DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic Signal
- URL: http://arxiv.org/abs/2504.20689v1
- Date: Tue, 29 Apr 2025 12:11:23 GMT
- Title: DICOM Compatible, 3D Multimodality Image Encryption using Hyperchaotic Signal
- Authors: Anandik N Anand, Sishu Shankar Muni, Abhishek Kaushik,
- Abstract summary: Medical image encryption plays an important role in protecting sensitive health information from cyberattacks and unauthorized access.<n>In this paper, we introduce a secure and robust encryption scheme that is multi-modality compatible.<n>The encryption starts by taking DICOM image as input, then padding to increase the image area.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Medical image encryption plays an important role in protecting sensitive health information from cyberattacks and unauthorized access. In this paper, we introduce a secure and robust encryption scheme that is multi-modality compatible and works with MRI, CT, X-Ray and Ultrasound images for different anatomical region of interest. The method utilizes hyperchaotic signals and multi-level diffusion methods. The encryption starts by taking DICOM image as input, then padding to increase the image area. Chaotic signals are produced by a logistic map and are used to carry out pixel random permutation. Then, multi-level diffusion is carried out by 4-bit, 8-bit, radial and adjacent diffusion to provide high randomness and immunity against statistical attacks. In addition, we propose a captcha-based authentication scheme to further improve security. An algorithm generates alphanumeric captcha-based image which is encrypted with the same chaotic and diffusion methods as the medical image. Both encrypted images(DICOM image and captcha image) are then superimposed to create a final encrypted output, essentially integrating dual-layer security. Upon decryption, the superimposed image is again decomposed back to original medical and captcha images, and inverse operations are performed to obtain the original unencrypted data. Experimental results show that the proposed method provides strong protection with no loss in image integrity, thereby reducing unauthorized data breaches to a significant level. The dual-encryption approach not only protects the confidentiality of the medical images but also enhances authentication by incorporating captcha.
Related papers
- X-Cross: Image Encryption Featuring Novel Dual-Layer Block Permutation and Dynamic Substitution Techniques [0.6094552383593457]
Image encryption plays an important role in securing the online transmission/storage of images from unauthorized access.<n>This paper presents a novel diffusion-confusion-based image encryption algorithm named as X-CROSS.
arXiv Detail & Related papers (2025-03-13T01:56:22Z) - Image Encryption Using DNA Encoding, Snake Permutation and Chaotic Substitution Techniques [0.7743851353380347]
This paper presents a new image encryption scheme using DNA encoding, snake permutation and chaotic substitution techniques.<n>DNA encoding and snake permutation modules ensure effective scrambling of the pixels.<n>For the confusion part, the chaotic substitution technique is implemented, which substitutes the pixel values chosen randomly from 3 S-boxes.
arXiv Detail & Related papers (2025-03-12T03:54:37Z) - A robust image encryption scheme based on new 4-D hyperchaotic system and elliptic curve [1.2499537119440245]
A new 4-D hyperchaotic system for image encryption is proposed and its effectiveness is demonstrated.
The proposed system is considered simple because it consists of eight terms with two nonlinearities.
The two-stage encryption process, involving confusion and diffusion, is employed to protect the confidentiality of digital images.
arXiv Detail & Related papers (2024-11-26T18:08:39Z) - StealthDiffusion: Towards Evading Diffusion Forensic Detection through Diffusion Model [62.25424831998405]
StealthDiffusion is a framework that modifies AI-generated images into high-quality, imperceptible adversarial examples.
It is effective in both white-box and black-box settings, transforming AI-generated images into high-quality adversarial forgeries.
arXiv Detail & Related papers (2024-08-11T01:22:29Z) - Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - An Effective Approach to Scramble Multiple Diagnostic Imageries Using Chaos-Based Cryptography [0.0]
We provide a chaotic system-based medical picture encryption method.
The permutation based on plain image and chaotic keys is offered to shuffle the plain picture's pixels to other rows and columns.
We analyze the chaotic behavior of the proposed system using various techniques and tests such as bifurcation plots, Lyapunov exponents, MSE, PSNR tests, and histogram analysis.
arXiv Detail & Related papers (2024-05-02T05:18:46Z) - PRO-Face S: Privacy-preserving Reversible Obfuscation of Face Images via
Secure Flow [69.78820726573935]
We name it PRO-Face S, short for Privacy-preserving Reversible Obfuscation of Face images via Secure flow-based model.
In the framework, an Invertible Neural Network (INN) is utilized to process the input image along with its pre-obfuscated form, and generate the privacy protected image that visually approximates to the pre-obfuscated one.
arXiv Detail & Related papers (2023-07-18T10:55:54Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Hiding Images in Deep Probabilistic Models [58.23127414572098]
We describe a different computational framework to hide images in deep probabilistic models.
Specifically, we use a DNN to model the probability density of cover images, and hide a secret image in one particular location of the learned distribution.
We demonstrate the feasibility of our SinGAN approach in terms of extraction accuracy and model security.
arXiv Detail & Related papers (2022-10-05T13:33:25Z) - Modeling Lost Information in Lossy Image Compression [72.69327382643549]
Lossy image compression is one of the most commonly used operators for digital images.
We propose a novel invertible framework called Invertible Lossy Compression (ILC) to largely mitigate the information loss problem.
arXiv Detail & Related papers (2020-06-22T04:04:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.