Research Article  Open Access
Dezhi An, Jun Lu, Shengcai Zhang, Yan Li, "A Novel Selective Encryption Method Based on Skin Lesion Detection", Mathematical Problems in Engineering, vol. 2020, Article ID 7982192, 13 pages, 2020. https://doi.org/10.1155/2020/7982192
A Novel Selective Encryption Method Based on Skin Lesion Detection
Abstract
Due to the semitrusted cloud, privacy protection of medical images in medical imaging clouds has become a precondition. For the privacy of patients and the security of medical images in the cloud, this paper proposes a selective encryption based on DNA sequence and chaotic maps for skin lesion image. Initially, we design a transition regionbased level set evolution functional which is merged into a variational level set expression with two extra energy functionals, to segment skin lesion image. Once skin lesion detection has been performed, the detected skin lesion pixels are encrypted by employing chaotic systems and DNA sequences. We apply 2DLASM and 1DLSS to produce the pseudorandom sequences and use the hash function of the plaintext image to calculate the secret keys of the encryption system. Results demonstrate that the proposed segmentation method is particularly suitable for the detection of skin lesion images with strong noise and complex background. Meanwhile, security analysis also reveals that this selective encryption has a large security key space and high sensitivity to the plaintext image and the secret key.
1. Introduction
Medical image processing has developed for many years, and there are more and more powerful tools to help dermatologists identify and classify skin lesions [1–6]. Among all kinds of skin lesions, melanoma is the most aggressive skin cancer and the one leading to the most deaths. However, in the transmission and storage, there are potential threats to the important content of these images, which makes the protection of important content a challenging problem [7–11].
To achieve confidentiality, encryption as an effective technology includes full encryption [12–15] and selective encryption [3, 16–20]. Full encryption involves encrypting complete image information, while selective encryption mainly focuses on the encryption of part of the image data. In recent years, selective encryption has been widely studied because of its tradeoff between computational complexity and security. Based on pixels of interest and singular value decomposition, Bhatnagar et al. proposed a selective image encryption scheme [16]. In [17], an edgebased lightweight image encryption scheme is proposed by Zhang et al. which employs chaosbased reversible hidden transform and multipleorder discrete fractional cosine transform. Wen et al. [18] proposed a selective method to encrypt the object of infrared images by using chaotic maps. Furthermore, they protected the salient regions of image by embedding them into a visually meaningful image in the work [19]. Actually, selective encryption is suitable for protecting the important areas of the image, but not the entire image. Most of the existing detection schemes do not have the ability to handle the skin lesions image [20].
In recent years, there are many techniques used for skin lesion detection, such as active contour model [21, 22], thresholding [23], fuzzy cmeans [24], and neural network [25], and local binary patterns clustering [2]. Rajab et al. [25] introduce the thresholding algorithm and neural network to realize the skin lesion detection. This technique can obtain the efficient result. However, the technique based on neural networks cannot deal with noisy images as the details of the edge were broken. Motivated by these problems, Barcelos et al. [26] posed a detection model for skin lesion image starting from nonlinear diffusion equations. However, in the case of strong noise and complex background, this model has some limitations.
So far, various techniques have been proposed for object detection. The level set method is an important segmentation method which has the advantages of allowing variable topological transformation and flexible numerical implementation. However, this method has the problem of contour initialization and reinitialization. To overcome these problems, Li et al. put forward a segmentation model without reinitialization [27] and distance regularized level set evolution (DRLSE) [28]. The two models employ the corresponding deviation penalty energy to force the level set function approach sign distance function and finally eliminate reinitialization. However, these two models need to initialize the contour. Recently, He et al. [29] proposed a weighted regionscalable fitting (WRSF) model which can handle well on medical images with intensity inhomogeneity, but fails to segment these with strong noises. In a partial differential equation (PDE) formulation, two geometric active contour models are, respectively, proposed by Wen et al. [22, 30]. The two models have the ability to segment skin lesion images with blurred boundaries.
