Image Encryption Using Dynamic Image as a Key Based on Multilayers of Chaotic Permutation

被引:10
|
作者
Jirjees, Seerwan W. [1 ]
Alkalid, Farah F. [1 ]
Shareef, Waleed F. [1 ]
机构
[1] Univ Technol Iraq, Control & Syst Engn Dept, Baghdad 10066, Iraq
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 02期
关键词
image encryption; pixel shuffling; entropy; chaotic permutation; symmetric key; ALGORITHM;
D O I
10.3390/sym15020409
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
With the rapid expansion of electronic data transmission, unauthorized data access is growing. Information security against unwanted access is becoming increasingly essential in data storage and data transfer. Images are a common type of information that is used in almost every aspect of life, so the security of image data against unwanted access is critical. In this article, we propose an encryption technique that uses a symmetric encryption method based on XOR operation between the plain image and another image that will be used as a key agreed upon by both the sender and recipient. To ensure the security of the plain images, the scheme performs pixel permutation procedures dynamically using random numbers on the key image and plain image in each encryption process, which renders the encryption algorithm strong and brute-force resistant. Simulation results on several standard images showed a random distribution of pixel values and a higher pass rate correlated with entropy and ideal values for analysis parameters. Thus, through the use of randomization, the proposed algorithm is resistant to various attacks and offers promising security measurements while maintaining efficient and fast execution.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations
    Xu, Shujiang
    Wang, Yinglong
    Wang, Jizhi
    Tian, Min
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 994 - 998
  • [42] Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure
    Li, Ming
    Guo, Yuzhu
    Huang, Jie
    Li, Yang
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 62 : 164 - 172
  • [43] Chaotic image encryption method based on improved zigzag permutation and DNA rules
    Xingyuan Wang
    Xiaohui Du
    Multimedia Tools and Applications, 2022, 81 : 43777 - 43803
  • [44] A novel chaotic image encryption with FSV based global bit-level chaotic permutation
    Yongjin Xian
    Xingyuan Wang
    Yingqian Zhang
    Xiaopeng Yan
    Ziyu Leng
    Multimedia Tools and Applications, 2023, 82 : 407 - 426
  • [45] Chaotic image encryption method based on improved zigzag permutation and DNA rules
    Wang, Xingyuan
    Du, Xiaohui
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (30) : 43777 - 43803
  • [46] A novel chaotic image encryption with FSV based global bit-level chaotic permutation
    Xian, Yongjin
    Wang, Xingyuan
    Zhang, Yingqian
    Yan, Xiaopeng
    Leng, Ziyu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (01) : 407 - 426
  • [47] Proposing a novel Dynamic AES for image encryption using a chaotic map key management approach
    Shariatzadeh, Mahdi
    Rostami, Mohammad Javad
    Eftekhari, Mahdi
    OPTIK, 2021, 246
  • [48] A chaotic image encryption algorithm based on random dynamic mixing
    Wang, Xingyuan
    Chen, Shengnan
    Zhang, Yingqian
    OPTICS AND LASER TECHNOLOGY, 2021, 138
  • [49] A NOVEL CHAOTIC IMAGE ENCRYPTION SCHEME BASED ON MAGIC CUBE PERMUTATION AND DYNAMIC LOOK-UP TABLE
    Wang, Xingyuan
    Yang, Lei
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2012, 26 (29):
  • [50] A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding
    Suryanto, Yohan
    Suryadi
    Ramli, Kalamullah
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16831 - 16854