Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Improved Lightweight Image Encryption and Decryption for Medical IoT Devices Using 6D Chaotic Maps with XOR Diffusion, Permutation and Substitution

View through CrossRef
This research introduces a lightweight image encryption framework specifically designed for medical IoT devices, utilising a 6D chaotic map in conjunction with XOR diffusion, pixel permutation, and an optional substitution layer. The methodology utilises the intrinsic randomness, ergodicity, and sensitivity of high-dimensional chaotic systems to achieve robust encryption and secure transmission of sensitive medical images, including X-rays, MRIs, and ECGs. Comprehensive evaluations indicate that the framework effectively disrupts spatial coherence, attaining nearly zero pixel correlation and high entropy (~8), while maintaining computational efficiency suitable for resource-constrained IoT environments. The encryption scheme demonstrates significant sensitivity to input variations, with an average NPCR of 99.6% and a UACI surpassing 33%, highlighting its robustness against differential and statistical attacks. The comparative analysis of traditional and lower-dimensional chaotic encryption methods reveals that the proposed algorithm offers a superior balance between cryptographic security and performance. The findings demonstrate that the proposed system is a feasible solution for real-time, secure image processing in medical IoT applications. Future research will investigate adaptive parameter tuning and the integration of machine learning to improve encryption efficiency and robustness.
Title: Improved Lightweight Image Encryption and Decryption for Medical IoT Devices Using 6D Chaotic Maps with XOR Diffusion, Permutation and Substitution
Description:
This research introduces a lightweight image encryption framework specifically designed for medical IoT devices, utilising a 6D chaotic map in conjunction with XOR diffusion, pixel permutation, and an optional substitution layer.
The methodology utilises the intrinsic randomness, ergodicity, and sensitivity of high-dimensional chaotic systems to achieve robust encryption and secure transmission of sensitive medical images, including X-rays, MRIs, and ECGs.
Comprehensive evaluations indicate that the framework effectively disrupts spatial coherence, attaining nearly zero pixel correlation and high entropy (~8), while maintaining computational efficiency suitable for resource-constrained IoT environments.
The encryption scheme demonstrates significant sensitivity to input variations, with an average NPCR of 99.
6% and a UACI surpassing 33%, highlighting its robustness against differential and statistical attacks.
The comparative analysis of traditional and lower-dimensional chaotic encryption methods reveals that the proposed algorithm offers a superior balance between cryptographic security and performance.
The findings demonstrate that the proposed system is a feasible solution for real-time, secure image processing in medical IoT applications.
Future research will investigate adaptive parameter tuning and the integration of machine learning to improve encryption efficiency and robustness.

Related Results

A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
Abstract To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper. This algorit...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
As the world keeps advancing, the need for automated interconnected devices has started to gain significance; to cater to the condition, a new concept Internet of Things (IoT) has ...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by...

Back to Top