Research Article

A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images

Table 4

NPCR and UACI of encrypted image samples with slightly different keys.

DICOM imagesEncrypted DICOM imagesKey valuesNPCR (in %)UACI (in %)

D_1ED_1, , , = 0.6313, 99.62433.4712
E′D_1, , , ,

D_2ED_2, , , , 99.138233.6820
E′D_2, , , ,

D_3ED_3, , , , 99.577733.0944
E′D_3, , , ,

D_4ED_4, , , , 99.23633.2985
E′D_4, , , ,

D_5ED_5, , , , 99.607633.9995
E′D_5, , , ,

D_6ED_6, , , , 99.582233.5912
E′D_6, , , ,

D_7ED_7, , , , 99.880933.4301
E′D_7, , , ,

D_8ED_8, , , , 99.894733.2369
E′D_8, , , ,

D_9ED_9, , , , 99.859633.4612
E′D_9, , , ,