A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption
Abstract
:1. Introduction
- The static time-invariant key of THC is replaced with a dynamic time-varying key, and a novel dynamic Hill cipher with stronger confidentiality is obtained.
- To further enhance the security of the novel dynamic Hill cipher, the Arnold scrambling algorithm is combined with it, and a novel DHCAST is proposed in this work.
- In order to quickly and effectively find the TVIKM of the DHCAST for the image ciphertext decryption at the receiver, a NFZNN model is designed, and both the theoretical analysis and simulation results indicate that the designed NFZNN model has superior convergence and robustness for quickly solving the TVIKM of the DHCAST.
2. THC and the Proposed DHCAST
2.1. THC
2.1.1. THC Encryption
- Step 1:
- The original image is transformed and stored in the plaintext pixel matrix .
- Step 2:
- Design an invertible static matrix as the secret key.
- Step 3:
- The THC encryption is performed by , where M is the ciphertext matrix.
2.1.2. THC Decryption
- Step 1:
- Calculate the inversion matrix of the secret key matrix D.
- Step 2:
- The ciphertext matrix M is multiplied by the inversion matrix , and the plaintext matrix can be obtained .
- Step 3:
- Transform the plaintext matrix I to the original information.
2.2. The Arnold Scrambling Algorithm
2.2.1. Arnold Scrambling Encryption
- Step 1:
- Select the dislocation parameters a and b. Two-dimensional Arnold scrambling requires the determination of the dislocation parameters to control the position of the pixels in the image.
- Step 2:
- Extract the image pixels into the corresponding matrix, where n is the row and column size of the plaintext matrix.
- Step 3:
- According to Equation (1), two equations and can be derived, and then the position of each element in the image plaintext matrix is scrambled according to the above equation.
- Step 4:
- For the disordered pixel coordinates , perform Step 3 here to get the new pixel coordinates . Repeat this operation until the preset number of disorganization is reached.
- Step 5:
- Convert the disorganized pixel matrix to an encrypted image.
2.2.2. Arnold Scrambling Decryption
2.3. The Proposed DHCAST
2.3.1. DHCAST Encryption
- Step 1:
- The original image is transformed and stored in the plaintext pixel matrix .
- Step 2:
- The first ciphertext matrix M with scrambled pixels can be obtained by using the Arnold scramble technique. Here, the first ciphertext matrix M with scrambled pixels is time-invariant.
- Step 3:
- Choose an appropriate n-dimensional time-varying matrix as the dynamic time-varying secret key matrix for the encryption. Here, the secret key matrix is a dynamic matrix, and its element values change with time t.
- Step 4:
- The second ciphertext matrix can be obtained by . Here, the second ciphertext matrix is time-varying due to the selection of the dynamic time-varying secret key matrix .
2.3.2. DHCAST Decryption
- Step 1:
- Derive the time-varying inversion key matrix (TVIKM) of the dynamic time-varying key matrix .
- Step 2:
- Multiply the second ciphertext matrix by the above TVIKM , the first ciphertext matrix is obtained by .
- Step 3:
- The plaintext pixel matrix P can be obtained by performing the inverse transformation of Arnold permutation with the number of times set in the first ciphertext matrix obtained as in the previous subsection.
- Step 4:
- Turn the plaintext pixel matrix P into the image that the receiver side expects to obtain, and the DHCAST decryption is complete.
3. The NFZNN Model
3.1. ZNN Model
- Step 1:
- By analyzing Equation (3), the following error function is constructed.
- Step 2:
- After analyzing the appeal, the problem that needs to be solved now is how to make converge to 0 quickly. In order to solve this problem, we construct the following evolution formula.
- Step 3:
- The ZNN model for solving the TVIKM matrix of the proposed DHCAST can be constructed by deriving both sides of Equation (4) simultaneously.
3.2. NFZNN Model
3.2.1. Fuzzy Logic System
- Step 1
- (Fuzzification): In a fuzzy logic system, fuzzification is the process of converting input variables from precise values to membership values in a fuzzy set. The method of fuzzification usually consists of establishing a fuzzy set, setting membership functions, calculating membership degrees, and generating several parts of the fuzzy set. In this article, a suitable fuzzy set is established, and the Gaussian membership function is used as the membership function of the FLS to transform input into fuzzy input P, thereby introducing uncertainty or fuzziness into the fuzzy logic system. The specific expression of the Gaussian membership function is as follows:
- Step 2
- (Matching fuzzy rules and conducting fuzzy inference): In this step, the main reliance is on the established Fuzzy Inference mechanism “IF-THEN” rule to infer different inputs and obtain the final inference. The relationship between fuzzy input P and fuzzy output O is defined as follows:
- Step 3
- (Anti fuzzification): The fuzzy parameter m can be obtained by the following anti fuzzification operation.
