A chaos-based medical image encryption method

The information in the e-health system involves the patient's privacy which is extremely sensitive. For instance, these information record social security numbers and detailed medical history.  When the breach happens, there are illegal, or disclosure behaviors taken to privacy that should be c...

Full description

Saved in:
Bibliographic Details
Main Authors: Wang, Xuehong (Author), Tu, Chunling (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-09-01.
Subjects:
Online Access:Get fulltext
Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02711 am a22003253u 4500
001 0 nhttps:__ijeecs.iaescore.com_index.php_IJEECS_article_downloadSuppFile_21939_3064
042 |a dc 
100 1 0 |a Wang, Xuehong  |e author 
100 1 0 |e contributor 
700 1 0 |a Tu, Chunling  |e author 
245 0 0 |a A chaos-based medical image encryption method 
260 |b Institute of Advanced Engineering and Science,   |c 2020-09-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21939 
520 |a The information in the e-health system involves the patient's privacy which is extremely sensitive. For instance, these information record social security numbers and detailed medical history.  When the breach happens, there are illegal, or disclosure behaviors taken to privacy that should be compromised security. In this paper, the medical digital images are protected by the proposed chaos-based encryption method in the process of transmission and utilization. Then the authentication is granted to patients and telemedicine staffs by the decryption method proposed. The Qi 3-D four wing chaotic system is employed in this method. The proposed method promises the keys with higher complexity and unpredictability than traditional cryptography methods by introducing the chaotic dynamics in the new cryptography. Digital medical images are used to validate the proposed method under the brute and the differential attacks. The pixels of the image are scrambled completely based on cat map and the sub-blocks of the image are diffused in the way that the original image is changed into a chaotic image robust to all kinds of attacks. The experiments show that the proposed method has higher performance and higher computation for decryption. 
540 |a Copyright (c) 2020 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Chaos; Encryption; Diffusion; Unpredictable 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 19, No 3: September 2020; 1316-1324 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v19.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21939/14109 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/downloadSuppFile/21939/3064 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21939/14109  |z Get fulltext 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/downloadSuppFile/21939/3064  |z Get fulltext