Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps

被引:7
作者
Abu-Faraj, Mua'ad [1 ]
Al-Hyari, Abeer [2 ]
Obimbo, Charlie [3 ]
Aldebei, Khaled [4 ]
Altaharwa, Ismail [1 ]
Alqadi, Ziad [5 ]
Almanaseer, Orabe [4 ]
机构
[1] Univ Jordan, Dept Comp Informat Syst, Aqaba 77110, Jordan
[2] Al Balqa Appl Univ, Elect Engn Dept, As Salt 19117, Jordan
[3] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
[4] Univ Jordan, Dept Informat Technol, Aqaba 77110, Jordan
[5] Al Balqa Appl Univ, Comp & Networks Engn Dept, Amman 15008, Jordan
关键词
cryptography; private key; chaotic logistic map; chaotic logistic map key; chaotic parameter; MSE; PSNR; CC; throughput; SYSTEM; SECURE;
D O I
10.3390/cryptography7020020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This research paper presents a novel digital color image encryption approach that ensures high-level security while remaining simple and efficient. The proposed method utilizes a composite key r and x of 128-bits to create a small in-dimension private key (a chaotic map), which is then resized to match the color matrix dimension. The proposed method is uncomplicated and can be applied to any image without any modification. Image quality, sensitivity analysis, security analysis, correlation analysis, quality analysis, speed analysis, and attack robustness analysis are conducted to prove the efficiency and security aspects of the proposed method. The speed analysis shows that the proposed method improves the performance of image cryptography by minimizing encryption-decryption time and maximizing the throughput of the process of color cryptography. The results demonstrate that the proposed method provides better throughput than existing methods. Overall, this research paper provides a new approach to digital color image encryption that is highly secure, efficient, and applicable to various images.
引用
收藏
页数:22
相关论文
共 53 条
[1]   Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map [J].
Abduljabbar, Zaid Ameen ;
Abduljaleel, Iman Qays ;
Ma, Junchao ;
Al Sibahee, Mustafa A. ;
Nyangaresi, Vincent Omollo ;
Honi, Dhafer G. ;
Abdulsada, Ayad, I ;
Jiao, Xianlong .
IEEE ACCESS, 2022, 10 :26257-26270
[2]   Privacy Protection in Real Time HEVC Standard Using Chaotic System [J].
Abu Taha, Mohammed ;
Hamidouche, Wassim ;
Sidaty, Naty ;
Viitanen, Marko ;
Vanne, Jarno ;
El Assad, Safwan ;
Deforges, Olivier .
CRYPTOGRAPHY, 2020, 4 (02) :1-18
[3]  
2022, APPL MATH INFORM SCI, V16, P1017, DOI [10.18576/amis/160619, 10.18576/amis/160619, DOI 10.18576/AMIS/160619]
[4]   CASDC: A Cryptographically Secure Data System Based on Two Private Key Images [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Al-Taharwa, Ismail ;
Al-Ahmad, Bilal ;
Alqadi, Ziad .
IEEE ACCESS, 2022, 10 :126304-126314
[5]   Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Aldebei, Khaled ;
Alqadi, Ziad A. ;
Al-Ahmad, Bilal .
IEEE ACCESS, 2022, 10 :69388-69397
[6]   A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Alqadi, Ziad .
SYMMETRY-BASEL, 2022, 14 (04)
[7]   Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography [J].
Abu-Faraj, Mua'ad M. ;
Aldebei, Khaled ;
Alqadi, Ziad A. .
TRAITEMENT DU SIGNAL, 2022, 39 (01) :173-178
[8]  
Abu-Faraj MM, 2020, ITAL J PURE APPL MAT, P590
[9]  
Abu-Faraj M, 2023, International Journal of Data and Network Science, V7, P809, DOI [10.5267/j.ijdns.2023.1.008, DOI 10.5267/J.IJDNS.2023.1.008]
[10]  
Agrawal Monika., 2012, International Journal on Computer Science and Engineering, V4, P877