Inspired by the works of Wen et al. [22, 30], but different from these works, this paper proposes a transition region (TR) based energy functional which can compel the level set function to have opposite different inside and outside image target. And then this energy functional is introduced into a variational level set expression with two extra energy functionals. According to the characteristics of significant regions, chaotic systems and DNA are combined to design suitable sensitive encryption algorithms.
The main contributions of this paper include the following points:(1)A novel skin lesion detectionbased selective encryption method is proposed. This method consists of the detection process of skin lesion image and selective encryption for privacy protection of skin lesion data.(2)In the skin lesion detection scheme, we propose a transition region (TR) based energy functional which compels this function to have a different sign inside and outside the image target. And the TRbased functional is introduced into a variational level set expression.(3)In the selective encryption for skin lesion data, we employ chaotic systems and DNA sequence operations. 2DLASM and 1DLSS are chosen to generate pseudorandom sequences and determine DNA encoding/decoding rules of the skin lesion region and the key matrix.
The structure of this article is described as follows. The DRLSE model and DNA encoding/decoding rules are introduced in Section 2. Section 3 describes the proposed skin lesion detectionbased selective encryption algorithm which contains skin lesion detection based on TRbased energy functional model and selective encryption algorithm. The experimental results and security analysis are depicted in Section 4. The conclusions are given in Section 5.
2. Related Works
2.1. The DRLSE Model
Li et al. [27] extended distance regularized level set evolution (DRLSE) and proposed a variational level set model for image segmentation. In a variational framework, this model is formulated about the level set function as follows:where , , are constants, is the level set smooth term, and is a certain external energy term. is a potential (or energy density) function , is an edge indicator function, and is the convolution of the image and the Gaussian kernel with standard deviation . The function is the onedimensional Heaviside function.
The term computes the length of the zero level set of in the conformal metric where is a parameterized representation of the zero level set of . The term can be viewed as the weighted area of the region , which forces the zero level set of to expand or shrink faster during the evolutionary process. Whether the parameter of can be positive or negative depends on the relative position of the object’s initial contour.
The level set evolution equation corresponding to equation (1) is obtained by the following equation:with initial condition , where and are, respectively, defined by
2.2. DNA Encoding/Decoding Rules
A DNA sequence consists of A (adenine), T (thymine), C (cytosine), and G (guanine), where A and T, G, and C are complementary pairs. Further, 0 and 1 are complementary, so the DNA sequence is similar to the binary data. According to the principle of complementary pairing, Table 1 shows eight types of encoding rules by the Watson–Crick complement regulation [31–33].

There introduce algebraic computation operators for DNA sequences to spread DNA computing, such as XOR. On the basis of traditional rule, the XOR operation is manipulated on DNA sequences. There exist 8 types of DNA XOR rules corresponding to 8 types of DNA encoding rules, and Table 2 shows DNA XOR under Rule 1.

3. Skin Lesion DetectionBased Selective Encryption Algorithm
This paper proposes a secure and privacypreserving technique to protect patients’ privacy and improve the security of skin lesion images. There have four stages of the proposed technique, as shown in Figure 1: TRbased energy functional based on adaptive function, skin lesion detection model, selective encryption based on skin lesion detection, and decryption.
3.1. Skin Lesion Detection Based on TRBased Energy Functional Model
Because of the variation of the shape and appearance of the skin lesions, the detection of the edge of the skin lesions is a very important problem. This paper proposes a TRbased energy functional model to segment the skin lesion image.
3.1.1. TRBased Energy Functional
Introduce an adaptive function via the gray mean of the transition region, which will serve as the weight of the proposed TRbased energy functional.
For an image and function , we designwhere is mean value of the transition region drawn by LETREM algorithms [22, 30]. As shown in the works [22, 30], we observe that the function has opposite sign inside and outside the transition region. A binary image is displayed in Figure 2(a), and the corresponding 3D plot of is described in Figure 2(b). From Figure 2(b), we can really reveal that the function has opposite sign inside and outside the transition region.
(a)
(b)
(c)
(d)
Now we pose a novel energy (TRbased energy) based on the function defined by (5). Given a level set function , we design this external energy as follows:where is the onedimensional smoothed Heaviside function and is the edge indicator given by .