3.2.2. The NFAF and NFZNN Model
4. Theoretical Analysis of the NFZNN Model
- (1)
- ⇔
- (2)
- Any in system (11) satisfies
- (1)
- The dynamic system (11) is finite-time stability;
- (2)
- For any , there exists a constant such that .
- (1)
- When
- (2)
- When :
4.1. Convergence Analysis of the NFZNN Model
4.2. Robustness Analysis of the NFZNN Model
4.2.1. Time-Variant Bounded Vanishing Noise
4.2.2. Time-Variant Vounded No-Vanishing Noise
5. Simulation Experiments of the NFZNN Model and the Proposed DHCAST
5.1. Two-Dimensional Time-Varying Inversion Key Matrix (TVIKM) Solving
5.2. DHCAST Encryption and Decryption Experiments on Medical Images
5.3. Performance Comparison Analysis
5.3.1. Number of Pixel Change Rate (NPCR) and Uniform Average Changing Intensity (UACI)
5.3.2. Mean Square Error (MSE) and Peak Signal-to-Noise Ratio (PSNR)
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Woźniak, M. Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption. Expert Syst. Appl. 2024, 246, 123190. [Google Scholar] [CrossRef]
- Yu, F.; Zhang, W.; Xiao, X.; Yao, W.; Cai, S.; Zhang, J.; Wang, C.; Li, Y. Dynamic analysis and field-programmable gate array implementation of a 5D fractional-order memristive hyperchaotic system with multiple coexisting attractors. Fractal Fract. 2024, 8, 271. [Google Scholar] [CrossRef]
- Lai, Q.; Yang, L.; Hu, G.; Guan, Z.H.; Iu, H.H.C. Constructing Multiscroll Memristive Neural Network with Local Activity Memristor and Application in Image Encryption. IEEE Trans. Cybern. 2024, 54, 4039–4048. [Google Scholar] [CrossRef] [PubMed]
- Jin, J.; Lei, X.; Chen, C.; Li, Z. A fuzzy activation function based zeroing neural network for dynamic Arnold map image cryptography. Math. Comput. Simul. 2024, in press. [Google Scholar] [CrossRef]
- Yu, F.; Kong, X.; Yao, W.; Zhang, J.; Cai, S.; Lin, H.; Jin, J. Dynamics analysis, synchronization and FPGA implementation of multiscroll Hopfield neural networks with non-polynomial memristor. Chaos Solitons Fractals 2024, 179, 114440. [Google Scholar] [CrossRef]
- Deng, Q.; Wang, C.; Sun, Y.; Deng, Z.; Yang, G. Memristive Tabu Learning Neuron Generated Multi-Wing Attractor with FPGA Implementation and Application in Encryption. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 1–12. [Google Scholar] [CrossRef]
- Ma, X.; Wang, Z.; Wang, C. An Image Encryption Algorithm Based on Tabu Search and Hyperchaos. Int. J. Bifurc. Chaos 2024, 34, 2450170. [Google Scholar] [CrossRef]
- Yu, F.; Xu, S.; Lin, Y.; Gracia, Y.M.; Yao, W.; Cai, S. Dynamic Analysis, Image Encryption Application and FPGA Implementation of a Discrete Memristor-Coupled Neural Network. Int. J. Bifurc. Chaos 2024, 34, 2450068. [Google Scholar] [CrossRef]
- Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting newly designed fractional-order 3D Lorenz chaotic system and 2D discrete polynomial hyper-chaotic map for high-performance multi-image encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
- Wen, H.; Lin, Y. Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 2024, 237, 121514. [Google Scholar] [CrossRef]
- Yu, F.; Wu, C.; Xu, S.; Yao, W.; Xu, C.; Cai, S.; Wang, C. Color video encryption transmission in IoT based on memristive hopfield neural network. Signal Image Video Process. 2024, 19, 77. [Google Scholar] [CrossRef]
- Dhingra, D.; Dua, M. Medical video encryption using novel 2D Cosine-Sine map and dynamic DNA coding. Med. Biol. Eng. Comput. 2024, 62, 237–255. [Google Scholar] [CrossRef] [PubMed]
