2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications 2008
DOI: 10.1109/ictta.2008.4530291
|View full text |Cite
|
Sign up to set email alerts
|

Chaos-Based Medical Image Encryption Using Symmetric Cryptography

Abstract: In this paper, we propose an encryption scheme for the medical image encryption based on combination of scrambling and confusion. Chaotic cat map is used for the scrambling the addresses of the medical image pixels. In order to provide security for the scheme, a modified form of Simplified version of Advance Encryption Standard (S-AES) is introduced and applied. The modification is that we make use of chaos for S-box design and replace it with that of S-AES. The so called Chaotic S-AES has all cryptographic ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…For example, medical images can be encrypted by combining different techniques such as pixel arrangement and chaotic maps [1], or AES and chaotic maps [2]. Nevertheless, these methods suffer from either high computational costs or low level of security due to leakage of original image information.…”
Section: Introductionmentioning
confidence: 99%
“…For example, medical images can be encrypted by combining different techniques such as pixel arrangement and chaotic maps [1], or AES and chaotic maps [2]. Nevertheless, these methods suffer from either high computational costs or low level of security due to leakage of original image information.…”
Section: Introductionmentioning
confidence: 99%
“…ICA describes a generative model for viewed multivariate data, which ordinarily is capable of finding the underlying factors In this model, data variable are believed to be immediate or nonlinear.ICA always looks for component that are statistically independent and non guassian [11].ICA always find principal component which is dissimilar from other components present …”
Section: Independent Component Analysis (Ica)mentioning
confidence: 99%
“…However, most applications implement S-Box in the form of a lookup table, in which case a large memory space is required for storing its values. The amount of memory required can be calculated using (2).…”
Section: Proposed Encryptionmentioning
confidence: 99%
“…Many image encryption schemes using traditional symmetric cryptography, such as AES (Advanced Encryption Standard) and DES (Data Encryption Standard) [2,29], as well as asymmetric cryptography, such as RSA and ECC [10,32], have been proposed to prevent forgery and safeguard privacy. However, the direct use of conventional cryptographic algorithms is fraught with difficulties because they were designed to encrypt text data transmission.…”
Section: Introductionmentioning
confidence: 99%