Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding

In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a combination of chaos and DNA computing under the scenario of two encryption rounds, preceded by a key generation layer, and follows the permutation-substitution-diffusion structure. The SHA-256 hash fu...

Full description

Bibliographic Details
Main Authors: Akram Belazi, Muhammad Talha, Sofiane Kharbech, Wei Xiang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8672068/
id doaj-02b5f672381d478bb45d6de45827d62b
record_format Article
spelling doaj-02b5f672381d478bb45d6de45827d62b2021-03-29T22:16:50ZengIEEEIEEE Access2169-35362019-01-017366673668110.1109/ACCESS.2019.29062928672068Novel Medical Image Encryption Scheme Based on Chaos and DNA EncodingAkram Belazi0https://orcid.org/0000-0002-5518-1836Muhammad Talha1https://orcid.org/0000-0002-4246-2524Sofiane Kharbech2https://orcid.org/0000-0002-0012-8173Wei Xiang3https://orcid.org/0000-0002-0608-065XRISC Laboratory, National Engineering School of Tunis, Tunis El Manar University, Tunis, TunisiaDeanship of Scientific Research, King Saud University, Riyadh, Saudi ArabiaLaboratory Sys’Com-ENIT (LR-99-ES21), Tunis El Manar University, Tunis, TunisiaCollege of Science and Engineering, James Cook University, Cairns, QLD, AustraliaIn this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a combination of chaos and DNA computing under the scenario of two encryption rounds, preceded by a key generation layer, and follows the permutation-substitution-diffusion structure. The SHA-256 hash function alongside the initial secret keys is employed to produce the secret keys of the chaotic systems. Each round of the proposed algorithm involves six steps, i.e., block-based permutation, pixel-based substitution, DNA encoding, bit-level substitution (i.e., DNA complementing), DNA decoding, and bit-level diffusion. A thorough search of the relevant literature yielded only this time the pixel-based substitution and the bit-level substitution are used in cascade for image encryption. The key-streams in the bit-level substitution are based on the logistic-Chebyshev map, while the sine-Chebyshev map allows producing the key-streams in the bit-level diffusion. The final encrypted image is obtained by repeating once the previous steps using new secret keys. Security analyses and computer simulations both confirm that the proposed scheme is robust enough against all kinds of attacks. Its low complexity indicates its high potential for real-time and secure image applications.https://ieeexplore.ieee.org/document/8672068/Image encryptionmedical imagespermutation and diffusionS-boxchaosDNA encoding
collection DOAJ
language English
format Article
sources DOAJ
author Akram Belazi
Muhammad Talha
Sofiane Kharbech
Wei Xiang
spellingShingle Akram Belazi
Muhammad Talha
Sofiane Kharbech
Wei Xiang
Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding
IEEE Access
Image encryption
medical images
permutation and diffusion
S-box
chaos
DNA encoding
author_facet Akram Belazi
Muhammad Talha
Sofiane Kharbech
Wei Xiang
author_sort Akram Belazi
title Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding
title_short Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding
title_full Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding
title_fullStr Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding
title_full_unstemmed Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding
title_sort novel medical image encryption scheme based on chaos and dna encoding
publisher IEEE
series IEEE Access
issn 2169-3536
publishDate 2019-01-01
description In this paper, we propose a new chaos-based encryption scheme for medical images. It is based on a combination of chaos and DNA computing under the scenario of two encryption rounds, preceded by a key generation layer, and follows the permutation-substitution-diffusion structure. The SHA-256 hash function alongside the initial secret keys is employed to produce the secret keys of the chaotic systems. Each round of the proposed algorithm involves six steps, i.e., block-based permutation, pixel-based substitution, DNA encoding, bit-level substitution (i.e., DNA complementing), DNA decoding, and bit-level diffusion. A thorough search of the relevant literature yielded only this time the pixel-based substitution and the bit-level substitution are used in cascade for image encryption. The key-streams in the bit-level substitution are based on the logistic-Chebyshev map, while the sine-Chebyshev map allows producing the key-streams in the bit-level diffusion. The final encrypted image is obtained by repeating once the previous steps using new secret keys. Security analyses and computer simulations both confirm that the proposed scheme is robust enough against all kinds of attacks. Its low complexity indicates its high potential for real-time and secure image applications.
topic Image encryption
medical images
permutation and diffusion
S-box
chaos
DNA encoding
url https://ieeexplore.ieee.org/document/8672068/
work_keys_str_mv AT akrambelazi novelmedicalimageencryptionschemebasedonchaosanddnaencoding
AT muhammadtalha novelmedicalimageencryptionschemebasedonchaosanddnaencoding
AT sofianekharbech novelmedicalimageencryptionschemebasedonchaosanddnaencoding
AT weixiang novelmedicalimageencryptionschemebasedonchaosanddnaencoding
_version_ 1724191915289608192