Md. Siddiqur Rahman Tanveer, K. R. Alam, Y. Morimoto
{"title":"A multi-stage chaotic encryption technique for medical image","authors":"Md. Siddiqur Rahman Tanveer, K. R. Alam, Y. Morimoto","doi":"10.1080/19393555.2021.1934197","DOIUrl":null,"url":null,"abstract":"ABSTRACT Usually, medical image relates to the disease. Its pixel distortion may cause an erroneous diagnosis. The multiple chaos-based encryptions can protect it significantly due to high sensitive control parameters. This paper proposes a multi-stage chaotic encryption technique by consecutively adopting Logistic map and Lorenz attractor to enrich the security level. At first, the usage of the Logistic map converts the plain medical image into a confusing image. Now, a confusion key encrypts this blur image. Later on, the involvement of the Lorenz attractor generates the final cipher image. Lastly, different security and statistical analyses including the National Institute of Standards and Technology (NIST) randomness test and comparisons ensure the strength of the cipher.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Security Journal: A Global Perspective","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/19393555.2021.1934197","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
ABSTRACT Usually, medical image relates to the disease. Its pixel distortion may cause an erroneous diagnosis. The multiple chaos-based encryptions can protect it significantly due to high sensitive control parameters. This paper proposes a multi-stage chaotic encryption technique by consecutively adopting Logistic map and Lorenz attractor to enrich the security level. At first, the usage of the Logistic map converts the plain medical image into a confusing image. Now, a confusion key encrypts this blur image. Later on, the involvement of the Lorenz attractor generates the final cipher image. Lastly, different security and statistical analyses including the National Institute of Standards and Technology (NIST) randomness test and comparisons ensure the strength of the cipher.