0% found this document useful (0 votes)
18 views81 pages

Mjip02 Final Document

This document presents a novel hybrid encryption scheme for securing medical images in cloud-based healthcare systems, addressing the critical need for data secrecy, legitimacy, and integrity. The proposed system utilizes innovative perturbation algorithms and demonstrates high efficiency, robustness, and security against various attacks, outperforming existing encryption methods. The project encompasses a comprehensive architecture, including user interface design and a medical cloud server, aimed at enhancing the security of patient data during transmission and storage.

Uploaded by

mohammadnaymath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views81 pages

Mjip02 Final Document

This document presents a novel hybrid encryption scheme for securing medical images in cloud-based healthcare systems, addressing the critical need for data secrecy, legitimacy, and integrity. The proposed system utilizes innovative perturbation algorithms and demonstrates high efficiency, robustness, and security against various attacks, outperforming existing encryption methods. The project encompasses a comprehensive architecture, including user interface design and a medical cloud server, aimed at enhancing the security of patient data during transmission and storage.

Uploaded by

mohammadnaymath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 81

A Medical Image Encryption Data Sharing

ABSTRACT
•Transmission and storage of medical data using cloud-based necessitate important prerequisites, such as secrecy, legitimacy, and integrity. This
paper recommends a novel hybrid encryption/decryption scheme that can be applied in healthcare, for the protection of medical images. The
proposed system explores innovative perturbation algorithms that utilize data. The proposed different techniques and tests are used to analyzed
behaviors of the proposed system. Moreover, evaluation using various test images indicated that the proposed cipher text is fast, have high
efficiency, showed high robustness and protection of medical images, and documented the good ability to withstand. Furthermore, images prove
the high security levels, sensitivity, and low residual intelligibility with high quality recovered data of our technique than encryption schemes.
CHAPTER 1
INTRODUCTION
1.1 GENERAL
•In the era of exponential growth of communications technologies, security of data, in particular medical data, is of great interest. Cloud-
based Internet-of-heath systems (IoHS) are being increasingly used to store patients data to make them remotely accessible at different
facilities/locations. The stored and/or transferred data include sensitive identifiable information (e.g., names, address and the other health
records) in addition to medical scans (i.e., medical images and physician reports). Non-authorized access to such data is catastrophic and
thus, the security of patient data is of immense importance [1]. Storage and/or transfer of medical images not only requires secrecy, but
also legitimacy and integrity as prerequisites [2]. Fortunately, cryptography algorithms can be exploited to ensure the required
security.,prerequisites, by medical image scrambling to fulfill encryption. Validness and uprightness of a given cryptosystem are
eventually assessed using various computerized marks. Early image encryption methods are primarily based on off-the-shelf data
encryption technologies [3], [4], e.g., data encryption standard (DES), advanced encryption standard (AES) [5], etc. However, those
approaches are shown to be low in efficiency and anti-attack capabilities [4], [6]. To increase encryption efficacy, other advanced
methods have been introduced in literature. Examples of the developed and utilized methods include the one-time keys methods (e.g.
[7]), bit-level permutation techniques (e.g., [8]), and deoxyribonucleic acid (DNA) rule-based schemes (e.g., [9]_[12]). However, one-
time keys-based methods do not have additional input parameters to control the encryption process other than the plain image and the
input key, which limits wide applicability range Additional attractive characteristics include initial value dependency, unpredictability,
pseudo randomness, and periodicity. Those characteristics make chaotic systems more desirable as they have great encryption potentials
similar to ideal cryptosystems [16]. Since the introduction of chaotic system by Lorenz in [22], various chaotic-
•based research have been developed to meet the demand for effective, secure, and storage/ transmission of digital data.
Schemes for both grayscale and color images have been introduced in different applications with the ultimate goal of high
robustness and reduced security breach
•risks. Earlier chaos-based encryption schemes employ only a single-level security by employing a single chaotic map, i.e.,
one-dimensional (1D) systems. Despite their realistic reliability and straightforward deployment, they have limited control
parameters, and suffer from the lack of restricted chaotic ranges and vulnerability to attacks [23]. For more efficient
encryption, variant of high dimensional schemes have been proposed in literature with excellent chaotic features and more
complexity and unpredictability due to the higher number of controlling variables [16]. A review of the recent literature-
related work will be provided in the next section
1.2 OBJECTIVE
•The data security, each of which has its advantages, disadvantage, and application domain. Time complexity,
dynamical behavior, computational overhead, robustness to attacks, and security are the main criteria used for
evaluation and choice. Since in the IoHS patients data are stored on the cloud to be accessible at different
facilities, its security. The work presented in this paper proposes an improved encryption algorithm that can
be applied and utilized in a secure e-healthcare system for the security of medical data. The main objective is
to develop a user-friendly data encryption scheme with low residual consistency, key sensitivity, and good
quality of the data retrieved.

.
1.3 SCOPE
•The scope of project is security review indicate that the proposed encrypt digital images with high
protection and a good ability to withstand a variety of attacks. Moreover, dynamic analysis and sample
entropy algorithm show that the proposed is hyperchaotic overall with high complexity and high sensitivity.
1.4 Existing System:

 Color-based encryption has been the area of extensive research in recent years. For example, an image encryption algorithm for color images
based on the recent.
 It achieved a desired effect after two rounds by an exclusive OR (XOR) avalanche operation. Another color-based encryption algorithm that
uses a hyper chaotic system and blocks permutation.
 The an encryption system for color image based on the Lorenz system and DNA permutation. It used chaotic pseudo-random sequences
depending on plain text images and secret keys..

