Supervised and Unsupervised Data Engineering for Multimedia Data
by Suman Kumar Swarnkar, J. P. Patra, Sapna Singh Kshatri, Yogesh Kumar Rathore, Tien Anh Tran
6Secure Medical Image Transmission Using 2-D Tent Cascade Logistic Map
L. R. Jonisha Miriam1*, A. Lenin Fred2, S. N. Kumar3, Ajay Kumar H.4, I. Christina Jane5, Parasuraman Padmanabhan6 and Balázs Gulyás6
1Department of Electronics and Communication Engineering, Mar Ephraem College of Engineering and Technology, Elavuvilai, Tamil Nadu, India
2Dept of Elec. and Comm. Engg, C. S. I Institute of Technology, Thovalai, India
3Amal Jyothi College of Engineering, Kanjirappally, Kerala, India
4Mar Ephraem College of Engineering and Technology, Elavuvilai, Tamil Nadu, India
5Department of ECE, Mar Ephraem College of Engineering and Technology, Marthandam, Tamil Nadu, India
6Lee Kong Chian School of Medicine, Nanyang Technological University, Singapore, Singapore
Abstract
Secure image communication is becoming more and more important owing to stealing and content manipulation. To protect the confidential image from unauthorized access, encryption algorithms are considered. Due to the unique properties of chaotic systems, the admired encryption algorithm used is the chaos-based encryption algorithm. It deals with a 2D chaos-based encryption algorithm known as Two-Dimensional Tent Cascade Logistic Map (2DTCLM). Cascading, logistic map and tent map generate 2D-TCLM, which is applied on permutation and substitution stages to obtain an encrypted image from the original image. Simulation results show the effect of the proposed algorithm on DICOM images to obtain their corresponding encrypted ...