Int J Performability Eng ›› 2019, Vol. 15 ›› Issue (5): 1436-1444.doi: 10.23940/ijpe.19.05.p20.14361444

Previous Articles     Next Articles

Hybrid Chaotic Encryption Algorithm for Securing DICOM Systems

Ge Jiaoa,b c,*, Sheng Zhoua, Lang Lia,b, and Yi Zoua,b   

  1. a College of Computer Science and Technology, Hengyang Normal University, Hengyang, 421002, China
    b Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang, 421002, China
    c School of Environment Protection and Safety Engineering, University of South China, Hengyang, 421002, China
  • Submitted on ;
  • Contact: * E-mail address: jiaoge@126.com
  • About author:Ge Jiao is an associate professor in the College of Computer Science & Technology at Hengyang Normal University. He received his master's degree from Hunan University, Changsha, China, in 2010. He is currently working toward a Ph.D. in safety engineering at the University of South China. His research interests include image processing and information security;Sheng Zhou is an undergraduate student in the College of Compute Science & Technology at Hengyang Normal University. Her research interests include semi-supervised machine learning and network data analysis; Lang Li received his Ph.D. and master's degrees in computer science from Hunan University, Changsha, China, in 2010 and 2006, respectively, and he earned his B.S. degree in circuits and systems from Hunan Normal University in 1996. Since 2011, he has been working as a professor in the College of Computer Science & Technology at Hengyang Normal University, Hengyang, China. His research interests include embedded systems and information security; Yi Zou received her master's degree in computer science from Hunan University, Changsha, China, in 2008. Since 2010, she has been working as a lecturer in the Department of Computer Science at Hengyang Normal University, Hengyang, China. Her research interests in embedded systems and information security.
  • Supported by:
    This work is supported by the Science and Technology Plan Project of Hunan Province (2016TP1020), the Open Fund Project of Hunan Provincial Key Laboratory of Intelligent Information Processing and Application for Hengyang Normal University (IIPA18K03), the Application-oriented Special Disciplines, Double First-Class University Project of Hunan Province (Xiangjiaotong [2018] 469), the Hunan Provincial Natural Science Foundation of China (2017JJ2010), the Scientific Research Fund of Hunan Provincial Education Department (16B039), the Hunan Province Special Funds of Central Government for Guiding Local Science and Technology Development (2018CT5001), the Subject Group Construction Project of Hengyang Normal University (18XKQ02), and the Research-based learning and innovative experimental project of Hengyang Normal University (cx1829).

Abstract: The DICOM system contains patients' personal privacy and may present a risk of information leakage in telemedicine diagnostics. In order to solve the security problem of the DICOM system, we propose a medical image encryption method based on the cross-diffusion of the logistic map and the Chebyshev map. We first parse the DICOM image and read the data elements, and then we use the logistic map and the Chebyshev map to generate a key. Then, we cross-use these two sequences for further image encryption diffusion. Finally, we conduct in-depth experiments and comparisons with existing algorithms to validate the characteristics of high security and low correlation of adjacent pixels of the proposed encryption algorithm.

Key words: DICOM system, system security, privacy, low correlation