1.4.1 Existing System Disadvantages:


No Security authentication.
Attackers have accessing directly.
It cannot detect the attackers.
1.5 LITERATURE SURVEY:

•TITLE : Hybrid optimization with cryptography encryption for medical image security in Internet of Things.
•AUTHOR : M. Elhoseny, K. Shankar, S. Lakshmanaprabu, A. Maseleno, and N. Arunkumar
•YEAR :2021
•DESCRIPTION :

•The development of the Internet of Things (IoT) is predicted to change the healthcare industry and might lead to the
rise of the Internet of Medical Things. The IoT revolution is surpassing the present-day human services with
promising mechanical, financial, and social prospects. This paper investigated the security of medical images in IoT
by utilizing an innovative cryptographic model with optimization strategies. For the most part, the patient data are
stored as a cloud server in the hospital due to which the security is vital. So another framework is required for the
secure transmission and effective storage of medical images interleaved with patient information. For increasing the
security level of encryption and decryption process, the optimal key will be chosen using hybrid swarm optimization,
i.e., grasshopper optimization and particle swarm optimization in elliptic curve cryptography. In view of this method,
the medical images are secured in IoT framework. From this execution, the results are compared and contrasted,
whereas a diverse encryption algorithm with its optimization methods from the literature is identified with the most

extreme peak signal-to-noise ratio values, i.e., 59.45 dB and structural similarity index as 1 .
• TITLE : Digital image encryption based on advanced encryption standard (AES),
•AUTHOR : Q. Zhang and Q. Ding
•YEAR : 2020

•DESCRIPTION :

•With the rapid development of network and communication technology, digital image communication has become
an important way of information transmission. Therefore, much more attention has been paid to the development of
the digital image encryption technology. In this paper, we propose a digital image encryption technology based on
AES algorithm, and the algorithm implementation in MATLAB. Then, we perform digital image processing, obtain
the date that can use the AES encryption algorithm, combine both approaches. Then, the digital image can be
encrypted, and the algorithm is realized in MATLAB simulation. Through the comparison of the histogram analysis
and the analysis of the key, the result has showed that the method can better realize the effect of encryption and
decryption
•TITLE : Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm
SHA-1
•AUTHOR : N. B. Slimane, K. Bouallegue, and M. Machhout
•YEAR : 2020

•DESCRIPTION :

•Security of multimedia data becomes an obligation, due the increasing use in smart embedded systems and other
domains such as medical industrial and engineering applications. In this paper, we propose a fast, secure and light
weight scheme for digital image encryption based on nested chaotic attractors using the Secure Hash Algorithm
SHA-1 using only two-diffusion process. The results of security analysis such as statistical tests, differential attacks,
key space, key sensitivity, entropy information and the running time are illustrated and compared to recent

encryption schemes where the highest security level and speed are improved. .
•TITLE : Cryptanalysis of an image encryption algorithm based on DNA encoding
•AUTHOR : A. Akhavan, A. Samsudin, and A. Akhshani
•YEAR : 2020
•DESCRIPTION :

•Recently an image encryption algorithm based on DNA encoding and the Elliptic Curve Cryptography (ECC) is
proposed. This paper aims to investigate the security the DNA-based image encryption algorithm and its resistance
against chosen plaintext attack. The results of the analysis demonstrate that security of the algorithm mainly relies on one
static shuffling step, with a simple confusion operation. In this study, a practical plain image recovery method is
proposed, and it is shown that the images encrypted with the same key could easily be recovered using the suggested
cryptanalysis method with as low as two chosen plain images. Also, a strategy to improve the security of the algorithm is
presented in this paper.
•TITLE : chaotic based encryption/decryption framework for secure multimedia communications

•AUTHOR : I. Yasser, M. A. Mohamed, A. S. Samra, and F. Khalifa

•YEAR : 2019

•DESCRIPTION :

•Chaos-based encryption has shown an increasingly important and dominant role in modern multimedia cryptography
compared with traditional algorithms. This work proposes novel chaotic-based multimedia encryption schemes utilizing
2D alteration models for high secure data transmission. A novel perturbation-based data encryption for both confusion
and diffusion rounds is proposed. Our chaotification structure is hybrid, in which multiple maps are combined combines
for media encryption. Blended chaotic maps are used to generate the control parameters for the permutation (shuffling)
and diffusion (substitution) structures. The proposed schemes not only maintain great encryption quality reproduced by
chaotic, but also possess other advantages, including key sensitivity and low residual clarity. Extensive security and
differential analyses documented that the proposed schemes are efficient for secure multimedia transmission as well as
the encrypted media possesses resistance to attacks. Additionally, statistical evaluations using well-known metrics for
specific media types, show that proposed encryption schemes can acquire low residual intelligibility with excessive nice
recovered statistics. Finally, the advantages of the proposed schemes have been highlighted by comparing it against
different state-of-the-art algorithms from literature. The comparative performance results documented that our schemes

are extra efficacious than their data-specific counterpart methods. .


•TITLE : A novel image encryption/decryption scheme based on integrating multiple chaotic
•map

•AUTHOR : B. Yousif, F. Khalifa, A. Makram, and A. Takieldeen

•YEAR : 2020

•DESCRIPTION :

•In this paper, a novel framework is presented for chaotic image encryption. The proposed method is based on integrating
multiple chaotic maps (e.g., logistic, tent, quadratic, cubic, and Bernoulli) to generate more robust chaotic maps in order to
increase the security and privacy needed by applying variable keys. The latter are generated by computing the sine square
logistic map and are then applied to generate the chaotic maps employed in our framework. For this, we have performed
many experiments to achieve the best period for each chaotic map in which it performed the best encryption. Here, we
combine multiple chaotic maps to get a new map. This selection was done with the lowest value for the correlation factor
because the smaller value of correlation has an impression of good encryption. We have also noted a clear difference in the
influence of one of these maps on some pictures from the others. We chose one of those maps according to the correlation
value for each encoding process and compared them. Then, we used a chaotic map of the best of these values for encryption
and decryption. Numerical results on various gray images showed the robustness of the proposed method to encrypt and
decrypt the images based on the evaluation using different performance analyses. We compared our methods against other
well-known approaches, e.g., circular mapping, S-boxes, and S-box with Arnold transform. Our pipeline outperforms those
methods. Moreover, our results documented that the proposed scheme has an excellent security level with very low
1.6 Proposed System
 The proposed system incorporates other input parameters besides the plain image and the secret key, to
permit controlling the encrypted data values without affecting the secret keys.
 Therefore, the suggested algorithm breaks the limitation of those based on keys scheme.
 Moreover, our algorithm can encrypt many images securely and speedily using the key.

 Experimental results and security review indicate that the proposed could encrypt digital images with
high protection and a good ability
1.6.1 PROPOSED SYSTEM ADVANTAGE
 Stronger authentication
 We can given a strong security while sharing a image data.
 The overall performance can be improved ,
CHAPTER 2
PROJECT DESCRIPTION

• The proposed encryption/decryption pipeline has been implemented using the novel maps and its
evaluation has been conducted on two phases. In the first phase, diverse medical MRI and CT scans (e.g.,
brain, lung, kidney) were used. Secondly, for the purpose of evaluating the robustness of our pipeline against
other (SOTA) literature techniques we use the benchmark color and greyscale images .

