The Journal of Engineering,
Journal Year:
2024,
Volume and Issue:
2024(12)
Published: Dec. 1, 2024
Abstract
This
research
introduces
an
innovative
algorithm
for
the
encryption
and
decryption
of
greyscale
digital
imaging
communications
in
medicine
images
utilizing
Laplace
transforms.
The
proposed
method
presents
a
ground
breaking
approach
to
image
encryption,
effectively
concealing
visual
information
ensuring
robust,
secure,
reliable
process.
By
leveraging
inherent
strengths
transform,
guarantees
complete
retrieval
original
without
any
loss,
provided
correct
key
is
used.
To
thoroughly
evaluate
performance
algorithm,
multiple
tests
were
conducted,
including
extensive
statistical
analyses
assessments
quality.
Key
metrics
carefully
measured,
correlation
coefficients
entropy
values,
which
ranged
from
7.89
7.99.
Additionally,
algorithm's
effectiveness
was
demonstrated
through
peak
signal‐to‐noise
ratio
spanned
7.597
9.915,
indicating
degree
similarity
between
encrypted
images.
Furthermore,
number
pixels
change
rate
ranging
99.519241
99.609375,
highlighted
ability
produce
significantly
different
original.
unified
average
changing
intensity
falling
35.72345678
35.78233456,
further
underscored
proficiency
altering
pixel
intensities
uniformly.
Overall,
this
offers
significant
advancement
field
combining
theoretical
robustness
with
practical
efficiency.
Security and Privacy,
Journal Year:
2025,
Volume and Issue:
8(2)
Published: Feb. 5, 2025
ABSTRACT
With
the
rapid
advancements
in
artificial
intelligence
(AI),
ensuring
privacy
and
security
of
patient
medical
images
has
emerged
as
a
pressing
concern
field
image
protection.
Traditional
encryption
methods,
however,
have
often
been
criticized
for
their
lack
flexibility
insufficient
measures.
To
address
these
challenges,
proposed
new
algorithm
that
uses
R3
(rotate,
rescale,
randomize)
Model
to
apply
concepts
chaotic
hyperchaotic
systems
approaches.
Based
on
behavior
circle
map
system
unpredictable
Chua
system,
performs
scaling,
rotation,
randomization
target
image.
Basically,
input
is
scaled
rotated
using
minimize
association
between
neighboring
pixels.
create
an
encrypted
image,
permuted
next
subjected
diffusion
operation
with
assistance
S‐box.
By
sensitivity
beginning
conditions,
technique
huge
key
space
2
5208
created,
improving
overall
fortifying
its
resistance
brute‐force
attacks.
The
speed
at
which
processes
data
minimal
number
resources
it
consumes
demonstrate
effectiveness,
making
appropriate
real‐time
applications.
evaluate
computational
efficiency
suggested
series
grayscale
photographs
were
extensive
testing.
In
addition
having
large
about
,
also
showed
differential
cryptanalysis,
NPCR
UACI
values
above
99.60%
30.20%,
respectively.
images'
entropy
was
close
eight,
suggesting
improved
security.
ideal
applications,
speeds
0.80
s
512
×
0.6
256
images.
scheme's
capacity
provide
strong
little
computing
overhead
complexity
demonstrated
by
experimental
results.