Resource optimized Region Based Image Encryption Using Chaotic Maps

Resource optimized Region Based Image Encryption Using Chaotic Maps

Kiran P., Parameshachari B. D., Sudheesh K.V., Sunil Kumar D.S.
Copyright: © 2022 |Pages: 20
DOI: 10.4018/IJeC.304379
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Securing medical images becomes a major concern to avoid leaking confidential data. This problem motivated the development of many low computational complexity methods to encrypt these medical images. In this research work, block cipher-based region of interest medical image encryption with multiple maps is proposed. Primarily, region of interest (ROI) regions and region of background (ROB) are extracted with the help of Laplacian edge detection operator. Further, important ROI regions are permuted in a circular fashion with the help of Arnold cat map and angle value. Then permuted ROI part is encrypted using the duffling system and unimportant regions are unchanged. The advantage of the work is that it encrypts only selected/important parts and that will achieve fast execution speed and reduction in computation complexity. The approach presented here enables the storage and transmission of medical image data within an open network. These results show that the security in the proposed method is much better than many chaotic encryption algorithms proposed in the recent times.
Article Preview
Top

Introduction

Telemedicine has been expanding to numerous sectors of health care systems and fields, including dermatology, cardiology, and neurology, since its inception in the 1960s. It provides a variety of benefits to the community, including improved and faster diagnosis, decreased consultation and treatment costs for patients, and more. Various diagnostic information about the patient is collected and sent among medical practitioners and patients for optimal care and treatment, ranging from cardiovascular readings to x-rays and ultrasound scan results. These bits of information should only be accessible to authorized persons in order to protect patients' privacy and respect medical practitioners' ethics. These diagnostic data, on the other hand, are typically transmitted over a public network, raising the risk of data leakage to unauthorized parties or adversaries. As a result, appropriate protection for data stored and in transit is required. Medical images captured during various medical procedures are very fragile and the number of security-related issues when sending over an unsecured network. Complicated Cryptographic algorithms are typically used to secure the transmission of medical images. In fact, Time diagnosis and image encryption time should be as short as possible. However, resources limited devices cannot perform complex encryption processes due to limited battery life and limited processing options. Therefore, encryption is outsourced to a third party such as the cloud. Much work has been done.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 7 Issues (2023)
Volume 18: 6 Issues (2022): 3 Released, 3 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing