An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation

被引:24
作者
Arshad, Usman [1 ]
Khan, Majid [2 ,3 ]
Shaukat, Sajjad [5 ]
Amin, Muhammad [3 ]
Shah, Tariq [4 ]
机构
[1] Inst Space Technol, Dept Elect Engn, Islamabad, Pakistan
[2] Inst Space Technol, Dept Appl Math & Stat, Islamabad, Pakistan
[3] Inst Space Technol Islamabad, Cyber & Informat Secur Lab, Islamabad, Pakistan
[4] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
[5] Kind Khalid Univ, Dept Math, Abha, Saudi Arabia
关键词
Linear canonical transform; Lorenz system; Confusion and diffusion; Chaotic systems; Statistical analysis; ENCRYPTION; ALGORITHM; PERMUTATION; DIFFUSION;
D O I
10.1016/j.physa.2019.123458
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Making information invulnerable is one of the most critical issues of today's era where information is being sent from one source to another destination with expeditious rates. In this research article, linear canonical transform (LCT) along with Lorenz differential equation is subjected for the process of double image encryption for its inherent characteristics which implies the diffusion and confusion of current era. In the contemplated method standard color images; Lena and Pepper of size 256x256 are used. Image scrambling, LCT of first order and second order along with Lorenz system are adapted as the steps on encryption process. The reverse process of defined encryption scheme is endorsed for the reformation of the original plain images separately from the single encrypted image. For quality assessment of the encryption scheme; different security and statistical analysis are performed and histograms of all the images are analyzed. As a result, statistical assessments recommended that our contemplated scheme is legitimate for the security of digital images. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:18
相关论文
共 44 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], [No title captured]
[3]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[4]   CIRCUIT IMPLEMENTATION OF SYNCHRONIZED CHAOS WITH APPLICATIONS TO COMMUNICATIONS [J].
CUOMO, KM ;
OPPENHEIM, AV .
PHYSICAL REVIEW LETTERS, 1993, 71 (01) :65-68
[5]   Linear Canonical Transform [J].
Ding, Jian-Jiun ;
Pei, Soo-Chang .
ADVANCES IN IMAGING AND ELECTRON PHYSICS, VOL 186, 2014, 186 :39-99
[6]   Color image encryption using one-time keys and coupled chaotic systems [J].
Dong, Chang'e .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (05) :628-640
[7]   Image encryption using a synchronous permutation-diffusion technique [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi ;
Altameem, Ayman ;
Lee, Malrey .
OPTICS AND LASERS IN ENGINEERING, 2017, 90 :146-154
[8]   Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence [J].
Enayatifar, Rasul ;
Abdullah, Abdul Hanan ;
Isnin, Ismail Fauzi .
OPTICS AND LASERS IN ENGINEERING, 2014, 56 :83-93
[9]   A new chaotic algorithm for image encryption [J].
Gao, HJ ;
Zhang, YS ;
Liang, SY ;
Li, DQ .
CHAOS SOLITONS & FRACTALS, 2006, 29 (02) :393-399
[10]   A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map [J].
Hamza, Rafik ;
Titouna, Faiza .
INFORMATION SECURITY JOURNAL, 2016, 25 (4-6) :162-179