaos-based secure voice communication system", IEEE International Conference on Industrial Technology, pp. 571-576. IEEE, 2005.
  19. C.K.Volos, I.M.Kyprianidis and I.N. Stouboulos, "Chaotic cryptosystem based on inverse duffing circuit." In Proc. of the 5th International Conference on Non–linear Analysis, Non–linear Systems and Chaos (NOLASC 2006), pp. 92-97. 2006.
  20. V. Grigoras, and C. Grigoras,”Chaos Encryption Method Based on Large Signal Modulation in Additive Nonlinear Discrete-Time System”,Proc. of the 5th WSEAS Int. Conf. on Non-Linear Analysis, Non-Linear Systems and Chaos, Bacharest, Romania, pp.16-18,2006.
  21. H.P.Xiao, and G.J Zhang,"Image encryption based on chaotic maps", In Systems, Man, and Cybernetics,. Computational Cybernetics and Simulation, 1997 IEEE International Conference on, Vol. 2, pp.1105-1110, IEEE, 1997.
  22. J.C.Yen,and J.I.Guo,”A New Mirroe-like image encryption algorithm and its VLSI architecture”, Department of Electronics Engineering National Lien-Ho College of Technology and Commerce, Miaoli, Taiwan, Republic of China in 1999.
  23. F.Han,J.Hu,X.Yu, and Y.Wang,"Fngerprint images encryption via multi-scroll chaotic attractors" , Applied Mathematics and Computation, Vol.185, No. 2, ppp. 931-939,2007.
  24. S.S.Maung, and M.M. Sein,” A fast encryption scheme based on chaotic maps”,pp.1-16,2008.
  25. A.A.El-Latif, and X.Niu,“A hybrid chaotic system and cyclic elliptic curve for image encryption”, AEU-International Journal of Electr- onics and Communications, Vol.67, No2, pp.136-143,2013.
  26. Q.Zhang, L.Guo and X.Wei,“Image encryption using DNA addition combining with chaotic maps”, Mathematical and Computer Modelling, Vol.52, No.11, pp.2028-2035,2010.
  27. N.K.Pareek, V.Patidar,K.K.Sud, “Image encryption using chaotic logistic map”, Image and Vision Computing, Vol.24,No.9, pp.926-934.
  28. S.R.Maniyath, and M. Supriya,” An uncompressed image encryption algorithm based on DNA sequences”, Computer Science and Information Technology, Vol.2, pp.258-270, 2011.
  29. Q.Zhang,S.Zhou, and X.Wei,“An efficient approach for DNA fractal-based image encryption”, Appl. Math. Inf. Sci,Vol. 5, pp.445-459,2011.
  30. R.E.Boriga, A.C.Dăscălescu, and A.V.Diaconu, “A new fast image encryption scheme based on 2D chaotic maps”, IAENG Int. Journal of Computer Science, Vol.41, No.4, pp.249-258, 2014.
  31. C.Fu, W.H. Meng, Y.F. Zhan, Z.L.Zhu, F.C.Lau, K.T.Chi, and H.F.Ma, "An efficient and secure medical image protection scheme based on chaotic maps", Computers in biology and medicine, Vol. 43, No.8, pp.1000-1010, 2013.
  32. J.Hu, and F.Han, "A pixel-based scrambling scheme for digital medical images protection", Journal of Network and Computer Applications, Vol.32, No.4, pp.788-794,2009.
  33. G.Zhou, D.Zhang, Y.Liu, Y.Yuan, and Q.Liu, "A novel image encryption algorithm based on chaos and Line map", Neurocomputing, No.169, pp.150-157, 2015.
  34. I.Bremnavas, B.Poorna, and I.R.Mohamed, "Secured medical image transmission using chaotic map", Elixir Comp. Sci. Eng, Vol.54, 2013.
  35. K.Singh, and K.Kaur, "Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it”, International Journal of Computer Applications”, Vol, 23, pp. 0975-8887, 2011.
