4.4 Article

A Novel Medical Image Encryption Using Rossler System

Journal

INTELLIGENT AUTOMATION AND SOFT COMPUTING
Volume 33, Issue 2, Pages 1081-1101

Publisher

TECH SCIENCE PRESS
DOI: 10.32604/iasc.2022.024023

Keywords

DNA Computing; bit-plane decomposition; permutation; encryption; chaos

Ask authors/readers for more resources

In this paper, we propose a new secure color medical image encryption algorithm based on binary plane decomposition, DNA computing, and the chaotic Rossler dynamical system. The algorithm performs bit-by-bit swap, DNA encoding, pixel value modifications, and pixel-by-pixel permutation to generate encrypted images. Experimental results show that the proposed algorithm is fast, robust, and competitive.
The technological advances made possible by the Internet, coupled with the unforeseen critical circumstances set in motion by the Covid-19 pandemic, have greatly increased the generation and transmission of medical images every day. Medical image transmission over an unsecured public network threatens the privacy of sensitive patient information. We have, in this paper, designed a new secure color medical image encryption algorithm based on binary plane decomposition, DNA (deoxyribonucleic acid) computing, and the chaotic Rossler dynamical system. At first, a bit-by-bit swap is performed on twenty four binary planes of the input image and encoded using DNA encoding rules. Thereafter, the Rossler system is used to modify the pixel values of the encoded image, which is subsequently decoded. Finally, the ciphered image is obtained by pixel-by-pixel permutation using position sequences. An innovative approach is used to compute keys from the color components of the input image. Extensive performance experiments of the proposed technique is conducted with metrics such as key sen-sitivity, key space, correlation coefficients (horizontal, diagonal and vertical direc-tions), histograms, information entropy, number of pixel changes rate (NPCR), information entropy, unified average changing intensity (UACI), and encryption time. Comparative analyses have demonstrated that the proposed algorithm is fast, robust and competitive.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.4
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available