Open Access   Article Go Back

A Survey on Medical Image Encryption

Garima Mathur1

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 128-133, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.128133

Online published on Apr 30, 2019

Copyright © Garima Mathur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Garima Mathur, “A Survey on Medical Image Encryption,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.128-133, 2019.

MLA Style Citation: Garima Mathur "A Survey on Medical Image Encryption." International Journal of Computer Sciences and Engineering 7.4 (2019): 128-133.

APA Style Citation: Garima Mathur, (2019). A Survey on Medical Image Encryption. International Journal of Computer Sciences and Engineering, 7(4), 128-133.

BibTex Style Citation:
@article{Mathur_2019,
author = {Garima Mathur},
title = {A Survey on Medical Image Encryption},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {128-133},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4006},
doi = {https://doi.org/10.26438/ijcse/v7i4.128133}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.128133}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4006
TI - A Survey on Medical Image Encryption
T2 - International Journal of Computer Sciences and Engineering
AU - Garima Mathur
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 128-133
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
461 279 downloads 177 downloads
  
  
           

Abstract

The medical industry has proceeded into the digital age thanks to the development of science and technology. Medicinal pictures which are utilized in their digital form play an important role in every modern hospital. This significant contribution is especially visible in the field of diagnosis and in the treatment of patients. The problem, however, may arise during the application of these digital data. Digital images are linked to image transmission and sharing, which bring about concerns regarding data security. The Digital Image and Communication on Medicine (DICOM) standard was created so as to encourage protected and reliable transmissions and communications. In this paper it has been surveyed about various encryption techniques that can be used for secure transmission of medical images through non-secure medium along with its advantages and disadvantages.

Key-Words / Index Term

Encryption, Medical images, DICOM, Key Sensitivity, Known Plaintext attack, Quaternion

References

[1]. Panigrahy S., Acharya B., Jen D. Image encryption using self-invertible key matrix of hill cipher algorithm. In: 1st International Conference on Advances in Computing, 21-22 February, Chikhli, India, . 2008; pp: 1-4.
[2]. Sokouti M., Pashazadeh S., Sokouti B. Medical image encryption using genetic-based random key generator (GRKG).; In: National Joint Conference on Computer and Mechanical Eng. (NJCCEM2013); May 8; Miandoab, Iran. 2013. pp. 1–6.
[3]. Sokouti M., Sokouti B., Pashazadeh S., Feizi-Derakhshi M-R., Haghipour S. Genetic-based random key generator (GRKG): a new method for generating more-random keys for one-time pad cryptosystem. Neural Comput. Appl. 2013;22(7-8):1667–1675. doi: 10.1007/s00521-011-0799-8.
[4]. Younes MAB, Janatan A. ”An image encryption approach using a combination of permutation technique followed by encryption”. IJCSNS. 2008;8(4):191–7.
[5]. Seyedzade S.M., Atani R.E., Mirzakuchaki S. Novel image encryption algorithm based on hash function.; 6th Iranian Conference on Machine Vision and Image Processing; October 27-28; 2010. pp. 1–6.
[6]. Ismail I.A., Amin M., Diab H. Digital image encryption algorithm based on composition of two chaotic logistic maps’2010. Int. J. Netw. Secur. 2010;11(1):1–5.
[7]. Kamali SH, Shankeria R, Hedayati M, Rahmani M. New modified version of advance encryption standard based algorithm for image encryption.; In: International Conference on Electronics and Information Engineering (ICEIE); August 1-3, 2010. pp. v1-141–v1-5.
[8]. Indrakanti S.P., Avadhani P.S. Permutation based image encryption technique. Int. J. Comput. Appl. 2011;28(8):45–47.
[9]. Enayatifkr R., Abdullah A.H. Image Security via genetic algorithm.; In: International Conference on Computer and Software Modeling IPCSIT;
[10]. Singh K., Kaur K. Image encryption using chaotic maps and DNA addition operation and noise effect on it. Int. J. Comput. Appl. 2011;23(6):17–24.
[11]. Alsafasfeh Q.H., Arfoa A.A. Image encryption based on the general approach for multiple chaotic system. J Signal Inform Process. 2011;2(3):238–244. doi: 10.4236/jsip.2011.23033.
[12]. Abuhaiba I.S., Hassan M.A. Image encryption using differential evolution approach in security Domain. Signal Image Process. Int. J. 2011;2(1):51–69. [SIPIJ].
[13]. Patel K.D., Belani S. Image encryption using different techniques: A review. Int. J. Emerg. Technol. Adv. Eng. 2011;1(1):30–4.
[14]. Abugharsa A.B., Basari A.S., Almangush H. A new image encryption approach using the integration of a shifting technique and the AES algorithm. Int. J. Comput. Appl. 2012;42(9):38–45.
[15]. Pareek N.K.“Design and Analysis of a novel digital image encryption scheme”. Int J Net secure Appl. 2012;4(2):95–108.doi: 10.5121/ijnsa.2012.4207.
[16]. Agarwal A. Secret key encryption algorithm using genetic algorithm. Int J Adv Res Comp Sci Soft Eng. 2012; 2(4): 216-8
[17]. Bhatt V. Implementation of new advance image encryption algorithm to enhance security of multimedia component. Int J Adv Technol Eng Res. 2012;2(4):13–20.
[18]. M. Dzwonkowski, M. Papaj, and R. Rykaczewski, “A new quaternion based encryption method for DICOM images,” IEEE Trans. Image Process., vol. 24, no. 11, pp. 4614–4622, Nov. 2015.
[19]. M. Dridi, M. A. Hajjaji, B. Bouallegue, and A. Mtibaa, “Cryptography of medical images based on a combination between chaotic and neural network,” IET Image Process., vol. 10, no. 11, pp. 830–839, 2016.
[20]. W. Cao, Y. Zhou, C. L. P. Chen, and L. Xia, “Medical image encryption using edge maps,” Signal Process., vol. 132, pp. 96–109, Mar. 2017.
[21]. J. Chandrasekaran and S. J. Thiruvengadam, “A hybrid chaotic and number theoretic approach for securing DICOM images,” Secur. Commun. Netw., vol. 2017, Jan. 2017, Art. no. 6729896, doi: 10.1155/2017/ 6729896.
[22]. M. Dzwonkowski and R. Rykaczewski, “Quaternion feistel cipher with an infinite key space based on quaternion Julia sets,” J. Telecommun. Inf. Technol., vol. 4, pp. 15–21, Dec. 2015.