- Yu, F.; Lin, Y.; Yao, W.; Cai, S.; Lin, H.; Li, Y. Multiscroll hopfield neural network with extreme multistability and its application in video encryption for IIoT. Neural Netw. 2024, 182, 106904. [Google Scholar] [CrossRef] [PubMed]
- Gao, S.; Iu, H.H.C.; Wang, M.; Jiang, D.; El-Latif, A.A.A.; Wu, R.; Tang, X. Design, Hardware Implementation, and Application in Video Encryption of the 2-D Memristive Cubic Map. IEEE Internet Things J. 2024, 11, 21807–21815. [Google Scholar] [CrossRef]
- Jiang, L.; Chen, L.; Giannetsos, T.; Luo, B.; Liang, K.; Han, J. Toward practical privacy-preserving processing over encrypted data in IoT: An assistive healthcare use case. IEEE Internet Things J. 2019, 6, 10177–10190. [Google Scholar] [CrossRef]
- Ding, Y.; Wu, G.; Chen, D.; Zhang, N.; Gong, L.; Cao, M.; Qin, Z. DeepEDN: A deep-learning-based image encryption and decryption network for internet of medical things. IEEE Internet Things J. 2020, 8, 1504–1518. [Google Scholar] [CrossRef]
- Radanliev, P. Artificial intelligence and quantum cryptography. J. Anal. Sci. Technol. 2024, 15, 4. [Google Scholar] [CrossRef]
- Varghese, F.; Sasikala, P. A detailed review based on secure data transmission using cryptography and steganography. Wirel. Pers. Commun. 2023, 129, 2291–2318. [Google Scholar] [CrossRef]
- Ostad-Sharif, A.; Arshad, H.; Nikooghadam, M.; Abbasinezhad-Mood, D. Three party secure data transmission in IoT networks through design of a lightweight authenticated key agreement scheme. Future Gener. Comput. Syst. 2019, 100, 882–892. [Google Scholar] [CrossRef]
- Sedlmeir, J.; Rieger, A.; Roth, T.; Fridgen, G. Battling disinformation with cryptography. Nat. Mach. Intell. 2023, 5, 1056–1057. [Google Scholar] [CrossRef]
- Kong, X.; Yu, F.; Yao, W.; Cai, S.; Zhang, J.; Lin, H. Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation. Neural Netw. 2024, 171, 85–103. [Google Scholar] [CrossRef] [PubMed]
- Zhang, S.; Chen, C.; Zhang, Y.; Cai, J.; Wang, X.; Zeng, Z. Multidirectional Multidouble-Scroll Hopfield Neural Network with Application to Image Encryption. IEEE Trans. Syst. Man Cybern. Syst. 2024, 1–12. [Google Scholar] [CrossRef]
- Sun, J.; Li, C.; Wang, Z.; Wang, Y. A Memristive Fully Connect Neural Network and Application of Medical Image Encryption Based on Central Diffusion Algorithm. IEEE Trans. Ind. Informatics 2024, 20, 3778–3788. [Google Scholar] [CrossRef]
- Yu, F.; Xu, S.; Lin, Y.; He, T.; Wu, C.; Lin, H. Design and Analysis of a Novel Fractional-Order System with Hidden Dynamics, Hyperchaotic Behavior and Multi-Scroll Attractors. Mathematics 2024, 12, 2227. [Google Scholar] [CrossRef]
- Lin, H.; Deng, X.; Yu, F.; Sun, Y. Grid Multibutterfly Memristive Neural Network with Three Memristive Systems: Modeling, Dynamic Analysis, and Application in Police IoT. IEEE Internet Things J. 2024, 11, 29878–29889. [Google Scholar] [CrossRef]
- Zhu, J.; Jin, J.; Chen, C.; Wu, L.; Lu, M.; Ouyang, A. A New-Type Zeroing Neural Network Model and Its Application in Dynamic Cryptography. IEEE Trans. Emerg. Top. Comput. Intell. 2024, 1–16. [Google Scholar] [CrossRef]
- Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image encryption algorithm based on plane-level image filtering and discrete logarithmic transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
- Lin, H.; Deng, X.; Yu, F.; Sun, Y. Diversified Butterfly Attractors of Memristive HNN with Two Memristive Systems and Application in IoMT for Privacy Protection. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2024, 1. [Google Scholar] [CrossRef]
