Skip to main content

Advertisement

Log in

Medical image protection using genetic algorithm operations

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

The security of digital medical images has attracted much attention recently, especially when these images are sent through the communication networks. An image encryption technique tries to convert an image to another image that is hard to understand. In this communication, we propose an encryption method for gray scale medical images based on the features of genetic algorithms. Performance analysis show that the proposed scheme has good statistical character, key sensitivity and can resist brute-force attack, differential attack, plaintext attack and entropy attack efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Afarin R, Mozaffari S (2013) Image encryption using genetic algorithm. In: 8th Iranian conference on machine vision and image processing (MVIP), pp 441–445. doi:10.1109/IranianMVIP.2013.6780026

  • Al-Husainy MAF (2012) A novel encryption method for image security. Int J Secur Appl 6:1–8

    Google Scholar 

  • Cao F, Huang HK, Zhou XQ (2003) Medical image security in a HIPAA mandated PACS environment. Comput Med Imaging Graph 27:185–196

    Article  Google Scholar 

  • Castiglione A, Pizzolante R, Santis AD, Carpentieri B, Castiglione A, Palmieri F (2014) Cloud- based adaptive compression and secure management services for 3D healthcare data. Future Gener Comput Syst. doi:10.1016/j.future.2014.07.001 (in press)

  • Coatrieux G, Montagner J, Huang H, Roux C (2007) Mixed reversible and RONI watermarking for medical image reliability protection. In: IEEE Conference on Engineering in Medicine and Biology Society (EMBS), pp 5653–5656

  • Dutt I, Paul S, Chaudhuri SN (2013) Implementation of network security using genetic algorithm. Int J Adv Res Comp Sci Softw Eng 3:234–241

    Google Scholar 

  • Fu C, Meng W-H, Zhan Y-F, Zhu Z-L, Lau FCM, Tse CK, Ma H-F (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43:1000–1010

    Article  Google Scholar 

  • Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  • Gorgan D, Bacu V, Rodila D, Pop F, Petcu D (2010) Experiments on ESIP—environment oriented satellite data processing platform. Earth Sci Inform 3:297–308

    Article  Google Scholar 

  • Goyat S (2012a) Cryptography using genetic algorithms. J Comput Eng 1:6–8

    Google Scholar 

  • Goyat S (2012b) Genetic key generation for public key cryptography. Int J Soft Comput Eng 2:231–233

    Google Scholar 

  • Haupt RL, Haupt SE (2004) Practical genetic algorithms. Wiley, New Jersey

    MATH  Google Scholar 

  • Holland J (1975) Adoption in natural and artificial systems. MIT press

  • Khan FU, Bhatia S (2012) A novel approach to genetic algorithm based cryptography. Int J Res Comp Sci 2:7–10

    Article  Google Scholar 

  • Kocarev L, Lian S (2012) Chaos-based cryptography: theory, algorithms and applications. Springer, Berlin

    Google Scholar 

  • Lin C-H, Yang C-Y, Chang C-W (2010) Authentication and protection for medical image, computational collective intelligence technologies and applications. Lecture Notes Comput Sci 6422:278–287

  • Lin CH, Yang CY, Chang CW (2012) An efficient algorithm for protecting and authenticating medical image. In: Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), pp 67–70

  • Misevicius A (2005) Experiments with hybrid genetic algorithm for the grey pattern problem. Informatica 17:237–258

    Google Scholar 

  • Mishra S, Bali S (2013) Public key cryptography using genetic algorithm. Int J Recent Technol Eng 2:150–154

    Article  Google Scholar 

  • Mitchell M (1996) An introduction to genetic algorithms. MIT Press, Cambridge

    Google Scholar 

  • Papadakis SE, Tzionas P, Kaburlasos VG, Theocharis JB (2005) A genetic based approach to the type I structure identification. Informatica 16:365–382

    MATH  MathSciNet  Google Scholar 

  • Patidar V, Pareek NK, Purohit G, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14:3056–3075

  • Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Commun 284:4331–4339

    Article  Google Scholar 

  • Petcu D, Gorgan D, Pop F, Tudor D (2007) MedioGrid: a grid-based platform for satellite image processing. In: IEEE workshopConference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), pp 137–142

  • Pizzolante R, Carpentieri B, Castiglione A (2013) A secure low complexity approach for compression and transmission of 3-D medical images. In: IEEE Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp 387–392

  • Pop F (2007) Distributed algorithm for change detection in satellite images for Grid Environments. In: Sixth International Symposium on Parallel and Distributed Computing (ISPDC), p 41

  • Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MATH  MathSciNet  Google Scholar 

  • Tsang PWM, Au ATS (1996) A genetic algorithm for projective invariant object recognition. In: IEEE TENCOM Conference proceedings on Digital Signal Processing Applications, pp 58–63

  • Ulh A, Pommer A (2005) Image and video encryption. Springer, Boston

    Google Scholar 

  • Velumani R and Seenivasagam V (2010) A reversible blind medical image watermarking scheme for patient identification, improved telediagnosis and tamper detection with a facial image watermark. In: IEEE Conference on Computational Intelligence and Computing Research (ICCIC), pp 1–8

  • Xu S, Wang Y, Wang J, Tian M (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and XOR operations. In: International Conference on Computational Intelligence and Security, pp 433–437

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Narendra K. Pareek.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pareek, N.K., Patidar, V. Medical image protection using genetic algorithm operations. Soft Comput 20, 763–772 (2016). https://doi.org/10.1007/s00500-014-1539-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-014-1539-7

Keywords

Navigation