Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 913476, 11 pages
http://dx.doi.org/10.1155/2015/913476
Research Article

Cryptanalysis and Improvement of an Efficient and Secure Medical Image Protection Scheme

1Software College, Northeastern University, Shenyang 110004, China
2Department of radiology, The General Hospital of Shenyang Command PLA, Shenyang 110016, China

Received 26 August 2014; Accepted 25 November 2014

Academic Editor: Jonathan N. Blakely

Copyright © 2015 Li-bo Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Hu and F. Han, “A pixel-based scrambling scheme for digital medical images protection,” Journal of Network and Computer Applications, vol. 32, no. 4, pp. 788–794, 2009. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Montagnat, F. Bellet, H. Benoit-Cattin et al., “Medical images simulation, storage, and processing on the European Data Grid testbed,” Journal of Grid Computing, vol. 2, no. 4, pp. 387–400, 2004. View at Publisher · View at Google Scholar · View at Scopus
  3. D.-C. Lou, M.-C. Hu, and J.-L. Liu, “Multiple layer data hiding scheme for medical images,” Computer Standards and Interfaces, vol. 31, no. 2, pp. 329–335, 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. M. Li, R. Poovendran, and S. Narayanan, “Protecting patient privacy against unauthorized release of medical images in a group communication environment,” Computerized Medical Imaging and Graphics, vol. 29, no. 5, pp. 367–383, 2005. View at Publisher · View at Google Scholar · View at Scopus
  5. F. Cao, H. K. Huang, and X. Q. Zhou, “Medical image security in a HIPAA mandated PACS environment,” Computerized Medical Imaging and Graphics, vol. 27, no. 2-3, pp. 185–196, 2003. View at Publisher · View at Google Scholar · View at Scopus
  6. United States Department of Health and Human Services, “HIPPA: medical privacy—national standards to protect the privacy of personal health information,” http://www.hhs.gov/ocr/privacy/hipaa/administrative/index.html.
  7. HEMA, DICOM: digital imaging and communication in medicine, http://medical.nema.org/.
  8. S. Li, G. Chen, and X. Zheng, “Chaos-based encryption for digital images and videos,” in Multimedia Security Handbook, chapter 4, pp. 133–167, CRC Press, New York, NY, USA, 2005. View at Google Scholar
  9. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. Y. Wang, K.-W. Wong, X. Liao, T. Xiang, and G. Chen, “A chaos-based image encryption algorithm with variable control parameters,” Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773–1783, 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Zhang, D. Xiao, H. Liu, and H. Nan, “GLS coding based security solution to JPEG with the structure of aggregated compression and encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 5, pp. 1366–1374, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. X. Wang and D. Luan, “A novel image encryption algorithm using chaos and reversible cellular automata,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 11, pp. 3075–3085, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. J.-X. Chen, Z.-L. Zhu, C. Fu, and H. Yu, “An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism,” Optics Express, vol. 21, no. 23, pp. 27873–27890, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. J.-X. Chen, Z.-L. Zhu, C. Fu, and H. Yu, “A fast image encryption scheme with a novel pixel swapping-based confusion approach,” Nonlinear Dynamics, vol. 77, no. 4, pp. 1191–1207, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 372, no. 4, pp. 394–400, 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. J. Chen, Z. ZHu, L. Zhang, C. Fu, and H. Yu, “An efficient diffusion scheme for chaos-based digital image encryption,” Mathematical Problems in Engineering, vol. 2014, Article ID 427349, 13 pages, 2014. View at Publisher · View at Google Scholar
  17. J.-X. Chen, Z.-L. Zhu, Z. Liu, C. Fu, L.-B. Zhang, and H. Yu, “A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains,” Optics Express, vol. 22, no. 6, pp. 7349–7361, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Zhang and D. Xiao, “An image encryption scheme based on rotation matrix bit-level permutation and block diffusion,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 1, pp. 74–82, 2014. View at Publisher · View at Google Scholar · View at Scopus
  19. X.-J. Tong, “The novel bilateral—diffusion image encryption algorithm with dynamical compound chaos,” Journal of Systems and Software, vol. 85, no. 4, pp. 850–858, 2012. View at Publisher · View at Google Scholar · View at Scopus
  20. Y. Wang, K.-W. Wong, X. Liao, and G. Chen, “A new chaos-based fast image encryption algorithm,” Applied Soft Computing Journal, vol. 11, no. 1, pp. 514–522, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. X. Y. Zhang, C. Wang, S. Zhong, and Q. Yao, “Image encryption scheme based on balanced two-dimensional cellular automata,” Mathematical Problems in Engineering, vol. 2013, Article ID 562768, 10 pages, 2013. View at Publisher · View at Google Scholar
  22. K. Wang, W. Pei, L. Zou, A. Song, and Z. He, “On the security of 3D Cat map based symmetric image encryption scheme,” Physics Letters A, vol. 343, no. 6, pp. 432–439, 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. Y. Zhang, W. Wen, M. Su, and M. Li, “Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik, vol. 125, no. 4, pp. 1562–1564, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. S. Li, C. Li, G. Chen, N. G. Bourbakis, and K.-T. Lo, “A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing: Image Communication, vol. 23, no. 3, pp. 212–223, 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. X. Wang and G. He, “Cryptanalysis on a novel image encryption method based on total shuffling scheme,” Optics Communications, vol. 284, no. 24, pp. 5404–5407, 2011. View at Publisher · View at Google Scholar · View at Scopus
  26. Y. Zhang, D. Xiao, W. Wen, and M. Li, “Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Nonlinear Dynamics, vol. 76, no. 3, pp. 1645–1650, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. C. Zhu, C. Liao, and X. Deng, “Breaking and improving an image encryption scheme based on total shuffling scheme,” Nonlinear Dynamics, vol. 71, no. 1-2, pp. 25–34, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. J. X. Chen, Z. L. Zhu, C. Fu, L. B. Zhang, and Y. Zhang, “Cryptanalysis and improvement of an optical image encryption scheme using chaotic Baker map and double random phase encoding,” Journal of Optics, vol. 16, no. 2, Article ID 125403, 13 pages, 2014. View at Google Scholar
  29. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 16, no. 8, pp. 2129–2151, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  30. C. Fu, W.-H. Meng, Y.-F. Zhan et al., “An efficient and secure medical image protection scheme based on chaotic maps,” Computers in Biology and Medicine, vol. 43, no. 8, pp. 1000–1010, 2013. View at Publisher · View at Google Scholar · View at Scopus
  31. C. Li and K.-T. Lo, “Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks,” Signal Processing, vol. 91, no. 4, pp. 949–954, 2011. View at Publisher · View at Google Scholar · View at Scopus
  32. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet
  33. IEEE Computer Society, IEEE Standard for Binary Floating-Point Arithmetic, ANSI/IEEE, 1985.