2.2 METHODOLOGIES
2.2.1 MODULES NAME:
•1. User Interface Design

•2. Medical Cloud Server

•3. Medical Image Manager

•4. Healthcare Provider

•5.Patient
1) User Interface Design
In this module we design the windows for the project. These windows are used for secure login for all users. To connect with server
user must give their username and password then only they can able to connect the server. If the user already exits directly can login
into the server else user must register their details such as username, password and Email id, into the server. Server will create the
account for the entire user to maintain upload and download rate. Name will be set as user id. Logging in is usually used to enter a
specific page.
Home Page

Server

User Login
Database

Register
&Login Page
2. Medical Cloud Server

This is the first module medical cloud server has a register with all details and login. The medical cloud server has a get a
medical image manager request. It will have a choice whether it has approve or reject.Afterwords it have a accepted users
details. Medical cloud server has a patient data but it will shows a encrypt image.

Medical Cloud Login


server

Medical Image Accepted Users User Data


Manager
Requests

Data Base
3. Medical Image Manager

This is the Second module of this project. In this module medical image manager has a register with all details and login
with a user id and password. Medical image manger has a upload a image. Medical image manager has a sending a key to
the health care provider. Medical image manger has a key to sharing for health provider
Register

Medical Image
Manager Login

Upload Image Sending Key Key’s

Data Base
4. Healthcare Provider

This is the third module of this project. Healthcare provider has a register with a all details and login. Health care provider
has a search a image. Healthcare provider has a key response and send to the patient.

.
Healthcare Register
Provider

Login

Search Image
Key
Response

Data Base
5. Patient

This is the fourth module of this project. Patient has a register with a details and login. Patient has a keys received from the
healthcare provider. Then the patient has a get a original report.

.
Patient Register
.

Login

Patient Key’s My Report

Data Base
GIVEN INPUT EXPECTED OUTPUT:

 User Interface Design

Input : Enter Login name and Password

Output : If valid user name and password then directly open the home page otherwise show error message and
redirect to the registration page.

 Medical Cloud Server

Input : Medical Cloud Server has a Login name and Password

Output: If valid user name and password then directly open the medical cloud server home page otherwise show error
message and redirect to the medical cloud server login page.

 Medical Image Manager


Input : Enter the medical image manager has a name and password

Output : If valid medical image manager id and password then directly open the the medical image manager home
page otherwise show error message and redirect to the medical image manager login page.
 Healthcare Provider

Input : Enter the Health care provider name and password

Output: If valid Health care provider id and password then directly open the Health care provider home page otherwise
show error message and redirect to the Health care provider login page.
 Patient

Input : Enter the Patient name and password

Output: If valid Patient id and password then directly open the Patient home page otherwise show error message and
redirect to Patient login page.
TECHNIQUE USED OR ALGORITHM USED
2.4.1 Proposed Algorithm
 AES Based cipher text image
We propose a novel chaos-based image encryption/ decryption scheme. The core of the proposed algorithm employs an
image process, where the pixels of a given image I to be encrypted are divided into one portions (Is, s _ 2). Since we
introduce two novel key maps, we choose s D 2, such that each image half is encoded using one of the proposed. Generally
any number of splits can be used and different (or a combinations) can be used for encoding different image portions. The
idea behind such process is that individual image portions/splits convey no valuable information, while in the same time an
adequate set Is will, at least partially, help to regenerate I . Although being an effective approach, the recovered image may
suffer poor quality due to contrast and colors loss. To partially overcome such limitation, a new and fast scheme is proposed
utilizing novel chaotic keys that have the advantage of less error chance in encryption/ decryption stages, thus can maintain
the quality of the recovered image
2.4.2 EXISTING SYSTEM
•Step-Wise Grey-Scale Image Encryption Scheme
A step-by-step demonstration of the encryption/decryption processes using a chest CT scan . The various processing steps
for the application of both encryption stage to obtain the encrypted data . Decryption steps are carried out for splitting the
diffused encrypted image; inverting diffusion process for each half using the same keys; inverting the permutation using the
similar keys used in encryption process; combing the two halves of the decrypted image to attain the original image. This
can only be achieved by using the right secret keys the data has a leaks. We cannot control the attackers. Image has splits
the data and keys will cannot detects the attacker. Attacker has directly accessing a image sharing
CHAPTER 3
REQUIREMENTS ENGINEERING
3.1 GENERAL

In this paper, we present an attribute-based storage system with secure deduplication in a hybrid cloud setting, where a private cloud is
responsible for duplicate detection and a public cloud manages thestorage. Compared with the prior data deduplication systems, our
system has two advantages.

3.2 HARDWARE REQUIREMENTS


The hardware requirements may serve as the basis for a contract for the implementation of the system and should therefore be a
complete and consistent specification of the whole system. They are used by software engineers as the starting point for the system
design. It shouls what the system do and not how it should be implemented.
HARDWARE REQUIREMENTS

•PROCESSOR : DUAL CORE 2 DUOS.

•RAM : 2GB DD RAM

•HARD DISK : 250 GB


SOFTWARE REQUIREMENTS

The software requirements document is the specification of the system. It should include both a definition and a
specification of requirements. It is a set of what the system should do rather than how it should do it. The software requirements
provide a basis for creating the software requirements specification. It is useful in estimating cost, planning team activities, performing
tasks and tracking the teams and tracking the team’s progress throughout the development activity.

Front End : J2EE (JSP, SERVLET)


Back End : MY SQL 5.5 or MS SQL Server
Operating System : Windows 7
IDE : IDE
3.4 FUNCTIONAL REQUIREMENTS
A functional requirement defines a function of a software-system or its component. A function is described as a set of inputs, the
behaviour, Firstly, the system is the first that achieves the standard notion of semantic security for data confidentiality in attribute-based
deduplication systems by resorting to the hybrid cloud architecture.
3.5 NON-FUNCTIONAL REQUIREMENTS
EFFICIENCY
Our multi-modal event tracking and evolution framework is suitable for multimedia documents from various social media platforms,
which can not only effectively capture their multi-modal topics, but also obtain the evolutionary trends of social events and generate
effective event summary details over time. Our proposed mmETM model can exploit the multi-modal property of social event, which can
effectively model social media documents including long text with related images and learn the correlations between textual and visual
modalities to separate the visual-representative topics and non-visual-representative topics.
CHAPTER 4
DESIGN ENGINEERING
4.1 GENERAL
Design Engineering deals with the various UML [Unified Modelling language] diagrams for the implementation of project.
Design is a meaningful engineering representation of a thing that is to be built. Software design is a process through which the
requirements are translated into representation of the software. Design is the place where quality is rendered in software engineering.
Design is the means to accurately translate customer requirements into finished product.
Uml Diagrams
Use Case Diagram

