Skip to main content
Log in

Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA)

  • Image & Signal Processing
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

This paper proposes an innovative image cryptosystem algorithm using the properties of the block encryption, 4D logistic map and DNA systems. Multiple key sequences are generated and pixel substitution is performed by using nonlinear 4D logistic map, then encryption is performed by using DNA rules to ensure that the different blocks are encrypted securely. The results of the experiment indicate that the proposed Non Linear 4D Logistic Map and DNA (NL4DLM_DNA) sequence based algorithm gives better performance, which is analyzed on the basis of security, quality, attack resilience, diffusion and running time as compared to some previous works.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Huang, X., Sun, T., Li, Y., and Liang, J., A color image encryption algorithm based on a fractional-order Hyperchaotic system. Entropy, MDPI 17:28–38, 2015. https://doi.org/10.3390/e17010028.

    Article  Google Scholar 

  2. Tong, X., Yang, L., Zhang, M., Xu, H., and Zhu, W., An image encryption scheme based on Hyperchaotic Ra, binovich and exponential Chaos maps. Entropy, MDPI 17:181–196, 2015. https://doi.org/10.3390/e17010181.

    Article  Google Scholar 

  3. Huang, X., A new digital image encryption algorithm based on 4D chaotic system. International Journal of Pure and Applied Mathematics 80(4):609–616, 2012.

    Google Scholar 

  4. Tian, Y., and Lu, Z., Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Advances:1–23, 2017.

  5. Sun, S., Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Optical Engineering 56(11):1–10, 2017.

    Google Scholar 

  6. Elamrawy, F., Sharkas, M., and Nasser, A. M., An image encryption based on DNA coding and 2DLogistic chaotic map. International Journal of Signal Processing 3:27–32, 2018.

    Google Scholar 

  7. Ye, G., Jiao, K., Pan, C., and Huang, X., An effective framework for chaotic image encryption based on 3D logistic map. Hindawi Security and Communication Networks:1–11, 2018. https://doi.org/10.1155/2018/8402578.

    Google Scholar 

  8. Song, C., and Qiao, Y., A novel image encryption algorithm based on DNA encoding and spatiotemporal Chaos. MDPI, Entropy 17:6954–6968, 2015. https://doi.org/10.3390/e17106954.

    Article  Google Scholar 

  9. Elshamy, A. M., Rashed, A. N. Z., Mohamed, A. E.-N. A., Faragalla, O. S., Yi, M., Alshebeili, S. A., and Abd El-Samie, F. E., Optical image encryption based on chaotic baker map and double random phase encoding. Journal Of Lightwave Technology 31(15):2533–2539, 2013.

    Article  Google Scholar 

  10. Khare, A., Shukla, P. K., Rizvi, M. A., and Stalin, S., An intelligent and fast chaotic encryption using digital logic circuits for ad-hoc and ubiquitous computing. Entropy, MDPI 18(201):1–27, 2016. https://doi.org/10.3390/e18050201.

    Article  Google Scholar 

  11. D_asc_alescu, A. C., Boriga, R., and Mih_ailescu, M. I., A novel chaos-based image encryption scheme. Annals of the University of Craiova, Mathematics and Computer Science Series 41(1):47–58, 2014.

    Google Scholar 

  12. Bakhache, B., Ahmad, K., and Assad, S. E. I., Chaos based improvement of the security of ZigBee and Wi-fi networks used for industrial controls. IEEE:139–145, 2011.

  13. Wang, X., and Chen, D., A parallel encryption algorithm based on piecewise linear chaotic map. Mathematical problems in engineering, Hindawi:1–8, 2013. https://doi.org/10.1155/2013/537934.

    Google Scholar 

  14. Haddush Fitwi, A., and Nouh, S., Performance analysis of chaotic encryption using a shared image as a key. Journal of EEA 28:17–29, 2011.

    Google Scholar 

  15. Guo, D., Wen, Q., Li, W., Zhang, H., and Jin, Z., Analysis and improvement of ‘chaotic map based Mobile dynamic ID authenticated key agreement scheme. Wireless Pers Commun, springer science+business media New York:1–14, 2015. https://doi.org/10.1007/s11277-015-2378-2).

    Article  Google Scholar 

  16. Gao, H., Zhang, Y., Liang, S., and Li, D., A new chaotic algorithm for image encryption. Chaos, Solitons and Fractals, Elsevier 29:393–399, 2006. https://doi.org/10.1016/j.chaos.2005.08.110.

    Article  Google Scholar 

  17. Zhu, H., Zhang, X., Yu, H., Zhao, C., and Zhu, Z., A novel image encryption scheme using the composite discrete chaotic system. Entropy , MDPI 18(276):1–27, 2016. https://doi.org/10.3390/e18080276.

    Article  CAS  Google Scholar 

  18. Kwok, H. S., and Tang, W. K. S., A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons and Fractals, Elsevier 32:1518–1529, 2007. https://doi.org/10.1016/j.chaos.2005.11.090.

