A novel colour image encryption algorithm using S-box technique

被引:0
作者
Kakade, Kiran Shrimant [1 ]
Sarkar, Swagata [2 ]
Asha, S. [3 ]
Sivakumaran, C. [4 ]
机构
[1] World Peace Univ, Fac Business & Leadership, MIT, Pune, India
[2] Sri Sairam Engn Coll, Artificial Intelligence & Data Sci Dept, Chennai, India
[3] SA Engn Coll, Dept Informat Technol, Chennai 600077, India
[4] Photon Technol, Chennai, India
关键词
chaotic image encryption; cryptanalysis; RNA mutation; 3D Arnold matrix; logistic map; S-box;
D O I
10.1504/IJESDF.2024.137045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The combined 3D image suggests that SHA-256 is responsible for seeding the memristive chaotic system with initial values. The suggested picture encryption method uses the encrypted image's output value to set the algorithm's parameters. Second, either discrete Arnold map or indeed the quantum chaotic maps are used to construct the structure of permutations and grey-level encryption, respectively. A classical chaos sequence modifies the pixel value before it is permuted using the Arnold transform. We use the S-box to introduce nonlinearity and diffusion to image files, and then we use the Boolean function XOR to the encrypted picture to provide even more randomness. Additionally, we examine randomness tests such as NIST-R, correlation, and key evaluation. The efficiency of the proposed method is evaluated in relation to many similar existing algorithms. Both theoretical and practical studies support the reliability of our methodology.
引用
收藏
页码:255 / 266
页数:13
相关论文
共 20 条
  • [1] A Dual Layer Secure Data Encryption and Hiding Scheme for Color Images Using the Three-Dimensional Chaotic Map and Lah Transformation
    Alanazi, Ammar S.
    [J]. IEEE ACCESS, 2021, 9 (09): : 26583 - 26592
  • [2] An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations
    Chai, Xiuli
    Gan, Zhihua
    Yang, Kang
    Chen, Yiran
    Liu, Xianxing
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 52 : 6 - 19
  • [3] Daemen J., 2001, AES PROPOSAL
  • [4] Diomidous Marianna, 2016, Acta Inform Med, V24, P66, DOI 10.5455/aim.2016.24.66-68
  • [5] Cyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims
    Dressing, Harald
    Bailer, Josef
    Anders, Anne
    Wagner, Henriette
    Gallas, Christine
    [J]. CYBERPSYCHOLOGY BEHAVIOR AND SOCIAL NETWORKING, 2014, 17 (02) : 61 - 67
  • [6] [杜之波 Du Zhibo], 2015, [通信学报, Journal on Communications], V36, P85
  • [7] An Image Compression and Encryption Algorithm Based on the Fractional-Order Simplest Chaotic Circuit
    Hu, Haiying
    Cao, Yinghong
    Xu, Ji
    Ma, Chenguang
    Yan, Huizhen
    [J]. IEEE ACCESS, 2021, 9 : 22141 - 22155
  • [8] Reversible Data Hiding in Encrypted Three-Dimensional Mesh Models
    Jiang, Ruiqi
    Zhou, Hang
    Zhang, Weiming
    Yu, Nenghai
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2018, 20 (01) : 55 - 67
  • [9] Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform
    Joshi, Anand B.
    Kumar, Dhanesh
    Gaffar, Abdul
    Mishra, D. C.
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 133
  • [10] Known-Key Attack on SM4 Block Cipher
    Kang, HyungChul
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2985 - 2990