Login

H.Register

Medical Image Manager Request

Medical Cloud H..Login


Server

Accepted Users
Search
HealthcCare
Provider

Key Response
User Data

Database

M.Register P.Register

P.Login
M.Login
Patient

Patient Key's
Medical Image
Upload Image
Manager

My Report
Sendiing Key

Key's
Class Diagram

Medical Image Manager Healthcare Provider


Medical Cloud Server
register register
login
login login
medicalimagemangerrequests()
uploadimage() search()
acceptedusers()
sendingkey() keyresponse()
userdata()
keys()

Database
cloudserver Patient
imagemanager
register
healthprovider
login
patient
patientkeys()
responsekeys()
myreport()
usersdata()
sendkeys()
Object Diagram

Medical Image Manager

Healthcare Provider
Medical Cloud Server

Database Patient
Sequence Diagram

Medical Image Medical Cloud Health Care Patient Database


Manger Server Provider

Register

Register

Login

Login

Login

Register

Patient Keys

Accepted User

Login

My Report

Upload Image

Search

User Data

Sending Keys

Key Response

Keys
Collaboration Diagram

Medical Cloud
4: Login
Server
13: User Data

11: Upload Image


2: Register
5: Login
Database
16: Keys

Medical Image
Manger

1: Register
3: Login
7: Patient Keys
10: My Report

6: Register
9: Login
14: Sending Keys 12: Search
15: Key Response

8: Accepted User

Patient

Health Care
Provider
Component Diagram:

Medical Image Login


Accepted Medical
Users Requests Cloud server

User Data Medical Image Register M.Login Upload Image Sending Key
Manager

P.Register Patient Key Search HealthCare Keys


Response Provider

P.Login Patient Keys Database


My Report
Deployment Diagram

Medical Image
Medical Cloud
Manager
Server

Healthcare
Provider

Login

Database
Patient
State Diagram

Database

Medical Cloud Server Medical Image Manager Healthcare Provider Patient

Medical Image Manager Request Upload Image


Search Patient Keys

Accepted Users Sending Key

Key Response
My Report

Keys
User Data

Database
Activity Diagram

Database

Register

Login

Medical Cloud Server


Medical Image Manager Healthcare Provider Patient

Medical Image Requests


Upload Image
Patient Keys
Search
Accepted Users
Sending Key

My Report
User Data Key Response
Keys

Database
Data Flow Diagram

Level 0

Register

Login Data base

Verify
Home Page Detail Error page
s
Medical Image Manager
Level 1 Requests
Medical Cloud
Server Accepted Users

