Highly secured and quickest image encryption algorithm based on trigonometric chaotic map and S-box

被引:3
作者
Chinram, Ronnason [1 ]
Bano, Mahwish [2 ]
Habib, Umair [2 ]
Singavananda, Pattarawan [3 ]
机构
[1] Prince Songkla Univ, Fac Sci, Div Computat Sci, Hat Yai 90110, Songkhla, Thailand
[2] Air Univ, Dept Math, Islamabad 44000, Pakistan
[3] Songkhla Rajabhat Univ, Fac Sci & Technol, Program Math, Songkhla 90000, Thailand
关键词
Encryption; Image encryption; S-box; Trigonometric chaotic map; XOR;
D O I
10.1007/s00500-023-08493-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The purpose of this research is to develop a highly secured non-breakable fastest cryptosystem. A significant number of image encryption plans have been proposed during the past years. By far, most such plans arrive at a high-security level; be that as it may, their moderate velocities due to their complex phenomenon make them of no utilization progressively applications. Motivated by this, we propose another proficient and quick image encryption plan subject to the trigonometric turbulent guide. In contrast with most current plans, we utilize this basic map to create just a couple of arbitrary rows and columns in the form of S-boxes. Besides, to, moreover, accelerate, we raise the handling unit from the pixel level to the line/segment level. Security of the new plan is acquired through a replacement stage organization, where we implemented around the shift of lines and segments to break the strong relation between adjoining pixels and non-repeating sequences. By then, we join the Exclusive-OR operation with modulo capacity to cover the pixel esteems and avoid any spilling of information. High-security tests and reenactment examinations have been done to display that the plan is extremely safe and particularly speedy for continuous picture preparation at 80 fps (frames per second). The present research has developed a cryptosystem based on Exclusive-OR with S-box (Substitution Box) and trigonometric chaotic map (TCM) of image matrices. High security is achieved due to the non-repeating sequence of the TCM. Earlier, the author has already presented the efficacy of the TCM combined with the S-Boxes.
引用
收藏
页码:11111 / 11123
页数:13
相关论文
共 24 条
  • [1] Abd-El-Hafiz SK., 2015, Applied Mathematics & Information Sciences, V9, P3215
  • [2] Abu-Amara F., 2013, WSEAS Transactions on Signal Processing, V9, P177
  • [3] Abu-Amara F., 2018, Jour of Adv Research in Dynamical Control Systems, V10, P230
  • [4] Secure Image Transmission Using Fractal and 2D-Chaotic Map
    Agarwal, Shafali
    [J]. JOURNAL OF IMAGING, 2018, 4 (01)
  • [5] Bano M., 2016, SCI INT, V28, P905
  • [6] Bano M., 2016, INDIAN J SCI TECHNOL, V9, P1
  • [7] Bano M., 2020, J MATH COMPUT SCI, V10, P2191
  • [8] Image reconstruction and text embedding using scan patterns with XOR in graph cut technique
    Bano, Mahwish
    Shah, Tariq
    Talat, Romana
    Shah, T. M.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 33 (02) : 1097 - 1104
  • [9] Chaotic Image Encryption Based on Running-Key Related to Plaintext
    Cao Guanghui
    Hu Kai
    Zhang Yizhi
    Zhou Jun
    Zhang Xing
    [J]. SCIENTIFIC WORLD JOURNAL, 2014,
  • [10] Efficient image encryption and compression based on a VAE generative model
    Duan, Xintao
    Liu, Jingjing
    Zhang, En
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2019, 16 (03) : 765 - 773