Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption

被引:0
作者
Al Duhayyim M. [1 ]
Alrayes F.S. [2 ]
Alotaibi S.S. [3 ]
Alazwari S. [4 ]
Allheeib N. [5 ]
Yafoz A. [6 ]
Alsini R. [6 ]
Aziz A.S.A. [7 ]
机构
[1] Department of Computer Science, College of Sciences and Humanities-Aflaj, Prince Sattam Bin Abdulaziz University
[2] Department of Information Systems, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh
[3] Department of Information Systems, College of Computing and Information System, Umm Al-Qura University
[4] Department of Information Technology, College of Computers and Information Technology, Taif University, Taif P.O. Box 11099, Taif
[5] Department of Information Systems-College of Computer and Information Sciences, King Saud University, Riyadh
[6] Department of Information Systems, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah
[7] Department of Digital Media, Faculty of Computers and Information Technology, Future University in Egypt, New Cairo
来源
Computer Systems Science and Engineering | 2023年 / 46卷 / 03期
关键词
image encryption; internet of things; optimal key generation; Remote sensing; security;
D O I
10.32604/csse.2023.034185
中图分类号
学科分类号
摘要
The Internet of Things (IoT) offers a new era of connectivity, which goes beyond laptops and smart connected devices for connected vehicles, smart homes, smart cities, and connected healthcare. The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications, the content security of remote-sensing images attracted much attention in academia and industry. Image encryption is important for securing remote sensing images in the IoT environment. Recently, researchers have introduced plenty of algorithms for encrypting images. This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption (ISCACE-RSI) technique in IoT Environment. The proposed model follows a three-stage process, namely pre-processing, encryption, and optimal key generation. The remote sensing images were preprocessed at the initial stage to enhance the image quality. Next, the ISCACERSI technique exploits the double-layer remote sensing image encryption (DLRSIE) algorithm for encrypting the images. The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid (DNA) Strand Displacement (DNASD) approach. The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images. Then, the study presents three DNASD-related encryption rules based on the variety of DNASD, and those rules are applied for encrypting the images at the DNA sequence level. For an optimal key generation of the DLRSIE technique, the ISCA is applied with an objective function of the maximization of peak signal to noise ratio (PSNR). To examine the performance of the ISCACE-RSI model, a detailed set of simulations were conducted. The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:3109 / 3223
页数:114
相关论文
共 50 条
  • [21] Image Encryption using an Image Pattern based on Advanced Encryption Standard
    Ruelas Quenaya, Merisabel
    Villa-Herrera, Alejandro-Antonio
    Chambi Ytusaca, Samuel Felipe
    Yauri Ituccayasi, Julio Enrique
    Velazco-Paredes, Yuber
    Flores-Quispe, Roxana
    2021 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2021,
  • [22] Enhanced Image Encryption Using Two Chaotic Maps
    Salman, Fatimah Abdulnabi
    Salman, Khitam Abdulnabi
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2020, 14 (02) : 134 - 148
  • [23] Image encryption based on a combination of multiple chaotic maps
    Elkandoz, Marwa Tarek
    Alexan, Wassim
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25497 - 25518
  • [24] A Chaotic Image Encryption Algorithm Based on Information Entropy
    Ye, Guodong
    Pan, Chen
    Huang, Xiaoling
    Zhao, Zhenyu
    He, Jianqing
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 28 (01):
  • [25] Adaptive image encryption based on twin chaotic maps
    Lyle, Munazah
    Sarosh, Parsa
    Parah, Shabir A.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (06) : 8179 - 8198
  • [26] Image encryption using block cipher and chaotic sequences
    Artiles, Jose A. P.
    Chaves, Daniel P. B.
    Pimentel, Cecilio
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 79 : 24 - 31
  • [27] Adaptive image encryption based on twin chaotic maps
    Munazah Lyle
    Parsa Sarosh
    Shabir A. Parah
    Multimedia Tools and Applications, 2022, 81 : 8179 - 8198
  • [28] Improved Homomorphic Encryption with Optimal Key Generation Technique for VANETs
    Tamilarasi, G.
    Gandhi, K. Rajiv
    Palanisamy, V
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (02) : 1273 - 1288
  • [29] Integrating Encryption and Marking for Remote Sensing Image Based on Orthogonal Decomposition
    Jiang, Li
    Niu, Tianye
    Xu, Zhengquan
    Xu, Yanyan
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2015, 8 (05) : 2232 - 2239
  • [30] A Colour Byte Scrambling Technique for Efficient Image Encryption Based on Combined Chaotic Map Image Encryption Using Combined Chaotic Map
    Parvees, M. Y. Mohamed
    Samath, J. Abdul
    Raj, I. Kaspar
    Bose, B. Parameswaran
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1067 - 1072