Hyperchaos for improving the security of medical data

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Because of the widespread use of medical images and signals in hospitals and healthcare communities, information security and medical data encryption are becoming more important. Cryptography has a specific role, is to protect data against unauthorized access. In this paper, we propose an efficient encryption scheme for medical data using a new hyperchaotic system applied with two algorithms: the first based on random key generation from initial conditions to encrypt a brain MRI and the second algorithm using chaotic masking technique to encrypt the heartbeat signal. The scheme achieves secure encryption and his robustness is measured by various metrics such as histogram analysis, key sensitivity, correlation coefficient and PSNR test. We conclude from the experimental results that the scheme promises stronger resistance against diverse forms of common attacks and high sensitivity to the security keys.



  • Keywords

    Medical Data; Encryption; Hyperchaotic System; Random Permutation; Chaotic Masking; Initial Conditions.

  • References

      [1] M. Y. M. Parvees, J. A. Samath, and B. P. Bose, “Secured Medical Images-a Chaotic Pixel Scrambling Approach,” J. Med. Syst., Vol. 40, No. 11, (2016), pp: 232. https://doi.org/10.1007/s10916-016-0611-5.

      [2] "National E-Health Transition Authority: About Us". National E-Health Transition Authority. (2013). Retrieved 2013-23-09.

      [3] Berman. M; Fenaughty. A,"Technology and managed care: patient benefits of telemedicine in a rural health care network", Health Economics, Vol. 14, No. 6. Wiley. (June 2005), pp: 559-573, https://doi.org/10.1002/hec.952.

      [4] Joshua C. Dagadu, Jianping Li, Emelia O. Aboagye, Xuedzi Ge, “Chaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map”, Journal of Multidisciplinary Engineering Science and Technology, Vol. 4 Issue 9, September 2017, pp: 8096-8103.

      [5] Al-Husainy. M. A. F, “A novel encryption method for image security,” Int. J. Secur. Its Appl., Vol. 6, No. 1, (2012).

      [6] Conde, Jose G.; De, Suvranu; Hall, Richard W.; Johansen, Edward; Meglan, Dwight; Peng, Grace C. Y, "Telehealth Innovations in Health Education and Training". Telemedicine and e-Health, vol. 16, No.1, (January/February2010), pp: 103- 106, https://doi.org/10.1089/tmj.2009.0152.

      [7] Yu-zeng. W, Shi-chao. G, Yu-jun. F, and Zhi- quan. F., “Research the Compression and Transmis- sion Technology of Medical Image Base on the Remote Consultation,” in The 2nd International Conference on Bioinformatics and Biomedical En- gineering (ICBBE), Shanghai, China, (2008), pp. 2142–2145.

      [8] Enayatifar. R, Sadaei. H. J, Abdullah; A. H, Lee. M, and Isnin. I. F, “A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata,” Opt. Lasers Eng., vol. 71, (2015), pp: 33- 41. https://doi.org/10.1016/j.optlaseng.2015.03.007.

      [9] Omala. A. A, Robert. N, and Li. F, “A provably-secure transmission scheme for wireless body area networks,” J. Med. Syst., vol. 40, No. 11, (2016), pp: 247. https://doi.org/10.1007/s10916-016-0615-1.

      [10]Laurence E. Sigler (trans.). Fibonacci's Liber Abaci. Springer-Verlag. (2002), pp: 402 - 403.

      [11] Lagmiri. S. N, Elalami. N, Elalami. J, "Three Dimensional Chaotic System for Color Image Scrambling Algorithm". International Journal of Computer Science and Information Security (IJCSIS), Vol. 16, No. 1, (January 2018), pp: 8-20.

      [12]Lagmiri. S. N, Elalami. N, Elalami. J, "Color and gray images encryption algorithm using chaotic systems of different dimensions". IJCSNS International Journal of Computer Science and Network Security, Vol.18 No.1, (January 2018), pp: 79-86.

      [13] Gámez-Guzmán. L, Cruz-Hernández. C, López-Gutiérrez. R.M, and García-Guerrero. E.E, “Synchronization of Chua’s circuits with multiscroll attractors: Application to communication”, Commun. Nonlinear Sci. Numer. Simulat. Vol. 14, (2009), pp: 2765–2775. https://doi.org/10.1016/j.cnsns.2008.10.009.

      [14] Lagmiri. S. N, Elalami. N, Elalami. J, "Encryption & Decryption Audio Communications in Mobile Networks based on a New Hyperchaotic System”. London Journal of Research in Computer Science and Technology Volume 18,| Issue 1, (April 2018).

      [15]Lagmiri. S. N, Elalami. N, Elalami. J, "Novel Chaotic System for Color Image Encryption Using Random Permutation”. International Journal of Computer Networks and Communications Security, Vol. 6, No. 1, (January 2018), pp: 9–16.

      [16]Mao. Y and Chen. G, “Chaos-based image encryption,” Handbook of Geometric Computing, (2005), pp: 231–265. https://doi.org/10.1007/3-540-28247-5_8.

      [17]Abraham. L, Daniel. N, “An improved color image encryption algorithm with Pixel permutation and bit substitution” International Journal of Research in Engineering and Technology. Vol. 2, Issue: 11, (Nov-2013).

      [18]El-Alfy. E.-S. M, Thampi. S. M, Takagi. H, Piramuthu. S, and Hanne. T, Advances in Intelligent Informatics. Springer, (2015).

      [19]Enayatifar. R, Abdullah. A. H, and Isnin. I. F, “Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence,” Opt. Lasers Eng., vol. 56, (2014), pp : 83–93.

      [20]Enayatifar. R., Abdullah. A. H, and Lee. M, “A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption,” Opt. Lasers Eng., vol. 51, no. 9, (2013), pp: 1066–1077. https://doi.org/10.1016/j.optlaseng.2013.03.010.

      [21]Lagmiri. S. N, Elalami. N, Elalami. J, "A Multimedia Encryption Algorithm based on Hyperchaotic Systems”. The 1st International Conference on Networking, Information Systems & Security, April 27-28, 2018, Tangier, Morocco.




Article ID: 10572
DOI: 10.14419/ijet.v7i3.10572

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.