3.1.2. The Proposed Detection Model
Following the DRLSE model, the energy functional is introduced into a variational level set expression. The energy functional for the proposed model is defined as follows:where the function is given by (4) and is the edge indicator function, which is different from that used in the DRLSE model.
We employ the gradient descent method to minimize energy functional (7) with respect to and obtain the associated level set evolution equation:where is defined by equation (3).
3.2. Selective Encryption Based on Skin Lesion Detection
In our encryption method, the proposed TRbased energy functional model can be chosen to detect skin lesion images. Further, the extracted significant region is encrypted by employed chaotic maps and DNA sequences.
3.2.1. Encryption and Decryption Process
Chaotic encryption technology has strong sensitivity. DNA computing has many advantages, such as massive parallelism, huge storage, and ultralow power consumption. Image encryption method based on DNA encoding integrates biological characteristics, but its encryption principle is closely related to chaotic encryption technology.
Step 1. Construct 1D logisticsine system (LSS) and 2D logisticadjustedsine map (LASM) and by chaotic maps.
Logistic map has high sensitivity and chaotic behavior. The sine map has a similar chaotic behavior with the logistic map. We employ 1D logisticsine system (LSS) [34] and 2D logisticadjustedsine map (2DLASM) [35] by the logistic and sine maps as seed maps:In the LSS system, the parameter , and mod function is the remainder used to return the division of two numbers. In 2DLASM system, , and y and z are state variables,.
Step 2. Generate the initial values and parameter for 1DLSS and 2DLASM.
We employ the SHA 256 hash of the plaintext image to generate a 256bit external secret key. Then the 256bit secret key is divided into 8bit blocks , so can also be described as follows:Then, the initial values can be produced as follows:where mod is the modular operation, and are the system parameters, , are initial values, and , , and are the given values used as secret keys.
Step 3. Perform DNA dynamic encoding process of the significant region.
Let I be an original skin lesion image, and detect the skin lesion region of image I using the proposed method as described in Section 3.1. Design an appropriate rectangle with the size of to cover the skin lesion region.(1)Convert each pixel in the rectangle block to its binary form, and obtain a binary matrix of .(2)Use produced in Step 1 for 1DLSS system to iterate (2000+4mn) times, then abandon the former 2000 values, and get chaotic sequences X to perform a matrix U of .(3)Generate dynamic encoding mode for every element of the significant region as follows:(4)Group every element of the matrix , then employ the corresponding encoding scheme in equation (13) to encode these elements, and finally form the encoded DNA a matrix of .
Step 4. Generate the key matrix K.(1)Use produced in Step 1 for 2DLASM map to iterate (2000 + q) times, where , and abandon the former 2000 values to avoid the transient effect. Pick up the former m values from Y to construct matrix Y1 of size , and use the former 4n values from Z to produce a matrix Z1 of size . Manipulate matrix multiplying operation for Y1 and Z1 to get a matrix with .(2)Employ the matrix to produce the key matrix by the following formula:
Step 5. Implement DNA XOR between the and the key matrix by equation (13):where denote the ciphertext DNA matrix.
Step 6. Decode the matrix by equation (13) to get the cipher block .
Step 7. Employ the Arnold transform to make cipher block have more secure encryption effect.
Arnold scrambling is an image encryption technology which disturbs the original image by changing the position of image pixels. In our method, Arnold transform is applied to further disturb the pixel of ciphertext image , and its definition is represented as follows:where and are positive integers, randomly selected scrambling parameters from the positive integers that affect the output value, and usually 1 is selected. denotes the order of the image matrix.
The decryption process is the reverse operation of the encryption process.
4. Experimental Result and Discussion
In this section, a series of skin lesion images are applied to analyze the performance of the proposed detection. From Table 3, the strengths and limitations of different DNA sequence encryption algorithms are summarized and compared. Therefore, the proposed method is superior to other compared encryption schemes in some aspects.

4.1. Experimental Results of Skin Lesion Detection
Without loss of generality, we set default parameters: , and (for ). The values of are provided in the following figure. In all the experiments, we simply initialize level set functions to zero function, i.e., .