User Data
Login
Database

Upload Image

Medical Image Sending Key


Manager
Key’s
Register

Login

Patient Keys
Search Image
HealthCare Provider
My Report
Key Response

Register
Login
Patient

Register Login
System Architecture
E-R Diagram User id Password

Medical Cloud Server Login

Medical Image Manager User Data


Request
Accepted Users

User Id Password
Data base
Verify
Medical Image Login
Manager Details

Upload Image Sending Key Keys

User Id Password
User Id Password

Patient
Healthcare Provider Login

Search
Key Response Patient Keys My Report
CHAPTER 5
DEVELOPMENT TOOLS
5.1 GENERAL
This chapter is about the software language and the tools used in the development of the project. The platform used here
is JAVA. The Primary languages are JAVA,J2EE and J2ME. In this project J2EE is chosen for implementation
5.2 FEATURES OF JAVA
5.2.1 THE JAVA FRAMEWORK
Java is a programming language originally developed by James Gosling at Microsystems and released in 1995 as a core
component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++ but has a simpler object
model and fewer low-level facilities. Java applications are typically compiled to byte code that can run on any Java Virtual Machine
(JVM) regardless of computer architecture. Java is general-purpose, concurrent, class-based, and object-oriented, and is specifically
designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run
anywhere". Java is considered by many as one of the most influential programming languages of the 20th century, and is widely used
from application software to web applications the java framework is a new platform independent that simplifies application development
internet. Java technology's versatility, efficiency, platform portability, and security make it the ideal technology for network computing.
From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere!
5.2.2 OBJECTIVES OF JAVA
To see places of Java in Action in our daily life, explore java.com.
Why Software Developers Choose Java
Java has been tested, refined, extended, and proven by a dedicated community. And numbering more than 6.5 million developers, it's the
largest and most active on the planet. With its versatility, efficiency, and portability, Java has become invaluable to developers by enabling
them to:
•Write software on one platform and run it on virtually any other platform
•Create programs to run within a Web browser and Web services
•Develop server-side applications for online forums, stores, polls, HTML forms processing, and more
•Combine applications or services using the Java language to create highly customized applications or services
•Write powerful and efficient applications for mobile phones, remote processors, low-cost consumer products, and practically any other
device with a digital heartbeat
Some Ways Software Developers Learn Java
Today, many colleges and universities offer courses in programming for the Java platform. In addition, developers can also enhance their
Java programming skills by reading Sun's java.sun.com Web site, subscribing to Java technology-focused newsletters, using the Java
Tutorial and the New to Java Programming Center, and signing up for Web, virtual, or instructor-led courses.
To be an Object Oriented language, any language must follow at least the four characteristics.
1. Inheritance :It is the process of creating the new classes and using the behavior of the existing classes by extending them just to
reuse the existing code and adding addition a features as needed.
2. Encapsulation: It is the mechanism of combining the information and providing the abstraction.
3. Polymorphism: As the name suggest one name multiple form, Polymorphism is the way of providing the different functionality by the
functions having the same name based on the signatures of the methods.
4. Dynamic binding: Sometimes we don't have the knowledge of objects about their specific types while writing our code. It is the way
of providing the maximum functionality to a program about the specific type at runtime.
5.2.3 JAVA SWING OVERVIEW
Abstract Window Toolkit (AWT) is cross-platform
Swing provides many controls and widgets to build user interfaces with. Swing class names typically begin with a J such as JButton,
JList, JFrame. This is mainly to differentiate them from their AWT counterparts and in general is one-to-one replacements. Swing is built
on the concept of Lightweight components vs AWT and SWT's concept of Heavyweight components. The difference between the two is
that the Lightweight components are rendered (drawn) using purely Java code, such as drawLine and drawImage, whereas Heavyweight
components use the native operating system to render the components.
Some components in Swing are actually heavyweight components. The top-level classes and any derived from them are heavyweight as
they extend the AWT versions. This is needed because at the root of the UI, the parent windows need to be provided by the OS. These
top-level classes include JWindow, JFrame, JDialog and JApplet. All Swing components to be rendered to the screen must be able to
trace their way to a root window of one of those classes.
Note: It generally it is not a good idea to mix heavyweight components with lightweight components (other than as previously
mentioned) as you will encounter layering issues, e.g., a lightweight component that should appear "on top" ends up being obscured by
a heavyweight component. The few exceptions to this include using heavyweight components as the root pane and for popup windows.
Generally speaking, heavyweight components will render on top of lightweight components and will not be consistent with the look
and feel being used in Swing. There are exceptions, but that is an advanced topic. The truly adventurous may want to consider reading
this article from Sun on mixing heavyweight and lightweight components
5.2.4 Evolution of Collection Framework:
Almost all collections in Java are derived from the java.util.Collection interface. Collection defines the basic parts of all collections.
The interface states the add() and remove() methods for adding to and removing from a collection respectively. Also required is the
toArray() method, which converts the collection into a simple array of all the elements in the collection. Finally, the contains() method
checks if a specified element is in the collection. The Collection interface is a subinterface of java.util.Iterable, so the iterator()
method is also provided. All collections have an iterator that goes through all of the elements in the collection. Additionally, Collection
is a generic. Any collection can be written to store any class. For example, Collection<String> can hold strings, and the elements from
the collection can be used as strings without any casting required.
There are three main types of collections:
•Lists: always ordered, may contain duplicates and can be handled the same way as usual arrays
•Sets: cannot contain duplicates and provide random access to their elements
•Maps: connect unique keys with values, provide random access to its keys and may host duplicate values
LIST
Lists are implemented in the JCF via the java.util.List interface. It defines a list as essentially a more flexible version of
an array. Elements have a specific order, and duplicate elements are allowed. Elements can be placed in a specific
position. They can also be searched for within the list. Two concrete classes implement List. The first
is java.util.ArrayList, which implements the list as an array. Whenever functions specific to a list are required, the class
moves the elements around within the array in order to do it. The other implementation is java.util.LinkedList. This
class stores the elements in nodes that each have a pointer to the previous and next nodes in the list. The list can be
traversed by following the pointers, and elements can be added or removed simply by changing the pointers around to
place the node in its proper place.
SET:
Java's java.util.Set interface defines the set. A set can't have any duplicate elements in it. Additionally, the set has no set order. As
such, elements can't be found by index. Set is implemented by java.util.HashSet,java.util.LinkedHashSet, and java.util.TreeSet.
HashSet uses a hash table. More specifically, it uses a java.util.HashMap to store the hashes and elements and to prevent duplicates.
Java.util.LinkedHashSet extends this by creating a doubly linked list that links all of the elements by their insertion order. This
ensures that the iteration order over the set is predictable. java.util.TreeSet uses a red-black tree implemented by a java.util.TreeMap.
The red-black tree makes sure that there are no duplicates. Additionally, it allows Tree Set to implement java.util.SortedSet.
The java.util.Set interface is extended by the java.util.SortedSet interface. Unlike a regular set, the elements in a sorted set are sorted,
either by the element's compareTo() method, or a method provided to the constructor of the sorted set. The first and last elements of
the sorted set can be retrieved, and subsets can be created via minimum and maximum values, as well as beginning or ending at the
beginning or ending of the sorted set. The SortedSet interface is implemented by java.util.TreeSet
MAP:
Maps are defined by the java.util.Map interface in Java. Maps are simple data structures that associate a key with a value. The
element is the value. This lets the map be very flexible. If the key is the hash code of the element, the map is essentially a set. If
it's just an increasing number, it becomes a list. Maps are implemented by java.util.HashMap, java.util.LinkedHashMap,
and java.util.TreeMap. HashMap uses a hash table. The hashes of the keys are used to find the values in various buckets.
LinkedHashMap extends this by creating a doubly linked list between the elements. This allows the elements to be accessed in
the order in which they were inserted into the map. TreeMap, in contrast to HashMap and LinkedHashMap, uses a red-black
tree. The keys are used as the values for the nodes in the tree, and the nodes point to the values in the map
Thread:
Simply put, a thread is a program's path of execution. Most programs written today run as a single thread, causing problems when
multiple events or actions need to occur at the same time. Let's say, for example, a program is not capable of drawing pictures while
reading keystrokes. The program must give its full attention to the keyboard input lacking the ability to handle more than one event
at a time. The ideal solution to this problem is the seamless execution of two or more sections of a program at the same time.

Creating threads
Java's creators have graciously designed two ways of creating threads: implementing an interface and extending a class. Extending
a class is the way Java inherits methods and variables from a parent class. In this case, one can only extend or inherit from a single
parent class. This limitation within Java can be overcome by implementing interfaces, which is the most common way to create
threads. (Note that the act of inheriting merely allows the class to be run as a thread. It is up to the class to start() execution, etc.)
Interfaces provide a way for programmers to lay the groundwork of a class. They are used to design the requirements for a set of
classes to implement. The interface sets everything up, and the class or classes that implement the interface do all the work. The
different set of classes that implement the interface have to follow the same rules.
5.5 Conclusion
Swing's high level of flexibility is reflected in its inherent ability to override the native host operating system (OS)'s GUI
controls for displaying itself. Swing "paints" its controls using the Java 2D APIs, rather than calling a native user
interface toolkit. The Java thread scheduler is very simple. All threads have a priority value which can be changed
dynamically by calls to the threads setPriority() method . Implementing the above concepts in our project to do the
efficient work among the Server.
CHAPTER 6
SAMPLE SOURCE CODE

CODING:

1.ImageBeanClass
ImageBeanClass
package com.beans;
import java.util.Map;
public class ImageBean {
private Map<String, Integer> map=null;
public Map<String, Integer> getMap() {
return map;}
public void setMap(Map<String, Integer> map) {
this.map = map;
}

