With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an...With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage and transmission,so it needs to be encrypted.In order to solve the security problem of medical images on mobile devices,a safe and efficient medical image encryption algorithm called ALCencryption is designed.The algorithm first analyzes the medical image and distinguishes the color image from the gray image.For gray images,the improved Arnold map is used to scramble them according to the optimal number of iterations,and then the diffusion is realized by the Logistic and Chebyshev map cross-diffusion algorithm.The color image is encrypted by cross-diffusion algorithm of double chaotic map.Security and efficiency analysis show that the ALCencryption algorithm has the characteristics of small neighboring pixels,large key space,strong key sensitivity,high safety and short encryption time.It is suitable for medical image encryption of mobile devices with high real-time requirements.展开更多
This paper presents a new synchronization method of the time-delay chaotic system and its application in medical image encryption. Compared with the existing techniques, the error system is greatly simplified because ...This paper presents a new synchronization method of the time-delay chaotic system and its application in medical image encryption. Compared with the existing techniques, the error system is greatly simplified because many coupled items can be considered zero items. An improved image encryption scheme based on a dynamic block is proposed. This scheme divides the image into dynamic blocks, and the number of blocks is determined by a previous block cipher. Numerical simulations are provided to illustrate the effectiveness of the proposed method.展开更多
In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for med...In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.展开更多
Healthcare and telemedicine industries are relying on technology that is connected to the Internet.Digital health data are more prone to cyber attacks because of the treasure trove of personal data they possess.This n...Healthcare and telemedicine industries are relying on technology that is connected to the Internet.Digital health data are more prone to cyber attacks because of the treasure trove of personal data they possess.This necessitates protection of digital medical images and their secure transmission.In this paper,an encryption technique based on DNA mutated with Lorenz and Lüchaotic attractors is employed to generate high pseudo-random key streams.The proposed chaos-DNA cryptic system operates on the integer wavelet transform(IWT)domain and a bio-inspired crossover,mutation unit for enhancing the confusion and diffusion phase in an approximation coefficient.Finally,an XOR operation is performed with a quantised chaotic set from the developed combined attractors.The algorithm attains an average entropy of 7.9973,near-zero correlation with an NPCR of 99.642%,a UACI of 33.438%,and a keyspace of 10~(203).Further,the experimental analyses and NIST statistical test suite have been designed such that the proposed medical image encryption technique has the potency to withstand any statistical,differential,and brute force attacks.展开更多
基金This work is partly supported by the Scientific Research Fund of Hunan Provincial Education Department(19B082)the Science and Technology Development Center of the Ministry of Education-New Generation Information Technology Innovation Project(2018A02020)+4 种基金the research supported by Science Foundation of Hengyang Normal University(19QD12)the Science and Technology Innovation Program of Hunan Province(2016TP1020)the Application-oriented Special Disciplines,Double First-Class University Project of Hunan Province(Xiangjiaotong[2018]469)the Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development(2018CT5001)the Subject Group Construction Project of Hengyang Normal University(18XKQ02).
文摘With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage and transmission,so it needs to be encrypted.In order to solve the security problem of medical images on mobile devices,a safe and efficient medical image encryption algorithm called ALCencryption is designed.The algorithm first analyzes the medical image and distinguishes the color image from the gray image.For gray images,the improved Arnold map is used to scramble them according to the optimal number of iterations,and then the diffusion is realized by the Logistic and Chebyshev map cross-diffusion algorithm.The color image is encrypted by cross-diffusion algorithm of double chaotic map.Security and efficiency analysis show that the ALCencryption algorithm has the characteristics of small neighboring pixels,large key space,strong key sensitivity,high safety and short encryption time.It is suitable for medical image encryption of mobile devices with high real-time requirements.
基金This project supported by the National Natural Science Foundation of China (Grant Nos. 51375293, 31570998), and the Science and Technology Commission of Shanghai Municipality (Grant No. 16511108600).
文摘This paper presents a new synchronization method of the time-delay chaotic system and its application in medical image encryption. Compared with the existing techniques, the error system is greatly simplified because many coupled items can be considered zero items. An improved image encryption scheme based on a dynamic block is proposed. This scheme divides the image into dynamic blocks, and the number of blocks is determined by a previous block cipher. Numerical simulations are provided to illustrate the effectiveness of the proposed method.
基金supported by the Key Research Project of Hainan Province[ZDYF2018129]the Higher Education Research Project of Hainan Province(Hnky2019-73)+3 种基金the National Natural Science Foundation of China[61762033]the Natural Science Foundation of Hainan[617175]the Special Scientific Research Project of Philosophy and Social Sciences of Chongqing Medical University[201703]the Key Research Project of Haikou College of Economics[HJKZ18-01].
文摘In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for medical images themselves to be protected,a novel robust watermarking algorithm for encrypted medical images based on dual-tree complex wavelet transform and discrete cosine transform(DTCWT-DCT)and chaotic map is proposed in this paper.First,DTCWT-DCT transformation was performed on medical images,and dot product was per-formed in relation to the transformation matrix and logistic map.Inverse transformation was undertaken to obtain encrypted medical images.Then,in the low-frequency part of the DTCWT-DCT transformation coefficient of the encrypted medical image,a set of 32 bits visual feature vectors that can effectively resist geometric attacks are found to be the feature vector of the encrypted medical image by using perceptual hashing.After that,different logistic initial values and growth parameters were set to encrypt the watermark,and zero-watermark technology was used to embed and extract the encrypted medical images by combining cryptography and third-party concepts.The proposed watermarking algorithm does not change the region of interest of medical images thus it does not affect the judgment of doctors.Additionally,the security of the algorithm is enhanced by using chaotic mapping,which is sensitive to the initial value in order to encrypt the medical image and the watermark.The simulation results show that the pro-posed algorithm has good homomorphism,which can not only protect the original medical image and the watermark information,but can also embed and extract the watermark directly in the encrypted image,eliminating the potential risk of decrypting the embedded watermark and extracting watermark.Compared with the recent related research,the proposed algorithm solves the contradiction between robustness and invisibility of the watermarking algorithm for encrypted medical images,and it has good results against both conventional attacks and geometric attacks.Under geometric attacks in particular,the proposed algorithm performs much better than existing algorithms.
文摘Healthcare and telemedicine industries are relying on technology that is connected to the Internet.Digital health data are more prone to cyber attacks because of the treasure trove of personal data they possess.This necessitates protection of digital medical images and their secure transmission.In this paper,an encryption technique based on DNA mutated with Lorenz and Lüchaotic attractors is employed to generate high pseudo-random key streams.The proposed chaos-DNA cryptic system operates on the integer wavelet transform(IWT)domain and a bio-inspired crossover,mutation unit for enhancing the confusion and diffusion phase in an approximation coefficient.Finally,an XOR operation is performed with a quantised chaotic set from the developed combined attractors.The algorithm attains an average entropy of 7.9973,near-zero correlation with an NPCR of 99.642%,a UACI of 33.438%,and a keyspace of 10~(203).Further,the experimental analyses and NIST statistical test suite have been designed such that the proposed medical image encryption technique has the potency to withstand any statistical,differential,and brute force attacks.