The following two experiments demonstrate that the diffusion model [26] and our model are applied to extract the lesion areas in several skin lesion images. It is a very important task to extract lesion regions from the background in the field of computer vision. Because of the variation in the shape and appearance of the skin lesions, the detection of the edge of the skin lesions is a very important problem. Other factors such as strong noise and hair, dim edges, or strong asymmetry, or complex texture background also make the segmentation process more difficult.
Figure 3 describes that the proposed model can handle well for four skin lesion images and is compared with the diffusion model [26] through the detective results and computing times. For a fair comparison, we select the best scale parameter and the most suitable high threshold (given in the caption of Figure 3) for the diffusion method. Our level set evolution starts with , so there are no initial contours in the top row of Figure 3. It is clearly seen from the bottom that our model (with parameters , for the first three images) obtains the satisfactory segmentation results for four images, which are almost the same as the diffusion model visually, but the important improvement of the proposed method is that computation complexity is lower than that in the diffusion method. Iteration umbers and CPU times of the two methods are exhibited in Table 4. It can be surveyed that iteration numbers and CPU times of the proposed method are all less than those of the diffusion model.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)
(q)
(r)
(s)
(t)

Figure 4 shows detective results of our model for ten skin lesions image with blurry boundaries and/or asymmetric lesions areas, as shown in the first and third rows. It is difficult to extract the lesion areas in such images. Here, we do not show the detective results of the diffusion model [26], as the model cannot achieve satisfactory detective results. It can be observed from the second and fourth rows of Figure 4 that our method (, for images in the first row; and , for images in the third row), and for the last two images), stating with a constant function , accurately extracts the lesion area boundaries.
We conclude this section by simply describing about parameters and ; for our model, the parameters are very important for the function . By experiments, our observations are as follows: for skin lesions images, is typically about 2, and is in the range between 0.75 and 0.99.
4.2. Experimental Results of Skin Lesion Region Protection
In this section, we, respectively, exhibit the subjective visual effect and objective data to prove the performance of plaintext encryption. We take four skin lesion images from Figures 3 and 4, as examples using the initial values and for the 1DLSS system and 2DLASM system. It can be seen from Figure 5 that the proposed method can protect significant regions.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
4.2.1. Key Space Analysis
In the proposed encryption method, the key includes (i) the given initial values and the parameters of 1D LSS and 2DLASM, , , and , and (ii) the 256bit external secret key. If the accuracy of the float is , then , , and can be any one among possible values. The whole key space is , which is larger than . Therefore, the proposed encryption method has a large key space to defend against brute force attacks.
4.2.2. Key Sensitivity Analysis
The encryption scheme expects a slight change in the key to result in completely different results. Key sensitivity guarantees the uniqueness of the key. The encryption algorithm contains multiple secret keys, and the value contributed by each key is different in the encryption process. The original clear image can be decrypted only when all the keys are correct.
To verify the sensitivity of the encryption algorithm for each key, the key sensitivity is performed by changing just one key in 10^{−15} position and keeping the rest same. The NPCR of the original target and changed cipher imageblocks for the keys of the proposed algorithm are listed in Table 5. It can be obviously seen from this table that when the key has a trivial change, the encrypted imageblocks have a complete change, and more than 99% pixels are modified compared with Figure 5(i), which implies the proposed scheme is highly key sensitive to all the keys.

4.2.3. Histogram of Analysis
Histogram describes the distribution of pixel values in an image. A secure cipher image encryption method should have a uniform histogram [38–41]. Generally speaking, a natural image should follow a regular distribution, while the secure encryption method should force the cipher image to follow a consistent distribution. Figure 6 reveals that our method can effectively prevent significant regions from being attacked by statistical attack opponents.
(a)
(b)
(c)
(d)
Furthermore, the variances of histograms and chisquare test are used to evaluate the uniformity of the pixel value distribution. The variances of histograms and chisquare values can be calculated as follows [42]:where is the occurrence frequency of gray level i, is the expected occurrence frequency of each of gray level, and n is the number of all the pixels. is the vector of the histogram values, and and are the numbers of pixels in which gray values are equal to i and j, respectively.
