Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and SHA-256 Hash Algorithm

被引:1
作者
Rahul, B. [1 ]
Kuppusamy, K. [1 ]
Senthilrajan, A. [1 ]
机构
[1] Alagappa Univ, Dept Computat Logist, Karaikkudi, India
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 03期
关键词
image encryption; Chaotic systems; encryption analysis; hash values; zig-zag traversal;
D O I
10.1080/19393555.2023.2230205
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a user-biometric-based image encryption using chaotic dynamical systems, SHA-256 hash function, and zigzag transformation. Three chaotic systems, namely, the Henon map, logistic map, and Lorenz system, are used to apply the chaotic properties to the encryption system. The hash value of the user biometric image is used to generate the initial value of the Henon map. The initial values for the logistic map and Lorenz system are generated from the hash value of the plain image. SHA-256 hash algorithm generates the hash values of the biometric and plain images. The plain image is scrambled using the two-dimensional chaotic values generated by the Henon map first. Next, the first scrambled image's pixels are XORed with the one-dimensional chaotic values generated from the logistic map and produce the second scrambled image. Finally, take the second scrambled image's pixels, and XOR them with the three-dimensional chaotic values generated from the Lorenz system and create the final encrypted image. The robustness and flexibility of the encryption system are analyzed using various security and performance analyses. The experiment results are compared with the existing algorithms to prove the efficiency of the proposed algorithm.
引用
收藏
页码:226 / 250
页数:25
相关论文
共 24 条
  • [1] Bouam M., 2021, PARALLEL COMPUT, V106, P102804, DOI [https://doi.org/10.1016/j.parco.2021.102804, DOI 10.1016/J.PARCO.2021.102804]
  • [2] A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes
    Brahim, A. Hadj
    Pacha, A. Ali
    Said, N. H. A. D. J.
    [J]. INFORMATION SECURITY JOURNAL, 2023, 32 (02): : 59 - 75
  • [3] Image encryption algorithm based on the finite fields in chaotic maps
    Broumandnia, Ali
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [4] Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics
    Fan, Haiju
    Li, Ming
    Liu, Dong
    An, Kang
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (15) : 20103 - 20127
  • [5] Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications
    Faragallah, Osama S.
    Afifi, Ashraf
    El-Shafai, Walid
    El-Sayed, Hala S.
    Naeem, Ensherah A.
    Alzain, Mohammed A.
    Al-Amri, Jehad F.
    Soh, Ben
    Abd El-Samie, Fathi E.
    [J]. IEEE ACCESS, 2020, 8 : 42491 - 42503
  • [6] A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure
    Hanis, Stanley
    Amutha, Ramachandran
    [J]. NONLINEAR DYNAMICS, 2019, 95 (01) : 421 - 432
  • [7] Coupling chaotic system based on unit transform and its applications in image encryption
    Hu, Guozhen
    Li, Baobin
    [J]. SIGNAL PROCESSING, 2021, 178
  • [8] Image encryption using 2D Logistic-adjusted-Sine map
    Hua, Zhongyun
    Zhou, Yicong
    [J]. INFORMATION SCIENCES, 2016, 339 : 237 - 253
  • [9] A novel multiple color image encryption scheme based on algebra M(2, F2[u]/u8) and chaotic map
    Jahangir, Saira
    Shah, Tariq
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
  • [10] Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform
    Li, Guo-dong
    Wang, Le-le
    [J]. VISUAL COMPUTER, 2019, 35 (09) : 1267 - 1277