Medical Image Encryption Technique using DNA Cryptography

Naga Raju C *, M. K. Gupta**
* Department of Computer Science and Engineering, Srinivasa Ramanujan Institute of Technology (Autonomous), Anantapur, Andhra Pradesh, India.
** Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University, Proddatur, Andhra Pradesh, India.
Periodicity:March - May'2020
DOI : https://doi.org/10.26634/jit.9.2.17760

Abstract

In the medical field, telemedicine, smart health and e-health, are cutting-edge technologies. These technologies utilize digital medical information for end-user communication. Even though this digitalization reduces time, it is a open source for hackers. Hence, hackers can tamper the digital medical image during broadcast. In the medical field, most of the investigations are done through X-rays, MRI and CT scan images. Security must be provided to maintain secrecy of diseases for avoiding the panic in the patients and for improving the degree of security in the image broadcast through internet. The DNA cryptography provides powerful security to enhance the probability of preventing from the brute-force and statistical analysis attacks. In this paper, two level security is provided using DNA codons. In first level, image is encrypted into DNA sequences by selecting key. In second level, codons are generated with dynamic numbers for encryption of image and construct DNA alphabets. In this technique, the encrypted image is in hidden format so that it is very difficult for attacker with known image attacks. The experimental results of the proposed technique are investigated with histogram based method and statistical analysis attacks and confirmed the superior security level in the protection of the image transmission.

Keywords

DNA, Cryptanalysis, Dynamic Chaos, Entropy, Bit Permutation.

How to Cite this Article?

Kumari, K. S., and Raju, C. N. (2020). Medical Image Encryption Technique using DNA Cryptography. i-manager's Journal on Information Technology, 9(2), 27-35. https://doi.org/10.26634/jit.9.2.17760

References

[1]. Awad, A., & Awad, D. (2010). Efficient image chaotic encryption algorithm with no propagation error. ETRI Journal, 32(5), 774-783. https://doi.org/10.4218/etrij.10. 1510.0063
[2]. Chirkkarottu, S., & Mathew, S. (2013). Summarization on DNA cr yptography. International Journal of Engineering Research & Technology (IJERT), 2(11), 303- 306.
[3]. Enayatifar, R., Abdullah, A. H., & Lee, M. (2013). A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryption. Optics and Lasers in Engineering, 51(9), 1066- 1077. https://doi.org/10.1016/j.optlaseng.2013.03.010
[4]. Kadir, A., Hamdulla, A., & Guo, W. Q. (2014). Color image encryption using skew tent map and hyper th chaotic system of 6 -order CNN. Optik, 125(5), 1671- 1675. https://doi.org/10.1016/j.ijleo.2013.09.040
[5]. Kanso, A., & Ghebleh, M. (2012). A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2943-2959. https://doi.org/10.1016/j.c nsns.2011.11.030
[6]. Kaundal, A. K., & Verma, A. K. (2014). DNA based cryptography: A review. International Journal of Information and Computation Technology, 4(7), 693- 698.
[7]. Li, H., Huang, Q., Shen, J., Yang, G., & Susilo, W. (2019). Designated-server identity-based authenticated encryption with keyword search for encrypted emails. Information Sciences, 481, 330-343. https://doi.org/10. 1016/j.ins.2019.01.004
[8]. Lu, Y., Wang, G., Li, J., & Shen, J. (2017). Efficient designated server identity-based encryption with conjunctive keyword search. Annals of Telecommunications, 72(5-6), 359-370. https://doi.org/10.1007/s12243-017-05 74-7
[9]. Mazloom, S., & Eftekhari-Moghadam, A. M. (2009). Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons & Fractals, 42(3), 1745- 1754. https://doi.org/10.1016/j.chaos.2009.03.084
[10]. Noroozi, M., Karoubi, I., & Eslami, Z. (2018). Designing a secure designated server identity-based encryption with keyword search scheme: Still unsolved. Annals of Telecommunications, 73(11-12), 769-776. https://doi.org/10.1007/s12243-018-0653-4
[11]. Sidorenko, A. V., & Shishko, M. S. (2016). Encryption of Image using DNA-sequences, chaotic dinamics and hash functions. Doklady BGUIR (in Russian). 5, 42-47.
[12]. Wang, Q., Zhang, Q., & Zhou, C. (2009, October). A multilevel image encryption algorithm based on chaos and DNA coding. In 2009, Fourth International Conference on Bio-Inspired Computing (BICTA), (pp. 1-5). IEEE. https://doi.org/10.1109/BICTA.2009.5338154
[13]. Wang, X. F., Mu, Y., Chen, R., & Zhang, X. S. (2016). Secure channel free id-based searchable encryption for peer-to-peer group. Journal of Computer Science and Technology, 31(5), 1012-1027. https://doi.org/10.1007/s 11390-016-1676-9
[14]. Yin, C. (2019). Encoding DNA sequences by integer chaos game representation. Journal of Computational Biology, 26(2), 143-151. https://doi.org/10.1089/cmb.20 18.0173
[15]. Zhang, X., Shao, L., Zhao, Z., & Liang, Z. (2014). An image encryption scheme based on constructing large permutation with chaotic sequence. Computers & Electrical Engineering, 40(3), 931-941. https://doi.org/10. 1016/j.compeleceng.2013.08.008
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.