As shown in ref. [42], according to the chisquare distribution table, at 255 degrees of freedom and 0.05 significance level, . With a significance level of 0.05, the chisquare test results are listed in Table 6. The results indicate that the null hypothesis that the distribution is uniform cannot be rejected at 0.05 significance level. In this circumstance, redundancy of the plain images has successfully been concealed and consequently does not provide any clue to apply statistical attacks. Besides, Table 7 lists the comparison of histogram variance among image encryption schemes. From this table, we can observe that the average histogram variance of the proposed method is less than the schemes in ref. [37, 42].
4.2.4. Correlation Analysis
We arbitrarily pick up 2,500 pairs of adjacent pixels in three directions which include horizontal, vertical, and diagonal from the skin lesion region of the plain image and the corresponding cipher image. The correlation coefficients of two adjacent pixels are computed through the following formulas:where x and y are values of the two adjacent pixels in the image. and are given by
Figure 7 illustrates the correlations of two horizontally, vertically, and diagonally adjacent pixels in the skin lesion region of plaintext image and its cipher image. Besides, Table 8 describes the correlation coefficients of adjacent pixels of the skin lesion region in the plaintext image and cipher image. We can clearly observe from these results that the correlations between adjacent pixels in each direction of cipher imageblock are much lower than the corresponding plaintext blocks.
(a)
(b)
(c)
(d)
(e)
(f)

4.2.5. Information Entropy Analysis
Information entropy is employed to measure the uniform distribution of pixel grayscale, and its definition is given as follows:where denotes the pixel value and the is the probability of .
If the pixel values are distributed more uniformly, the information entropy is larger. For a gray image in the range of [0, 255], ideally, if all pixel values have an equal probability of occurrence, the upper limit value of image entropy H is 8. From Table 9, we can observe that the entropies of the cipher imageblocks are closed to 8, which have been added to the corresponding plaintexts. Therefore, this reveals that our method can defend the entropy cryptanalysis.
4.2.6. Computational and Complexity Analyses
Algorithmic complexity is an important reference standard for algorithm performance. We analyze the computational complexity of the proposed scheme and compare it with ref. [36].
For the proposed scheme, the computational complexity has two parts: target extraction and target encryption. In the target extraction process, the main source of time complexity is the numerical solution of level set evolution equation (2). In this paper, we employ a simple explicit finite difference scheme to solve this equation. Its time complexity is . The encryption process contains the DNA level diffusion part and the Arnold scrambling further disturbs the pixel of cipher imageblock. For the DNA level diffusion part, the complexity of the timeconsuming includes generating chaotic sequences and DNA encoding and decoding operations. We, respectively, adopt 1D LSS and 2DLASM to produce the chaotic sequences for the encoded DNA matrix and the key matrix in the diffusion steps. The time complexity of generating LSS systembased sequence is , and the time complexity of generating the 2DLASM systembased sequence is . So the total time complexity of generating chaotic sequences is . The time complexity of DNA encoding and decoding operation is . The time complexity of Arnold scrambling is no more than . So the total time complexity of the proposed algorithm is .
For ref. [36], there are three stages of encryption steps, that is shuffling, diffusion, and shuffling. The authors employ the complex hyperchaotic system to generate the chaotic sequences for increasing the strength of encryptions and decryptions, whereas lowdimensional chaotic systems are adopted in our algorithm, and the lowdimensional system is easy to implement and can run faster. As mentioned in ref. [36], the time complexity of the algorithm is . Therefore, the time complexity of our algorithm is lower than that of ref. [36].
