Image encryption algorithm based on factorial decomposition

被引:7
作者
Alshaikh, Muath [1 ]
Alzaqebah, Malek [2 ,3 ]
Gmati, Nabil [2 ,3 ]
Alrefai, Nashat [2 ,3 ]
Alsmadi, Mutasem K. [4 ]
Almarashdeh, Ibrahim [4 ]
Mohammad, Rami Mustafa A. [5 ]
Alamri, Sultan [1 ]
Kara, Mostefa [6 ]
机构
[1] Saudi Elect Univ, Coll Comp & Informat, Dept Comp Sci, Riyadh 11673, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Sci, Dept Math, POB 1982, Dammam, Saudi Arabia
[3] Imam Abdulrahman Bin Faisal Univ, Basic & Appl Sci Res Ctr, POB 1982, Dammam 31441, Saudi Arabia
[4] Imam Abdulrahman Bin Faisal Univ, Coll Appl Studies & Community Serv, Dept Management Informat Syst, Dammam 34212, Saudi Arabia
[5] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Comp Informat Syst Dept, Dammam, Saudi Arabia
[6] Natl Higher Sch Math Sci & Technol Hub Sidi Abdell, POB 75, Algiers 16093, Algeria
关键词
Factorial decomposition; Permutation; Image encryption; Decryption; Security; PERMUTATION; COMPRESSION;
D O I
10.1007/s11042-023-17663-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure. The image is converted to a matrix, and then an encryption algorithm based on factorial decomposition permutation is applied. Two variants of the algorithm have been proposed in this study, where each variant is distinguished by the elements of the matrix to be permutated. The first variant is based on the permutation of the pixels of the image. In the second variant, the permutation is applied to both columns and rows of the matrix. These variants of the algorithm have been tested and compared. To create a permutation of a collection of elements, the factorial decomposition mathematical technique is applied, where the Euclidian division of a given key is obtained by adding the factorials of all the integers. The experimental results indicate that the proposed approach provides sufficient and optimistic results in terms of computational complexity, Keyspace analysis, Statistical analysis, and Sensitivity analysis attacks. The statistical analysis shows the superiority of the algorithm using two permutation methods, where sensitivity analysis indicates that the number of pixels changing rate (NPCR) achieved around 99.7 and the unified average changed intensity (UACI) is around 33.5, which showed better performance than the other approaches in the literature. Moreover, the proposed approach provided less computational complexity compared with the existing approaches.
引用
收藏
页码:88447 / 88467
页数:21
相关论文
共 48 条
[1]   CHAOTIC NEURAL NETWORKS [J].
AIHARA, K ;
TAKABE, T ;
TOYODA, M .
PHYSICS LETTERS A, 1990, 144 (6-7) :333-340
[2]   Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment [J].
Alanezi, Ahmad ;
Abd-El-Atty, Bassem ;
Kolivand, Hoshang ;
Abd El-Latif, Ahmed A. ;
Abd El-Rahiem, Basma ;
Sankar, Syam ;
Khalifa, Hany S. .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[3]   A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution [J].
Alghamdi, Yousef ;
Munir, Arslan ;
Ahmad, Jawad .
ENTROPY, 2022, 24 (10)
[4]  
Aqeel-Ur-Rehman X., 2018, OPTIK, V153, P117, DOI [10.1016/j.ijleo.2017.09.099, DOI 10.1016/j.ijleo.2017.09.099]
[5]   A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution [J].
Arif, Jameel ;
Khan, Muazzam A. ;
Ghaleb, Baraq ;
Ahmad, Jawad ;
Munir, Arslan ;
Rashid, Umer ;
Al-Dubai, Ahmed Y. .
IEEE ACCESS, 2022, 10 :12966-12982
[6]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[7]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[8]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[9]   Optical color image encryption based on Arnold transform and interference method [J].
Chen, W. ;
Quan, C. ;
Tay, C. J. .
OPTICS COMMUNICATIONS, 2009, 282 (18) :3680-3685
[10]   A Novel Color Image Encryption Algorithm Based on Hyperchaotic System and Permutation-Diffusion Architecture [J].
Cheng, Guangfeng ;
Wang, Chunhua ;
Chen, Hua .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (09)