A GRU and chaos-based novel image encryption approach for transport images

被引:19
|
作者
Kumar, Atul [1 ]
Dua, Mohit [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Image encryption; GRU; Sine-cosine map; Chaos; ALGORITHM; CRYPTANALYSIS; SYSTEM; MAP; PERMUTATION;
D O I
10.1007/s11042-022-13902-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An Intelligent Transport System (ITS) uses smart devices to capture the traffic data in the form of images. However, the adversary can steal and misuse this traffic information. Hence, it becomes essential to have an efficient encryption strategy to save data from various types of attacks. This paper proposes a novel encryption algorithm that uses the Gated Recurrent Unit (GRU) and Sine-Cosine chaotic map to encrypt transport images. The encryption scheme is divided into three phases. In the first phase, two intermediate keys and the seed value required for creating chaotic sequence are generated using unique combinations of 128-bit share key and 128-bit initial vector. In the second phase, permutation is performed using one of the intermediate keys and the chaotic sequence generated by the novel Sine-Cosine chaotic map. The final phase performs the diffusion process using the other intermediate key and GRU approach that uses the chaotic sequence generated by the Sine-Cosine map. The performance of the proposed encryption approach is analyzed using various standard encryption metrics, attacks and decryption parameters. The obtained results and comparative results with existing approaches reveal that the proposed method is suitable for implementing secure and efficient transport image cryptosystems.
引用
收藏
页码:18381 / 18408
页数:28
相关论文
共 50 条
  • [31] Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption
    Preishuber, Mario
    Huetter, Thomas
    Katzenbeisser, Stefan
    Uhl, Andreas
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) : 2137 - 2150
  • [32] Weaknesses in Security Considerations Related to Chaos-Based Image Encryption
    Huetter, Thomas
    Preishuber, Mario
    Haemmerle-Uhl, Jutta
    Uhl, Andreas
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 278 - 291
  • [33] Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption
    El-Latif, Ahmed A. Abd
    Abd-El-Atty, Bassem
    Belazi, Akram
    Iliyasu, Abdullah M.
    ELECTRONICS, 2021, 10 (12)
  • [34] A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers
    Silva Garcia, Victor Manuel
    Gonzalez Ramirez, Marlon David
    Flores Carapia, Rolando
    Vega-Alvarado, Eduardo
    Rodriguez Escobar, Eduardo
    IEEE ACCESS, 2019, 7 : 163729 - 163739
  • [35] SPRING: a novel parallel chaos-based image encryption scheme
    Wai-Kong Lee
    Raphael C.-W. Phan
    Wun-She Yap
    Bok-Min Goi
    Nonlinear Dynamics, 2018, 92 : 575 - 593
  • [36] Chaos-based model for encryption and decryption of digital images
    Elgendy, Fatma
    Sarhan, Amany M.
    Eltobely, Tarek E.
    El-Zoghdy, S. F.
    El-sayed, Hala S.
    Faragallah, Osama S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) : 11529 - 11553
  • [37] A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution
    Zhang, Xuanping
    Fan, Xing
    Wang, Jiayin
    Zhao, Zhongmeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (04) : 1745 - 1763
  • [38] A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation
    Li, Zhen
    Peng, Changgen
    Tan, Weijie
    Li, Liangrong
    SYMMETRY-BASEL, 2020, 12 (09):
  • [39] A new chaos-based fast image encryption algorithm
    Wang, Yong
    Wong, Kwok-Wo
    Liao, Xiaofeng
    Chen, Guanrong
    APPLIED SOFT COMPUTING, 2011, 11 (01) : 514 - 522
  • [40] Security analysis of a chaos-based image encryption algorithm
    Lian, SG
    Sun, JS
    Wang, ZQ
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) : 645 - 661