5. Conclusion
A novel approach for skin lesion detection and privacy protection is presented in this paper. Firstly, a transition regionbased level set evolution method is proposed to detect skin lesion image. This idea of the proposed method is to construct the energy functional that compels the level set function to have a different sign inside and outside the image target. Then this functional is introduced into a variational level set expression with the other two functionals. Then, once skin lesion detection has been performed, the detected skin lesion pixels are encrypted by utilizing DNA sequences and chaotic systems. We employ 2DLASM and 1DLSS to make the pseudorandom sequences and use the 256bit hash value of the plaintext image to generate the initial values and system parameters. Different from these existing encryption algorithms based on DNA computing, the DNA encoding/decoding rules of the skin lesion region and the key matrix are generated by the skin lesion region, and this may increase resilience to statistical attacks. Experimental results of skin lesions detection show that the proposed method is particularly suitable for the detection of skin lesion images with strong noise and complex background. Meanwhile, security analyses reveal that our selective encryption method has a good encryption effect.
Data Availability
The data used to support the findings of this study have not been made available.
Conflicts of Interest
The authors declare that they have no conflicts of interest regarding the publication of this paper.
Authors’ Contributions
D.A. conceptualized the study, was responsible for methodology, and was involved in funding acquisition; J.L. was responsible for software and was involved in visualization; S.Z. validated and investigated the data; Y.L. performed formal analysis, reviewed and edited the manuscript, and supervised the study; J.L. and S.Z prepared the original draft.
Acknowledgments
This research was funded by the Team Project of Collaborative Innovation in Universities of Gansu Province (no. 2017C16) and the Major Project of Gansu University of Political Science and Law (no. 2016XZD12).
References
 H. Kaufman, The Melanoma Book: a Complete Guide to Prevention and Treatment, vol. 1, Gotham Books, New York, NY, USA, 2005.
 P. Pereira, R. FonsecaPinto, R. Paiva et al., “Dermoscopic skin lesion image segmentation based on local binary pattern clustering: comparative study,” Biomedical Signal Processing and Control, vol. 59, Article ID 101924, 2020. View at: Publisher Site  Google Scholar
 Y. Zhang, H. Huang, Y. Xiang, L. Y. Zhang, and X. He, “Harnessing the hybrid cloud for secure big image data service,” IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1380–1388, 2017. View at: Publisher Site  Google Scholar
 Y. Zhang, P. Wang, H. Huang, Y. Zu, D. Xiao, and Y. Xiang, “Privacyassured FogCS: chaotic compressive sensing for secure industrial big image data processing in fog computing,” IEEE Transactions on Industrial Informatics, 2020, In press. View at: Publisher Site  Google Scholar
 Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using highspeed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, 2018. View at: Publisher Site  Google Scholar
 J. Chen, L. Chen, L. Y. Zhang, and Z.L. Zhu, “Medical image cipher using hierarchical diffusion and nonsequential encryption,” Nonlinear Dynamics, vol. 96, no. 1, pp. 301–322, 2019. View at: Publisher Site  Google Scholar
 Y. Zhang, Y. Xiang, L. Y. Zhang, Y. Rong, and S. Guo, “Secure wireless communications based on compressive sensing: a survey,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1093–1111, 2019. View at: Publisher Site  Google Scholar
 H. Peng, Y. Tian, J. Kurths, L. Li, Y. Yang, and D. Wang, “Secure and energyefficient data transmission system based on chaotic compressive sensing in bodytobody networks,” IEEE Transactions on Biomedical Circuits and Systems, vol. 11, no. 3, pp. 558–573, 2017. View at: Publisher Site  Google Scholar
