VisCrypt: Image Encryption Featuring Novel Chaotic Key Generation and Block Permutation Techniques with Visual Cryptography

被引:0
作者
Khan, Muhammad Shahbaz [1 ]
Ahmad, Jawad [1 ]
Ali, Muhammad [2 ]
Al Dubai, Ahmed [1 ]
Pitropakis, Nikolaos [1 ]
Buchanan, William J. [1 ]
机构
[1] Edinburgh Napier Univ, Sch Comp Engn & Built Environm, Edinburgh, Midlothian, Scotland
[2] HITEC Univ, Dept Elect Engn, Taxila, Pakistan
来源
2024 IEEE 7TH INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES, SIGNAL AND IMAGE PROCESSING, ATSIP 2024 | 2024年
关键词
Image encryption; confusion; diffusion; permutation; chaos; cryptography;
D O I
10.1109/ATSIP62566.2024.10639041
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this digital era, ensuring the security of data transmission is critically important. Digital data, especially image data, needs to be secured against unauthorized access. In this regards, this paper presents a robust image encryption scheme named as VisCrypt. VisCrypt introduces a novel key generation and block permutation technique with visual cryptography to effectively encrypt the input images. The proposed scheme utilizes a diffusion-confusion image encryption architecture. The diffusion phase consists of novel key generation and block permutation techniques. The proposed key generation module utilizes hyper-chaotic maps with nonlinear dynamical behavior to generate random sequences that undergo spiral permutations to generate complex and unpredictable keys. Moreover, in the novel block permutation technique the image is decomposed into four equal-size blocks where each block is permuted using the generated permutation keys. Furthermore, in the confusion phase, a modified dynamic substitution process is applied on the permuted images and after substitution, the final encrypted images in visually concealed to add extra layer of security. Extensive security analysis validates the effectiveness of proposed scheme by exhibiting ideal results for information entropy, correlation, homogeneity, contrast, and energy.
引用
收藏
页码:376 / 381
页数:6
相关论文
共 14 条
[1]  
Abikoye O. C., 2012, Efficient data hiding system using cryptography and steganography
[2]   A secure image encryption scheme based on chaotic maps and affine transformation [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13951-13976
[3]  
Ahmad Jawad., 2010, computing, V23, P25
[4]   RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System [J].
Alexan, Wassim ;
ElBeltagy, Mohamed ;
Aboshousha, Amr .
SYMMETRY-BASEL, 2022, 14 (03)
[5]   CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption [J].
Ali, Hassan ;
Khan, Muhammad Shahbaz ;
Driss, Maha ;
Ahmad, Jawad ;
Buchanan, William J. ;
Pitropakis, Nikolaos .
2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
[6]   Logistic map as a random number generator [J].
Andrecut, M .
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 1998, 12 (09) :921-930
[7]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[8]  
Khan Muhammad Shahbaz, 2023, 2023 International Conference on Engineering and Emerging Technologies (ICEET), P1, DOI 10.1109/ICEET60227.2023.10525758
[9]  
Khan MS, 2023, Arxiv, DOI arXiv:2311.02795
[10]  
Mazloom S., 2011, Proceedings 2011 IEEE Symposium on Computational Intelligence for Multimedia, Signal and Vision Processing (CIMSIVP 2011), P142, DOI 10.1109/CIMSIVP.2011.5949254