2021
DOI: 10.1007/s11277-021-08584-z
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

Abstract: Medical images possess significant importance in diagnostics when it comes to healthcare systems. These images contain confidential and sensitive information such as patients’ X-rays, ultrasounds, computed tomography scans, brain images, and magnetic resonance imaging. However, the low security of communication channels and the loopholes in storage systems of hospitals or medical centres put these images at risk of being accessed by unauthorized users who illegally exploit them for non-diagnostic purposes. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
35
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 99 publications
(36 citation statements)
references
References 43 publications
1
35
0
Order By: Relevance
“…In the case of image feature leakage, it is vital that the encryption scheme can resis statistical analysis. The histogram of the image shows the distribution of pixel values in the image, so the histogram is a key indicator reflecting the robustness of the image en cryption scheme [38]. The histograms of four plaintext images, ciphertext images, and de crypted images are shown in Figure 14.…”
Section: Histogram Analysismentioning
confidence: 99%
“…In the case of image feature leakage, it is vital that the encryption scheme can resis statistical analysis. The histogram of the image shows the distribution of pixel values in the image, so the histogram is a key indicator reflecting the robustness of the image en cryption scheme [38]. The histograms of four plaintext images, ciphertext images, and de crypted images are shown in Figure 14.…”
Section: Histogram Analysismentioning
confidence: 99%
“…Image encryption methods are currently available using various techniques, such as chaotic systems [ 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ], DNA coding [ 18 , 19 , 20 , 21 ], substitution boxes [ 22 , 23 , 24 ], and cellular automata [ 25 , 26 , 27 , 28 ]. Chaotic phenomena [ 29 , 30 ] are seemingly random irregular motions that occur in a deterministic system—a system described by a deterministic theory that behaves in an uncertain, irreducible, and unpredictable manner.…”
Section: Introductionmentioning
confidence: 99%
“…One-dimensional chaotic systems have advantages, such as simple structures, easy implementation, and low computational complexity [ 11 ], but they also have disadvantages, such as small key spaces and low security [ 8 , 9 ]. To solve this problem, some MD chaotic systems have been applied to image encryption [ 12 , 13 , 14 , 15 , 16 , 17 ]. The encryption algorithms based on MD systems have larger key spaces and higher security levels; however, MD chaotic systems are relatively difficult to implement in hardware or software and the respective encryption systems have high computational complexity [ 11 ].…”
Section: Introductionmentioning
confidence: 99%
“…In the image encryption system that is based on chaotic maps, the encryption system includes a pair of linear (i.e., permutation) -non-linear (i.e., diffusion) conversions. Some of the encryption systems are repeating this procedure to raise the encryption strength [21][22][23][24][25]. However, in those algorithms, a large number of iterations of chaotic maps is required to produce large sequences to be utilised in permutation and diffusion steps.…”
Section: Introductionmentioning
confidence: 99%