 Y. Zhang, P. Wang, L. Fang, X. He, H. Han, and B. Chen, “Secure transmission of compressed sampling data using edge clouds,” IEEE Transactions on Industrial Informatics, vol. 16, no. 10, pp. 6641–6651, 2020. View at: Publisher Site  Google Scholar
 W. Wen, Y. Hong, Y. Fang, M. Li, and M. Li, “A visually secure image encryption scheme based on semitensor product compressed sensing,” Signal Processing, vol. 173, Article ID 107580, 2020. View at: Publisher Site  Google Scholar
 Y. Zhang, Q. He, G. Chen, X. Zhang, and Y. Xiang, “A lowoverhead, confidentialityassured, and authenticated data acquisition framework for IoT,” IEEE Transactions on Industrial Informatics, vol. 16, no. 12, pp. 7566–7578, 2019. View at: Publisher Site  Google Scholar
 T. Zhao and Q. Ran, “The weighted fractional fourier transform and its application in image encryption,” Mathematical Problems in Engineering, vol. 2019, Article ID 4789194, 10 pages, 2019. View at: Google Scholar
 X. Chai, H. Wu, Z. Gan, Y. Zhang, Y. Chen, and K. W. Nixon, “An efficient visually meaningful image compression and encryption scheme based on compressive sensing and dynamic LSB embedding,” Optics and Lasers in Engineering, vol. 124, Article ID 105837, 2020. View at: Publisher Site  Google Scholar
 H. Fan and M. Li, “Cryptanalysis and improvement of chaosbased image encryption scheme with circular interintrapixels bitlevel permutation,” Mathematical Problems in Engineering, vol. 2017, Article ID 8124912, 11 pages, 2017. View at: Publisher Site  Google Scholar
 Y. Niu, X. Sun, C. Zhang, and H. Liu, “Anticontrol of a fractionalorder chaotic system and its application in color image encryption,” Mathematical Problems in Engineering, vol. 2020, Article ID 6795964, 12 pages, 2020. View at: Publisher Site  Google Scholar
 G. Bhatnagar and Q. M. Jonathan Wu, “Selective image encryption based on pixels of interest and singular value decomposition,” Digital Signal Processing, vol. 22, no. 4, pp. 648–663, 2012. View at: Publisher Site  Google Scholar
 Y. Zhang, D. Xiao, W. Wen, and Y. Tian, “Edgebased lightweight image encryption using chaosbased reversible hidden transform and multipleorder discrete fractional cosine transform,” Optics & Laser Technology, vol. 54, pp. 1–6, 2013. View at: Publisher Site  Google Scholar
 W. Wen, Y. Zhang, Z. Fang, and J.X. Chen, “Infrared targetbased selective encryption by chaotic maps,” Optics Communications, vol. 341, pp. 131–139, 2015. View at: Publisher Site  Google Scholar
 W. Wen, Y. Zhang, Y. Fang, and Z. Fang, “Image salient regions encryption for generating visually meaningful ciphertext image,” Neural Computing and Applications, vol. 29, no. 3, pp. 653–663, 2018. View at: Publisher Site  Google Scholar
 D. Xiao, Q. Fu, T. Xiang, and Y. Zhang, “Chaotic image encryption of regions of interest,” International Journal of Bifurcation and Chaos, vol. 26, no. 11, Article ID 1650193, 2016. View at: Publisher Site  Google Scholar
 D. Chung and G. Sapiro, “Segmenting skin lesions with partialdifferentialequationsbased image processing algorithms,” IEEE Transaction on Medical Imaging, vol. 19, no. 7, pp. 763–767, 2000. View at: Publisher Site  Google Scholar
 W. Wen, C. He, and M. Li, “Transition regionbased active contour model for image segmentation,” Journal of Electronic Imaging, vol. 22, no. 1, pp. 1–12, 2013. View at: Publisher Site  Google Scholar
 I. Maglogiannis, S. Pavlopoulos, and D. Koutsouris, “An integrated computer supported acquisition, handling, and characterization system for pigmented skin lesions in dermatological images,” IEEE Transactions on Information Technology in Biomedicine, vol. 9, no. 1, pp. 86–98, 2005. View at: Publisher Site  Google Scholar
 Y. Lim and S. Lee, “On the color image segmentation algorithm based on the thresholding and the fuzzy cmeans techniques,” Pattern Recognition, vol. 23, no. 9, pp. 935–952, 1990. View at: Publisher Site  Google Scholar
