Skip to main content

Advertisement

Log in

Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption

  • Original Article
  • Published:
Medical & Biological Engineering & Computing Aims and scope Submit manuscript

Abstract

In the current high-tech era, the growing popularity of e-healthcare has heightened the attention focused on data security against cyber-attacks. As digital medical images are transported over the public network, an intermediate degree of protection must be in place. One major technique is the implementation of encryption to safeguard medical images. This article recommends a new medical image encryption technology. This algorithm began with a simple application of advanced Vigenere technology, followed by the implementation of a deeply adapted genetic operator for color image encryption, with the intention of better integrating into the medical image encryption security sector. After vectorization of the original image, the first round of Vigenere control by two chaotic substitution tables attached to highly modified replacement functions is applied. The output vector is encoded in restricted ASCII code in order to obtain a genetic hybridization suitable for encryption of medical and color images. A strong chaining will be applied between the encrypted block and the following clear block in order to increase the impact of the avalanche effect and to protect the system against any differential attack. Simulations carried out on a large volume of images of different sizes and formats ensure that our approach is not exposed to known attacks.

Highlights

The two rounds of our algorithm represent a large modification of a classical and a genetic operator. The main new features are

✓ First round

  ○ Vigenere upgrade

  ○ Selected simulations from the primary round

✓ Switching to reduced ASCII code

  ○ Two cross-over tables building process

  ○ Chaotic operation ASCII table

  ○ Output vector encryption

    ■ Detailed simulation study

    ■ Benchmarking with other recent algorithms

Graphical abstract

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

Abbreviations

\({G}_t={~}^{Z}\!\left/ \!{~}_{ tZ}\right.\) :

ring

\({G}_t^{\ast }\) :

Set of G t reversers line j

A(j:):

colunm j

⨁:

Xor operator

⊠:

Crossover operator

E(x)::

Whole part of the real number x

References

  1. Siahaan APU (2016) Genetic algorithm in Hill cipher encryption. Int Assoc Sci Innov Res (IASR) 15(1)

  2. Alkhalid AS (2015) Cryptanalysis of Hill cipher using genetic algorithm. dalam IEEE hanmument

  3. Jarjar A (2017) Improvement of Hill’s classical method in image cryptography. Int J Stat Appl Math 2(3) Part A

  4. Saputra I, Mesran N, Hasibuan A (2017) Vigenere cipher algorithm with grayscale image key generator for secure text file. Int J Eng Res Technol (IJERT) 6(01)

  5. Subhasri P, Padmapriya A (2015) Enhancing the security of Dicom content using modified Vigenere Cipher. Int J Appl Eng Res 10(55)

  6. Siahaan APU (2016) Three pass protocol in Hill cipher encryption technique. Int J Sci Res (IJSR) 5(nà 7):1149–1152

    Google Scholar 

  7. Dewangga IGAP, Purboyo TW, Nugrahaeni RA (2017) A new approach of data hiding in BMP image using LSB steganography and Caesar Vigenere cipher cryptography. Int J Appl Eng Res 12(21):10626–10636

    Google Scholar 

  8. Overbey J, Travers W, Wydylo J (2005) On the key space of the Hill cipher. Cryptologia 29(1):59–72

    Article  Google Scholar 

  9. Saeednia S (2000) How to make the Hill secure. Cryptologia 24(2):353–360

    Article  Google Scholar 

  10. Lin CH, Lee CY, Lee CY (2004) Comments on Saeednia’s improved scheme for the Hill cipher. J Chin Inst Eng 27(5):743–746

    Article  Google Scholar 

  11. Wang Y (2009) A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons & Fractals 41(4):1773–1783

    Article  Google Scholar 

  12. Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30:943–961

    Article  Google Scholar 

  13. Li H, Wang Y, Zuo Z (2019) Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Opt Lasers Eng 115:197–207

    Article  Google Scholar 

  14. R Ge, G Yang, J Wu, Y Chen, G Coatrieux, L Luo (2019) “A novel chaos-based symmetric image encryption using bit-pair level process. IEEE Access ieeexplore.ieee.org

  15. JarJar M (2019) Further improvement of the HILL method applied in image encryption. Procedia Comput Sci 00:000–000

    Google Scholar 

  16. Ali SMA (2019) Novel encryption algorithm for securing sensitive information based on Feistel cipher. Test Eng Manag 80(19):10–16

    Google Scholar 

  17. Gan Z-h (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic 31:7111–7130

    Article  Google Scholar 

  18. Rukhin A (2022) A statistical test suite for random and pseudorandom number generators for cryptographic Rahma Isnaini Masya; Rizal Fathoni Aji; Setiadi Yazid All Authors. Comparison of Vigenere Cipher and Affine Cipher in Three-pass Protocol for Securing Imag. IEEE Xplore

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdellatif JarJar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

JarJar, A. Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption. Med Biol Eng Comput 60, 2077–2093 (2022). https://doi.org/10.1007/s11517-022-02566-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11517-022-02566-4

Keywords