Abstract
Sensitive multimedia information of all forms is encrypted, with key, before storage and transmission, to protect from illegal use and data manipulation. Since digital images are larger, it’s crucial to encrypt the content, specifically in medical images effectively. In medical image diagnosis, even a small manipulation of data may lead to misinterpretation. This paper addresses this concern by devising an algorithm suitable for encrypting DICOM and other types of images. RC6 cipher is used for encrypting the approximation coefficients (LL), obtained by applying the Haar wavelet transform on the plain image and combined with the redistributed (confused) detailed coefficients (LH, HL, HH). Generation of keys through governing equations of Combined Logistical Tent map, adds to the robustness of the algorithm against attacks. This algorithm works well for all types of images, including DICOM. Among several image databases available, 30 different modalities of images have been taken for experimentation, and promising results have been achieved. Results show that on an average, for an image of bit-depth eight, the proposed encryption algorithm provides the PSNR of 9.0955 dB, the entropy of 7.9990 bits for an encrypted image and, with a UACI of 33.4549 and NPCR of 99.6129, the algorithm could effectively defy the statistical and differential attacks.
Similar content being viewed by others
References
Aashiq Banu S, Amirtharajan R (2020) Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed Tools Appl 79:28807–28824. https://doi.org/10.1007/s11042-020-09501-5
Aashiq Banu S, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput 58(7):1445–1458. https://doi.org/10.1007/s11517-020-02178-w
Aashiq Banu S, Amirtharajan R (2020) Bio-inspired cryptosystem on reciprocal domain-DNA strands mutate to secure health data. Frontiers of Information Technology & Electronic Engineering:1–16. https://doi.org/10.1631/FITEE.2000071
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(8):2129–2151
Arroyo D, Alvarez G, Fernandez V (2008) On the inadequacy of the logistic map for cryptographic applications
Banik A, Shamsi Z, Laiphrakpam DS (2019) An encryption scheme for securing multiple medical images. J Inf Secur Appl vol. 49
Benssalah M, Rhaskali Y, Azzaz MS (2018) Medical images encryption based on elliptic curve cryptography and chaos theory, in 2018 International Conference on Smart Communications in Network Technologies, SaCoNeT 2018, pp. 222–226
Benssalah M, Rhaskali Y, Drouiche K (2021) An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl 80:2081–2107. https://doi.org/10.1007/s11042-020-09775-9
Bentoutou Y, Bensikaddour E-H, Taleb N, Bounoua N (2020) An improved image encryption algorithm for satellite applications. Adv Space Res 1:176–192
Boussif M, Aloui N, Cherif A (May 2020) Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher. IET Image Process 14(6):1209–1216
Cao W, Zhou Y, Chen CLP, Xia L (2017) Medical image encryption using edge maps. Signal Process 132:96–109
Chaos Theory and the Logistic Map – Geoff Boeing. (n.d.) [Online]. Available: https://geoffboeing.com/2015/03/chaos-theory-logistic-map/. [Accessed: 02-Jan-2020]
Diamond LPH, Thompson K (2017) Phys 221A lecture notes - lyapunov exponents and their relation to entropy, vol. 16, no. M: 1–11
DICOM Library (2020) DICOM library - anonymize, share, view DICOM files ONLINE, 2019. [Online]. Available: https://www.dicomlibrary.com/. [Accessed: 02-Jan-2020].
Dzwonkowski M, Rykaczewski R (Jan. 2019) Secure quaternion feistel cipher for DICOM images. IEEE Trans Image Process 28(1):371–380
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284
Fu XQ, Liu BC, Xie YY, Li W, Liu Y (2018) Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics J 10(3)
Haddad S, Coatrieux G, Moreau-Gaudry A, Cozic M (2020) Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Trans Inf Forensics Secur 15:2556–2569
Hsiao HI, Lee J (2015) Fingerprint image cryptography based on multiple chaotic systems. Signal Process 113:169–181
Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci (Ny) 480:403–419
Image Databases (2001) http://www.imageprocessingplace.com/root_files_V3/ image_databases.htm [Accessed: 03-Feb-2021].
Jakimoski G, Kocarev L (2001) Analysis of some recently proposed chaos-based encryption algorithms. Phys Lett Sect A Gen At Solid State Phys 291(6):381–384
Kang X, Luo X, Zhang X, Jiang J (Jul. 2019) Homogenized Chebyshev-Arnold map and its application to color image encryption. IEEE Access 7:114459–114471
Kaur M, Kumar V (Dec. 2018) Adaptive differential evolution-based Lorenz chaotic system for image encryption. Arab J Sci Eng 43(12):8127–8144
Kerckhoffs - Cryptographie militaire. (2020) [Online]. Available: https://www.petitcolas.net/kerckhoffs/. [Accessed: 02-Jan-2020].
