Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Securing Medical Images by Image Encryption using Key Image

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 3
Year of Publication: 2014
Authors:
Shrija Madhu
Mohammed Ali Hussain
10.5120/18184-9079

Shrija Madhu and Mohammed Ali Hussain. Article: Securing Medical Images by Image Encryption using Key Image. International Journal of Computer Applications 104(3):30-34, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Shrija Madhu and Mohammed Ali Hussain},
	title = {Article: Securing Medical Images by Image Encryption using Key Image},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {3},
	pages = {30-34},
	month = {October},
	note = {Full text available}
}

Abstract

This paper presents two methods for encryption and decryption of images using XOR operation. In the first method the original image is encrypted by the key image using XOR operation and decryption process also uses the same key image with XOR operation. In the second method one of the bit planes of the key image is used for encrypting the bit planes of the original image and shuffling is done for getting the encrypted image. This method also uses XOR operation. Both the methods use a binary image of the same size as key for encrypting the original image. Experiments have shown that both algorithms are suitable for 2D as well as 3D images. These algorithms are implemented in MATLAB environment and tested on various medical images which have shown good results. These methods can be used for encrypting other images also.

References

  • Panigrahy, S. K. , Acharya, B. and Jen, D. , 2008. Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm. In 1st International Conference on Advances in Computing, Chikhli, India.
  • Kamali, S. H. , Shakerian, R. , Hedayati, M. ,Rahmani, M. , 2010. A new modified version of Advance Encryption Standard based algorithm for image encryption. In International Conference on Electronics and Information Engineering (ICEIE),
  • Younes,M. A. B and Jantan,A. , 2008. An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption. In International Journal of Computer Science and Network Security(IJCSNS), VOL. 8.
  • Zeghid,M. , Machhout,M. , Khriji,L. , Baganne,A. , Tourki, R. ,2007. Modified AES Based Algorithm for Image Encryption. In World Academy of Science, Engineering and Technology.
  • Singh,K. , Kaur,K. , 2011. Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it. In International Journal of Computer Applications, Volume 23– No. 6.
  • Seyedzade,S. M. , Atani,R. E. and Mirzakuchaki,S. 2010. A Novel Image Encryption Algorithm Based on Hash Function. In 6th Iranian Conference on Machine Vision and Image Processing.
  • Gupta,R. ,Bisht,J. 2013. Colour Image Encryption and Decryption by using Scan Approach. In International Journal of software & Hardware Research in Engineering, Volume 1 Issue 2.
  • Younes,M. A. B and Jantan,A. , 2008. Image Encryption Using Block-Based Transformation Algorithm. In International Journal of Computer Science(IAENG),.
  • Yun-peng,Z. , Wei,L. , Shui-ping,C. , Zheng-jun,Z. , Xuan ,N. ,Wei-di,D. , 2009. Digital image encryption algorithm based on chaos and improved DES. In IEEE International Conference on Systems, Man and Cybernetics.
  • Seyedzade,S. M. , Atani,R. E. and Mirzakuchaki,S. , 2010. A Novel Image Encryption Algorithm Based on Hash Function. In 6th Iranian Conference on Machine Vision and Image Processing.
  • Pareek ,N. K. , Patidar , V. , Sud, . K . K. 2006. Image encryption using chaotic logistic map. In Image and Vision Computing 24(2006)926–934, Elsevier.
  • Nag, A. , Srabani Khan, Saswati Ghosh, Singh, J. P. , Biswas, S. , Sarkar,D. , Sarkar,P. P. 2011. Image Encryption Using Affine Transform and XOR Operation. In International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN).
  • Reddy Jyoteeswara Prasad, S. and Sathyanarayana, R. V. S. 2013. Image encryption using color key images. In International Journal of Elec. & Electr. Eng. & Telecom.