Medical Image Encryption Using Multi Chaotic Maps
Medical Image Encryption Using Multi Chaotic Maps
Corresponding Author:
Abbas Zamil Hussain
Department of Computer Science, University of Technology
Baghdad, Iraq
Email: [email protected]
1. INTRODUCTION
Chaos theory has expanded and changed several disciplines, since its discovery in the 1960s, it has
been used in a variety of fields, such as physics, engineering, computer programming, economics, and
biology. Academics didn’t discover there were intimate links and analogies connecting chaos theory and
encryption until the 1990s, and ever since, chaos has begun to infiltrate into current cryptography [1].
As illustrated in Figure 1, any property of chaotic systems has a corresponding counterpart in traditional
cryptosystems [2].
Despite the fact that chaotic systems are deterministic, their unique traits make them relevant to
secure multimedia communications (i.e., confusion and diffusion, unpredictability properties, and sensitivity
to initial conditions and parameters) [3]. Each of these characteristics can be linked to the standard
cryptographic qualities of a good cipher, such as confusion and diffusion, for the purpose of with standing
statistical analysis assaults. As a result, the commonalities between chaotic systems and crypto systems make
collaboration appealing [4].
Many academics have pointed out that chaos and cryptography have a significant relationship.
The most significant advantage of a chaotic system over a noisy one is that it is predictable, allowing the
recovery of a message with perfect knowledge of initial conditions and system characteristics. The concept of
chaotic cryptography was first proposed by Alghafis et al. [5]. This paper is partitioned into sections as:
in section 2, we looked at some of the related works. Section 3 went through the theoretical foundation in
greater depth. In section 4, the proposed scheme architecture was provided. Section 5 contains the experimental
results as well as security evaluations. In section 6, we look at several algorithm comparisons from the literature,
section 6 has the conclusion.
2. RELATED WORKS
Several chaos-based image encryption algorithms have recently been proposed. In this section, some
be arranged in chronological order from oldest to newest. Gupta et al. [6] proposed a method that is robust,
efficient, secure, and rapid, as evidenced by the results of many parameters. The cat map and chaotic function
have been successfully and effectively applied to a variety of images. The simulation results show that the new
approach reduces the risk of a brute force decryption assault and is fast enough for real image encryption.
Gashim and Hussein [7] integrated two logistic maps to create the key. The created key is employed
in the stages of confusion and dissemination. The image’s pixel is permuted in the confusion stage, while the
value of each pixel is modified in the diffusion step. These approaches’ security and performance were
extremely precise and quick.
Balaska et al. [8] merged the Grain-128a stream cipher technique with a 2D Zaslavsky chaotic map to
increase sensitivity and security in the initial parameter selection. Then, to generate the chaotic map’s needed
parameters, a 256-bit secret key with a fixed length is used. The sequences will then be used to encrypt the
image using a diffusion approach and some confusion. The simulated experiments demonstrated that the
proposed approach for encrypting images of any type or format is incredibly dependable and effective.
Guodong et al. [9] used the cryptosystem to produce the initial parameters for the fundamental
quantum logistic map. Discrete cosine transform (DCT), on the other hand, transfers images to the frequency
domain. Substitution-permutation network (SPN) with five rounds offers effective protection against
differential-like assaults. In comparison to asymmetric-based images, encryption requires procedures with
reduced computational complexity.
Kari et al. [10] proposed a set of innovative chaotic maps depending on discret wavelet transform
(DWT) and the double chaotic function to increase encryption quality and execution. The proposed map was
commonly hyper-chaotic, with great sensitivity and complexity, as determined by dynamical analysis and
sample entropy techniques. As a result, the suggested chaos-based picture cipher could be a valuable tool for
a variety of applications.
Alhumyani [11] created an image cipher that makes advantage of the DCT chaotic Baker map (BM).
Before rearranging the DCT coefficients of the original plain image with the BM, the proposed DCT-based BM
image cipher’s module DCTs the plain image. The proposed DCT-based BM image cipher’s superiority in terms
of sensitivity, statistics, noise immunity, and differential was demonstrated through a number of experiments.
Ibrahim et al. [12] introduced a broad medical image encryption system depending on a novel
combination of two extremely efficient structures: dynamic substitution boxes (S-boxes) and chaotic maps.
