An ILM-cosine transform-based improved approach to image encryption

被引:21
|
作者
Dua, Mohit [1 ]
Suthar, Arun [1 ]
Garg, Arpit [1 ]
Garg, Vaibhav [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
CT-ILM; Random order substitution; Image encryption; CC; MSE; MAP; CRYPTANALYSIS;
D O I
10.1007/s40747-020-00201-z
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The chaos-based cryptography techniques are used widely to protect digital information from intruders. The chaotic systems have some of special features that make them suitable for the purpose of encryption. These systems are highly unpredictable and are highly sensitive or responsive to the initial conditions, also known as butterfly effect. This sensitive dependence on initial conditions make these systems to exhibit an intricate dynamical behaviour. However, this dynamical behaviour is not much complex in simple one-dimensional chaotic maps. Hence, it becomes easy for an intruder to predict the contents of the message being sent. The proposed work in this paper introduces an improved method for encrypting images, which uses cosine transformation of 3-D Intertwining Logistic Map (ILM). The proposed approach has been split into three major parts. In the first part, Secure Hash Function-256 (SHA-256) is used with cosine transformed ILM (CT-ILM) to generate the chaotic sequence. This chaotic sequence is used by high-efficiency scrambling to reduce the correlations between the adjacent pixels of the image. In the second part, the image is rotated to move all the pixels away from their original position. In the third part, random order substitution is applied to change the value of image pixels. The effectiveness of the proposed method has been tested on a number of standard parameters such as correlation coefficient, Entropy and Unified average change in intensity. The proposed approach has also been tested for decryption parameters like mean square error and peak signal to noise ratio. It can easily be observed from the obtained results that the proposed method of image encryption is more secure and time efficient than some earlier proposed techniques. The approach works for both color and grey scale images.
引用
收藏
页码:327 / 343
页数:17
相关论文
共 50 条
  • [41] Multiple image encryption approach using non linear chaotic map and cosine transformation
    Dua M.
    Kumar A.
    garg A.
    garg V.
    International Journal of Information Technology, 2022, 14 (3) : 1627 - 1641
  • [42] Spiral-Transform-Based Fractal Sorting Matrix for Chaotic Image Encryption
    Xian, Yongjin
    Wang, Xingyuan
    Wang, Xiaoyu
    Li, Qi
    Yan, Xiaopeng
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (08) : 3320 - 3327
  • [43] Image encryption-decryption system based on Gyrator transform and Jigsaw transform
    Vilardy, Juan M.
    Torres, Cesar O.
    Mattos, Lorenzo
    8TH IBEROAMERICAN OPTICS MEETING AND 11TH LATIN AMERICAN MEETING ON OPTICS, LASERS, AND APPLICATIONS, 2013, 8785
  • [44] Breaking a novel image encryption scheme based on improved hyperchaotic sequences
    Li, Chengqing
    Liu, Yuansheng
    Xie, Tao
    Chen, Michael Z. Q.
    NONLINEAR DYNAMICS, 2013, 73 (03) : 2083 - 2089
  • [45] Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform
    Alhumyani, Hesham
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (01) : 68 - 81
  • [46] Breaking a novel image encryption scheme based on improved hyperchaotic sequences
    Chengqing Li
    Yuansheng Liu
    Tao Xie
    Michael Z. Q. Chen
    Nonlinear Dynamics, 2013, 73 : 2083 - 2089
  • [47] Image Encryption Based on Hyperchaotic System and Improved Zigzag Diffusion Method
    Zou, Dongyao
    Pei, Tengda
    Xi, Guangyong
    Wang, Liping
    IEEE ACCESS, 2023, 11 : 95396 - 95409
  • [48] Improved reverse zigzag transform and DNA diffusion chaotic image encryption method
    Zhida Guo
    Peng Sun
    Multimedia Tools and Applications, 2022, 81 : 11301 - 11323
  • [49] Color image encryption approach based on memetic differential evolution
    Kaur, Manjit
    Kumar, Vijay
    Li, Li
    NEURAL COMPUTING & APPLICATIONS, 2019, 31 (11) : 7975 - 7987
  • [50] Image encryption based on joint transform correlator and vector decomposition
    Department of Electronic and Optics Engineering, Ordnance Engineering College, Shijiazhuang, China
    Guangdianzi Jiguang, 5 (1005-1009): : 1005 - 1009