Image Encryption and Decryption Using Key Sequence of Triple Logistic Map for Medical Applications

S. Rohith, L. Jahnavi, S. Bhuvaneshwari, S. Supreeth, B. Sujatha
{"title":"Image Encryption and Decryption Using Key Sequence of Triple Logistic Map for Medical Applications","authors":"S. Rohith, L. Jahnavi, S. Bhuvaneshwari, S. Supreeth, B. Sujatha","doi":"10.1109/ICAECC50550.2020.9339529","DOIUrl":null,"url":null,"abstract":"In the present world scenario, security of medical images from unauthorized access is one of the key challenges. This paper provides one of the solutions to solve the security of medical images. The proposed scheme uses a combination of key sequences of Triple Logistic Map (TLM) for the encryption process. To generate the key sequence Logistic function is used with initial value X<inf>0</inf>and r. The three key sequences{X <sup>11</sup>}, {X<inf>2i</inf>and {X<inf>3i</inf>} with different initial value are used (X<inf>10</inf>:/ X<inf>20</inf> :/ X<inf>30</inf>) with r=3.99. The key sequences {X<inf>li</inf>}‘ {X<inf>2i</inf>} and {X<inf>3i</inf>} are converted into discrete key sequence {K<inf>li</inf>}, {K<inf>2i</inf>} and {K<inf>3i</inf>} in the range of 0 to 255. The combined key sequence {K<inf>i</inf>} is obtained using bit by bit logical XOR operation between {K<inf>li</inf>}, {K<inf>2i</inf>}, and {K<inf>3i</inf>}. The resultant Key sequence {Ki} is used forthe encryption process of the medical image. To evaluate the performance of the proposed scheme different grayscale images are chosen. The proposed TLM based image encryption scheme is compared with the encryption scheme using (i) Logistic Map (LM) alone ii) Double Logistic Map (DLM). To evaluate the proposed scheme parameters such as (i) Visual analysis (ii) Histogram plot (iii) Mean Square Error (MSE) iv) Correlation (v) Entropyis used. The simulation result shows that the proposed TLM based scheme provides better performance and immune to statistical attacks.","PeriodicalId":196343,"journal":{"name":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Third International Conference on Advances in Electronics, Computers and Communications (ICAECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAECC50550.2020.9339529","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

In the present world scenario, security of medical images from unauthorized access is one of the key challenges. This paper provides one of the solutions to solve the security of medical images. The proposed scheme uses a combination of key sequences of Triple Logistic Map (TLM) for the encryption process. To generate the key sequence Logistic function is used with initial value X0and r. The three key sequences{X 11}, {X2iand {X3i} with different initial value are used (X10:/ X20 :/ X30) with r=3.99. The key sequences {Xli}‘ {X2i} and {X3i} are converted into discrete key sequence {Kli}, {K2i} and {K3i} in the range of 0 to 255. The combined key sequence {Ki} is obtained using bit by bit logical XOR operation between {Kli}, {K2i}, and {K3i}. The resultant Key sequence {Ki} is used forthe encryption process of the medical image. To evaluate the performance of the proposed scheme different grayscale images are chosen. The proposed TLM based image encryption scheme is compared with the encryption scheme using (i) Logistic Map (LM) alone ii) Double Logistic Map (DLM). To evaluate the proposed scheme parameters such as (i) Visual analysis (ii) Histogram plot (iii) Mean Square Error (MSE) iv) Correlation (v) Entropyis used. The simulation result shows that the proposed TLM based scheme provides better performance and immune to statistical attacks.
基于三重逻辑映射密钥序列的图像加解密医学应用
在当今世界的情况下,医学图像的安全,从未经授权的访问是一个关键的挑战。本文提出了一种解决医学图像安全问题的方案。该方案采用三层逻辑映射(TLM)的密钥序列组合进行加密。为了生成键序列,使用初始值为x0和r的Logistic函数,使用初始值不同的三个键序列{x11}, {x2i}和{X3i} (X10:/ X20:/ X30), r=3.99。将键序列{Xli} ' {X2i}和{X3i}转换为0 ~ 255范围内的离散键序列{Kli}、{K2i}和{K3i}。组合键序列{Ki}是通过{Kli}、{K2i}、{K3i}之间的逐位逻辑异或运算得到的。生成的密钥序列{Ki}用于医学图像的加密过程。为了评估该方案的性能,选择了不同的灰度图像。将提出的基于TLM的图像加密方案与仅使用Logistic Map (LM)和双Logistic Map (DLM)的加密方案进行了比较。为了评估所提出的方案参数,如(i)视觉分析(ii)直方图(iii)均方误差(MSE) iv)相关性(v)使用的熵。仿真结果表明,基于TLM的方案具有更好的性能和抗统计攻击能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信