Javascript must be enabled to continue!
Medical image encryption algorithm based on hyper‐chaotic system and DNA coding
View through CrossRef
AbstractWith the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ensure the security of patients' medical information such as patients' records, examination reports, images and so on. In this article, an image encryption scheme based on Secure Hash Algorithm 3 (SHA‐3), DNA coding and high dimensional chaos system is proposed to promote the security level of medical images in information sharing processes such as over the network. First, SHA‐3 algorithm is used to calculate the hash value of the input image, and the result is taken as the initial value of the hyper‐chaotic system. Second, the intensity value of the input image is converted into a serial binary digital stream. Third, the pseudo‐random sequence generated by a 4‐dimensional hyper‐chaotic system is used to perturb the bit stream globally so as to achieve the purpose of hiding the effective information of the input image. During the operation of hyper‐chaotic sequence and DNA sequence, algebraic and complementary operations are performed on DNA encoding values to enhance encryption performance. Finally, simulations have been applied on an open‐source medical image database, and the results demonstrate obvious encryption effectiveness and high security level of the proposed encryption algorithm in the robustness of noise and clipping attacks.
Institution of Engineering and Technology (IET)
Title: Medical image encryption algorithm based on hyper‐chaotic system and DNA coding
Description:
AbstractWith the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation.
In this process, it is important to ensure the security of patients' medical information such as patients' records, examination reports, images and so on.
In this article, an image encryption scheme based on Secure Hash Algorithm 3 (SHA‐3), DNA coding and high dimensional chaos system is proposed to promote the security level of medical images in information sharing processes such as over the network.
First, SHA‐3 algorithm is used to calculate the hash value of the input image, and the result is taken as the initial value of the hyper‐chaotic system.
Second, the intensity value of the input image is converted into a serial binary digital stream.
Third, the pseudo‐random sequence generated by a 4‐dimensional hyper‐chaotic system is used to perturb the bit stream globally so as to achieve the purpose of hiding the effective information of the input image.
During the operation of hyper‐chaotic sequence and DNA sequence, algebraic and complementary operations are performed on DNA encoding values to enhance encryption performance.
Finally, simulations have been applied on an open‐source medical image database, and the results demonstrate obvious encryption effectiveness and high security level of the proposed encryption algorithm in the robustness of noise and clipping attacks.
Related Results
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Genome wide hypomethylation and youth-associated DNA gap reduction promoting DNA damage and senescence-associated pathogenesis
Genome wide hypomethylation and youth-associated DNA gap reduction promoting DNA damage and senescence-associated pathogenesis
Abstract
Background: Age-associated epigenetic alteration is the underlying cause of DNA damage in aging cells. Two types of youth-associated DNA-protection epigenetic mark...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Echinococcus granulosus in Environmental Samples: A Cross-Sectional Molecular Study
Echinococcus granulosus in Environmental Samples: A Cross-Sectional Molecular Study
Abstract
Introduction
Echinococcosis, caused by tapeworms of the Echinococcus genus, remains a significant zoonotic disease globally. The disease is particularly prevalent in areas...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...

