Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance

被引:2
作者
Winarno, Edy [1 ]
Hadikurniawati, Wiwien [1 ]
Nugroho, Kristiawan [1 ]
Lusiana, Veronica [1 ]
机构
[1] Univ Stikubank, Fac Informat Technol & Ind, Semarang 50241, Central Java, Indonesia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Encryption; Cryptography; Bifurcation; Polynomials; Mathematical models; Hash functions; Resistance; Chaos; Image encryption; Feistel network; chaotic encryption; image cryptosystem; cryptography; ALGORITHM;
D O I
10.1109/ACCESS.2024.3436558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key's security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research's Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security.
引用
收藏
页码:106720 / 106734
页数:15
相关论文
共 50 条
[21]   An image encryption process based on Chaotic logistic map [J].
Mandal, Mrinal Kanti ;
Banik, Gourab Dutta ;
Chattopadhyay, Debasish ;
Nandi, Debashis .
IETE TECHNICAL REVIEW, 2012, 29 (05) :395-404
[22]   A fast image encryption algorithm based on chaotic map [J].
Liu, Wenhao ;
Sun, Kehui ;
Zhu, Congxu .
OPTICS AND LASERS IN ENGINEERING, 2016, 84 :26-36
[23]   A novel chaotic map-based encryption scheme for surveillance videos [J].
Dhingra, Deepti ;
Dua, Mohit .
PHYSICA SCRIPTA, 2023, 98 (12)
[24]   A fast image encryption algorithm based on chaotic map and lookup table [J].
Pingguang Cheng ;
Huaqian Yang ;
Pengcheng Wei ;
Wei Zhang .
Nonlinear Dynamics, 2015, 79 :2121-2131
[25]   A fast image encryption algorithm based on chaotic map and lookup table [J].
Cheng, Pingguang ;
Yang, Huaqian ;
Wei, Pengcheng ;
Zhang, Wei .
NONLINEAR DYNAMICS, 2015, 79 (03) :2121-2131
[26]   IMAGE ENCRYPTION BASED ON CHAOTIC MAP AND REVERSIBLE INTEGER WAVELET TRANSFORM [J].
Wei, Xiaopeng ;
Wang, Bin ;
Zhang, Qiang ;
Che, Chao .
JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2014, 65 (02) :90-96
[27]   Genetic algorithm for attack of image encryption scheme based chaotic map [J].
Mekhaznia, Tahar ;
Zidani, Abdelmadjid .
2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
[28]   An innovative image encryption scheme based on chaotic map and Vigenere scheme [J].
Bansal, Ritesh ;
Gupta, Shailender ;
Sharma, Gaurav .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) :16529-16562
[29]   A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm [J].
Anandkumar, R. ;
Kalpana, R. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (8) :3713-3727
[30]   A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm [J].
R. Anandkumar ;
R. Kalpana .
Journal of Ambient Intelligence and Humanized Computing, 2022, 13 :3713-3727