- Wen, H.; Lin, Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. J. King Saud Univ.-Comput. Inf. Sci. 2023, 35, 101612. [Google Scholar] [CrossRef]
- Das, A.K.; Das, N. Enhancement of 3D-Playfair algorithm using dual key. Int. J. Adv. Intell. Paradig. 2020, 15, 405–416. [Google Scholar] [CrossRef]
- Albahrani, E.A.; Maryoosh, A.A.; Lafta, S.H. Block image encryption based on modified playfair and chaotic system. J. Inf. Secur. Appl. 2020, 51, 102445. [Google Scholar] [CrossRef]
- Abdel-Basset, M.; Mohamed, R.; ELkomy, O.M. Knapsack Cipher-based metaheuristic optimization algorithms for cryptanalysis in blockchain-enabled internet of things systems. Ad Hoc Netw. 2022, 128, 102798. [Google Scholar] [CrossRef]
- Vambol, A. Polynomial-Time Plaintext-Recovery Attack on the Matrix-Based Knapsack Cipher. Int. J. Comput. 2020, 19, 474–479. [Google Scholar] [CrossRef]
- Dhall, S.; Pal, S.K.; Sharma, K. A chaos-based probabilistic block cipher for image encryption. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 1533–1543. [Google Scholar] [CrossRef]
- Bezerra, J.I.M.; de Almeida Camargo, V.V.; Molter, A. A new efficient permutation-diffusion encryption algorithm based on a chaotic map. Chaos Solitons Fractals 2021, 151, 111235. [Google Scholar] [CrossRef]
- Prasad, K.; Mahato, H. Cryptography using generalized Fibonacci matrices with Affine-Hill cipher. J. Discret. Math. Sci. Cryptogr. 2022, 25, 2341–2352. [Google Scholar] [CrossRef]
- Wen, H.; Lin, Y.; Yang, L.; Chen, R. Cryptanalysis of an image encryption scheme using variant Hill cipher and chaos. Expert Syst. Appl. 2024, 250, 123748. [Google Scholar] [CrossRef]
- Wei, Y.; Li, H.s.; Liu, K.; Zhao, S. Quantum video encryption based on bitplanes and improved Arnold scrambling. Quantum Inf. Process. 2024, 23, 67. [Google Scholar] [CrossRef]
- Bhatti, U.A.; Yu, Z.; Li, J.; Nawaz, S.A.; Mehmood, A.; Zhang, K.; Yuan, L. Hybrid watermarking algorithm using Clifford algebra with Arnold scrambling and chaotic encryption. IEEE Access 2020, 8, 76386–76398. [Google Scholar] [CrossRef]
- Elmoznino, E.; Bonner, M.F. High-performing neural network models of visual cortex benefit from high latent dimensionality. PLoS Comput. Biol. 2024, 20, e1011792. [Google Scholar] [CrossRef]
- Wan, Q.; Yang, Q.; Liu, T.; Chen, C.; Shen, K. Single direction, grid and spatial multi-scroll attractors in Hopfield neural network with the variable number memristive self-connected synapses. Chaos Solitons Fractals 2024, 189, 115584. [Google Scholar] [CrossRef]
- Luo, D.; Wang, C.; Deng, Q.; Sun, Y. Dynamics in a memristive neural network with three discrete heterogeneous neurons and its application. Nonlinear Dyn. 2024, 1–14. [Google Scholar] [CrossRef]
- Yao, W.; Fang, J.; Yu, F.; Xiong, L.; Tang, L.; Zhang, J.; Sun, Y. Electromagnetic radiation control for nonlinear dynamics of Hopfield neural networks. Chaos Interdiscip. J. Nonlinear Sci. 2024, 34, 073149. [Google Scholar] [CrossRef] [PubMed]
- Zhang, S.; Yao, W.; Xiong, L.; Wang, Y.; Tang, L.; Zhang, X.; Yu, F. A Hindmarsh–Rose neuron model with electromagnetic radiation control for the mechanical optimization design. Chaos Solitons Fractals 2024, 187, 115408. [Google Scholar] [CrossRef]
- Mou, J.; Cao, H.; Zhou, N.; Cao, Y. An FHN-HR Neuron Network Coupled with a Novel Locally Active Memristor and Its DSP Implementation. IEEE Trans. Cybern. 2024, 54, 7333–7342. [Google Scholar] [CrossRef]
- Zhu, R.; Zhong, G.Y.; Li, J.C. Forecasting price in a new hybrid neural network model with machine learning. Expert Syst. Appl. 2024, 249, 123697. [Google Scholar] [CrossRef]
