Abstract
The security of digital medical images has attracted much attention recently, especially when these images are sent through the communication networks. An image encryption technique tries to convert an image to another image that is hard to understand. In this communication, we propose an encryption method for gray scale medical images based on the features of genetic algorithms. Performance analysis show that the proposed scheme has good statistical character, key sensitivity and can resist brute-force attack, differential attack, plaintext attack and entropy attack efficiently.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig1_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig2_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig3_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig4_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig5_HTML.gif)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig6_HTML.jpg)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs00500-014-1539-7/MediaObjects/500_2014_1539_Fig7_HTML.gif)
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Afarin R, Mozaffari S (2013) Image encryption using genetic algorithm. In: 8th Iranian conference on machine vision and image processing (MVIP), pp 441–445. doi:10.1109/IranianMVIP.2013.6780026
Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl 6:1–8
Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196
Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2014) Cloud- based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst. doi:10.1016/j.future.2014.07.001 (in press)
Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. In: IEEE Conference on Engineering in Medicine and Biology Society (EMBS), pp 5653–5656
Dutt I, Paul S, Chaudhuri SN (2013) Implementation of network security using genetic algorithm. Int J Adv Res Comp Sci Softw Eng 3:234–241
Fu C, Meng W-H, Zhan Y-F, Zhu Z-L, Lau FCM, Tse CK, Ma H-F (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010
Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400
Gorgan D, Bacu V, Rodila D, Pop F, Petcu D (2010) Experiments on ESIP—environment oriented satellite data processing platform. Earth Sci Inform 3:297–308
Goyat S (2012a) Cryptography using genetic algorithms. J Comput Eng 1:6–8
Goyat S (2012b) Genetic key generation for public key cryptography. Int J Soft Comput Eng 2:231–233
Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New Jersey
Holland J (1975) Adoption in natural and artificial systems. MIT press
Khan FU, Bhatia S (2012) A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2:7–10
Kocarev L, Lian S (2012) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin
Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image, computational collective intelligence technologies and applications. Lecture Notes Comput Sci 6422:278–287
Lin CH, Yang CY, Chang CW (2012) An efficient algorithm for protecting and authenticating medical image. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp 67–70
Misevicius A (2005) Experiments with hybrid genetic algorithm for the grey pattern problem. Informatica 17:237–258
Mishra S, Bali S (2013) Public key cryptography using genetic algorithm. Int J Recent Technol Eng 2:150–154
Mitchell M (1996) An introduction to genetic algorithms. MIT Press, Cambridge
Papadakis SE, Tzionas P, Kaburlasos VG, Theocharis JB (2005) A genetic based approach to the type I structure identification. Informatica 16:365–382
Patidar V, Pareek NK, Purohit G, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075
Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun 284:4331–4339
Petcu D, Gorgan D, Pop F, Tudor D (2007) MedioGrid: a grid-based platform for satellite image processing. In: IEEE workshopConference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp 137–142
Pizzolante R, Carpentieri B, Castiglione A (2013) A secure low complexity approach for compression and transmission of 3-D medical images. In: IEEE Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 387–392
Pop F (2007) Distributed algorithm for change detection in satellite images for Grid Environments. In: Sixth International Symposium on Parallel and Distributed Computing (ISPDC), p 41
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715
Tsang PWM, Au ATS (1996) A genetic algorithm for projective invariant object recognition. In: IEEE TENCOM Conference proceedings on Digital Signal Processing Applications, pp 58–63
Ulh A, Pommer A (2005) Image and video encryption. Springer, Boston
Velumani R and Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In: IEEE Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8
Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In: International Conference on Computational Intelligence and Security, pp 433–437
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Pareek, N.K., Patidar, V. Medical image protection using genetic algorithm operations. Soft Comput 20, 763–772 (2016). https://doi.org/10.1007/s00500-014-1539-7
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-014-1539-7