An efficient hybrid chaotic map-based encryption technique for multiple image security systems

被引:1
作者
Jaber, Mohanad J. [1 ]
Jaber, Zahraa Jasim [2 ]
Obaid, Ahmed J. [2 ]
机构
[1] Kufa Univ, Coll Dent, Dept Basic Sci, Najaf, Iraq
[2] Kufa Univ, Fac Comp Sci & Math, Dept Comp Sci, Najaf, Iraq
关键词
Encryption; Map-based; Image security; Chaotic map; DECRYPTION;
D O I
10.47974/JDMSC-1934
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Researchers are increasingly interested in image encryption in the modern technological era. Their goal is to improve the security of image data from unauthorized sources. Due to its randomness and unpredictable behavior, chaos theory is considered the most suitable method for encrypting images. An image encryption algorithm based on diffusion maps is presented in this paper. An element of nonlinearity is generated by modifying the pixel values with a chaotic map first. Three chaotic maps are used in the proposed image encryption scheme. In an efficient encryption algorithm based on the improved three chaotic maps, the permuted image is subjected to a diffusion process using the key from the original image. This scheme has the advantage of a large key space and is resistant to various attacks. Real-time applications are suitable for the proposed scheme because of their high-security level and low computational complexity.
引用
收藏
页码:1507 / 1522
页数:16
相关论文
共 31 条
[1]   Smartphone-based ECG signals encryption for transmission and analyzing via IoMTs [J].
Abdulbaqi, Azmi Shawkat ;
Obaid, Ahmed J. ;
Abdulameer, Maysaa Hameed .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (07) :1979-1988
[2]  
Fraser B., Phys Can. Spec. Issue Non-Linear Dynam, V57, P155
[3]  
Fridrich J, 1997, IEEE SYS MAN CYBERN, P1105, DOI 10.1109/ICSMC.1997.638097
[4]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[5]  
HABUTSU T, 1991, LECT NOTES COMPUT SC, V547, P127
[6]   FPGA Implementation of Improved Security Approach for Medical Image Encryption and Decryption [J].
Hafsa, Amal ;
Gafsi, Mohamed ;
Malek, Jihene ;
Machhout, Mohsen .
SCIENTIFIC PROGRAMMING, 2021, 2021
[7]  
Hussain N., 2020, Comparative Studied Based on Attack Resilient and Efficient Protocol with Intrusion Detection System Based on Deep Neural Network for Vehicular System Security, P217, DOI [10.1201/9781003038467-13, DOI 10.1201/9781003038467-13]
[8]  
Hussain N., 2022, Federated learning for IoT applications, P169
[9]   Chaos and cryptography: Block encryption ciphers based on chaotic maps [J].
Jakimoski, G ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2001, 48 (02) :163-169
[10]  
Kotulski Z, 1997, ANN PHYS-LEIPZIG, V6, P381, DOI 10.1002/andp.19975090504