Abstract
In the current high-tech era, the growing popularity of e-healthcare has heightened the attention focused on data security against cyber-attacks. As digital medical images are transported over the public network, an intermediate degree of protection must be in place. One major technique is the implementation of encryption to safeguard medical images. This article recommends a new medical image encryption technology. This algorithm began with a simple application of advanced Vigenere technology, followed by the implementation of a deeply adapted genetic operator for color image encryption, with the intention of better integrating into the medical image encryption security sector. After vectorization of the original image, the first round of Vigenere control by two chaotic substitution tables attached to highly modified replacement functions is applied. The output vector is encoded in restricted ASCII code in order to obtain a genetic hybridization suitable for encryption of medical and color images. A strong chaining will be applied between the encrypted block and the following clear block in order to increase the impact of the avalanche effect and to protect the system against any differential attack. Simulations carried out on a large volume of images of different sizes and formats ensure that our approach is not exposed to known attacks.
Highlights
The two rounds of our algorithm represent a large modification of a classical and a genetic operator. The main new features are
✓ First round
○ Vigenere upgrade
○ Selected simulations from the primary round
✓ Switching to reduced ASCII code
○ Two cross-over tables building process
○ Chaotic operation ASCII table
○ Output vector encryption
■ Detailed simulation study
■ Benchmarking with other recent algorithms
Graphical abstract












Similar content being viewed by others
Abbreviations
- \({G}_t={~}^{Z}\!\left/ \!{~}_{ tZ}\right.\) :
-
ring
- \({G}_t^{\ast }\) :
-
Set of G t reversers line j
- A(j:):
-
colunm j
- ⨁:
-
Xor operator
- ⊠:
-
Crossover operator
- E(x)::
-
Whole part of the real number x
References
Siahaan APU (2016) Genetic algorithm in Hill cipher encryption. Int Assoc Sci Innov Res (IASR) 15(1)
Alkhalid AS (2015) Cryptanalysis of Hill cipher using genetic algorithm. dalam IEEE hanmument
Jarjar A (2017) Improvement of Hill’s classical method in image cryptography. Int J Stat Appl Math 2(3) Part A
Saputra I, Mesran N, Hasibuan A (2017) Vigenere cipher algorithm with grayscale image key generator for secure text file. Int J Eng Res Technol (IJERT) 6(01)
Subhasri P, Padmapriya A (2015) Enhancing the security of Dicom content using modified Vigenere Cipher. Int J Appl Eng Res 10(55)
Siahaan APU (2016) Three pass protocol in Hill cipher encryption technique. Int J Sci Res (IJSR) 5(nà 7):1149–1152
Dewangga IGAP, Purboyo TW, Nugrahaeni RA (2017) A new approach of data hiding in BMP image using LSB steganography and Caesar Vigenere cipher cryptography. Int J Appl Eng Res 12(21):10626–10636
Overbey J, Travers W, Wydylo J (2005) On the key space of the Hill cipher. Cryptologia 29(1):59–72
Saeednia S (2000) How to make the Hill secure. Cryptologia 24(2):353–360
Lin CH, Lee CY, Lee CY (2004) Comments on Saeednia’s improved scheme for the Hill cipher. J Chin Inst Eng 27(5):743–746
Wang Y (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons & Fractals 41(4):1773–1783
Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30:943–961
Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115:197–207
R Ge, G Yang, J Wu, Y Chen, G Coatrieux, L Luo (2019) “A novel chaos-based symmetric image encryption using bit-pair level process. IEEE Access ieeexplore.ieee.org
JarJar M (2019) Further improvement of the HILL method applied in image encryption. Procedia Comput Sci 00:000–000
Ali SMA (2019) Novel encryption algorithm for securing sensitive information based on Feistel cipher. Test Eng Manag 80(19):10–16
Gan Z-h (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic 31:7111–7130
Rukhin A (2022) A statistical test suite for random and pseudorandom number generators for cryptographic Rahma Isnaini Masya; Rizal Fathoni Aji; Setiadi Yazid All Authors. Comparison of Vigenere Cipher and Affine Cipher in Three-pass Protocol for Securing Imag. IEEE Xplore
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
JarJar, A. Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption. Med Biol Eng Comput 60, 2077–2093 (2022). https://doi.org/10.1007/s11517-022-02566-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11517-022-02566-4