Full Paper View Go Back

An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography

Sreekala M.1 , Varghese Paul2

Section:Research Paper, Product Type: Journal-Paper
Vol.10 , Issue.5 , pp.1-9, Oct-2022


Online published on Oct 31, 2022


Copyright © Sreekala M., Varghese Paul . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sreekala M., Varghese Paul, “An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography,” International Journal of Scientific Research in Computer Science and Engineering, Vol.10, Issue.5, pp.1-9, 2022.

MLA Style Citation: Sreekala M., Varghese Paul "An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography." International Journal of Scientific Research in Computer Science and Engineering 10.5 (2022): 1-9.

APA Style Citation: Sreekala M., Varghese Paul, (2022). An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography. International Journal of Scientific Research in Computer Science and Engineering, 10(5), 1-9.

BibTex Style Citation:
@article{M._2022,
author = {Sreekala M., Varghese Paul},
title = {An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2022},
volume = {10},
Issue = {5},
month = {10},
year = {2022},
issn = {2347-2693},
pages = {1-9},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2949},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2949
TI - An Enhanced Dynamic Scheme for Medical Image Encryption Using Elliptical Curve Cryptography
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Sreekala M., Varghese Paul
PY - 2022
DA - 2022/10/31
PB - IJCSE, Indore, INDIA
SP - 1-9
IS - 5
VL - 10
SN - 2347-2693
ER -

271 Views    245 Downloads    40 Downloads
  
  

Abstract :
In order to increase security when transferring medical photos, this research suggests a revolutionary dynamic encryption technique. The paper addresses the various types of image encryption methods currently in use. Additionally, some early techniques for medical image encryption are reviewed in this study. Different medical image types, including CT, MRI, Ultrasound, X-ray, and ECG images, are taken into consideration for encryption. There is also a performance analysis of the reviewed methods and the suggested method. This work adds greater security than standard elliptic curve encryption because it uses the dynamic message mapping mechanism in elliptic curves.

Key-Words / Index Term :
Medical Image, Encryption, Elliptic Curve Cryptography, Dynamic Message Mapping

References :
[1] V. Pavithra and C. Jeyamala, “A Survey on the Techniques of Medical Image Encryption,” in 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India, pp. 1–8, Dec. 2018.
[2] D. Ravichandran, A. Banu S, B. K. Murthy, V. Balasubramanian, S. Fathima, and R. Amirtharajan, “An efficient medical image encryption using hybrid DNA computing and chaos in transform domain,” Med. Biol. Eng. Comput., vol. 59, no. 3, pp. 589–605, Mar. 2021.
[3] S. Jeevitha and N. Amutha Prabha, “Novel medical image encryption using DWT block-based scrambling and edge maps,” J. Ambient Intell. Humaniz. Comput., vol. 12, no. 3, pp. 3373–3388, Mar. 2021.
[4] A. Banu S and R. Amirtharajan, “A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach,” Med. Biol. Eng. Comput., vol. 58, no. 7, pp. 1445–1458, Jul. 2020.
[5] P. T. Akkasaligar and S. Biradar, “Selective medical image encryption using DNA cryptography,” Inf. Secur. J. Glob. Perspect., vol. 29, no. 2, pp. 91–101, Mar. 2020.
[6] S. Kumar, B. Panna, and R. K. Jha, “Medical image encryption using fractional discrete cosine transform with chaotic function,” Med. Biol. Eng. Comput., vol. 57, no. 11, pp. 2517–2533, Nov. 2019.
[7] H. Nematzadeh, R. Enayatifar, H. Motameni, F. G. Guimarães, and V. N. Coelho, “Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices,” Opt. Lasers Eng., vol. 110, pp. 24–32, Nov. 2018.
[8] C. Lakshmi, K. Thenmozhi, J. B. B. Rayappan, and R. Amirtharajan, “Encryption and watermark-treated medical image against hacking disease—An immune convention in spatial and frequency domains,” Comput. Methods Programs Biomed., vol. 159, pp. 11–21, Jun. 2018.
[9] S. M. Ismail, L. A. Said, A. G. Radwan, A. H. Madian, and M. F. Abu-Elyazeed, “Generalized double-humped logistic map-based medical image encryption,” J. Adv. Res., vol. 10, pp. 85–98, Mar. 2018.
[10] Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Process., vol. 144, pp. 134–144, Mar. 2018.
[11] X. Chen and C.-J. Hu, “Adaptive medical image encryption algorithm based on multiple chaotic mapping,” Saudi J. Biol. Sci., vol. 24, no. 8, pp. 1821–1827, Dec. 2017.
[12] D. S. Laiphrakpam and M. S. Khumanthem, “Medical image encryption based on improved ElGamal encryption technique,” Optik, vol. 147, pp. 88–102, Oct. 2017.
[13] S. Haddad, G. Coatrieux, M. Cozic, and D. Bouslimi, “Joint Watermarking and Lossless JPEG-LS Compression for Medical Image Security,” IRBM, vol. 38, no. 4, pp. 198–206, Aug. 2017.
[14] W. Cao, Y. Zhou, C. L. P. Chen, and L. Xia, “Medical image encryption using edge maps,” Signal Process., vol. 132, pp. 96–109, Mar. 2017.
[15] D. Bouslimi and G. Coatrieux, “A crypto-watermarking system for ensuring reliability control and traceability of medical images,” Signal Process. Image Commun., vol. 47, pp. 160–169, Sep. 2016.
[16] Y. Liu, X. Qu, and G. Xin, “A ROI-based reversible data hiding scheme in encrypted medical images,” J. Vis. Commun. Image Represent., vol. 39, pp. 51–57, Aug. 2016.
[17] J. B. Lima, F. Madeiro, and F. J. R. Sales, “Encryption of medical images based on the cosine number transform,” Signal Process. Image Commun., vol. 35, pp. 1–8, Jul. 2015.
[18] A. Kanso and M. Ghebleh, “An efficient and robust image encryption scheme for medical applications,” Commun. Nonlinear Sci. Numer. Simul., vol. 24, no. 1–3, pp. 98–116, Jul. 2015.
[19] M. Ashtiyani, P. M. Birgani, and H. M. Hosseini, “Chaos-Based Medical Image Encryption Using Symmetric Cryptography,” in 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, Syria, pp. 1–5, Apr. 2008.
[20] J. B. Akan, E. A. Adedokun, G. Onuh, A. Umar, R. I. Nwosu, and Y. Ibrahim, “Medical Image Encryption Scheme Based On Hybrid Chaotic Permutation,” p. 8, 2020.
[21] S. Sharma, Y. Verma, and A. Nadda, “Information Security: Cyber Security Challenges,” p. 6, 2019.
[22] C. Chattopadhyay, B. Sarkar, and D. Mukherjee, “Encoding by DNA Relations and Randomization Through Chaotic Sequences for Image Encryption,” p. 16.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation