Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs

被引:56
作者
Alexan, Wassim [1 ]
Alexan, Nader [2 ]
Gabr, Mohamed [2 ]
机构
[1] German Univ Cairo, Fac Informat Engn & Technol, Commun Dept, Cairo 11835, Egypt
[2] German Univ Cairo, Fac Media Engn & Technol, Comp Sci Dept, Cairo 11835, Egypt
关键词
chaotic maps; cellular automata; cryptography; image encryption; Intel's MKL; Mersenne Twister; OpenSSL; S-box; CHAOTIC SYSTEM; S-BOX; DESIGN;
D O I
10.3390/fractalfract7040287
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Image encryption is increasingly becoming an important area of research in information security and network communications as digital images are widely used in various applications and are vulnerable to various types of attacks. In this research work, a color image cryptosystem that is based on multiple layers is proposed. For every layer, an encryption key and an S-box are generated and utilized. These are based on a four-dimensional (4D) dynamical Chen system of a fractional-order, the Mersenne Twister, OpenSLL, Rule 30 Cellular Automata and Intel's MKL. The sequential application of Shannon's ideas of diffusion and confusion three times guarantees a total distortion of any input plain image, thereby, resulting in a totally encrypted one. Apart from the excellent and comparable performance to other state-of-the-art algorithms, showcasing resistance to visual, statistical, entropy, differential, known plaintext and brute-force attacks, the proposed image cryptosystem provides an exceptionally superior performance in two aspects: a vast key space of 2(1658) and an average encryption rate of 3.34 Mbps. Furthermore, the proposed image cryptosystem is shown to successfully pass all the tests of the NIST SP 800 suite.
引用
收藏
页数:40
相关论文
共 90 条
[1]   Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario [J].
Abd El-Latif, Ahmed A. ;
Abd-El-Atty, Bassem ;
Mazurczyk, Wojciech ;
Fung, Carol ;
Venegas-Andraca, Salvador E. .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (01) :118-131
[2]   A generalized framework for elliptic curves based PRNG and its utilization in image encryption [J].
AbdElHaleem, Sherif H. ;
Abd-El-Hafiz, Salwa K. ;
Radwan, Ahmed G. .
SCIENTIFIC REPORTS, 2022, 12 (01)
[3]   Design of a strong S-box based on a matrix approach [J].
Aboytes-Gonzalez, J. A. ;
Murguia, J. S. ;
Mejia-Carlos, M. ;
Gonzalez-Aguilar, H. ;
Ramirez-Torres, M. T. .
NONLINEAR DYNAMICS, 2018, 94 (03) :2003-2012
[4]  
Adam N., 2019, P 2019 2 INT C COMPU, P1
[5]  
Alexan Wassim, 2021, 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), P77, DOI 10.1109/NICS54270.2021.9701533
[6]  
Alexan Wassim, 2021, 2021 International Conference on Microelectronics (ICM), P29, DOI 10.1109/ICM52667.2021.9664947
[7]  
Alexan W., 2022, P 2022 INT TELECOMMU, P1, DOI [10.1109/ITC-Egypt55520.2022.9855678, DOI 10.1109/ITC-EGYPT55520.2022.9855678]
[8]  
Alexan W., 2021, P 2021 8 NAFOSTED C, P177
[9]   Color Image Encryption Through Chaos and KAA Map [J].
Alexan, Wassim ;
Elkandoz, Marwa ;
Mashaly, Maggie ;
Azab, Eman ;
Aboshousha, Amr .
IEEE ACCESS, 2023, 11 :11541-11554
[10]   RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System [J].
Alexan, Wassim ;
ElBeltagy, Mohamed ;
Aboshousha, Amr .
SYMMETRY-BASEL, 2022, 14 (03)