Experiments have shown that the suggested architecture, regardless of implementation, passes all security
tests. Any chaotic map can be created, as well as any key-dependent dynamic S-box construction method.
Elghandour et al. [13] proposed the chaotic sequences are generated via a two-dimensional
piecewise smooth nonlinear chaotic map. These sequences are then converted to numbers between 0 and 255.
Ultimately, the chaotic sequences are employed to mask the image that has been jumbled (diffusion). Their
method was secure, quick, and resistant to numerous assaults.
Guodong et al. [14] developed a novel asymmetric image encryption system. The starting values for
a quantum logistic map are generated first using the asymmetric public key Rivest-Shamir Adleman (RSA)
technique. On the plain image, the Arnold scrambling process is used to accomplish the basic concealment of
visual information. Finally, exclusive-OR (XOR) diffusion is applied to each row and column of the image as
separate units. Then, Arnold’s map parameters are calculated. The experimental testing show better
distribution of pixel values uniformly minimizes high correlation and can withstand various assaults.
Medical image encryption using multi chaotic maps (Abbas Zamil Hussain)
558 ISSN: 1693-6930
Ankita et al. [15] proposed dividing the color images into red, green, and blue channels, transposing
them from the pixel plane to the bit-plane, and then scrambling the matrix using the Arnold cat map (ACM).
The new system is more sensitive to differential assaults, more secure, and more resilient to brute-force
attacks. The performance and security metrics histogram, correlation distribution, correlation coefficient,
entropy, number of pixel change rate, and unified averaged changed intensity are calculated to show the
potential of the proposed encryption technique.
3. RESEARCH METHOD
In this section, the technologies utilized in the suggested medical image encryption model are
discussed. A brief description of each algorithm or technique used in the proposed system is given. It includes
the types of encryptions and the concept of chaos theory and its types in addition to clarifying the protocol used
to transmit medical images through the network from sender to receiver.
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 3, June 2023: 556-565
TELKOMNIKA Telecommun Comput El Control 559
Where 𝑦0 ∈ (0, 1) represents the starting state of the chaotic system at any time 𝑛 and 𝜇 ∈ (0,4), is the
system parameter also called the bifurcation parameter as shown in Figure 3. The next stage of the system is
expressed by 𝑦𝑛+1 , where 𝑛 shows the discrete time. The behavior of the logistic map highly depends on the
value of the control parameter 𝜇 [22].
b) Arnold cat map
Vladimir Arnold’s Arnold cat map is a two-dimensional chaotic system. The transformation
procedure is built by converting an image to an 𝑁 × 𝑁 matrix. It’s a straightforward demonstration of Chaos
Theory, Vladimir Arnold’s theory of chaos. Each pixel’s coordinates are given by an ordered pair of (𝑋, 𝑌) in
the real range [0, 1], which is represented by two independent (2) and (3).
Where 𝑋𝑛 , 𝑌𝑛 are the sample positions in the 𝑁 × 𝑁 𝑚𝑎𝑡𝑟𝑖𝑥, 𝑛 = 1,2,3, . . . , 𝑁 − 1, and 𝑋𝑛+1 , 𝑌𝑛+1 are the
transformed positions after cat map, and A, B are two control parameters that are positive integers.
The encryption procedure is carried out via cat map iteration; after 𝑀 iterations, there exist 𝑇 positive
integers such that (𝑋𝑛+1 , 𝑌𝑛+1 ) = (𝑋𝑛 , 𝑌𝑛 ). The period 𝑇 is determined by the parameters 𝐴 and 𝐵, as well as
the size of the sample’s matrix (𝑁 × 𝑁 𝑚𝑎𝑡𝑟𝑖𝑥) [23].
c) Baker map
The chaotic Baker map is a well-known encryption technique in the image processing domain. It’s a
permutation-based tool that uses a secret key to change the pixel positions in a square matrix of dimensions
𝑁 × 𝑁. In a bijective mode, it assigns a pixel to another pixel position. The discretized Baker map is a useful
tool for generating random numbers in a square matrix. The discretized map is denoted by 𝐵(𝑛1 , … , 𝑛𝑘 ), where
the vector [𝑛1 , … , 𝑛𝑘 ] represents the secret key as 𝑆𝑘𝑒𝑦 . The secret key is chosen so that each integer 𝑛𝑖 divides
𝑁, 𝑎𝑛𝑑 𝑛1 + ⋯ , +𝑛𝑘 = 𝑁, using 𝑁 as the number of data items in one row. Allow 𝑁𝑖 = 𝑛1 + ⋯ , +𝑛𝑖 .
