The Importance of Validation Metrics in Chaotic Image Encryption

  • Conference paper
  • First Online:
Advances in Electrical and Computer Technologies (ICAECT 2021)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 881))

  • 608 Accesses

Abstract

Nowadays, the technological growth is remarkable in various fields and domains. Besides, the computing environments will be completely in distributed mode in near future. That is, even the development, training and testing of computing models or algorithms and other artificial intelligence algorithms will be running in several locations for many hours. Hence, the data supplied to this type of environment must be secure. The distributed environment also should be completely secured to avoid adversarial attacks. This perhaps leads to deal with different types of data in which the images are the important one. Particularly, the medical images have vital part in medical field for diagnosing and treatment of diseases. In order to provide confidentiality for medical images, several encryption algorithms are proposed. Among them chaotic encryption plays an important role. This study deals and elaborates the importance of validation metrics used for chaotic cryptosystem. Ultimately, few suggestions are also proposed for validating chaotic cryptosystem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
USD 279.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimedia Tools Appl 79(15). https://doi.org/10.1007/s11042-020-08645-8

  2. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyperchaotic system. J Syst Softw 85:290. https://doi.org/10.1016/j.jss.2011.08.017

    Article  Google Scholar 

  3. Kadir A, Hamdulla A, Guo W (2014) Color image encryption using skew tent map and hyper chaotic system of 6th order CNN. Optik 125:1671. https://doi.org/10.1016/j.ijleo.2013.09.040

    Article  Google Scholar 

  4. Liu G, Li J, Liu H (2014) Chaos-based colour pathological image encryption scheme using one-time keys. Comput Biol Med 45:111. https://doi.org/10.1016/j.compbiomed.2013.11.010

  5. Parvees MYM, Samath JA, Bose BP (2017) Medical images are safe—an enhanced chaotic scrambling approach. J Med Syst 41(10). https://doi.org/10.1007/s10916-017-0809-1

  6. Parvees MYM, Samath JA, Raj IK, Bose BP (2016) A colour byte scrambling technique for efficient image encryption based on combined chaotic map. In: Proceedings of the international conference on electrical, electronics, and optimization techniques (ICEEOT’16), pp 1067–1072, March 2016. https://doi.org/10.1109/iceeot.2016.7754851

  7. Parvees MYM, Samath JA, Bose BP (2016) Secured medical images—a chaotic pixel scrambling approach. J Med Syst 40(11):232:1–232:11. https://doi.org/10.1007/s10916-016-0611-5

  8. Parvees MYM, Samath JA, Raj IK, Nirmal RM (2017) Chaos-based steganocryptic approach to protect medical images with text data of patients. J Med Imaging Health Inf 7:118–125. https://doi.org/10.1166/jmihi.2017.1993

    Article  Google Scholar 

  9. Ragab AHM, Alla OSF, Noaman AY (2014) Encryption quality analysis of the RCBC block cipher compared with RC6 and RC5 algorithms. In: International association for cryptologic research cryptology ePrint archive

    Google Scholar 

  10. Bashir AA, Basari H, Bin AS, Hamida A (2012) A novel image encryption using an integration technique of blocks rotation based on the magic cube and the AES algorithm. Int J Comput Sci Issues (IJCSI) 9(4):41

    Google Scholar 

  11. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local shannon entropy measure with statistical tests for image randomness. Inf Sci 222(10):323–342. https://doi.org/10.1016/j.ins.2012.07.049

    Article  MathSciNet  MATH  Google Scholar 

  12. Praveenkumar P, Devi K, Ravichandran D, Avila J, Thenmozhi K, Rayappan JBB, Amirtharajan R (2017) Transreceiving of encrypted medical image—a cognitive approach. Multimedia Tools Appl. https://doi.org/10.1007/s11042-017-4741-7

    Article  Google Scholar 

  13. Liu Y, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on DNA coding. Multimedia Tools Appl 79(29–30). https://doi.org/10.1007/s11042-020-08880-z

  14. Wang X, Chen S, Zhang Y (2021) A chaotic image encryption algorithm based on random dynamic mixing. Opt Laser Technol 138(12):106837. https://doi.org/10.1016/j.optlastec.2020.106837

  15. Abbas AM, Alharbi AA, Ibrahim S (2021) A novel parallelizable chaotic image encryption scheme based on elliptic curves. IEEE Access 9:54978–54991. https://doi.org/10.1109/ACCESS.2021.3068931

    Article  Google Scholar 

  16. El-Samie FEA, Ahmed HEH, Elashry IF, Shahieen MH, Faragallah OS, El-Rabaie EM, Alshebeili SA (2014) Image encryption: a communication perspective. CRC Press, Boca Raton, Florida

    Google Scholar 

  17. Parvees MYM, Samath JA, Bose BP (2017) Protecting large size medical images with logistic map using dynamic parameters and key image. Int J Netw Sec 19(6):984–994. https://doi.org/10.6633/IJNS.201711.19(6).15

    Article  Google Scholar 

  18. Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282:2123–2127. https://doi.org/10.1016/j.optcom.2009.02.044

    Article  Google Scholar 

  19. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24. https://doi.org/10.1016/j.asoc.2015.08.008

    Article  Google Scholar 

  20. Parvees MYM (2019) Studies on the development and analysis of improved chaotic symmetric cryptographic solutions for image security. Ph.D. thesis, Bharathiar University, Coimbatore. http://hdl.handle.net/10603/301501

  21. Parvees MYM, Samath JA, Bose BP (2019) Chaotic sequences are cryptographically secure now—an improved chaotic approach. J Comput Theor Nanosci 16(4):1438–1443. https://doi.org/10.1166/jctn.2019.8056.96

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank Department of Computer and Information Science, Annamalai University authorities for providing RUSA-funded Computer Laboratory and Dr.C.P.Ramaswami Aiyar Library, Annamalai University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Y. Mohamed Parvees .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohamed Parvees, M.Y., Vijayakumar, T. (2022). The Importance of Validation Metrics in Chaotic Image Encryption. In: Sengodan, T., Murugappan, M., Misra, S. (eds) Advances in Electrical and Computer Technologies. ICAECT 2021. Lecture Notes in Electrical Engineering, vol 881. Springer, Singapore. https://doi.org/10.1007/978-981-19-1111-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1111-8_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1110-1

  • Online ISBN: 978-981-19-1111-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation