Log in

A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Advancement of medical imaging in health care sector emerges new challenge of secure image transmission. Security of medical imaging is a prominent issue to keep patients information safe. In this paper an efficient and secure biomedical image encryption algorithm is proposed with two phases of encryption. In the first phase the image has to undergone a random substitution of 20 Amino Acid based Codon with one or more than alternate Codon in the form of triplets using the base DNA code (A, T, C and G) using Linear Congruential Generator. Upshot of the first phase encrypted image is divided into blocks and a logistic map is used to generate a series of unique initial condition and control parameter. Using a random ASCII character as a seed the unique initial conditions for each block is generating some Pseudo Random Number Generator. The seed is encrypted using RSA. Each block is circularly shifted using unique PRNG. These unique initial conditions and control parameters are utilized by a series of Tent Maps to perform block by block confusion in the second phase encryption using XOR operation. Keys used in both the phases are encrypted using AES technique. Proposed method is used to encrypt any biomedical and other images also. All type of security measure such as Differential attack, key space analysis to resist Brute force attack, Correlation analysis, key sensitivity test, resistance to Noise attack and plain text attack along with time analysis has been taken into consideration to test the vulnerability of the proposed algorithm. From the comparative study the proposed method outperform in many aspects than the existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14.
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

References

  1. Abanda Y, Tiedeu A (2016) Image encryption by chaos mixing. IET Image Process 10(10):742–750

    Article  Google Scholar 

  2. Abdelfatah RI, Nasr ME, Alsharqawy MA (2020) Encryption for multimedia based on chaotic map: several scenarios. Multimed Tools Appl 79:19717–19738. https://doi.org/10.1007/s11042-020-08788-8

  3. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816

    Article  Google Scholar 

  4. Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly auto correlated data in encryption algorithms. Nonlinear Dyn 82:1839–1850

    Article  Google Scholar 

  5. Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75:13951–13976. https://doi.org/10.1007/s11042-015-2973-y

    Article  Google Scholar 

  6. Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel tolerant image encryption scheme. Wirel Pers Commun 77:2771–2791

    Article  Google Scholar 

  7. Banik A, Shamsi Z, Laiphrakpama DS (2019) An encryption scheme for securing multiple medical images. J Inf Secur Applic, Elsevier 49:102398

    Google Scholar 

  8. Bansal R, Gupta S, Sharma G (2016) An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimed Tools Appl 76:16529–16562. https://doi.org/10.1007/s11042-016-3926-9

    Article  Google Scholar 

  9. Barik RC, Sahu SS, Changder S (2018) A novel smooth texture-based visual cryptography approach for secure communication. Int J Electron Secur Digit Forensics 10(2):109–137

    Article  Google Scholar 

  10. Belazi A, Talha M, Kharbech S, **ang W (2018) Novel medical image encryption scheme based on Chaos and DNA encoding. 7:36667–36681. https://doi.org/10.1109/ACCESS.2019.2906292

  11. Cao F, Huanga HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196

    Article  Google Scholar 

  12. Cao W, Zhou Y, Chen CLP, **a L (2016) Medical image encryption using edge maps. Signal Process. https://doi.org/10.1016/j.sigpro.2016.10.003

  13. Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419–35453. https://doi.org/10.1007/s11042-019-08168-x

    Article  Google Scholar 

  14. Chen J, Chen L, Zhang LY (2019) Medical image cipher using hierarchical diffusion and non-sequential encryption. Nonlinear Dyn 96:301–322

    Article  Google Scholar 

  15. Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic map**. Saudi J Biol Sci 24:1821–1827

    Article  Google Scholar 

  16. Chunhu L, Guangchun L, Ke Q, Chunbao L (2016) An image encryption scheme based on chaotic tent map. Nonlinear Dyn. https://doi.org/10.1007/s11071-016-3030-8

