Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

被引:73
作者
Qayyum, Abdullah [1 ]
Ahmad, Jawad [2 ]
Boulila, Wadii [3 ,4 ]
Rubaiee, Saeed [5 ]
Arshad [6 ]
Masood, Fawad [7 ]
Khan, Fawad [8 ]
Buchanan, William J. [2 ]
机构
[1] Univ Engn & Technol, Dept Elect Engn, Peshawar 25120, Pakistan
[2] Edinburgh Napier Univ, Sch Comp, Edinburgh EH10 5DT, Midlothian, Scotland
[3] Univ Manouba, RIADI Lab, Manouba 2010, Tunisia
[4] Taibah Univ, Coll Comp Sci & Engn, Medina 42353, Saudi Arabia
[5] Univ Jeddah, Dept Ind & Syst Engn, Jeddah 21589, Saudi Arabia
[6] Univ Strathclyde, Inst Energy & Environm, Glasgow G1 1XQ, Lanark, Scotland
[7] Inst Space Technol, Dept Elect Engn, Islamabad 44000, Pakistan
[8] Natl Univ Sci & Technol, Dept Informat Secur, Islamabad 44000, Pakistan
关键词
Encryption; Chaotic communication; Heuristic algorithms; Robustness; Henon map; Ikeda map; chaos; encryption; substitution box; LOGISTIC MAP; PERMUTATION; ALGORITHM; SYSTEM;
D O I
10.1109/ACCESS.2020.3012912
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks. Encryption is a method that can protect information from hackers and hence confidential data can be secured through a cryptosystem. Due to the increased number of cyber attacks, encryption has become an important component of modern-day communication. In this article, a new image encryption algorithm is presented using chaos theory and dynamic substitution. The proposed scheme is based on two-dimensional Henon, Ikeda chaotic maps, and substitution box (S-box) transformation. Through Henon, a random S-Box is selected and the image pixel is substituted randomly. To analyze security and robustness of the proposed algorithm, several security tests such as information entropy, histogram investigation, correlation analysis, energy, homogeneity, and mean square error are performed. The entropy values of the test images are greater than 7.99 and the key space of the proposed algorithm is 2(798). Furthermore, the correlation values of the encrypted images using the proposed scheme are close to zero when compared with other conventional schemes. The number of pixel change rate (NPCR) and unified average change intensity (UACI) for the proposed scheme are higher than 99.50% and 33, respectively. The simulation results and comparison with the state-of-the-art algorithms prove the efficiency and security of the proposed scheme.
引用
收藏
页码:140876 / 140895
页数:20
相关论文
共 69 条
[1]  
Ahmad J., 2019, 2019 UKCHINA EMERGIN, P1
[2]   A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation [J].
Ahmad, Jawad ;
Khan, Muazzam Ali ;
Ahmed, Fawad ;
Khan, Jan Sher .
NEURAL COMPUTING & APPLICATIONS, 2018, 30 (12) :3847-3857
[3]   A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices [J].
Ahmad, Jawad ;
Khan, Muazzam A. ;
Hwang, Seong Oun ;
Khan, Jan Sher .
NEURAL COMPUTING & APPLICATIONS, 2017, 28 :S953-S967
[4]   A secure image encryption scheme based on chaotic maps and affine transformation [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13951-13976
[5]   Chaos-based diffusion for highly autocorrelated data in encryption algorithms [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
NONLINEAR DYNAMICS, 2015, 82 (04) :1839-1850
[6]   An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes [J].
Ahmad, Jawad ;
Hwang, Seong Oun ;
Ali, Arshad .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) :901-918
[7]  
Ahmad Jawad., 2010, computing, V23, P25
[8]   A new hybrid digital chaotic system with applications in image encryption [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je ;
Alkhawaldeh, Rami S. .
SIGNAL PROCESSING, 2019, 160 :45-58
[9]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[10]   Theory and practice of chaotic cryptography [J].
Amigo, J. M. ;
Kocarev, L. ;
Szczepanski, J. .
PHYSICS LETTERS A, 2007, 366 (03) :211-216