MLCM: An efficient image encryption technique for IoT application based on multi-layer chaotic maps

被引:3
作者
Al-Majdi, Kadhum [1 ]
Salman, Ahmed H. [2 ]
Abbas, Noor Alhuda F. [2 ]
Hashim, Mohammed M. [3 ]
Taha, Mustafa S. [4 ]
Alrabeeah, Abdullah A. Nahi [4 ]
Saleh, Salim [4 ,5 ]
机构
[1] Ashur Univ Coll, Baghdad, Iraq
[2] Al Esraa Univ Coll, Dept Comp Technol Engn, Baghdad, Iraq
[3] Uruk Univ, Fac Engn, Baghdad, Iraq
[4] Cihan Univ Erbil, Dept Comp Sci, Kurdistan Region, Iraq
[5] Hodeidah Univ Hodeidah, Dept Math, Al Hudaydah, Yemen
来源
INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS | 2022年 / 13卷 / 02期
关键词
IoT applications; Chaotic Maps; Image encryption; Logistic Map; Bernoulli Map;
D O I
10.22075/ijnaa.2022.6571
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
The importance of image encryption has considerably increased especially after the dramatic evolution of the internet of things (IOT) and due to the simplicity of capturing and transferring digital images. Although there are several encryption approaches, chaos-based image encryption is considered the most appropriate approach for image applications because of its sensitivity to initial conditions and control parameters. This research aims at generating an encrypted image free of statistical information to make cryptanalysis infeasible. Therefore, a new method was introduced in this paper called Multi-layer Chaotic Maps (MLCM) based on confusion and diffusion. Basically, the confusion method uses the Sensitive Logistic Map (SLM), He acute accent non Map, and the additive white Gaussian noise to generate random numbers to be used in the pixel permutation method. However, the diffusion method uses Extended Bernoulli Map (EBM), Tinkerbell, Burgers, and Ricker maps to generate the random matrix. The correlation between adjacent pixels was minimized to have a very small value (x10-3). Besides, the keyspace was extended to be very large (2(450)) considering the key sensitivity to hinder brute force attack. Finally, a histogram was idealized to be perfectly equal in all occurrences and the resulted information entropy was equal to the ideal value(8), which means that the resulted encrypted image is free of statistical properties in terms of histogram and information entropy. Based on the findings, the high randomness of the generated random sequences of the proposed confusion and diffusion methods is capable of producing a robust image encryption framework against all types of cryptanalysis attacks.
引用
收藏
页码:1591 / 1615
页数:25
相关论文
共 50 条
[1]  
Abdurazakov M. M., 2017, EUR PROC SOC BEHAV, P1, DOI DOI 10.15405/epsbs.2017.08.1
[2]   An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications [J].
Al-Khasawneh, Mahmoud Ahmad ;
Uddin, Irfan ;
Shah, Syed Atif Ali ;
Khasawneh, Ahmad M. ;
Abualigah, Laith ;
Mahmoud, Marwan .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (02) :999-1013
[3]  
[Anonymous], 2019, 7 INT C MECH ENG ICO
[4]  
[Anonymous], 2022, IEEE ACCESS, DOI DOI 10.1093/RAPSTU/RAAC003
[5]  
[Anonymous], 2016, 3 INT C COMP SUST GL
[6]   Coherent imaging of objects through thin-layer highly scattering medium based on optical encryption [J].
Bai, Xing ;
Zhang, LuoZhi ;
Li, Jinxi ;
Yu, Zhan ;
Yang, Zhongzhuo ;
Wang, Yujie ;
Chen, Xingyu ;
Zhou, Xin .
OPTICS COMMUNICATIONS, 2022, 506
[7]  
Balamurugan E, 2019, PROCEEDINGS OF 2019 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND KNOWLEDGE ECONOMY (ICCIKE' 2019), P657, DOI [10.1109/ICCIKE47802.2019.9004327, 10.1109/iccike47802.2019.9004327]
[8]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[9]  
Budiman M., 2021, J PHYS C SER, V1898
[10]  
Dahiphale V, 2017, 2017 INTERNATIONAL CONFERENCE ON BIG DATA, IOT AND DATA SCIENCE (BID), P130, DOI 10.1109/BID.2017.8336586