The indices (𝑟, 𝑠) data item is relocated to the indices as shown in (4).
𝑁 𝑁 𝑛𝑖 𝑁
𝐵(𝑟. 𝑠) = [ (𝑟 − 𝑁𝑖 ) + 𝑠 𝑚𝑜𝑑 ( ) . (𝑠 − 𝑠 ( )) + 𝑁𝑖 ] (4)
𝑛𝑖 𝑛𝑖 𝑁 𝑛𝑖
Medical image encryption using multi chaotic maps (Abbas Zamil Hussain)
560 ISSN: 1693-6930
The scan begins at the bottom left corner of each rectangle and works its way up. Chaos systems is a
sophisticated nonlinear sequence that is hard to understand and predict. For such an “a word a secret”
encryption system, the chaotic sequence is a suitable key sequence. Chaotic sequences have a number of
cryptographic advantages over normal ciphers, including the fact that they are difficult to attack and crack [24].
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 3, June 2023: 556-565
TELKOMNIKA Telecommun Comput El Control 561
On client-side
3) While (true)
Begin
− Wait for a client to establish a connection
− Establish a new thread that will serve the client using the newly formed TCP connection socket
− Go to 4
End while
4) Read the input plain image then do:
− If the input image is a color image convert it to grayscale, then go to 5
− Else
− Go to 5
− End if
5) Apply the 3DES encryption algorithm
6) Select the chaotic map form (Logistic or Arnold cat or Baker) map
7) Send the cipher image to the server-side
On server-side
8) After receiving the image on the server-side do:
9) Perform the inverse operation of the chaotic map that was selected on the client-side
10) Apply the 3DES decryption algorithm to the cipher image
11) Return the plain image
End
∑𝑀 𝑁
𝑖=1 ∑𝑗=1 [𝑃(𝑖 .𝑗)−𝐶(𝑖 .𝑗)]
2
𝑀𝑆𝐸 = (5)
𝑀𝑁
Where 𝑀 and 𝑁 are the height and width of the image respectively. 𝑃 (𝑖, 𝑗) is the (𝑖. 𝑗)𝑡ℎ pixel value of the
original image, and 𝐶( 𝑖, 𝑗) is the (𝑖. 𝑗)𝑡ℎ pixel value of the decrypted image.
b) Peak signal to noise ratio (PSNR)
It can be used to determine an image’s quality. A decent picture encryption method should result in
encrypted images with a low PSNR value. PSNR is calculated using the (6).
10 𝑙𝑜𝑔10 (2𝑛−1)2
𝑃𝑆𝑁𝑅 = (6)
𝑀𝑆𝐸
Where 𝑃(𝑚𝑖 ) denotes the occurrence probability of the gray level 𝑖, and 𝑖 = 0, 1, 2, . . . , 2𝑛 . The 2𝑛 is an
image’s number of grayscale levels.
