Reference Hub2
Resource optimized Region Based Image Encryption Using Chaotic Maps

Resource optimized Region Based Image Encryption Using Chaotic Maps

Kiran P., Parameshachari B. D., Sudheesh K.V., Sunil Kumar D.S.
Copyright: © 2022 |Volume: 18 |Issue: 1 |Pages: 20
ISSN: 1548-3673|EISSN: 1548-3681|EISBN13: 9781799893868|DOI: 10.4018/IJeC.304379
Cite Article Cite Article

MLA

Kiran P., et al. "Resource optimized Region Based Image Encryption Using Chaotic Maps." IJEC vol.18, no.1 2022: pp.1-20. http://doi.org/10.4018/IJeC.304379

APA

Kiran P., Parameshachari B. D., Sudheesh K.V., & Sunil Kumar D.S. (2022). Resource optimized Region Based Image Encryption Using Chaotic Maps. International Journal of e-Collaboration (IJeC), 18(1), 1-20. http://doi.org/10.4018/IJeC.304379

Chicago

Kiran P., et al. "Resource optimized Region Based Image Encryption Using Chaotic Maps," International Journal of e-Collaboration (IJeC) 18, no.1: 1-20. http://doi.org/10.4018/IJeC.304379

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Securing medical images becomes a major concern to avoid leaking confidential data. This problem motivated the development of many low computational complexity methods to encrypt these medical images. In this research work, block cipher-based region of interest medical image encryption with multiple maps is proposed. Primarily, region of interest (ROI) regions and region of background (ROB) are extracted with the help of Laplacian edge detection operator. Further, important ROI regions are permuted in a circular fashion with the help of Arnold cat map and angle value. Then permuted ROI part is encrypted using the duffling system and unimportant regions are unchanged. The advantage of the work is that it encrypts only selected/important parts and that will achieve fast execution speed and reduction in computation complexity. The approach presented here enables the storage and transmission of medical image data within an open network. These results show that the security in the proposed method is much better than many chaotic encryption algorithms proposed in the recent times.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.