Asian Journal of Scientific Research1992-14542077-2076Asian Network for Scientific Information10.3923/ajsr.2015.359.366PraveenkumarPadmapriya PriyangaG.U. ThenmozhiK. RayappanJ.B.B. AmirtharajanR. 3201583The intellectual growth of computer communication lead to drastic improvement in wireless technology and shrunken the world into palms of the user which paved the path for the security attack issues. The development of the security system became the ultimate. Popular technique widely used in present scenario that provides a better security to secret information is image encryption. Multiple encryption technique has been adopted in this study. The secret image is block shuffled and then chaotic maps such as baker map, skew tent map and Arnold cat map are used to encrypt the image. Further the image is encrypted using Cipher Block Chaining (CBC) to contribute the final encrypted image. Metrics such as horizontal, vertical, diagonal correlation, Number of Changing Pixel Rate (NPCR) and entropy were calculated for various Digital Imaging and Communication in Medicine (DICOM) test images and the performance of the algorithm was analyzed.]]>Aarthie, N. and R. Amirtharajan,20147123135Amirtharajan, R., P. Archana and J.B.B. Rayappan,20135341351Mahmood, A., R. Dony and S. Areibi,20132013pp: 16Mahmood, A.B. and R.D. Dony,20132013pp: 3943Dong, C., J. Li, M. Huang and Y. Bai,20122012pp: 119124Naeem, E.A., M.M. Abd Elnaby, N.F. Soliman, A.M. Abbas and O.S. Faragallah et al.,201497118127Chen, J.X., Z.L. Zhu, C. Fu, H. Yu and L.B. Zhang,201567191204Chen, J.X., Z.L. Zhu, C. Fu, L.B. Zhang and Y. Zhang,201423294310Korrai, P.K., M.N.S. Swamy and K.D. Rao,20122012pp: 242246Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan,20146207215Praveenkumar, P., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan,20147136144Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan,20141416891700Praveenkumar, P., R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi and R. Amirtharajan,2014Zoning→ encryption.]]>6368378Praveenkumar, P., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan,201569562572Patidar, V., N.K. Pareek, G. Purohit and K.K. Sud,201128443314339Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan,20146223236Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan,20146308324Rajagopalan, S., H.N. Upadhyay, J.B.B. Rayappan and R. Amirtharajan,20146291307Zhang, S., T. Gao and L. Gao,20142014Veena, V.K., G.J. Lal, S.V. Prabhu, S.S. Kumar and K.P. Soman,20122012pp: 105108Tong, X.J., Z. Wang, Y. Liu, M. Zhang and L. Xu,201522120133Dai, Y. and X. Wang,20122012pp: 210214Tang, Z., X. Zhang and W. Lan,20142014Liu, Z., M. Gong, Y. Dou, F. Liu and S. Lin et al.,201250248255