Browse > Article
http://dx.doi.org/10.9717/kmms.2014.17.11.1279

Gradual Encryption of Medical Image using Non-linear Cycle and 2D Cellular Automata Transform  

Nam, Tae Hee (Dept. of Biomedical Engineering, Dongju College)
Publication Information
Abstract
In this paper, we propose on image encryption method which uses NC(Non-linear Cycle) and 2D CAT(Two-Dimensional Cellular Automata Transform) in sequence to encrypt medical images. In terms of the methodology, we use NC to generate a pseudo noise sequence equal to the size of the original image. We then conduct an XOR operation of the generated sequence with the original image to conduct level 1 NC encryption. Then we set the proper Gateway Values to generate the 2D CAT basis functions. We multiply the generated basis functions by the altered NC encryption image to conduct the 2nd level 2D CAT encryption. Finally, we verify that the proposed method is efficient and extremely safe by conducting an analysis of the key spatial and sensitivity analysis of pixels.
Keywords
NC; CAT; PN(Pseudo Noise) Sequences; Image Encryption; Basis Functions;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 J.W. Shin, Y. Sook, H.M. Yoo, and D.S. Park, "A Novel Digital Image Protection using Cellular Automata Transform," The Korean Institute of Communications and Information Sciences, Vol. 35, No. 8, pp. 689-696, 2010.   과학기술학회마을
2 H.M. Lim, S.H. Lee, and B.G. Kim, "Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on/off-line Learner Tracking System," Journal of Korea Multimedia Society, Vol. 14, No. 1, pp. 24-32, 2011.   과학기술학회마을   DOI
3 C. Sur, Y.H. Park, and K.H. Rhee, "A Multireceiver Certificateless Encryption Scheme and Its Application," Journal of Korea Multimedia Society, Vol. 14, No. 6, pp. 775-784, 2011.   DOI
4 G. Ateniese, C. Blundo, and A. Santis, "Extended Schemes for Visual Cryptography," Theoretical Computer Science, Vol. 250, Issues 1-2, pp. 143-161, 2001.   DOI   ScienceOn
5 J. Giesl and K. Vlcek, "Image Encryption based on Strange Attractor," ICGST-GVIP Journal, Vol. 9, Issue 2, pp. 154-162, 2009.
6 K.W. Wong, S.H. Kwok, and W.S. Law, "A Fast Image Encryption Scheme based on Chaotic Standard Map," Physics Letters A, Vol. 372, Issue 15, pp. 2645-2652, 2008.   DOI   ScienceOn
7 Q. Zhou, K.W. Wong, X. Liao, T. Xiang, and Y. Hu, "Parallel Image Encryption Algorithm based on Discretized Chaotic Map," Chaos, Solitons and Fractals, Vol. 38, Issue 4, pp. 1081-1092, 2008.   DOI   ScienceOn
8 G. Chen, Y. Mao, and C. Chui, "Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps," Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749-761, 2004.   DOI   ScienceOn
9 L. Zhang, X. Liao, and X. Wang, "An Image Encryption Approach based on Chaotic Maps," Chaos, Solitons and Fractals, Vol. 24, Issue 3, pp. 759-765, 2005.   DOI   ScienceOn
10 N.K. Pareek, V. Patidar, and K.K. Sud, "Image Encryption using Chaotic Logistic Map," Image and Vision Computing, Vol, 24, Issue 9, pp. 926-934, 2006.   DOI   ScienceOn
11 T.H. Nam, S.T. Kim, and S.J. Cho, "Image Encryption using Non-linear FSR and Complemented MLCA," Proceeding of 2009 International Conference of Maritime Information and Communication Sciences, Vol. 2, No. 1, pp. 168-171, 2009.
12 O. Lafe, Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling, Kluwer Academic Publishers Norwell, MA, USA, 2000.
13 H.K. Kim, T.H. Nam, S.J. Cho, and S.T. Kim, "A Novel Image Encryption using Complemented MLCA based on NBCA and 2D CAT," The Korean Institute of Communications and Information Sciences, Vol. 36, No. 6, pp. 361-367, 2011.   과학기술학회마을   DOI