Abstract
Advancement of medical imaging in health care sector emerges new challenge of secure image transmission. Security of medical imaging is a prominent issue to keep patients information safe. In this paper an efficient and secure biomedical image encryption algorithm is proposed with two phases of encryption. In the first phase the image has to undergone a random substitution of 20 Amino Acid based Codon with one or more than alternate Codon in the form of triplets using the base DNA code (A, T, C and G) using Linear Congruential Generator. Upshot of the first phase encrypted image is divided into blocks and a logistic map is used to generate a series of unique initial condition and control parameter. Using a random ASCII character as a seed the unique initial conditions for each block is generating some Pseudo Random Number Generator. The seed is encrypted using RSA. Each block is circularly shifted using unique PRNG. These unique initial conditions and control parameters are utilized by a series of Tent Maps to perform block by block confusion in the second phase encryption using XOR operation. Keys used in both the phases are encrypted using AES technique. Proposed method is used to encrypt any biomedical and other images also. All type of security measure such as Differential attack, key space analysis to resist Brute force attack, Correlation analysis, key sensitivity test, resistance to Noise attack and plain text attack along with time analysis has been taken into consideration to test the vulnerability of the proposed algorithm. From the comparative study the proposed method outperform in many aspects than the existing methods.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig12a_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig12b_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig16_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig17_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig18_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig19_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig20_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig21_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig22_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig23_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig24_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-020-09930-2/MediaObjects/11042_2020_9930_Fig25_HTML.png)
Similar content being viewed by others
References
Abanda Y, Tiedeu A (2016) Image encryption by chaos mixing. IET Image Process 10(10):742–750
Abdelfatah RI, Nasr ME, Alsharqawy MA (2020) Encryption for multimedia based on chaotic map: several scenarios. Multimed Tools Appl 79:19717–19738. https://doi.org/10.1007/s11042-020-08788-8
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816
Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly auto correlated data in encryption algorithms. Nonlinear Dyn 82:1839–1850
Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75:13951–13976. https://doi.org/10.1007/s11042-015-2973-y
Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel tolerant image encryption scheme. Wirel Pers Commun 77:2771–2791
Banik A, Shamsi Z, Laiphrakpama DS (2019) An encryption scheme for securing multiple medical images. J Inf Secur Applic, Elsevier 49:102398
Bansal R, Gupta S, Sharma G (2016) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76:16529–16562. https://doi.org/10.1007/s11042-016-3926-9
Barik RC, Sahu SS, Changder S (2018) A novel smooth texture-based visual cryptography approach for secure communication. Int J Electron Secur Digit Forensics 10(2):109–137
Belazi A, Talha M, Kharbech S, **ang W (2018) Novel medical image encryption scheme based on Chaos and DNA encoding. 7:36667–36681. https://doi.org/10.1109/ACCESS.2019.2906292
Cao F, Huanga HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196
Cao W, Zhou Y, Chen CLP, **a L (2016) Medical image encryption using edge maps. Signal Process. https://doi.org/10.1016/j.sigpro.2016.10.003
Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419–35453. https://doi.org/10.1007/s11042-019-08168-x
Chen J, Chen L, Zhang LY (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301–322
Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic map**. Saudi J Biol Sci 24:1821–1827
Chunhu L, Guangchun L, Ke Q, Chunbao L (2016) An image encryption scheme based on chaotic tent map. Nonlinear Dyn. https://doi.org/10.1007/s11071-016-3030-8
Das JK, Das P, Ray KK, Choudhury PP, Jana SS (2016) Mathematical characterization of protein sequences using patterns as chemical group combinations of amino acids. PLoS One 11(12):e0167651
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284:5415–5423
Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010
Gonzalez RC, Woods RE (2008) Digital image processing. Pearson education, Inc., Upper Saddle River, New Jersey
Hasimoto-Beltran R, Al-Masalas F, Khokhar A (2011) Performance evaluation of chaotic and conventional encryption on portable and Mobile platforms. In: Kocarev L, Lian S (eds) Chaos-based cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg, pp 375–395
Hussain N, Rahman U, Balamuruganm C, Mariappan R (2015) A novel DNA computing based encryption and decryption algorithm. Procedia Comput Sci 46:463–475
Ismail SM, Said LA, Radwan AG, Madian AH, Abu-Elyazeed MF (2018) Generalized double-humped logistic map-based medical image encryption. J Adv Res 10:85–98
Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24:98–116
Kaur M annd Kumar V (2018). Adaptive differential evolution-based Lorenz chaotic system for image encryption. Arab J Sci Eng 43:8127–8144. https://doi.org/10.1007/s13369-018-3355-3
Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78:26203–26222. https://doi.org/10.1007/s11042-019-07818-4
Lawande QV, Ivan BR, Dhodapkar SD (2005) Chaos based cryptography: a new approach to secure communications, Barc Lett, N°258, 1–11.
Mirazaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557–566
Mozaffari S (2018) Parallel image encryption with bitplane decomposition and genetic algorithm. Multimed Tools Appl 77:25799–25819. https://doi.org/10.1007/s11042-018-5817-8
Naz F, Shoukat IA, Ashraf R, Iqbal U, Rauf A (2020) An ASCII based effective and multi-operation image encryption method. Multimed Tools Appl 79:22107–22129
Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137–2150
Shafique A, Shahid J (2018) Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 133:331
Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895
Talarposhti KM, Jamie MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34
Wang X, Wang Y, Zhu X, Unar S (2019) Image encryption scheme based on Chaos and DNA plane operations. Multimed Tools Applic 78:26111–26128
Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522
Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346
Wen H, Yu S (2019) Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 134(337):1–16
Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Mathematical Problems in Engineering 2015:1–11. https://doi.org/10.1155/2015/913476
Zhou Y, Cao W, Chen CLP (2014) Image encryption using binary bitplane. Signal Process 100:197–207
Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybernet 43:515–529
Zhou Q, Wong KW, Liao X, ** Based Permutation Approach. Mathematical Problems in Engineering 2015:1–9. https://doi.org/10.1155/2015/940638
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Barik, R.C., Changder, S. A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps. Multimed Tools Appl 80, 10723–10760 (2021). https://doi.org/10.1007/s11042-020-09930-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09930-2