A Gray Image Encryption Technique Using the Concept of Water Waves, Chaos and Hash Function

被引:26
作者
Firdous, Amnah [1 ]
Rehman, Aqeel Ur [2 ,3 ]
Saad Missen, Malik Muhammad [1 ]
机构
[1] Islamia Univ Bahawalpur, Dept Comp Sci & IT, Punjab 63100, Pakistan
[2] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
[3] COMSATS Univ Islamabad, Dept Comp Sci, Vehari Campus, Vehari 63110, Pakistan
关键词
Encryption; Logistics; Surface waves; Hash functions; Ciphers; Visualization; Matrices; Water waves substitution; chaos; image cryptography; SHA-2; DNA; PERMUTATION; SYSTEM; TRANSFORM; MAP;
D O I
10.1109/ACCESS.2021.3049791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article, an innovative encryption technique is developed by getting the inspiration from the natural up-down water wave's phenomena that changes a reflection on pond's surface. The plain image is considered as water pond and stones are throwing on the pond to diffuse the pixels. The direction of diffusion follows the pattern of natural water waves in 360 degrees. The distance traveled by the waves depend upon the weight of the stone i.e. heavier is the stone, longer will be the distance. Each layer of pixels in image represents Crest (Up) and Troughs (Down) around the hitting point of stone. The number of Crest and Troughs generated by a stone in radius are measured and are categorized into 1 to 6 or six levels (Layers). The concept of Crest and Trough in encryption are achieved by addition and subtraction of pseudo-random numbers in the pixel's intensity. The pseudo random numbers are generated from Logistic map and transformed into stones of different weights ranges from 0-255. Before substitution, the pixels are shuffled in 1-dimensional vector using the index values of random numbers. The hash value is used for modification of initial seeds of the Logistic map. The initial seeds of the Logistic map are modified by the output of 256-bit hash function. Finally, the simulated results are compiled which ascertains that the projected algorithm achieves the required security standard with large pool of secret keys.
引用
收藏
页码:11675 / 11693
页数:19
相关论文
共 62 条
[1]   A new fast double-chaotic based Image encryption scheme [J].
Abdelfatah, Roayat Ismail .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (1-2) :1241-1259
[2]   A New Chaos-Based Image-Encryption and Compression Algorithm [J].
Al-Maadeed, Somaya ;
Al-Ali, Afnan ;
Abdalla, Turki .
JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2012, 2012
[3]   An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos [J].
Aqeel-ur-Rehman ;
Liao, Xiaofeng ;
Hahsmi, Muntazim Abbas ;
Haider, Rizwan .
OPTIK, 2018, 153 :117-134
[4]   A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps [J].
Aqeel-ur-Rehman ;
Liao, Xiaofeng ;
Kulsoom, Ayesha ;
Ullah, Sami .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (18) :11241-11266
[5]   Efficient selective image encryption [J].
Ayoup, Ahmed M. ;
Hussein, Amr H. ;
Attia, Mahmoud A. A. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (24) :17171-17186
[6]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[7]   Discrete fractional wavelet transform and its application to multiple encryption [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
INFORMATION SCIENCES, 2013, 223 :297-316
[8]   A New Fractional Random Wavelet Transform for Fingerprint Security [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2012, 42 (01) :262-275
[9]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[10]  
Biham E., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P487