  36. L.Gupta,R.Gupta, and M.Sharma,”Low Complexity Efficient Image Encryption Technique Based on Chaotic Map”, International Journal of, 2014.
  37. R.Kaur,”Comparative analysis and implementation of image encryption algorithms”, International Journal of Computer Science and Network Security (IJCSNS), Vol.13,No.12, 2013.
  38. P.N.Khade, and M.Narnaware,”3D chaotic functions for image encryption”, IJCSI International Journal of Computer Science Issues, Vol.9,No.3, pp.323-328,2012.
  39. S.Koppu and V.,“A novel chaotic image encryption system for color images based Arnold cat map and efficient pixel shuffling,” International Journal of Pharmacy & Technology, Vol.8, No.2, pp.13353-13361,2016
  40. S.Koppu and V., “A survey on security issues: digital images”, International Journal of Pharmacy & Technology, Vol.8, No.2, pp.13420-13427, 2016.
  41. K. Lakshmanna and N. Khare, “Constraint-Based Measures for DNA Sequence Mining using Group Search Optimization Algorithm", The Intelligent Networks and Systems Society, Vol.9, No.3, pp.91-100, 2016.
  42. H.Gao, Y.Zhang, S.Liang and D.Li, D., "A new chaotic algorithm for image encryption," Chaos Solitons & Fractals, Vol.29, No. 2,pp.393-399, 2006.
  43. F.Sun, S.Liu, Z.Li, and Z. Lü, "A novel image encryption scheme based on spatial chaos map", Chaos, Solitons & Fractals, Vol.38, No.3, pp.631-640, 2008.
  44. N.K.Pareek, V.Patidar, and K.K.Sud, "Image encry-ption using chaotic logistic map", Image and Vision Computing, Vol.24, No. 9, pp.926-934,2006.
  45. G.Chen, Y. Mao, and C.K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps", Chaos, Solitons & Fractals Vol.21, No.3, pp.749-761,2004.
  46. Y.Mao,G.Chen, and S.Lian,"A novel fast image encryption scheme based on 3D chaotic baker maps", International Journal of Bifurcation and Chaos,Vol.14, No.10, pp.3613-3624, 2004.
  47. Z.Song, L.Hengjian, and Y.Xu, "A secure and efficient fingerprint images encryption scheme", In Young Computer Scientists, 2008, The 9th International Conference, pp.2803-2808,IEEE, 2008.
  48. T.Gao, and Z.Chen,"Image encryption based on a new total shuffling algorithm",Chaos, solitons & fractals, Vol.38, No.1 pp.213-220,2008.
  49. J.Lai, S.Liang, S. and D. Cui, "A novel image encryption algorithm based on fractional Fourier transform and chaotic system", In Multimedia Communications (Mediacom), International Conference on, pp. 24-27. IEEE, 2010.
  50. C.Fu,W.H.Meng,Z.han, Y.F.,Zhu, Z.L.Lau, H.F.Ma and"An efficient and secure medical image protection scheme based on chaotic maps", Computers in biology and medicine, Vol.43, No. 8,pp.1000-1010,2013.
  51. Q.Zhang, L.Guo, and X.Wei,"Image encryption using DNA addition combining with chaotic maps", Mathematical and Computer Modelling, Vol.52, No.11,pp.2028-2035,2010.
  52. S.Mirjalili, S.M.Mirjalili, and A.Lewis,"Grey Wolf Optimizer", Advances in Engineering Software, Vol. 69, pp.46–61, 2014.
  53. R.Kaluri, C.H. Pradeep Reddy, “A Framework for Sign Gesture Recognition using Improved Genetic Algorithm and Adaptive Filter”, Cogent Engineeri ng, Vol.3, No.1, pp.1-9, 2016.
  54. C.D. Naidu, S. Koppu, V. and S.L. Aarthy,” Crystography Based Medical Image Security with LSB-Blowfish Algorithms”, ARPN Journal of Engineering and Applied Sciences,Vol.9,No.8,2014.

INASS Home | Copyright@2008 The Intelligent Networks and Systems Society