Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 240749, 11 pages
http://dx.doi.org/10.1155/2014/240749
Research Article

A Novel Encryption Frame for Medical Image with Watermark Based on Hyperchaotic System

College of Software, Nankai University, Wei Jin Road No. 94, Nankai District, Tianjin 300071, China

Received 5 January 2014; Accepted 19 March 2014; Published 9 April 2014

Academic Editor: Jui-Sheng Lin

Copyright © 2014 Shun Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. V. Fotopoulos, M. L. Stavrinou, and A. N. Skodras, “Medical image authentication and self-correction through an adaptive reversible watermarking technique,” in Proceedings of the 8th IEEE International Conference on BioInformatics and BioEngineering (BIBE '08), pp. 1–5, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Physics Letters A, vol. 372, no. 4, pp. 394–400, 2008. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Bouslimi, G. Coatrieux, M. Cozic, and C. Roux, “A joint encryption/watermarking system for verifying the reliability of medical images,” IEEE Transactions on Information Technology in Biomedicine, vol. 16, pp. 891–899, 2012. View at Google Scholar
  4. M. François, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Processing: Image Communication, vol. 27, no. 3, pp. 249–259, 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. Z. Wei, Y. Wu, X. Ding, and R. H. Deng, “A scalable and format-compliant encryption scheme for H. 264/SVC bitstreams,” Signal Processing: Image Communication, vol. 27, pp. 1011–1024, 2012. View at Google Scholar
  6. M. Ghebleh, A. Kanso, and H. Noura, “An image encryption scheme based on irregularly decimated chaotic maps,” Signal Processing: Image Communication, 2013. View at Publisher · View at Google Scholar
  7. J. B. Lima, E. A. O. Lima, and F. Madeiro, “Image encryption based on the finite field cosine transform,” Signal Processing: Image Communication, vol. 28, pp. 1537–1547, 2013. View at Google Scholar
  8. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Zhang, D. Xiao, Y. Shu, and J. Li, “A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations,” Signal Processing: Image Communication, vol. 28, pp. 292–300, 2013. View at Google Scholar
  10. H. Zhu, C. Zhao, and X. Zhang, “A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem,” Signal Processing: Image Communication, vol. 28, pp. 670–680, 2013. View at Google Scholar
  11. V. Fotopoulos, M. L. Stavrinou, and A. N. Skodras, “Authentication and self-correction in sequential MRI slices,” Journal of Digital Imaging, vol. 24, no. 5, pp. 943–948, 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. F. Rahimi and H. Rabbani, “A dual adaptive watermarking scheme in contourlet domain for DICOM images,” BioMedical Engineering Online, vol. 10, article 53, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Processing Letters, vol. 18, no. 4, pp. 255–258, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. W. Hong, T.-S. Chen, and H.-Y. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Processing Letters, vol. 19, no. 4, pp. 199–202, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Lavanya and V. Natarajan, “Watermarking patient data in encrypted medical images,” Sadhana-Academy Proceedings in Engineering Sciences, vol. 37, pp. 723–729, 2012. View at Google Scholar
  16. X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 826–832, 2012. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. View at Publisher · View at Google Scholar · View at MathSciNet
  18. K. W. Wong, “A fast chaotic cryptographic scheme with dynamic look-up table,” Physics Letters A, vol. 298, no. 4, pp. 238–242, 2002. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  19. A. Kanso and M. Ghebleh, “A novel image encryption algorithm based on a 3D chaotic map,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2943–2959, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  20. J. Fridrich, M. Goljan, and R. Du, “Lossless data embedding for all image formats,” in Electronic Imaging, vol. 2002, pp. 572–583, 2002. View at Google Scholar
  21. J. Tian, “Reversible data embedding using a difference expansion,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, no. 8, pp. 890–896, 2003. View at Publisher · View at Google Scholar · View at Scopus
  22. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 16, no. 3, pp. 354–361, 2006. View at Publisher · View at Google Scholar · View at Scopus
  23. S. L. Lin, C. F. Huang, M. H. Liou, and C. Y. Chen, “Improving histogram-based reversible information hiding by an optimal weight-based pre-diction scheme,” Journal of Information Hiding and Multimedia Signal Processing, vol. 1, pp. 19–33, 2013. View at Google Scholar
  24. H. Gwoboa, H. Ying-Hsuan, C. Chin-Chen, and L. Yanjun, “(k, n)-image reversible data hiding,” Journal of Information Hiding and Multimedia Signal Processing, vol. 5, pp. 152–164, 2014. View at Google Scholar
  25. S. Weng, S. C. Chu, N. Cai, and R. Zhan, “Invariability of mean value based reversible watermarking,” Journal of Information Hiding and Multimedia Signal Processing, vol. 4, pp. 90–98, 2013. View at Google Scholar
  26. C.-C. Lin, W.-L. Tai, and C.-C. Chang, “Multilevel reversible data hiding based on histogram modification of difference images,” Pattern Recognition, vol. 41, no. 12, pp. 3582–3591, 2008. View at Publisher · View at Google Scholar · View at Scopus
  27. K.-S. Kim, M.-J. Lee, H.-Y. Lee, and H.-K. Lee, “Reversible data hiding exploiting spatial correlation between sub-sampled images,” Pattern Recognition, vol. 42, no. 11, pp. 3083–3096, 2009. View at Publisher · View at Google Scholar · View at Scopus
  28. T. Gao, Z. Chen, Z. Yuan, and G. Chen, “A hyperchaos generated from Chen's system,” International Journal of Modern Physics C, vol. 17, no. 4, pp. 471–478, 2006. View at Google Scholar · View at Scopus