Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 6729896, 12 pages
Research Article

A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images

1Department of Information Technology, Thiagarajar College of Engineering, Madurai, India
2Department of Electronics and Communication Engineering, Thiagarajar College of Engineering, Madurai, India

Correspondence should be addressed to Jeyamala Chandrasekaran

Received 31 July 2016; Accepted 24 November 2016; Published 12 January 2017

Academic Editor: Ángel Martín Del Rey

Copyright © 2017 Jeyamala Chandrasekaran and S. J. Thiruvengadam. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


The advancements in telecommunication and networking technologies have led to the increased popularity and widespread usage of telemedicine. Telemedicine involves storage and exchange of large volume of medical records for remote diagnosis and improved health care services. Images in medical records are characterized by huge volume, high redundancy, and strong correlation among adjacent pixels. This research work proposes a novel idea of integrating number theoretic approach with Henon map for secure and efficient encryption. Modular exponentiation of the primitive roots of the chosen prime in the range of its residual set is employed in the generation of two-dimensional array of keys. The key matrix is permuted and chaotically controlled by Henon map to decide the encryption keys for every pixel of DICOM image. The proposed system is highly secure because of the randomness introduced due to the application of modular exponentiation key generation and application of Henon maps for permutation of keys. Experiments have been conducted to analyze key space, key sensitivity, avalanche effect, correlation distribution, entropy, and histograms. The corresponding results confirm the strength of the proposed design towards statistical and differential crypt analysis. The computational requirements for encryption/decryption have been reduced significantly owing to the reduced number of computations in the process of encryption/decryption.