Medical image encryption using multi chaotic maps (Abbas Zamil Hussain)
562 ISSN: 1693-6930
Figure 6. Plain grayscale images with different sizes: (a) 512×512, (b) 600×600, (c) 900×900,
(d) 1024×1024, (e) 612×612, and (f) 500×500
512×512
Logistic map + 3DES 15.9809 19092 7.9998 3.98098
Arnold cat map + 3DES 11.4982 22778 7.9990 2.76832
Baker map + 3DES 19.2980 19898 7.9993 3.89797
600×600
Logistic map + 3DES 11.490 25980 7.9994 4.80980
Arnold cat map + 3DES 8.8979 17980 7.9998 6.39878
Baker map + 3DES 9.3675 13897 7.9991 3.99080
900×900
Logistic map + 3DES 11.3780 35980 7.9990 6.39789
Arnold cat map + 3DES 8.9080 26980 7.9993 3.87990
Baker map + 3DES 7.8797 24678 7.9995 1.87979
1024×1024
Logistic map + 3DES 6.7686 35788 7.9993 5.27238
Arnold cat map + 3DES 13.879 56980 7.9997 3.34989
Baker map + 3DES 12.897 25879 7.9993 3.78687
612×612
Logistic map + 3DES 11.110 12675 7.9990 8.76876
Arnold cat map + 3DES 8.564 25643 7.9998 9.98983
Baker map + 3DES 10.786 25249 7.9999 2.87999
500×500
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 3, June 2023: 556-565
TELKOMNIKA Telecommun Comput El Control 563
512×512
Logistic map + 3DES Inf. 0 7.2720 6.76867
Arnold cat map + 3DES Inf. 0 7.2973 5.78687
Baker map + 3DES Inf. 0 7.8573 3.27868
600×600
Logistic map + 3DES Inf. 0 7.3897 7.67577
Arnold cat map + 3DES Inf. 0 7.3786 7.27868
Baker map + 3DES Inf. 0 7.2654 0.37686
900×900
Logistic map + 3DES Inf. 0 7.3677 3.87989
Arnold cat map + 3DES Inf. 0 7.3897 6.87633
Baker map + 3DES Inf. 0 7.3256 2.37687
1024×1024
Logistic map + 3DES Inf. 0 7.1342 6.37683
Arnold cat map + 3DES Inf. 0 7.2367 3.27863
Baker map + 3DES Inf. 0 7.8978 0.26578
612×612
Logistic map + 3DES Inf. 0 7.3267 4.97990
Arnold cat map + 3DES Inf. 0 7.2357 5.78687
Baker map + 3DES Inf. 0 7.8273 1.78689
500×500
Medical image encryption using multi chaotic maps (Abbas Zamil Hussain)
564 ISSN: 1693-6930
6. CONCLUSION
By employing efficient cryptographic primitives, the proposed medical image encryption system
achieves an exceptional throughput suitable for encryption. The suggested framework’s security and efficiency
benefits may be applied to any chaotic map, whether classic, modern, or future. The suggested method’s most
notable features are its amazing sensitivity to even minor changes in the encryption key, as well as its robustness
versus data loss due to transmission network issues. 3DES is more reliable and has a larger key length, which
avoids several of the attacks that may be used to speed up the process. As a result, chaotic maps provide various
advantages, including a large keyspace and good security. In order to reach higher performance for medical
image encryption in an ideal time, we proposed a method that takes advantage of the long key and the high
security with easy implementation of them. The simulation and performance assessment findings show that the
approach is successful and trustworthy in encrypting images of various sorts and sizes, making it suitable for
dependable and feasible cryptographic usage. The proposed scheme will be paired with image steganography in
the future to allow for secure image transfer utilizing the secret key.
REFERENCES
[1] J. A. M. -García, A. M. G. -Zapata, E. J. R. -Ramírez, and E. T. -Cuautle, “On the Prediction of Chaotic Time Series using Neural
Networks,” Journal of Chaos Theory and Applications, vol. 4, no. 2, pp. 94-103, 2022, doi: 10.51537/chaos.1116084.
[2] O. M. Al-Hazaimeh, M. F. Al-Jamal, N. Alhindawi, and A. Omari, “Image Encryption Algorithm Based on Lorenz Chaotic Map with
Dynamic Secret Keys,” Neural Computing and Applications, vol. 31, pp. 2395–2405, 2019, doi: 10.1007/s00521-017-3195-1.
[3] Y. Luo, J. Yu, W. Lai, and L. Liu, “A Novel Chaotic Image Encryption Algorithm Based on Improved Baker Map and Logistic
Map,” Multimedia Tools Application, vol. 78, pp. 22023–22043, 2019, doi: 10.1007/s11042-019-7453-3.
[4] X. Chai, X. Fu, Z. Gan, Y. Zhang, Y. Lu, and Y. Chen, “An Efficient Chaos-Based Image Compression and Encryption Scheme Using
Block Compressive Sensing and Elementary Cellular Automata,” Neural Computing and Applications, vol. 32, pp. 4961–4988, 2020,
doi: 10.1007/s00521-018-3913-3.
[5] A. Alghafis, F. Firdousi, M. Khan, S. I. Batool, and M. Amin, “An Efficient Image Encryption Scheme Based on Chaotic and
Deoxyribonucleic Acid Sequencing,” Mathematics and Computers in Simulation, vol. 177, pp. 441–466, 2020,
doi: 10.1016/j.matcom.2020.05.016.
