Abstract

In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment. This contribution investigates the dynamics of a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that the map has an infinite number of solutions. Lyapunov exponent, bifurcation diagram, and phase portrait are used to demonstrate the complex dynamic of the map. The sequences of the map are utilized to construct a robust cryptosystem. First, three sets of key streams are generated from the newly designed trigonometric map and are used jointly with the image components (R, G, B) for hamming distance calculation. The output distance-vector, corresponding to each component, is then Bit-XORed with each of the key streams. The output is saved for further processing. The decomposed components are again Bit-XORed with key streams to produce an output, which is then fed into the conditional shift algorithm. The Mandelbrot Set is used as the input to the conditional shift algorithm so that the algorithm efficiently applies confusion operation (complete shuffling of pixels). The resultant shuffled vectors are then Bit-XORed (Diffusion) with the saved outputs from the early stage, and eventually, the image vectors are combined to produce the encrypted image. Performance analyses of the proposed cryptosystem indicate high security and can be effectively incorporated in an IoHT framework for secure medical image transmission.

Highlights

  • As the data represented by medical images are of a vital source of information concerning the privacy of patients, The associate editor coordinating the review of this manuscript and approving it for publication was Muhammad Tariq

  • Very recently, [22], [23] used chaotic systems and hash function to design an encryption scheme with the key streams depending on the input image

  • We address in this paper a new 2-D trigonometric map with complex, chaotic behaviour compared to current 2-D maps

Read more

Summary

INTRODUCTION

As the data represented by medical images are of a vital source of information concerning the privacy of patients, The associate editor coordinating the review of this manuscript and approving it for publication was Muhammad Tariq. Cryptosystems have been widely designed using low dimensional chaotic maps like 1-D Such maps are vulnerable to various onslaught given that the range of chaos dynamics for 1-D maps is limited, initial values and key parameters produce a small keyspace, and it is easy to predict their output [7]. Very recently, [22], [23] used chaotic systems and hash function to design an encryption scheme with the key streams depending on the input image. 6) Lack of an exclusive algorithm to be used in an IoHT framework To overcome these weaknesses and contribute to enriching the literature, we present here the methodology to achieve a new efficient colour image cryptosystem. The algorithm is designed using four main components: Trigonometric map (Logistic-Sine-Cosine), Mandelbrot Set, Bit-XOR operation, and new Conditional shift operation. 5) Security analysis proves the applicability of our cryptosystem in the secure healthcare environment

APPLICATION IN HEALTHCARE
STABILITY OF EQUILIBRIUM
TRIGONOMETRIC ENCRYPTION
SECURITY ANALYSIS OF THE PROPOSED CRYPTOSYTEM
NPCR AND UACI ANALYSIS
HISTOGRAM AND CHI-SQUARE ANALYSES
BIT DISTRIBUTION UNIFORMITY INSIDE EACH BIT-PLANE
SHANNON ENTROPY
KEY RANGE ANALYSIS
OCCLUSION ATTACK
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.