  17. Das JK, Das P, Ray KK, Choudhury PP, Jana SS (2016) Mathematical characterization of protein sequences using patterns as chemical group combinations of amino acids. PLoS One 11(12):e0167651

    Article  Google Scholar 

  18. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

  19. Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284:5415–5423

    Article  Google Scholar 

  20. Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010

    Article  Google Scholar 

  21. Gonzalez RC, Woods RE (2008) Digital image processing. Pearson education, Inc., Upper Saddle River, New Jersey

    Google Scholar 

  22. Hasimoto-Beltran R, Al-Masalas F, Khokhar A (2011) Performance evaluation of chaotic and conventional encryption on portable and Mobile platforms. In: Kocarev L, Lian S (eds) Chaos-based cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg, pp 375–395

    Chapter  Google Scholar 

  23. Hussain N, Rahman U, Balamuruganm C, Mariappan R (2015) A novel DNA computing based encryption and decryption algorithm. Procedia Comput Sci 46:463–475

    Article  Google Scholar 

  24. Ismail SM, Said LA, Radwan AG, Madian AH, Abu-Elyazeed MF (2018) Generalized double-humped logistic map-based medical image encryption. J Adv Res 10:85–98

    Article  Google Scholar 

  25. Kanso A, Ghebleh M (2015) An efficient and robust image encryption scheme for medical applications. Commun Nonlinear Sci Numer Simul 24:98–116

    Article  MathSciNet  Google Scholar 

  26. Kaur M annd Kumar V (2018). Adaptive differential evolution-based Lorenz chaotic system for image encryption. Arab J Sci Eng 43:8127–8144. https://doi.org/10.1007/s13369-018-3355-3

  27. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78:26203–26222. https://doi.org/10.1007/s11042-019-07818-4

    Article  Google Scholar 

  28. Lawande QV, Ivan BR, Dhodapkar SD (2005) Chaos based cryptography: a new approach to secure communications, Barc Lett, N°258, 1–11.

  29. Mirazaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557–566

    Article  MathSciNet  Google Scholar 

  30. Mozaffari S (2018) Parallel image encryption with bitplane decomposition and genetic algorithm. Multimed Tools Appl 77:25799–25819. https://doi.org/10.1007/s11042-018-5817-8

    Article  Google Scholar 

  31. Naz F, Shoukat IA, Ashraf R, Iqbal U, Rauf A (2020) An ASCII based effective and multi-operation image encryption method. Multimed Tools Appl 79:22107–22129

    Article  Google Scholar 

  32. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Forensics Secur 13(9):2137–2150

    Article  Google Scholar 

  33. Shafique A, Shahid J (2018) Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 133:331

    Article  Google Scholar 

  34. Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895

    Article  Google Scholar 

  35. Talarposhti KM, Jamie MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34

    Article  Google Scholar 

  36. Wang X, Wang Y, Zhu X, Unar S (2019) Image encryption scheme based on Chaos and DNA plane operations. Multimed Tools Applic 78:26111–26128

    Article  Google Scholar 

  37. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522

    Article  Google Scholar 

  38. Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346

    Article  MathSciNet  Google Scholar 

  39. Wen H, Yu S (2019) Cryptanalysis of an image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 134(337):1–16

    Google Scholar 

  40. Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Mathematical Problems in Engineering 2015:1–11. https://doi.org/10.1155/2015/913476

  41. Zhou Y, Cao W, Chen CLP (2014) Image encryption using binary bitplane. Signal Process 100:197–207

    Article  Google Scholar 

  42. Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybernet 43:515–529

    Article  Google Scholar 

  43. Zhou Q, Wong KW, Liao X, ** Based Permutation Approach. Mathematical Problems in Engineering 2015:1–9. https://doi.org/10.1155/2015/940638

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ram Chandra Barik.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Barik, R.C., Changder, S. A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps. Multimed Tools Appl 80, 10723–10760 (2021). https://doi.org/10.1007/s11042-020-09930-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09930-2

Keywords

Navigation