[6] R. Gupta, R. Pachauri, and A. K. Singh, “An Efficient Way of Medical Image Encryption using Cat Map and Chaotic Logistic
Function,” International Journal of Computer Science and Information Security (IJCSIS), vol. 15, no. 11, 2017. [Online]. Available:
https://www.researchgate.net/publication/322384257_An_Efficient_Way_of_Medical_Image_Encryption_using_Cat_Map_and_Cha
otic_Logistic_Function
[7] L. L. Gashim and K. Q. Hussein, “A New Algorithm of Encryption and Decryption of Image Using Combine Chaotic Mapping,”
Iraqi Journal of Information Technology, vol. 9, no. 2, 2018. [Online]. Available:
https://www.iasj.net/iasj/download/95ac83f87a71d850
[8] N. Balaska, Z. Ahmida, A. Belmeguenai, and S. Boumerdassi, “Image Encryption Using a Combination of Grain-128a Algorithm and
Zaslavsky Chaotic Map,” The Institution of Engineering and Technology, vol. 14, no. 6, pp. 1120-1131, 2020, doi: 10.1049/iet-
ipr.2019.0671.
[9] G. Ye, K. Jiao, X. Huang, B. -M. Goi, and W. -S. Yap, “An Image Encryption Scheme Based on Public-Key Cryptosystem and
Quantum Logistic Map,” Scientific Reports, vol. 10, no. 21044, 2020, doi: 10.1038/s41598-020-78127-2.
[10] A. P. Kari, A. H. Navin, A. M. Bidgoli and M. Mirnia, “A New Image Encryption Scheme Based on Hybrid Chaotic Maps,”
Multimedia Tools and Applications, vol. 80, pp. 2753–2772, 2021, doi: 10.1007/s11042-020-09648-1.
[11] H. Alhumyani, “Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform,” Cybernetics and Information
Technologies, vol. 20, no. 1, 2020, doi: 10.2478/cait-2020-0005.
[12] S. Ibrahim et al., “Framework for Efficient Medical Image Encryption Using Dynamic S-Boxes and Chaotic Maps,” in IEEE
Access, vol. 8, pp. 160433-160449, 2020, doi: 10.1109/ACCESS.2020.3020746.
[13] A. Elghandour, A. Salah, and A. Karawia, “A New Cryptographic Algorithm Via a Two-Dimensional Chaotic Map,” Ain Shams
Engineering Journal, vol. 13, no. 1, 2022, doi: 10.1016/j.asej.2021.05.004.
[14] G. Ye, H. Wu, K. Jiao, and D. Mei, “Asymmetric Image Encryption Scheme Based on the Quantum Logistic Map and Cyclic Modulo
Diffusion,” Mathematical Biosciences and Engineering, vol. 18, no. 5, pp. 5427-5448, 2021, doi: 10.3934/mbe.2021275.
[15] A. Bisht, M. Dua, S. Dua, and P. Jaroli, “A Color Image Encryption Technique Based on Bit-Level Permutation and Alternate
Logistic Maps,” Journal of Intelligent Systems, vol. 29, no. 1, 2022, doi: 10.1515/jisys-2018-0365.
[16] Z. Qiao, “Nonlinear Dynamics, Applications to Chaos-Based Encryption,” PH.D. Thesis, University of Le Havre Normandy,
2021. [Online]. Available: https://hal.archives-ouvertes.fr/tel-03200707/file/Z_QIAO.pdf
[17] O. G. Abood and S. K. Guirguis, “A Survey on Cryptography Algorithms,” International Journal of Scientific and Research
TELKOMNIKA Telecommun Comput El Control, Vol. 21, No. 3, June 2023: 556-565
TELKOMNIKA Telecommun Comput El Control 565
BIOGRAPHIES OF AUTHORS
Maisa’a Abid Ali Khodher obtained her M.Sc. and Ph.D. in 2005 and 2016
from the University of Technology in Iraq, and her M.Sc. in Image Processing, and her Ph.D.
in information hiding. Currently, she is Assist. Prof. in Computer Science. Dr. Maisa’a has
more than 30 years of experience and she has supervised B.Sc. final year projects. And she
has supervised M.SC. and Ph.D. Her research interests include cryptography, image
processing, databases, data security, and linguistic steganography. She can be contacted at
email: [email protected].
Medical image encryption using multi chaotic maps (Abbas Zamil Hussain)