}
2.UserBean
package com.beans;
public class UserBean {
private String dcnames,cname,pass,email,home,gender,usertype;
private int uid;
public String getDcnames() {
return dcnames;
}
public void setDcnames(String dcnames) {
this.dcnames = dcnames;
}
public String getCname() {
return cname;
}
public void setCname(String cname) {
this.cname = cname;
}
public String getPass() {
return pass;
}
public void setPass(String pass) {
this.pass = pass;
}
public String getEmail() {
return email;
}
public void setEmail(String email) {
this.email = email;
}
public String getHome() {
return home;
}
public void setHome(String home) {
this.home = home;
}
public String getGender() {
return gender;
}
public void setGender(String city) {
this.gender = city;
}
public int getUid() {
return uid;
}
public void setCid(int cid) {
this.uid = cid;
}
public String getUsertype() {
return usertype;
}
public void setUsertype(String usertype) {
this.usertype = usertype;
}
public void setUid(int uid) {
this.uid = uid;
}
}
3.Image Encryption.java

package com.Controller;

import java.io.File;

import java.io.FileInputStream;

import java.io.FileNotFoundException;

import java.io.FileOutputStream;

import java.io.IOException;

import java.io.InputStream;

import java.security.Key;

import java.security.NoSuchAlgorithmException;

import java.sql.Connection;

import java.sql.DriverManager;

import java.sql.PreparedStatement;

import java.sql.SQLException;

import javax.crypto.Cipher;
import javax.crypto.Cipher;

import javax.crypto.KeyGenerator;

public class ImageEncrypt {

public static byte[] getFile() {

File f = new File("D:/LavanN/workspace/vtjns07/WebContent/img1.jpg");

InputStream is = null;

try {

is = new FileInputStream(f);

} catch (FileNotFoundException e2) {

// TODO Auto-generated catch block

e2.printStackTrace();

byte[] content = null;

try {

content = new byte[is.available()];


// TODO Auto-generated catch block

e1.printStackTrace();

try {

is.read(content);

} catch (IOException e) {

// TODO Auto-generated catch block

e.printStackTrace();

return content;

}
public static byte[] encryptPdfFile(Key key, byte[] content) {

Cipher cipher;

byte[] encrypted = null;

try {

cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");

cipher.init(Cipher.ENCRYPT_MODE, key);
encrypted = cipher.doFinal(content);

} catch (Exception e) {

e.printStackTrace();

return encrypted;

public static byte[] decryptPdfFile(Key key, byte[] textCryp) {

Cipher cipher;

byte[] decrypted = null;

try {

cipher = Cipher.getInstance("AES/ECB/PKCS5Padding");

cipher.init(Cipher.DECRYPT_MODE, key);

decrypted = cipher.doFinal(textCryp);
} catch (Exception e) {
/ e.printStackTrace();

return decrypted;

}public static Connection connect()

Connection con = null;

try{

Class.forName("com.mysql.jdbc.Driver");

con=DriverManager.getConnection("jdbc:mysql://localhost:3306/vtjns07","root","root");

return con;

}catch(ClassNotFoundException e)

{e.printStackTrace();

return con;

}catch (SQLException e) {

// TODO: handle exception

e.printStackTrace();

return con;
} public static void saveFile(byte[] bytes) throws IOException {

FileOutputStream fos = new FileOutputStream("temp.jpg");

fos.write(bytes);

fos.close();

public static void main(String args[])

throws NoSuchAlgorithmException, InstantiationException, IllegalAccessException, IOException {

KeyGenerator keyGenerator = KeyGenerator.getInstance("AES");

keyGenerator.init(128);

Key key = keyGenerator.generateKey();

System.out.println(key);

byte[] keybit=key.getEncoded();

byte[] content = getFile();

System.out.println(content);

byte[] encrypted = encryptPdfFile(key, content);


System.out.println(encrypted);

byte[] decrypted = decryptPdfFile(key, encrypted);

System.out.println(decrypted);

Connection con=connect();

try {

PreparedStatement p=con.prepareStatement("insert into storeimg values(0,?,?)");

p.setBytes(1,keybit);

p.setBytes(2,encrypted);

System.out.println(p.executeUpdate());

} catch (SQLException e) {

// TODO Auto-generated catch block

e.printStackTrace();

}
4.Upload.java

package com.servlets;

import java.awt.Font;

import java.awt.Graphics;

import java.awt.image.BufferedImage;

import java.io.ByteArrayOutputStream;

import java.io.File;

import java.io.FileInputStream;

import java.io.FileOutputStream;

import java.io.IOException;

import java.io.InputStream;

import java.security.Key;

import java.security.NoSuchAlgorithmException;

import java.sql.Connection;

import java.sql.PreparedStatement;

import java.sql.ResultSet;

import java.sql.SQLException;

import javax.crypto.KeyGenerator;
import javax.imageio.ImageIO;

import javax.servlet.ServletException;

import javax.servlet.annotation.MultipartConfig;

import javax.servlet.annotation.WebServlet;

import javax.servlet.http.HttpServlet;

import javax.servlet.http.HttpServletRequest;

import javax.servlet.http.HttpServletResponse;

import javax.servlet.http.HttpSession;

import javax.servlet.http.Part;

import javax.swing.ImageIcon;

import com.Controller.DBConnect;

import com.Controller.ImageEncrypt;

/**

* Servlet implementation class FileUpload

*/

@WebServlet("/Uploadphoto")

@MultipartConfig(maxFileSize = 16177215)

public class Uploadphoto extends HttpServlet {

private static final long serialVersionUID = 1L;

private static final int BUFFER_SIZE = 4096;


private static final int BUFFER_SIZE = 4096;

protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException {

Connection conn = null;

InputStream inputStream = null;

String filename,ioid = null,ioname = null;

double pog=0,pop=0,pos = 0,tot=0;

File file = null;

Part filePart = request.getPart("file");

filename=request.getParameter("iname");

String rid=request.getParameter("rid");

String ides=request.getParameter("ides");

try {

if (filePart != null)

System.out.println(filePart.getName());

System.out.println(filePart.getSize());

System.out.println(filePart.getContentType());

filename=filename+".jpg";

file=new File(filename);
HttpSession sc=request.getSession();

String email=(String)sc.getAttribute("email");

System.out.println(email);

inputStream = filePart.getInputStream();

//ByteArrayOutputStream bs = new ByteArrayOutputStream();

FileOutputStream bs=new FileOutputStream(file);

int bytesRead = -1;

byte[] buffer = new byte[BUFFER_SIZE];

while ((bytesRead = inputStream.read(buffer)) != -1)

bs.write(buffer, 0, bytesRead);

System.out.println((int)file.length());

ResultSet r;
r = DBConnect.getUser(email);

if(r.next())

ioid=r.getString(1);

ioname=r.getString(2);

ByteArrayOutputStream bs1 = new ByteArrayOutputStream();

BufferedImage
bufferedImage = new BufferedImage(icon.getIconWidth(), icon.getIconHeight(), BufferedImage.TYPE_INT_RGB);

// create graphics object and add original image to it

Graphics graphics = bufferedImage.getGraphics();

graphics.drawImage(icon.getImage(), 0, 0, null);

