Details

Encryption of Medical Image Based on Cascaded Design of AES Block Algorithm and Chaotic Map

Gaidaa S. Mahdi

University of Technology-Iraq, Chemical Engineering Department, Baghdad, Iraq

Marwa Fadhel Jassim

University of Technology-Iraq, Control and Systems Engineering Department, Baghdad, Iraq

Mustafa Q. Ali

University of Baghdad, College of Islamic Sciences Baghdad, Iraq

1-12

Vol: 14, Issue: 3, 2024

Receiving Date: 2024-04-26 Acceptance Date:

2024-08-01

Publication Date:

2024-08-12

Download PDF

http://doi.org/10.37648/ijrst.v14i03.001

Abstract

Security concerns in the transfer of medical images have drawn a lot of attention to the topic of medical picture encryption as of late. Furthermore, recent events have brought attention to the fact that medical photographs are constantly being produced and circulated online, necessitating safeguards against their inappropriate use. To improve the design of the AES algorithm standard for medical picture encryption, this research presents several new criteria. It was created so that needs for higher levels of safety and higher levels of performance could be met. First, the pixels in the image are diffused to randomly mix them up and disperse them all over the screen. Rather than using rounds, the suggested technique utilizes a cascaded-looking composition of F-functions in a quadrate architecture. The proposed F-function architecture is a three-input, three-output Type-3 AES-Feistel network with additional integer parameters representing the subkeys in use. The suggested system makes use of the AES block cipher as a function on a Type-3 AES-Feistel network. Blocks in the proposed system are 896 bits in length, whereas keys are 128 bits. The production of subkeys is encrypted using a chain of E8- algorithms. The necessary subkeys are then generated with a recursion. The results are reviewed to verify that the new layout improves the security of the AES block cipher when used to encrypt medical images in a computer system.

Keywords: Cryptography; Block Cipher; AES; Medical image; Chaotic map, Image Encryption

References

  1. K. Jain, A. Aji and P. Krishnan, 'Medical Image Encryption Scheme Using Multiple Chaotic Maps,' Pattern Recognition Letters, vol. 152, pp. 356-364, 2021.
  2. A. T. Hashim, J. K. Amira and F. H. Qussay, 'Medical image encryption based on hybrid AES with chaotic map,' Journal of Physics: Conference Series, vol. 1973, no. 1, p. 012037, 2021.
  3. X. Wang and Y. Wang, 'Multiple medical image encryption algorithm based on scrambling of region of interest and diffusion of odd-even interleaved points,' Expert Systems with Applications, vol. 213, no. A, p. 118924, 2023.
  4. Q. Lai, C. Lai, H. Zhang and C. Li, 'Hidden coexisting hyperchaos of new memristive neuron model and its application in image encryption,' Chaos, Solitons & Fractals, vol. 158, p. 112017, 2022.
  5. Z. Hua, F. Jin, B. Xu and H. Huang, '2D Logistic-Sine-coupling map for image encryption,' Signal Processing, vol. 149, pp. 148-161, 2018.
  6. C. Zou, X. Wang, C. Zhou, S. Xu and C. Huang, 'A novel image encryption algorithm based on DNA strand exchange and diffusion,' Applied Mathematics and Computation, vol. 430, p. 127291, 2022.
  7. M. F. Jassim and A. F. Shimal, 'Biometric iris templates security based on secret image sharing and chaotic maps,' International Journal of Electrical & Computer Engineering, vol. 12, no. 1, pp. 2088-8708, 2022.
  8. Z. Hua, S. Yi and Y. Zhou, 'Medical image encryption using high-speed scrambling and pixel adaptive diffusion,' Signal Processing, vol. 144, pp. 134-144, 2018.
  9. R. S. Bhogal, B. Li, A. Gale and Y. Chen, 'Medical image encryption using chaotic map improved advanced encryption standard,' IJ Information Technology and Computer Science, vol. 8, pp. 1-10, 2018.
  10. G. Manjula and H. S. Mohan, 'A secure framework for medical image encryption using enhanced AES algorithm,' International Journal of Scientific & Technology Research, vol. 9, no. 2, pp. 3837-3841, 2020.
  11. M. W. Malik, D. Husna, I. K. E. Purnama, N. Ingrid , A. N. Hidayati and A. A. P. Ratna, 'Development of Medical Image Encryption System Using Byte-Level Base-64 Encoding and AES Encryption Method,' in 6th International Conference on Communication and Information Processing, 2020.
  12. N. Chaudhary, T. B. Shahi and A. Neupane, 'Secure image encryption using chaotic, hybrid chaotic and block cipher approach,' Journal of Imaging, vol. 8, no. 6, p. 167, 2022.
  13. S. Aarthi, K. Geetha, J. Premaladha and V. Nirmala, 'Medical color image encryption using chaotic framework and AES through Poisson regression model,' in International Conference on Wireless Communications Signal Processing and Networking, Chennai, India, 2022.
  14. L. Qiang, H. Genwen, E. Uǧur and T. Abdurrahim, 'High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map,' Applied Mathematics and Computation, vol. 442, p. 127738, 2023.
  15. A. A. Mohamed and A. H. Madian, 'A Modified Rijndael Algorithm and it's Implementation using FPGA,' in 2010 17th IEEE International Conference on Electronics, Circuits and Systems, 2010.
  16. N. Pramstaller, F. K. Gurkaynak, S. Haene, S, H. Kaeslin, N. Felber and W. Fichtner, 'Towards an AES crypto-chip resistant to differential power analysis,' in The 30th European Solid-State Circuits Conference , 2004.
  17. R. S. Mohammed and S. B. Sadkhan, 'Speech scrambler based on proposed random chaotic maps,' in 2016 Al-Sadeq International Conference on Multidisciplinary in IT and Communication Science and Applications (AIC-MITCSA), 2016.
  18. W. Xiangjun, K. Jürgen and K. Haibin , 'A robust and lossless DNA encryption scheme for color images,' Multimedia Tools and Applications, vol. 77, pp. 12349-12376, 2018.
  19. G. Liu, Wei Li, F. Xingkui, L. Zhuang, W. Yuxuan and M. Hongyang, 'An image encryption algorithm based on discrete-time alternating quantum walk and advanced encryption standard,' Entropy, vol. 24, no. 5, p. 608, 2022.
  20. A. T. Hashim, A. H. Jassem and S. A. Ali, 'A novel design of Blowfish algorithm for image security,' Journal of Physics: Conference Series, vol. 1818, no. 1, p. 012085, 2021.
  21. A. Belazi, M. Khan, A. A. Abd El-Latif and S. Belghith, 'Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption,' Nonlinear Dynamics, vol. 87, pp. 337-361, 2017.
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.