Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A novel 2D MTMHM based key generation for enhanced security in medical image communication
by
Amirtharajan, Rengarajan
, Devi, C. Sivaranjani
in
2D-chaotic map
/ 639/166/987
/ 639/705/117
/ DICOM
/ Discrete map
/ Humanities and Social Sciences
/ Image encryption
/ multidisciplinary
/ Science
/ Science (multidisciplinary)
/ Security analysis
/ Selective shuffling
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A novel 2D MTMHM based key generation for enhanced security in medical image communication
by
Amirtharajan, Rengarajan
, Devi, C. Sivaranjani
in
2D-chaotic map
/ 639/166/987
/ 639/705/117
/ DICOM
/ Discrete map
/ Humanities and Social Sciences
/ Image encryption
/ multidisciplinary
/ Science
/ Science (multidisciplinary)
/ Security analysis
/ Selective shuffling
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A novel 2D MTMHM based key generation for enhanced security in medical image communication
by
Amirtharajan, Rengarajan
, Devi, C. Sivaranjani
in
2D-chaotic map
/ 639/166/987
/ 639/705/117
/ DICOM
/ Discrete map
/ Humanities and Social Sciences
/ Image encryption
/ multidisciplinary
/ Science
/ Science (multidisciplinary)
/ Security analysis
/ Selective shuffling
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A novel 2D MTMHM based key generation for enhanced security in medical image communication
Journal Article
A novel 2D MTMHM based key generation for enhanced security in medical image communication
2025
Request Book From Autostore
and Choose the Collection Method
Overview
In today’s tech-driven world, secure communication of medical information is a critical necessity. Protecting the patient’s sensitive medical data through encryption algorithms based on chaos theory has emerged as a prominent research trend. This research proposes a novel 2D-Modified Tinkerbell Map with Henon Map (2D-MTMHM) chaotic equation to generate the pseudo-random key sequences for medical image encryption. Combining the Tinkerbell map with the Henon map exhibits a broader range of chaotic behaviour, making it highly suitable for cryptographic applications. The nature, randomness and sensitivity of the developed 2D-MTMHM equation are validated through the NIST SP800-22 statistical test, bifurcation diagram, Lyapunov exponent, permutation entropy, attractor trajectory, sample entropy and sensitivity test. The generated random key sequences trigger the proposed medical image encryption algorithm, which integrates a shuffling-diffusion process. The shuffling unit of the proposed medical image encryption scheme consists of three distinct phases: row-wise shuffling, column-wise shuffling, and selective shuffling based on cut-off points. The diffusion unit is designed to bit-wise scramble the pixel-shuffled image, further enhancing the randomness and security of the encrypted image. Simulation and experimental analysis demonstrate that the encryption system effectively resists statistical, differential and Brute-force attacks. The algorithm achieves an average entropy of 7.99, a correlation coefficient nearer to zero, a Number of Pixels Change Ratio (NPCR) of 99.6%, and a Unified Average Changing Intensity (UACI) of 33.4%. A larger key space of 10
270
is obtained, implying that the algorithm provides security against brute−force attacks.
Publisher
Nature Publishing Group UK,Nature Portfolio
MBRLCatalogueRelatedBooks
Related Items
Related Items
We currently cannot retrieve any items related to this title. Kindly check back at a later time.
This website uses cookies to ensure you get the best experience on our website.