Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture

被引:10
作者
Al-Hyari, Abeer [1 ]
Obimbo, Charlie [2 ]
Abu-Faraj, Mua'ad M. [3 ]
Al-Taharwa, Ismail
机构
[1] Al Balqa Appl Univ, Elect Engn Dept, Al Salt 19117, Jordan
[2] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
[3] Univ Jordan, Dept Comp Informat Syst, Aqaba 77110, Jordan
关键词
Chaotic logistic map; chaotic logistic map key; chaotic parameter; Collatz conjecture; cryptography; EFFICIENT; SCHEME; SECURE; SYSTEM; LEVEL;
D O I
10.1109/ACCESS.2024.3349470
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, which is then used to encrypt the plaintext image. This study proposes an image encryption scheme based on CLMK, Collatz Conjecture, and indexing techniques; it uses a private key of a 15-digit size that is parsed in a novel way to generate a considerable keyspace reaches up to 2(97). The Collatz Conjecture generator is used to create variable length sequences that are used to generate the Chaotic parameters r(1), r(2), x(1), and x(2); these parameters are used to create a 2D CLMK for encrypting each color channel and a 1D vector that is used for permeation, both confusion and diffusion are performed in four consecutive rounds to ensure the robustness of the proposed approach. The random sequences generated by the Collatz Conjecture were tested for randomness using the NIST benchmark randomness test suit, and they passed most tests. The proposed method is robust against all the well-known attacks, including differential attacks, white Gaussian noise attacks, Salt-and-pepper noise attacks, clipping attacks, occlusion attacks, and known plaintext attacks. Various experiments were conducted to evaluate the performance of the proposed method in terms of encryption time, throughput, and several image quality metrics. The results indicate that the proposed method is efficient regarding encryption time, and throughput enhancement can reach up to 3.34 times the state-of-the-art chaotic encryption methods.
引用
收藏
页码:4825 / 4844
页数:20
相关论文
共 74 条
[1]   Provably Secure and Fast Color Image Encryption Algorithm Based on S-Boxes and Hyperchaotic Map [J].
Abduljabbar, Zaid Ameen ;
Abduljaleel, Iman Qays ;
Ma, Junchao ;
Al Sibahee, Mustafa A. ;
Nyangaresi, Vincent Omollo ;
Honi, Dhafer G. ;
Abdulsada, Ayad, I ;
Jiao, Xianlong .
IEEE ACCESS, 2022, 10 :26257-26270
[2]  
Abu-Faraj M., 2023, Int. J. Data Netw. Sci, V7, P809, DOI DOI 10.5267/J.IJDNS.2023.1.008
[3]  
Abu-Faraj M., 2022, Appl. Math. Inf. Sci, V16, P1017, DOI [10.18576/amis/160619, DOI 10.18576/AMIS/160619]
[4]   Protecting Digital Images Using Keys Enhanced by 2D Chaotic Logistic Maps [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Obimbo, Charlie ;
Aldebei, Khaled ;
Altaharwa, Ismail ;
Alqadi, Ziad ;
Almanaseer, Orabe .
CRYPTOGRAPHY, 2023, 7 (02)
[5]   CASDC: A Cryptographically Secure Data System Based on Two Private Key Images [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Al-Taharwa, Ismail ;
Al-Ahmad, Bilal ;
Alqadi, Ziad .
IEEE ACCESS, 2022, 10 :126304-126314
[6]   Rotation Left Digits to Enhance the Security Level of Message Blocks Cryptography [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Aldebei, Khaled ;
Alqadi, Ziad A. ;
Al-Ahmad, Bilal .
IEEE ACCESS, 2022, 10 :69388-69397
[7]   A Complex Matrix Private Key to Enhance the Security Level of Image Cryptography [J].
Abu-Faraj, Mua'ad ;
Al-Hyari, Abeer ;
Alqadi, Ziad .
SYMMETRY-BASEL, 2022, 14 (04)
[8]   Simple, Efficient, Highly Secure, and Multiple Purposed Method on Data Cryptography [J].
Abu-Faraj, Mua'ad M. ;
Aldebei, Khaled ;
Alqadi, Ziad A. .
TRAITEMENT DU SIGNAL, 2022, 39 (01) :173-178
[9]  
Abu-Faraj MM, 2020, ITAL J PURE APPL MAT, P590
[10]  
Agrawal M., 2012, INT J COMPUT SCI ENG, V4