    Article  Google Scholar 

  19. Junming, M., and Ruisong, Y., An image encryption scheme based on hybrid orbit of hyper-chaotic systems. I. J. Computer Network and Information Security, MECS (5):25–33, 2015. https://doi.org/10.5815/ijcnis.2015.05.04.

    Article  Google Scholar 

  20. Liu, L., and Miao, S., A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer Plus 5(289):1–12, 2016. https://doi.org/10.1186/s40064-016-1959-1.

    Article  Google Scholar 

  21. Ahmada, M., Shamsib, U., and Khan, I. R., An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems. Third International convention on Recent Trends in Computing, Procedia Computer Science, Elsevier 57:852–859, 2015. https://doi.org/10.1016/j.procs.2015.07.494.

    Article  Google Scholar 

  22. Usama, M., and Zakaria, N., Chaos-based simultaneous compression and encryption for Hadoop. PLoS ONE 12(1):1–29, 2017. https://doi.org/10.1371/journal.pone.0168207.

    Article  CAS  Google Scholar 

  23. Reyad, O., Kotulski, Z., and Abd-Elhafiez, W. M., Image encryption using Chaos-driven elliptic curve Pseudo-random number generators. Appl. Math. Inf. Sci. 10(4):1283–1292, 2016. https://doi.org/10.18576/amis/100407.

    Article  Google Scholar 

  24. Shukla, P. K., Khare, A., Rizvi, M. A., Stalin, S., and Kumar, S., Applied cryptography using Chaos function for fast digital logic-based Systems in Ubiquitous Computing. Entropy, MDPI 17:1387 1410, 2015. https://doi.org/10.3390/e17031387.

    Article  Google Scholar 

  25. Wei, X., Wang, B., Zhang, Q., and Che, C., Image encryption based on chaotic map and reversible integer wavelet transform. Journal of Electrical Engineering 65(2):90–96, 2014.

    Article  Google Scholar 

  26. Seyed Mohammad Seyedzadeh and Sattar Mirzakuchaki, “A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map”, Signal Processing, Elsevier, vol. 92, 1202–1215, 2012. doi:https://doi.org/10.1016/j.sigpro.2011.11.004

    Article  Google Scholar 

  27. Soleymani, A., Nordin, M. J., and Sundararajan, E., A chaotic cryptosystem for images based on Henon and Arnold cat map. The scientific world journal, Hindawi:1–21, 2014. https://doi.org/10.1155/2014/536930.

    Google Scholar 

  28. Shu-Ying Wang, Jian-Feng Zhao, Xian-Feng Li and Li-Tao Zhang, Image blocking encryption algorithm based on laser Chaos synchronization, journal of electrical and computer engineering, Hindawi, pp-1-15, 2016.

    Google Scholar 

  29. Kumar, T. S., and Venkatesan, R., A new Image Encryption Method Based on Knight’s Travel path and True random number. Journalof Information Science and Engineering 32:133–152, 2016.

    Google Scholar 

  30. Xing-yuan, W., and Qing, Y., A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Communications in Nonlinear Science and Numerical Simulation, Elsevier 14:574–581, 2009. https://doi.org/10.1016/j.cnsns.2007.10.011.

    Article  Google Scholar 

  31. Mondal, B., and Mandal, T., A light weight secure image encryption scheme based on chaos & DNA computing. Journal of King Saud University, Computer and Information Sciences:1–6, 2016. https://doi.org/10.1016/j.jksuci.2016.02.003.

    Article  Google Scholar 

  32. Niu, H., Zhou, C., Wang, B., Zheng, X., and Zhou, S., Splicing model and hyper–chaotic system for image encryption. Journal of Electrical Engineering 67(2):78–86, 2016. https://doi.org/10.1515/jee-2016-0012.

    Article  Google Scholar 

  33. Keuninckx, L., Soriano, M. C., Fischer, I., Mirasso, C. R., Nguimdo, R. M., and Van der Sande, G., Encryption key distribution via chaos synchronization. Scientific Reports:1–14, 2017. https://doi.org/10.1038/srep43428.

  34. Jiménez-Rodríguez, M., González-Novoa, M. G., Estrada-Gutiérrez, J. C., Acosta-Lúaa, C., and Flores-Siordia, O., Secure point-to-point communication using chaos. Universidad Nacional de Colombia, DYNA 83(197):180–186. June, 2016. https://doi.org/10.15446/dyna.v83n197.53506.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shalini Stalin.

Ethics declarations

Conflict of interest

Shalini Stalin declares that she has no conflict of interest. Priti Maheshwari declares that she has no conflict of interest. Piyush Kumar Shukla declares that he has no conflict of interest. Manish Maheshwari declares that he has no conflict of interest. Bhupesh Gour declares that he has no conflict of interest. Ankur Khare declares that he has no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Image & Signal Processing

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Stalin, S., Maheshwary, P., Shukla, P.K. et al. Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA). J Med Syst 43, 267 (2019). https://doi.org/10.1007/s10916-019-1389-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-019-1389-z

Keywords

Navigation