// set font for the watermark text

graphics.setFont(new Font("Arial", Font.BOLD, 30));

//unicode characters for (c) is \u00a9

String watermark = email;

// add the watermark text

graphics.drawString(watermark, 0, icon.getIconHeight() / 2);


File newFile = new File("D:/abc.jpg");

try {

ImageIO.write(bufferedImage, "jpg", newFile);

byte[] buffer1 = new


byte[BUFFER_SIZE];

while ((bytesRead1 = inputStream1.read(buffer1)) != -1)

bs1.write(buffer1, 0, bytesRead1);

System.out.println(newFile.getPath() + " created successfully!");

}catch(Exception e)

e.printStackTrace();

KeyGenerator keyGenerator;

keyGenerator = KeyGenerator.getInstance("AES");

keyGenerator.init(128);

Key key = keyGenerator.generateKey();


statement.setInt(1, 0);

statement.setString(2, filename);

statement.setString(3, ides);

statement.setString(4,rid);

statement.setBytes(5,keybit);

statement.setString(6, ioid);

statement.setString(7, ioname);

statement.setString(8, email);

statement.setBytes(9, encrypted);

statement.setString(10,k);

int row = statement.executeUpdate();

tot=pos+pog+pop;

if (row > 0)

response .sendRedirect("success.jsp?msg=photo
Uploaded successfully&&to=ManagerUserhome.jsp");

try {

conn.close(); }
5.Index.jsp
<!DOCTYPE html>
<!--
Template Name: Yeinydd
Author: <a href="https://www.os-templates.com/">OS Templates</a>
Author URI: https://www.os-templates.com/
Copyright: OS-Templates.com
Licence: Free to use under our free template licence terms
Licence URI: https://www.os-templates.com/template-terms
-->
<html lang="">
<!-- To declare your language - read more here: https://www.w3.org/International/questions/qa-html-language-declarations -->
<head>
<title>VTNS07</title>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no">
<link href="layout/styles/layout.css" rel="stylesheet" type="text/css" media="all">
</head>
<body id="top">
<!-- Top Background Image Wrapper -->
<div class="bgded overlay" style="background-image:url('medical-wallpaper-HD5.jpg');height: 100vh;">
<div class="wrapper row1">
<h1 class="hoc clear"><a href="#">A Robust Chaos-Based Technique for Medical Image Encryption</a></h1>
<header id="header" class="hoc clear">
<div id="logo" class="fl_left">
</div>
<nav id="mainav" class="fl_right">
<ul class="clear">
<li class="active"><a href="index.html">Home</a></li>
<li class="active"><a href="MedicalCloud.jsp">Medical Cloud Server</a></li>
<li class="active"><a href="MedicalimageManager.jsp">Medical Image Manager</a></li>
<li class="active"><a href="HealthcareReg.jsp">Healthcare Provider</a></li>
<li class="active"><a href="PatientReg.jsp">Patient</a></li>

<br><br>

</ul>
</nav>
</header>
</div>
</div>
<!-- JAVASCRIPTS -->
<script src="layout/scripts/jquery.min.js"></script>
<script src="layout/scripts/jquery.backtotop.js"></script>
<script src="layout/scripts/jquery.mobilemenu.js"></script>
</body>
</html>
CHAPTER 7
SNAPSHOTS
General:

This project is implements like web application using COREJAVA and the Server process is maintained using
the SOCKET & SERVERSOCKET and the Design part is played by Cascading Style Sheet.

Fig 7.2.1 Index Page


CHAPTER 8
SOFTWARE TESTING

8.1 GENERAL
The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or
weakness in a work product. It provides a way to check the functionality of components, sub assemblies, assemblies and/or a finished
product It is the process of exercising software with the intent of ensuring that the Software system meets its requirements and user
expectations and does not fail in an unacceptable manner. There are various types of test. Each test type addresses a specific testing
requirement.

8.2 DEVELOPING METHODOLOGIES


The test process is initiated by developing a comprehensive plan to test the general functionality and special features on
a variety of platform combinations. Strict quality control procedures are used. The process verifies that the application meets the
requirements specified in the system requirements document and is bug free. The following are the considerations used to develop the
framework from developing the testing methodologies.
Sl. No Test scenario User action Expected result Actual Result Remarks

1. Registration Users registering into Register into the system. Successfully alert registered Pass
the system. message.

2. Login 1. Entered correct 1. Log into the system. 1. Successfully logged in. Pass
password. 2. Alert generated. 2. Successfully generated the
alert.

3. Medical Cloud Search File, Gets the Massages sending data Successfully generated the Successful
Server requests from medical user alert is generated. alert and massages sending
cloud server

4. Medical Image Upload a Files and send Medical image manager Successfully generated the Successful
Manager request for health care has to actions alert to image manager
message

5. Healthcare Provider Healthcare provider has Massages Alert is Successfully generated the Successful
a search image and key generated alert for healthcare massages
response
8.3.3 System Test
System testing ensures that the entire integrated software system meets requirements. It tests a configuration to ensure
known and predictable results. An example of system testing is the configuration oriented system integration test. System testing is
based on process descriptions and flows, emphasizing pre-driven process links and integration points.

8.3.4 Performance Test


The Performance test ensures that the output be produced within the time limits, and the time taken by the system for
compiling, giving response to the users and request being send to the system for to retrieve the results.

8.3.5 Integration Testing


Software integration testing is the incremental integration testing of two or more integrated software components on a
single platform to produce failures caused by interface defects.
The task of the integration test is to check that components or software applications, e.g. components in a software
system or – one step up – software applications at the company level – interact without error.
8.3.6 Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant participation by the end user. It also ensures
that the system meets the functional requirements.