- Zhang, S.; Li, Y.; Lu, D.; Li, C. A novel memristive synapse-coupled ring neural network with countless attractors and its application. Chaos Solitons Fractals 2024, 184, 115056. [Google Scholar] [CrossRef]
- Xu, Q.; Wang, K.; Feng, C.; Fan, W.; Wang, N. Dynamical effects of low-frequency and high-frequency current stimuli in a memristive Morris–Lecar neuron model. Chaos Solitons Fractals 2024, 189, 115646. [Google Scholar] [CrossRef]
- Wang, J.; Liu, Y.; Rao, S.; Zhou, X.; Hu, J. A novel self-adaptive multi-strategy artificial bee colony algorithm for coverage optimization in wireless sensor networks. Ad Hoc Netw. 2023, 150, 103284. [Google Scholar] [CrossRef]
- Li, J.; Wang, C.; Deng, Q. Symmetric multi-double-scroll attractors in Hopfield neural network under pulse controlled memristor. Nonlinear Dyn. 2024, 112, 14463–14477. [Google Scholar] [CrossRef]
- Zhang, Z.; Guo, J.; Chen, S.; Xu, S.; Zhang, M.; Teruo, N.; Wang, H.; Pei, Y. A Real-Time 3-D Visual Detection-Based Soft Wire Avoidance Scheme for Industrial Robot Manipulators. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 827–840. [Google Scholar] [CrossRef]
- Jin, J.; Chen, W.; Chen, C.; Chen, L.; Tang, Z.; Chen, L.; Wu, L.; Zhu, C. A predefined fixed-time convergence ZNN and its applications to time-varying quadratic programming solving and dual-arm manipulator cooperative trajectory tracking. IEEE Trans. Ind. Inform. 2022, 19, 8691–8702. [Google Scholar] [CrossRef]
- Jin, J.; Zhu, J.; Zhou, L.; Chen, C.; Wu, L.; Lu, M.; Zhu, C.; Chen, L.; Zhao, L.; Li, Z. A Complex-Valued Variant-Parameter Robust Zeroing Neural Network Model and its Applications. IEEE Trans. Emerg. Top. Comput. Intell. 2024, 8, 1303–1321. [Google Scholar] [CrossRef]
- Jin, J.; Zhu, J.; Zhao, L.; Chen, L.; Chen, L.; Gong, J. A robust predefined-time convergence zeroing neural network for dynamic matrix inversion. IEEE Trans. Cybern. 2023, 53, 3887–3900. [Google Scholar] [CrossRef] [PubMed]
- Zhang, Z.; Li, Z.; Yang, S. A barrier varying-parameter dynamic learning network for solving time-varying quadratic programming problems with multiple constraints. IEEE Trans. Cybern. 2021, 52, 8781–8792. [Google Scholar] [CrossRef]
- Chen, W.; Jin, J.; Chen, C.; Yu, F.; Wang, C. A disturbance suppression zeroing neural network for robust synchronization of chaotic systems and its FPGA implementation. Int. J. Bifurc. Chaos 2022, 32, 2250210. [Google Scholar] [CrossRef]
- Jin, J.; Chen, W.; Ouyang, A.; Yu, F.; Liu, H. A time-varying fuzzy parameter zeroing neural network for the synchronization of chaotic systems. IEEE Trans. Emerg. Top. Comput. Intell. 2024, 8, 364–376. [Google Scholar] [CrossRef]
- Jin, J.; Fang, J.; Chen, C.; Li, Z.; Yu, F. A complex-valued time varying zeroing neural network model for synchronization of complex chaotic systems. Nonlinear Dyn. 2024, 1–21. [Google Scholar] [CrossRef]
- Liao, B.; Han, L.; Cao, X.; Li, S.; Li, J. Double integral-enhanced Zeroing neural network with linear noise rejection for time-varying matrix inverse. CAAI Trans. Intell. Technol. 2024, 9, 197–210. [Google Scholar] [CrossRef]
- Liao, B.; Han, L.; He, Y.; Cao, X.; Li, J. Prescribed-time convergent adaptive ZNN for time-varying matrix inversion under harmonic noise. Electronics 2022, 11, 1636. [Google Scholar] [CrossRef]
- Feng, S.; Wu, H.N. Hybrid robust boundary and fuzzy control for disturbance attenuation of nonlinear coupled ODE-beam systems with application to a flexible spacecraft. IEEE Trans. Fuzzy Syst. 2016, 25, 1293–1305. [Google Scholar] [CrossRef]
