An Enhanced Security in Medical Image Encryption Using Dynamic Chaotic Fuzzy Based Technique

Q3 Computer Science 中国图象图形学报 Pub Date : 2023-12-01 DOI:10.18178/joig.11.4.376-383
Snehashish Bhattacharjee, Mousumi Gupta, Biswajoy Chatterjee
{"title":"An Enhanced Security in Medical Image Encryption Using Dynamic Chaotic Fuzzy Based Technique","authors":"Snehashish Bhattacharjee, Mousumi Gupta, Biswajoy Chatterjee","doi":"10.18178/joig.11.4.376-383","DOIUrl":null,"url":null,"abstract":"As IoT and cloud computing have grown in popularity, medical images are now often transmitted between devices or accessed directly from the cloud. With this, the security is always a concern as these images are prone to many types of attack. We have proposed a proven method that is efficient in terms of security, time complexity, and integrity in order to be cloud-friendly so that it may be launched into the cloud and made accessible to users at any time. The goal of the work is to create a dynamic key that, depending on fuzzy values, alters the reproduction rate parameters with each repetition. By applying the last chaotic value created from the previous iteration, the fuzzy triangular membership function has been used in this manner to generate the reproduction rate parameter. The uniqueness and major benefit of the suggested strategy are that it can increase the security of the algorithm that makes use of a chaotic map and a static key. The method has been put forth when designing algorithms so that it should not only demonstrate security against different attacks but also provide efficiency towards computational complexity. The technique has been tested against a set of images and an existing algorithm using a variety of security metrics, including the correlation coefficient, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), and entropy. It has been determined from the comparative analysis that the proposed approach can make the existing algorithm more secure.","PeriodicalId":36336,"journal":{"name":"中国图象图形学报","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"中国图象图形学报","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.18178/joig.11.4.376-383","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 0

Abstract

As IoT and cloud computing have grown in popularity, medical images are now often transmitted between devices or accessed directly from the cloud. With this, the security is always a concern as these images are prone to many types of attack. We have proposed a proven method that is efficient in terms of security, time complexity, and integrity in order to be cloud-friendly so that it may be launched into the cloud and made accessible to users at any time. The goal of the work is to create a dynamic key that, depending on fuzzy values, alters the reproduction rate parameters with each repetition. By applying the last chaotic value created from the previous iteration, the fuzzy triangular membership function has been used in this manner to generate the reproduction rate parameter. The uniqueness and major benefit of the suggested strategy are that it can increase the security of the algorithm that makes use of a chaotic map and a static key. The method has been put forth when designing algorithms so that it should not only demonstrate security against different attacks but also provide efficiency towards computational complexity. The technique has been tested against a set of images and an existing algorithm using a variety of security metrics, including the correlation coefficient, Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI), and entropy. It has been determined from the comparative analysis that the proposed approach can make the existing algorithm more secure.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用基于动态混沌模糊技术提高医学图像加密的安全性
随着物联网和云计算的普及,医疗图像现在经常在设备之间传输或直接从云中访问。因此,安全性总是一个问题,因为这些图像容易受到多种类型的攻击。我们已经提出了一种经过验证的方法,该方法在安全性、时间复杂性和完整性方面都是有效的,以便于云友好,以便可以将其启动到云中并随时供用户访问。这项工作的目标是创建一个动态键,根据模糊值,每次重复都会改变复制速率参数。利用前一次迭代产生的最后一个混沌值,利用模糊三角隶属函数生成再现率参数。所建议的策略的惟一性和主要优点是,它可以提高使用混沌映射和静态密钥的算法的安全性。在设计算法时提出了这种方法,既要证明对不同攻击的安全性,又要对计算复杂度提供效率。该技术已经针对一组图像和使用各种安全度量的现有算法进行了测试,包括相关系数、像素变化率(NPCR)、统一平均变化强度(UACI)和熵。对比分析表明,本文提出的方法可以提高现有算法的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
中国图象图形学报
中国图象图形学报 Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
1.20
自引率
0.00%
发文量
6776
期刊最新文献
Roselle Pest Detection and Classification Using Threshold and Template Matching Human Action Recognition with Skeleton and Infrared Fusion Model Melanoma Detection Based on SVM Using MATLAB Evaluation of SSD Architecture for Small Size Object Detection: A Case Study on UAV Oil Pipeline MonitoringEvaluation of SSD Architecture for Small Size Object Detection: A Case Study on UAV Oil Pipeline Monitoring Improving Brain Tumor Classification Efficacy through the Application of Feature Selection and Ensemble Classifiers
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1