Paper
4 August 2022 Medical image encryption based on hyper-chaotic system
Lu Zhang, Tailin Han, Xuan Liu, Hong Liu
Author Affiliations +
Proceedings Volume 12306, Second International Conference on Digital Signal and Computer Communications (DSCC 2022); 1230605 (2022) https://doi.org/10.1117/12.2641315
Event: Second International Conference on Digital Signal and Computer Communications (DSCC 2022), 2022, Changchun, China
Abstract
Medical images contain a large amount of private information like patient's lesions. Theft or destruction of medical images will cause irreparable losses to patients and medical institutions. How to realize the secure transmission of information in the process of telemedicine has become a research hotspot. In this paper, an encryption algorithm for hyper-chaotic systems based on DNA coding is proposed. First, a four-dimensional chaotic system is constructed by adding a dimension to the three-dimensional chaotic system, which improves the dynamic performance of the system, increases the parameters of the chaotic system, and improves the key space. Second, the algorithm complexity is increased by the added DNA encoding. The experimental results show that the key space encrypted by the method in this paper is 2469, and the key sensitivity can reach 10-16. At the same time, in the analysis of histogram, adjacent correlation and information entropy, the algorithm in this paper can achieve good security performance.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lu Zhang, Tailin Han, Xuan Liu, and Hong Liu "Medical image encryption based on hyper-chaotic system", Proc. SPIE 12306, Second International Conference on Digital Signal and Computer Communications (DSCC 2022), 1230605 (4 August 2022); https://doi.org/10.1117/12.2641315
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Medical imaging

Complex systems

Computer programming

Chaos

Computer security

Image processing

Back to Top