- Jin, J.; Chen, W.; Chen, C.; Wu, L. Fixed-time solution of inequality constrained time-varying linear systems via zeroing neural networks. J. Frankl. Inst. 2024, 361, 106870. [Google Scholar] [CrossRef]
- Samimi Namin, F.; Rouhani, M.M. A Review: Applications of Fuzzy Theory in Rock Engineering. Indian Geotech. J. 2024, 1–18. [Google Scholar] [CrossRef]
- Jin, J.; Chen, W.; Ouyang, A.; Liu, H. Toward Fuzzy Activation Function Activated Zeroing Neural Network for Currents Computing. IEEE Trans. Circuits Syst. II-Express Briefs 2023, 70, 4201–4205. [Google Scholar] [CrossRef]
- Xiao, L.; Song, W.; Jia, L.; Li, X. ZNN for time-variant nonlinear inequality systems: A finite-time solution. Neurocomputing 2022, 500, 319–328. [Google Scholar] [CrossRef]
- Zeng, Y.; Xiao, L.; Li, K.; Li, J.; Li, K.; Jian, Z. Design and analysis of three nonlinearly activated ZNN models for solving time-varying linear matrix inequalities in finite time. Neurocomputing 2020, 390, 78–87. [Google Scholar] [CrossRef]
- Xiao, L.; Zhang, Y.; Dai, J.; Li, J.; Li, W. New noise-tolerant ZNN models with predefined-time convergence for time-variant Sylvester equation solving. IEEE Trans. Syst. Man, Cybern. Syst. 2019, 51, 3629–3640. [Google Scholar] [CrossRef]
- Chen, C.; Li, L.; Peng, H.; Yang, Y.; Mi, L.; Zhao, H. A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks. Neural Netw. 2020, 123, 412–419. [Google Scholar] [CrossRef]
- Kaur, M.; AlZubi, A.A.; Singh, D.; Kumar, V.; Lee, H.N. Lightweight Biomedical Image Encryption Approach. IEEE Access 2023, 11, 74048–74057. [Google Scholar] [CrossRef]
- Prabhavathi, K.; Anandaraju, M.; Kiran. An efficient medical image encryption algorithm for telemedicine applications. Microprocess. Microsyst. 2023, 101, 104907. [Google Scholar] [CrossRef]
- Younas, I.; Khan, M. A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 2018, 20, 913. [Google Scholar] [CrossRef]
- Khan, H.; Jamal, S.S.; Hazzazi, M.M.; Khan, M.; Hussain, I. New image encryption scheme based on Arnold map and cuckoo search optimization algorithm. Multimed. Tools Appl. 2023, 82, 7419–7441. [Google Scholar] [CrossRef]
Full Names | Abbreviations |
---|---|
traditional Hill cipher | THC |
dynamic Hill cipher with Arnold scrambling technique | DHCAST |
Zeroing Neural Network | ZNN |
time-varying inversion key matrix | TVIKM |
new fuzzy zeroing neural network | NFZNN |
traditional Zeroing Neural Networ | TZNN |
magnetic resonance imagin | MRI |
ultrasound | USC |
Mean Square Error | MSE |
Peak signal-to-noise ratio | PSNR |
Number of Pixel Change Rate | NPCR |
Uniform Average Changing Intensity | UACI |
NPCR(%) | Average UACI(%) | |
---|---|---|
Ref. [69] | 99.67 | 33.42 |
This work | 99.74 | 33.64 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Xi, Y.; Ning, Y.; Jin, J.; Yu, F. A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption. Mathematics 2024, 12, 3948. https://doi.org/10.3390/math12243948
Xi Y, Ning Y, Jin J, Yu F. A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption. Mathematics. 2024; 12(24):3948. https://doi.org/10.3390/math12243948
Chicago/Turabian StyleXi, Yuzhou, Yu Ning, Jie Jin, and Fei Yu. 2024. "A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption" Mathematics 12, no. 24: 3948. https://doi.org/10.3390/math12243948
APA StyleXi, Y., Ning, Y., Jin, J., & Yu, F. (2024). A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption. Mathematics, 12(24), 3948. https://doi.org/10.3390/math12243948