Acceptance testing for Data Synchronization:


•The Acknowledgements will be received by the Sender Node after the Packets are received by the Destination Node
•The Route add operation is done only when there is a Route request in need
•The Status of Nodes information is done automatically in the Cache Updating process

8.3.7 Build the test plan


Any project can be divided into units that can be further performed for detailed processing. Then a testing strategy for each of
this unit is carried out. Unit testing helps to identity the possible bugs in the individual component, so the component that has bugs
can be identified and can be rectified from errors.
Chapter -9
9.1 CONCLUSION

This paper has introduced a novel and robust medical image encryption scheme that can integrated in cloud-based
internet-of-heath systems (IoHS). The proposed pipeline introduced two novel chaotic maps, which demonstrated
strong and effective chaotic behaviours, unpredictability, and extreme sensitive to initial seeds. Dynamic analysis
and validation using bifurcation diagram and showed that the proposed maps are hyperchaotic overall with high
complexity and high sensitivity. Moreover, the proposed pipeline scheme (1) consists of a two-run confusion-
diffusion architecture, and (2) incorporates other input parameters besides the plain image and the secret key
unlike those encryption algorithms based on one-time keys. The latter has the advantage that it permits controlling
the encrypted data values without affecting the secret keys. Thus, our system breaks the limitation of those based
on one-time keys and possess multiple advantage, including improved encryption quality, performance, and
robustness; and also secure and speed encryption of many images using the same key. This has been documented
using various experiments and various test medical images. Additional companion with state-of-theart encryption
scheme using benchmark images (both color and greyscale) highlighted the high effectiveness and robustness of
the proposed scheme to prevent many existing cryptography attacks and cryptanalysis techniques. It is worth
mentioning that the proposed pipeline is general and can be applied for any multimedia encryption application,
Future Enhancement

In the future enhancement in our project has a medical image manager has a takes a permission with a medical cloud
server. Medical cloud server has a accept the request then only image manager has a upload a image and share with the
patient. Key sensitivity is another important analysis procedure that evaluates the characteristics of chaotic coding.
Ideally, cipher images should be very sensitive to slight changes in their secret keys.
9.2 REFERENCES
[1] M. Elhoseny, K. Shankar, S. Lakshmanaprabu, A. Maseleno, and N. Arunkumar, ``Hybrid optimization with cryptography encryption
for medical image security in Internet of Things,'' Neural Comput. Appl., vol. 32, pp. 10979_10993, 2018.
[2] S. Madhu and M. A. Hussain, ``Securing medical images by image encryption using key image,'' Int. J. Comput. Appl., vol. 104, no. 3,
pp. 30_34, Oct. 2014.
[3] J. Li and H. Liu, ``Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map,'' IET
Inf. Secur., vol. 7, no. 4, pp. 265_270, Dec. 2013.
[4] Q. Zhang and Q. Ding, ``Digital image encryption based on advanced encryption standard (AES),'' in Proc. 5th Int. Conf. Instrum.
Meas., Com- put., Commun. Control (IMCCC), Sep. 2015, pp. 1218_1221.
[5] J. Daemen and V. Rijmen, The Design of Rijndael: AES_The Advanced Encryption Standard. Springer-Verlag, 2002, p. 238, doi:
10.1007/978-3- 662-04722-4.
[6] N. B. Slimane, K. Bouallegue, and M. Machhout, ``Nested chaotic image encryption scheme using two-diffusion process and the secure
hash algorithm SHA-1,'' in Proc. 4th Int. Conf. Control Eng. Inf. Technol. (CEIT), Dec. 2016, pp. 1_5.
[7] X. Wu, K. Wang, X. Wang, H. Kan, and J. Kurths, ``Color image DNA encryption using NCA map-based CML and one-time keys,''
Signal Process., vol. 148, pp. 272_287, Jul. 2018.
[8] L. Xu, Z. Li, J. Li, and W. Hua, ``A novel bit-level image encryption algorithm based on chaotic maps,'' Opt. Lasers Eng., vol. 78, pp.
17_25, Mar. 2016.
[9] A. Akhavan, A. Samsudin, and A. Akhshani, ``Cryptanalysis of an image encryption algorithm based on DNA encoding,'' Opt. Laser
Technol., vol. 95, pp. 94_99, Oct. 2017.
[10] Y. Dou, X. Liu, H. Fan, and M. Li, ``Cryptanalysis of a DNA and chaos based image encryption algorithm,'' Optik, vol. 145, pp.
456_464, Sep. 2017.
[11] S. K. Pujari, G. Bhattacharjee, and S. Bhoi, ``A hybridized model for image encryption through genetic algorithm and DNA
sequence,'' Proc. Comput. Sci., vol. 125, pp. 165_171, Dec. 2018.
[12] H. M. Waseem, S. S. Jamal, I. Hussain, and M. Khan, ``A novel hybrid secure con_dentiality mechanism for medical environment based
on Kramer's spin principle,'' Int. J. Theor. Phys., vol. 60, no. 1, pp. 314_330, 2021.
[13] H. Liu, A. Kadir, and X. Sun, ``Chaos-based fast colour image encryption scheme with true random number keys from environmental
noise,'' IET Image Process., vol. 11, no. 5, pp. 324_332, 2017.
[14] S. Tariq, M. Khan, A. Algha_s, and M. Amin, ``A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key
generation,'' Multimedia Tools Appl., vol. 79, no. 31, pp. 23507_23529, 2020.
[15] U. A. Waqas, M. Khan, and S. I. Batool, ``A new watermarking scheme based on Daubechies wavelet and chaotic map for quick
response code images,'' Multimedia Tools Appl., vol. 79, nos. 9_10, pp. 6891_6914, Mar. 2020.
[16] I. Yasser, M. A. Mohamed, A. S. Samra, and F. Khalifa, ``A chaoticbased encryption/decryption framework for secure multimedia
communications,'' Entropy, vol. 22, no. 11, p. 1253, Nov. 2020.
[17] A. Algha_s, N. Munir, and M. Khan, ``An encryption scheme based on chaotic Rabinovich_Fabrikant system and s8 confusion
component,'' Multimedia Tools Appl., vol. 80, no. 5, pp. 7967_7985, Feb. 2021.
[18] A. Algha_s, H. M. Waseem, M. Khan, S. S. Jamal, M. Amin, and S. I. Batool, ``A novel digital contents privacy scheme based on
quantum harmonic oscillator and Schrodinger paradox,'' Wireless Netw., pp. 1_20, May 2020, doi: 10.1007/S11276-020-02363-7.
[19] S. Tariq, A. Elmoasry, S. I. Batool, and M. Khan, ``Quantum harmonic oscillator and Schrodinger paradox based nonlinear confusion
component,'' Int. J. Theor. Phys., vol. 59, no. 11, pp. 3558_3573, Nov. 2020.
[20] B. Yousif, F. Khalifa, A. Makram, and A. Takieldeen, ``A novel image encryption/decryption scheme based on integrating multiple
chaotic maps,'' AIP Adv., vol. 10, no. 7, Jul. 2020, Art. no. 075220.
[21] M. Boussif, N. Aloui, and A. Cherif, ``Smartphone application for medical images secured exchange based on encryption using the
matrix product and the exclusive addition,'' IET Image Process., vol. 11, no. 11, pp. 1020_1026, Nov. 2017.

You might also like