Abstract

Current image encryption methods have many shortcomings for the medical image encryption with high resolution, strong correlation and large storage space, and it is difficult to obtain reliable clinically applicable medical images. Therefore, this paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. And the dynamic analysis of the phase diagram and bifurcation diagram of the five-dimensional three-leaf chaotic system selected in this paper is carried out, and NIST is used to test the randomness of its chaotic sequence. This algorithm follows the diffusion-scrambling framework, especially using the principle of DNA recombination combined with the five-dimensional three-leaf chaotic system to generate a chaotic matrix that participates in the operation. The bit-level DNA mutation operation is introduced in the diffusion, and the scrambling and diffusion effects have been further improved. Algorithm security and randomness have been enhanced. This paper evaluates the efficiency of this algorithm for medical image encryption in terms of security analysis and time performance. Security analysis is carried out from key space, information entropy, histogram, similarity between decrypted image and original image, PSNR, correlation, sensitivity, noise attack, cropping attack and so on. Perform time efficiency analysis from the perspective of time performance. The comparison between this algorithm and the experimental results obtained by some of the latest medical image encryption algorithms shows that this algorithm is superior to the existing medical image encryption algorithms to a certain extent in terms of security and time efficiency.

Highlights

  • In recent years, with the rapid development of the Internet, the rapid expansion of information, a large amount of information is transmitted in public channels, and the issue of information security is followed by [1,2,3]

  • Medical image encryption based on a new five-dimensional three-leaf chaotic system and genetic operation

  • Transition is the exchange of two different purines or Medical image encryption based on a new five-dimensional three-leaf chaotic system and genetic operation two different pyrimidines; Transversion is the exchange of one purine and one pyrimidine

Read more

Summary

Introduction

With the rapid development of the Internet, the rapid expansion of information, a large amount of information is transmitted in public channels, and the issue of information security is followed by [1,2,3]. Researchers only used low-dimensional chaotic systems, such as Logistic chaos [14], and put them into the encryption algorithm. Incorporating this DNA mutation operation [35, 36] into the encryption algorithm can change the pixel value more fundamentally, and better meet the requirements of high randomness and large change rate of image information encryption. This paper proposes a medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation.

Five-dimensional three-leaf chaotic system
DNA coding and operations
DNA mutation
C G complementðGÞ complementðCÞ
DNA recombination
Key generation
Generation of chaotic matrix
Bit-level dynamic DNA coding
Index scrambling
Dynamic DNA operations
Dynamic DNA mutation
Encryption algorithm
Decryption algorithm
Simulation results
Analysis of decryption algorithm restoration ability
Key space analysis
Information entropy
Histogram
Correlation coefficient and point image
Plaintext sensitivity analysis
Key sensitivity analysis
Noise attack analysis
4.10 Cropping attack analysis
4.11 Time performance analysis
4.12 Analysis of the effect of ordinary image encryption
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.