Medical image encryption using fractional discrete cosine transform with chaotic function

被引:61
|
作者
Kumar, Sumit [1 ]
Panna, Bhaskar [1 ]
Jha, Rajib Kumar [1 ]
机构
[1] Indian Inst Technol Patna, Dept Elect Engn, Bihta, India
关键词
Medical image; Encryption; Decryption; Chaotic; Fractional cosine transform; Key space; Key sensitivity; DNA-SEQUENCE OPERATION; ALGORITHM; SCHEME; PERMUTATION; EFFICIENT; SYSTEM; FUSION; SECURE;
D O I
10.1007/s11517-019-02037-3
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this advanced era, where we have high-speed connectivity, it is very imperative to insulate medical data from forgery and fraud. With the regular increment in the number of internet users, it is challenging to transmit the beefy medical data. This (medical data) is always reused for different diagnosis purposes, so the information of the medical images need to be protected. This paper introduces a new scheme to ensure the safety of the medical data, which includes the use of a chaotic map on the fractional discrete cosine transform (FrDCT) coefficients of the medical data/images. The imperative FrDCT provides a high degree of freedom for the encryption of the medical images. The algorithm consists of two significant steps, i.e., application of FrDCT on an image and after that chaotic map on FrDCT coefficients. The proposed algorithm discusses the benefits of FrDCT over fractional Fourier transform (FRFT) concerning fractional order alpha. The key sensitivity and space of the proposed algorithm for different medical images inspire us to make a platform for other researchers to work in this area. Experiments are conducted to study different parameters and challenges. The proposed method has been compared with state-of-the-art techniques. The results suggest that our technique outperforms many other state-of-the-art techniques.
引用
收藏
页码:2517 / 2533
页数:17
相关论文
共 50 条
  • [21] Image Double Encryption Based on Parametric Discrete Cosine Transform
    Cao, Han
    Zhou, Yicong
    Chen, C. L. Philip
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [22] Trinion discrete cosine transform with application to color image encryption
    Shao, Zhuhong
    Wang, Xue
    Tang, Yadong
    Shang, Yuanyuan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (10) : 14633 - 14659
  • [23] Image Enhancement with Medical Image Fusion using Multiresolution Discrete Cosine Transform
    Ravi, Prabha
    Krishnan, J.
    [J]. MATERIALS TODAY-PROCEEDINGS, 2018, 5 (01) : 1936 - 1942
  • [24] Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps
    Ji Xiaoyong
    Bai Sen
    Zhu Guibin
    Yan Bing
    [J]. Multimedia Tools and Applications, 2017, 76 : 12965 - 12979
  • [25] Image Encryption Based on Arnod Transform and Fractional Chaotic
    Chen, Chao
    Zhang, Hongying
    Wu, Bin
    [J]. SYMMETRY-BASEL, 2022, 14 (01):
  • [26] Image encryption and compression based on the generalized knight's tour, discrete cosine transform and chaotic maps
    Ji Xiaoyong
    Bai Sen
    Zhu Guibin
    Yan Bing
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (10) : 12965 - 12979
  • [27] Computation of Partial Fractional Derivative of Digital Image Using Discrete Cosine Transform
    Tseng, Chien-Cheng
    Lee, Su-Ling
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, : 2828 - 2831
  • [28] The fractional discrete cosine transform
    Cariolaro, G
    Erseghe, T
    Kraniauskas, P
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2002, 50 (04) : 902 - 911
  • [29] A Chaotic Watermarking Scheme using Discrete Cosine Transform
    Mohammadi, Somayyeh
    [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 6 - 10
  • [30] Efficient Image Encryption and Decryption Using Discrete Wavelet Transform and Fractional Fourier Transform
    Sharma, Prerana
    Mishra, Devesh
    Agarwal, Ankur
    [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 153 - 157