Digital Images Security Technique Using Hénon and Piecewise Linear Chaotic Maps

被引:1
|
作者
Hazzazi, Mohammad Mazyad [1 ]
Iqbal, Nadeem [2 ]
Ikram, Atif [2 ,3 ]
机构
[1] King Khalid Univ, Coll Sci, Dept Math, Abha 61421, Saudi Arabia
[2] Univ Lahore, Dept Comp Sci & IT, Lahore 54000, Pakistan
[3] Univ Malaysia Terengganu, Fac Ocean Engn Technol & Informat, Kuala Terengganu 21300, Malaysia
关键词
Ciphers; Encryption; Streaming media; Security; Gray-scale; Fractals; Sensitivity; Chaos; Computer security; cryptanalysis; cybersecurity; decryption; encryption; geometric figure; ENCRYPTION;
D O I
10.1109/ACCESS.2023.3320031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of images has become a hot research area due to the widespread usage of the digital images all over the world. Literature review on chaotic image cryptography, on the other hand, indicates that many constructs have been employed for the realization of confusion operation while developing the image ciphers. To enhance the computational time, this study proposes a novel image cipher based on two chaotic maps and rectangle as a scrambler. As the given grayscale image is input, it is scrambled through dynamically generated rectangles. As a modus operandi, these rectangles are created in the given image with various dimensions and different location. The pixels lying on the boundary of the rectangle are rotated clockwise and anticlockwise with an arbitrary amount. These operations have been repeated a number of times to get the scrambling effects. The scrambled image has been further subjected to an XOR operation for embedding the diffusion effects in it. Two chaotic maps of Henon and piecewise linear chaotic map have been used for the generation of random numbers. These numbers help in deciding the size, location, clockwise/anticlockwise movement of the pixels and the amount with which these pixels have to be rotated. The performance analysis and the machine simulation validate that the suggested cipher is sufficient enough to thwart the varied cryptanalytic attacks. In particular, we gained the computational speed of 0.5156 seconds and the information entropy of 7.9975. Besides, we posit that it has the ample prospects for its real world application.
引用
收藏
页码:106299 / 106314
页数:16
相关论文
共 50 条
  • [1] On the dynamical degradation of digital piecewise linear chaotic maps
    Li, SJ
    Chen, GR
    Mou, XQ
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2005, 15 (10): : 3119 - 3151
  • [2] Efficient information hiding in medical optical images based on piecewise linear chaotic maps
    Nasr, Marwa A.
    El-Shafai, Walid
    Abdel-Salam, Nariman
    El-Rabaie, El-Sayed M.
    El-Fishawy, Adel S.
    Abd El-Samie, Fathi E.
    JOURNAL OF OPTICS-INDIA, 2023, 52 (04): : 1852 - 1866
  • [3] Chaotic Encryption Technique for Color Images by Coupling Two Chaotic Maps
    Asmita
    Lade, Shrikant
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (10): : 88 - 93
  • [4] Chaotic Encryption Technique for Color Images by Coupling Two Chaotic Maps
    Asmita
    Lade, Shrikant
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (10): : 90 - 95
  • [5] Efficient Encryption Technique for Medical X-ray Images using Chaotic Maps
    Reddy, V. Praneeth Kumar
    Fathima, A. Annis
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 783 - 787
  • [6] Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer
    Al-Sharo, Yasser Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (04) : 252 - 258
  • [7] Confusion and Diffusion of Grayscale Images Using Multiple Chaotic Maps
    Som, Sukalyan
    Kotal, Atanu
    2012 NATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION SYSTEMS (NCCCS), 2012, : 152 - 156
  • [8] Images Cryptosystem based on Chaotic Maps for Databases Security
    Mousa, Ayman
    El-Rabaie, El-Sayed M.
    Nigm, E. M.
    Faragallah, Osama S.
    PROCEEDINGS OF THE 2013 SECOND INTERNATIONAL JAPAN-EGYPT CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND COMPUTERS (JEC-ECC), 2013, : 154 - 158
  • [9] Enhancing Security of Medical Images Using Deep Learning, Chaotic Map, and Hash Table
    Kumar, Piyush
    Rahman, Mobashshirur
    Namasudra, Suyel
    Moparthi, Nageswara Rao
    MOBILE NETWORKS & APPLICATIONS, 2023, 29 (5) : 1489 - 1503
  • [10] Enhancing the Security of Digital Image Encryption using Diagonalize Multidimensional Nonlinear Chaotic System
    Moussa, Mahmoud, I
    Abd El-Latif, Eman, I
    Majid, Nawaz
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 524 - 533