 M. I. Rajab, M. S. Woolfson, and S. P. Morgan, “Application of regionbased segmentation and neural network edge detection to skin lesions,” Computerized Medical Imaging and Graphics, vol. 28, no. 12, pp. 61–68, 2004. View at: Publisher Site  Google Scholar
 C. A. Z. Barcelos and V. B. Pires, “An automatic based nonlinear diffusion equations scheme for skin lesion segmentation,” Applied Mathematics and Computation, vol. 215, no. 1, pp. 251–261, 2009. View at: Publisher Site  Google Scholar
 C. Li, C. Xu, C. Gui, and M. Fox, “Level set evolution without reinitialization: a new variational formulation,” in Proceedings of the 2005 IEEE CVPR, pp. 430–436, San Diego, CA, USA, June 2005. View at: Publisher Site  Google Scholar
 C. Li, C. Xu, C. Gui, and M. Fox, “Distance regularized level set evolution and its application to image segmentation,” IEEE Transactions on Image Processing, vol. 19, no. 12, pp. 3243–3254, 2010. View at: Publisher Site  Google Scholar
 C. He, Y. Wang, and Q. Chen, “Active contours driven by weighted regionscalable fitting energy based on local entropy,” Signal Processing, vol. 92, no. 2, pp. 587–600, 2012. View at: Publisher Site  Google Scholar
 W. Wen, C. He, Y. Zhang, and Z. Fang, “A novel method for image segmentation using reactiondiffusion model,” Multidimensional Systems and Signal Processing, vol. 28, no. 2, pp. 657–677, 2017. View at: Publisher Site  Google Scholar
 J. D. Watson and F. H. C. Crick, “Molecular structure of nucleic acids: a structure for deoxyribose nucleic acid,” Nature, vol. 171, no. 4356, pp. 737738, 1953. View at: Publisher Site  Google Scholar
 Z.H. Gan, X.L. Chai, D.J. Han, and Y.R. Chen, “A chaotic image encryption algorithm based on 3D bitplane permutation,” Neural Computing and Applications, vol. 31, no. 11, pp. 7111–7130, 2019. View at: Publisher Site  Google Scholar
 W. Wen, K. Wei, Y. Zhang, Y. Fang, and M. Li, “Colour light field image encryption based on DNA sequences and chaotic systems,” Nonlinear Dynamics, vol. 99, no. 2, pp. 1587–1600, 2020. View at: Publisher Site  Google Scholar
 Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for image encryption,” Signal Processing, vol. 97, pp. 172–182, 2014. View at: Publisher Site  Google Scholar
 Z. Hua and Y. Zhou, “Image encryption using 2D logisticadjustedsine map,” Information Sciences, vol. 339, pp. 237–253, 2016. View at: Publisher Site  Google Scholar
 K. Abhimanyu Kumar Patro, B. Acharya, and V. Nath, “Secure, lossless, and noiseresistive image encryption using chaos, hyperchaos, and DNA sequence operation,” IETE Technical Review, vol. 37, no. 3, pp. 223–245, 2019. View at: Publisher Site  Google Scholar
 X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Computing and Applications, vol. 31, no. 1, pp. 219–237, 2019. View at: Publisher Site  Google Scholar
 N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compressionencryption scheme based on hyperchaotic system and 2D compressive sensing,” Optics & Laser Technology, vol. 82, pp. 121–133, 2016. View at: Publisher Site  Google Scholar
 Z. Hua, Y. Zhou, and H. Huang, “Cosinetransformbased chaotic system for image encryption,” Information Sciences, vol. 480, pp. 403–419, 2019. View at: Publisher Site  Google Scholar
 N. R. Zhou, T. X. Hua, L. H. Gong, D. J. Pei, and Q. H. Liao, “Quantum image encryption based on generalized Arnold transform and double randomphase encoding,” Quantum Information Processing, vol. 14, no. 4, pp. 1193–1213, 2015. View at: Publisher Site  Google Scholar
 Y. Luo, S. Tang, J. Liu, L. Cao, and S. Qiu, “Image encryption scheme by combining the hyperchaotic system with quantum coding,” Optics and Lasers in Engineering, vol. 124, Article ID 105836, 2020. View at: Publisher Site  Google Scholar
 K. Abhimanyu Kumar Patro and B. Acharya, “A novel multidimensional multiple image encryption technique,” Multimedia Tools and Applications, vol. 79, pp. 12959–12994, 2020. View at: Publisher Site  Google Scholar
Copyright
Copyright © 2020 Dezhi An et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.