DOI QR코드

DOI QR Code

Gradual Encryption of Medical Image using Non-linear Cycle and 2D Cellular Automata Transform

  • Nam, Tae Hee (Dept. of Biomedical Engineering, Dongju College)
  • Received : 2014.07.30
  • Accepted : 2014.10.29
  • Published : 2014.11.30

Abstract

In this paper, we propose on image encryption method which uses NC(Non-linear Cycle) and 2D CAT(Two-Dimensional Cellular Automata Transform) in sequence to encrypt medical images. In terms of the methodology, we use NC to generate a pseudo noise sequence equal to the size of the original image. We then conduct an XOR operation of the generated sequence with the original image to conduct level 1 NC encryption. Then we set the proper Gateway Values to generate the 2D CAT basis functions. We multiply the generated basis functions by the altered NC encryption image to conduct the 2nd level 2D CAT encryption. Finally, we verify that the proposed method is efficient and extremely safe by conducting an analysis of the key spatial and sensitivity analysis of pixels.

Keywords

References

  1. J.W. Shin, Y. Sook, H.M. Yoo, and D.S. Park, "A Novel Digital Image Protection using Cellular Automata Transform," The Korean Institute of Communications and Information Sciences, Vol. 35, No. 8, pp. 689-696, 2010.
  2. H.M. Lim, S.H. Lee, and B.G. Kim, "Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on/off-line Learner Tracking System," Journal of Korea Multimedia Society, Vol. 14, No. 1, pp. 24-32, 2011. https://doi.org/10.9717/kmms.2011.14.1.024
  3. C. Sur, Y.H. Park, and K.H. Rhee, "A Multireceiver Certificateless Encryption Scheme and Its Application," Journal of Korea Multimedia Society, Vol. 14, No. 6, pp. 775-784, 2011. https://doi.org/10.9717/kmms.2011.14.6.775
  4. G. Ateniese, C. Blundo, and A. Santis, "Extended Schemes for Visual Cryptography," Theoretical Computer Science, Vol. 250, Issues 1-2, pp. 143-161, 2001. https://doi.org/10.1016/S0304-3975(99)00127-9
  5. J. Giesl and K. Vlcek, "Image Encryption based on Strange Attractor," ICGST-GVIP Journal, Vol. 9, Issue 2, pp. 154-162, 2009.
  6. K.W. Wong, S.H. Kwok, and W.S. Law, "A Fast Image Encryption Scheme based on Chaotic Standard Map," Physics Letters A, Vol. 372, Issue 15, pp. 2645-2652, 2008. https://doi.org/10.1016/j.physleta.2007.12.026
  7. G. Chen, Y. Mao, and C. Chui, "Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps," Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749-761, 2004. https://doi.org/10.1016/j.chaos.2003.12.022
  8. L. Zhang, X. Liao, and X. Wang, "An Image Encryption Approach based on Chaotic Maps," Chaos, Solitons and Fractals, Vol. 24, Issue 3, pp. 759-765, 2005. https://doi.org/10.1016/j.chaos.2004.09.035
  9. N.K. Pareek, V. Patidar, and K.K. Sud, "Image Encryption using Chaotic Logistic Map," Image and Vision Computing, Vol, 24, Issue 9, pp. 926-934, 2006. https://doi.org/10.1016/j.imavis.2006.02.021
  10. Q. Zhou, K.W. Wong, X. Liao, T. Xiang, and Y. Hu, "Parallel Image Encryption Algorithm based on Discretized Chaotic Map," Chaos, Solitons and Fractals, Vol. 38, Issue 4, pp. 1081-1092, 2008. https://doi.org/10.1016/j.chaos.2007.01.034
  11. T.H. Nam, S.T. Kim, and S.J. Cho, "Image Encryption using Non-linear FSR and Complemented MLCA," Proceeding of 2009 International Conference of Maritime Information and Communication Sciences, Vol. 2, No. 1, pp. 168-171, 2009.
  12. O. Lafe, Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling, Kluwer Academic Publishers Norwell, MA, USA, 2000.
  13. H.K. Kim, T.H. Nam, S.J. Cho, and S.T. Kim, "A Novel Image Encryption using Complemented MLCA based on NBCA and 2D CAT," The Korean Institute of Communications and Information Sciences, Vol. 36, No. 6, pp. 361-367, 2011. https://doi.org/10.7840/KICS.2011.36C.6.361

Cited by

  1. Image Encryption Based on One Dimensional Nonlinear Group Cellular Automata vol.18, pp.12, 2015, https://doi.org/10.9717/kmms.2015.18.12.1462