2020
DOI: 10.1109/access.2020.3010794
|View full text |Cite
|
Sign up to set email alerts
|

A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things

Abstract: In this paper, we report an effective cryptosystem aimed at securing the transmission of medical images in an Internet of Healthcare Things (IoHT) environment. This contribution investigates the dynamics of a 2-D trigonometric map designed using some well-known maps: Logistic-sine-cosine maps. Stability analysis reveals that the map has an infinite number of solutions. Lyapunov exponent, bifurcation diagram, and phase portrait are used to demonstrate the complex dynamic of the map. The sequences of the map are… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 123 publications
(54 citation statements)
references
References 51 publications
0
54
0
Order By: Relevance
“…To confirm the effectiveness of the proposed encryption approach in relation to other very recently approaches ( [47], [48], [50]), Table 8 presents a simple comparison of the proposed approach with other related methods in terms of correlation coefficients, NPCR, UACI, global and local information entropy, and Chi-square test. The values provided in Table 8 confirms the effectiveness of the presented mechanism.…”
Section: G Comparative Analysismentioning
confidence: 98%
See 1 more Smart Citation
“…To confirm the effectiveness of the proposed encryption approach in relation to other very recently approaches ( [47], [48], [50]), Table 8 presents a simple comparison of the proposed approach with other related methods in terms of correlation coefficients, NPCR, UACI, global and local information entropy, and Chi-square test. The values provided in Table 8 confirms the effectiveness of the presented mechanism.…”
Section: G Comparative Analysismentioning
confidence: 98%
“…Nevertheless, the global entropy neglects to evaluate the true randomness for ciphered images. Accordingly, local entropy can be calculated by the average of global entropies over all the non-overlapping blocks (per block has 1936 pixels) [48]. Table 7 presented the values of global and local information entropies for the plain images and their corresponding ciphered ones, which all values of information entropy for ciphered images are very near to 8-bit.…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…A privacy-protected IoHT framework was designed in [79] , where IoHT data with provenance and audit trails were delivered to authorized subscribers. The authors in [80] designed a cryptosystem that could secure IoHT data during transmission between two endpoints. The cryptosystem was successfully tested with medical image transmission.…”
Section: Literature Reviewmentioning
confidence: 99%
“…3) Histogram, χ 2 and variance tests Any good encryption scheme must pass the histogram and chisquare test to be able to resist the statistical intrusion of a third party [76]. The histogram of a plain data is usually distributed randomly whereas the histogram of the corresponding cipher is required to be uniform.…”
Section: ) Correlation Of Adjacent Pixelsmentioning
confidence: 99%