Lakshmi C, Thenmozhi K, Rayappan JBB, Rajagopalan S, Amirtharajan R, Chidambaram N (2020) Neural-assisted image-dependent encryption scheme for medical image cloud storage. Neural Comput & Applic. https://doi.org/10.1007/s00521-020-05447-9
Lawnik M (2018) Combined logistic and tent map. J Phys Conf Ser 1141(1):12132
Li S, Mou X, Cai Y (2001) Improving security of a chaotic encryption approach. Phys Lett Sect A Gen At Solid State Phys 290(3–4):127–133
Li C, Luo G, Qin K, Li C (2017) An image encryption scheme based on chaotic tent map. Nonlinear Dyn 87(1):127–133
Lima JB, Madeiro F, Sales FJR (Jul. 2015) Encryption of medical images based on the cosine number transform. Signal Process Image Commun 35:1–8
MIDAS - Head Axial DICOM (2020) [Online]. Available: http://insight-journal.org/midas/item/view/2461. [Accessed: 02-Jan-2020]
MIDAS - Ultrasound 3D CIRS 57 phantom data set (2020) [Online]. Available: http://insight-journal.org/midas/item/view/943. [Accessed: 02-Jan-2020]
Murugan B, Nanjappa Gounder AG (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Comput Vis 10(6):593–602
Oteko Tresor L, Sumbwanyambe M (Jul. 2019) A selective image encryption scheme based on 2D DWT, Henon map and 4D qi hyper-Chaos. IEEE Access 7:103463–103472
Patient Contributed image repository (2020) Downloads available. [Online]. Available: http://www.pcir.org/researchers/downloads_available.html. [Accessed: 02-Jan-2020].
Rajagopalan S, Poori S, Narasimhan M, Rethinam S, Vallipalayam Kuppusamy C, Balasubramanian R, Moorthi Paramasivam Annamalai V, Rengarajan A (2020) Chua’s diode and strange attractor: a three-layer hardware–software co-design for medical image confidentiality. IET Image Process 14:1248–1256. https://doi.org/10.1049/iet-ipr.2019.0562
RC6 and RC5 Test Vectors For Multiple Block Sizes. (2019) [Online]. Available: https://tools.ietf.org/id/draft-krovetz-rc6-rc5-vectors-00.html. [Accessed: 25-Nov-2019].
Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic S-boxes and chaotic maps. 3D Res 7(1):1–8
Rivest R, Robshaw MJB, Sidney R, Yin YL (1998) The RC6 Block Cipher, First Adv Encryption
Rubo medical (2019) Sample DICOM files. [Online]. Available: https://www.rubomedical.com/dicom_files/index.html. [Accessed: 20-Dec-2019].
Summary E (2001) Analysis of RC6
Wang M, Wang X, Zhang Y, Gao Z (Dec. 2018) A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt Laser Technol 108:558–573
Wu X, Zhu B, Hu Y, Ran Y (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429–6436
Xu J, Li P, Yang F, Yan H (2019) High intensity image encryption scheme based on quantum logistic chaotic map and complex Hyperchaotic system. IEEE Access 7:167904–167918
Yavuz E (2019) A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Opt Laser Technol 114:224–239
Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci (Ny) 450:361–377
Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11–12):2028–2035
Zhang LB, Zhu ZL, Yang BQ, Liu WY, Zhu HF, Zou MY (2015) Medical image encryption and compression scheme using compressive sensing and pixel swapping based permutation approach. Math Probl Eng, vol. 2015
Zhao CF, Ren HP (2020) Image encryption based on hyper-chaotic multi-attractors. Nonlinear Dyn 100:679–698. https://doi.org/10.1007/s11071-020-05526-5
Zhou Y, Cao W, Philip Chen CL (Jul. 2014) Image encryption using binary bitplane. Signal Process 100:197–207
Zhu C, Sun K (Mar. 2018) Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 6:18759–18770
Zhu S, Zhu C, Wang W (2018) A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20(9):716
Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098
Acknowledgements
Authors thank the Department of Science & Technology, New Delhi for the FIST funding (SR/FST/ET-II/2018/221). Also, Authors wish to thank the Intrusion Detection Lab at School of Electrical & Electronics Engineering, SASTRA Deemed University for providing infrastructural support to carry out this research work.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Manikandan, V., Amirtharajan, R. On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM. Multimed Tools Appl 80, 23511–23540 (2021). https://doi.org/10.1007/s11042-021-10943-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10943-8