Digital Images Security Technique Using Hénon and Piecewise Linear Chaotic Maps

被引:1
作者
Hazzazi, Mohammad Mazyad [1 ]
Iqbal, Nadeem [2 ]
Ikram, Atif [2 ,3 ]
机构
[1] King Khalid Univ, Coll Sci, Dept Math, Abha 61421, Saudi Arabia
[2] Univ Lahore, Dept Comp Sci & IT, Lahore 54000, Pakistan
[3] Univ Malaysia Terengganu, Fac Ocean Engn Technol & Informat, Kuala Terengganu 21300, Malaysia
关键词
Ciphers; Encryption; Streaming media; Security; Gray-scale; Fractals; Sensitivity; Chaos; Computer security; cryptanalysis; cybersecurity; decryption; encryption; geometric figure; ENCRYPTION;
D O I
10.1109/ACCESS.2023.3320031
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of images has become a hot research area due to the widespread usage of the digital images all over the world. Literature review on chaotic image cryptography, on the other hand, indicates that many constructs have been employed for the realization of confusion operation while developing the image ciphers. To enhance the computational time, this study proposes a novel image cipher based on two chaotic maps and rectangle as a scrambler. As the given grayscale image is input, it is scrambled through dynamically generated rectangles. As a modus operandi, these rectangles are created in the given image with various dimensions and different location. The pixels lying on the boundary of the rectangle are rotated clockwise and anticlockwise with an arbitrary amount. These operations have been repeated a number of times to get the scrambling effects. The scrambled image has been further subjected to an XOR operation for embedding the diffusion effects in it. Two chaotic maps of Henon and piecewise linear chaotic map have been used for the generation of random numbers. These numbers help in deciding the size, location, clockwise/anticlockwise movement of the pixels and the amount with which these pixels have to be rotated. The performance analysis and the machine simulation validate that the suggested cipher is sufficient enough to thwart the varied cryptanalytic attacks. In particular, we gained the computational speed of 0.5156 seconds and the information entropy of 7.9975. Besides, we posit that it has the ample prospects for its real world application.
引用
收藏
页码:106299 / 106314
页数:16
相关论文
共 50 条
  • [21] Preserving the confidentiality of digital images using a chaotic encryption scheme
    Jolfaei, Alireza
    Matinfar, Ahmadreza
    Mirghadri, Abdolrasoul
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (03) : 258 - 277
  • [22] Secure Image Transcoding technique using chaotic key based algorithm with improved security
    Anoop, B. N.
    George, Sudhish N.
    Deepthi, P. P.
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 693 - 697
  • [23] Novel Integer Shmaliy Transform and New Multiparametric Piecewise Linear Chaotic Map for Joint Lossless Compression and Encryption of Medical Images in IoMTs
    Daoui, Achraf
    Mao, Haokun
    Yamni, Mohamed
    Li, Qiong
    Alfarraj, Osama
    Abd El-Latif, Ahmed A.
    MATHEMATICS, 2023, 11 (16)
  • [24] A novel image encryption algorithm based on piecewise linear chaotic maps and least squares approximation
    M. Ghebleh
    A. Kanso
    D. Stevanović
    Multimedia Tools and Applications, 2018, 77 : 7305 - 7326
  • [25] Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization
    Abodawood, Mostafa
    Khalil, Abeer Twakol
    Amer, Hanan M.
    Ata, Mohamed Maher
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 14611 - 14635
  • [26] Digital images watermarking and partial encryption based on DWT transformation and chaotic maps
    Benrhouma, Oussama
    Mannai, Olfa
    Hermassi, Houcemeddine
    Belghith, Safya
    2015 IEEE 12TH INTERNATIONAL MULTI-CONFERENCE ON SYSTEMS, SIGNALS & DEVICES (SSD), 2015,
  • [27] A novel image compression technique and secured transmission of compressed images via optical fiber using higher dimensional chaotic map
    Das, Banhi Dutta Choudhuri
    Sikder, Somali
    Saha, Arijit
    JOURNAL OF OPTICS-INDIA, 2024,
  • [28] Improvement of Radio Frequency Identification Security Using New Hybrid Advanced Encryption Standard Substitution Box by Chaotic Maps
    El Batouty, Amira S.
    Farag, Hania H.
    Mokhtar, Amr A.
    El-Badawy, El-Sayed A.
    Aly, Moustafa H.
    ELECTRONICS, 2020, 9 (07) : 1 - 14
  • [29] Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
    Li-Chin Huang
    Min-Shiang Hwang
    Lin-Yu Tseng
    Journal of Electronic Science and Technology, 2013, (02) : 230 - 236
  • [30] Design of piecewise maps for chaotic spread-spectrum communications using genetic programming
    Varadan, V
    Leung, H
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 2002, 49 (11): : 1543 - 1553