Secure color image cryptosystem based on chaotic logistic in the FrFT domain

被引:1
作者
Osama S. Faragallah
Mohammed A. AlZain
Hala S. El-Sayed
Jehad F. Al-Amri
Walid El-Shafai
Ashraf Afifi
Ensherah A. Naeem
Ben Soh
机构
[1] Menoufia University,Department of Computer Science and Engineering, Faculty of Electronic Engineering
[2] Taif University,Department of Information Technology, College of Computers and Information Technology
[3] Menoufia University,Department of Electrical Engineering, Faculty of Engineering
[4] Menoufia University,Department of Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering
[5] Higher Technological Institute,Department of Electrical Engineering and Computers
[6] Higher Institute of Engineering and Technology,Department of Electronics and Electrical Communications
[7] La Trobe University,Department of Computer Science and Computer Engineering
来源
Multimedia Tools and Applications | 2020年 / 79卷
关键词
Cryptography; Image encryption; Fractional fourier transform (FrFT); 2D logistic map (2D LM); Security analysis; Noise immunity;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, the digital multimedia security technology has been an interesting research theme due to fast advancement in employing real time multimedia through Internet and wireless networks. The market of multimedia streaming, such as exclusive video on demand (VoD) is a huge multi- billion-dollar market. This market is threatened by hackers. The multimedia streaming industry needs a cryptosystem that is both fast and secure. Chaotic cryptosystems have been proposed by many researchers in order to promote communication security. However, these chaotic schemes have some major problems, such as unacceptable expansion of data, slow performance speed, and shortcomings against differential attack. Therefore, this paper provides an efficient Fractional Fourier Transform (FrFT)-based logistic map (LM) color image encryption scheme by applying a 2D LM on FrFT. In the proposed FrFT-based LM color image encryption scheme, the 2D LM is employed as a confusion step to scramble the color image pixel positions in the FrFT and confuse the relationship between the cipherimage and the plainimage. For enhancing the encryption performance characteristics of the 2D LM under the FrFT, the angle of the FrFT is taken as an extra additional key in encryption. The proposed FrFT-based LM color image encryption scheme is examined and investigated using visual inspection, entropy, histograms, encryption quality, noise tests, and differential analysis. The obtained simulation tests demonstrate and verify the effectiveness of the FrFT-based LM color image encryption scheme. Moreover, our results also show a significant improvement in the performance of the confusion property with our proposed 2D LM encryption scheme using the FrFT. Also, we compared the proposed cryptosystem with recent state-of-the-art cryptosystems. Experimental results show that our proposed image cryptosystem is highly secure from the cryptographic point of view. Furthermore, the obtained test results ensured the superiority of our proposed cryptosystem for digital image transmission compared to the recent state-of-theart cryptosystems.
引用
收藏
页码:2495 / 2519
页数:24
相关论文
共 50 条
[41]   Design of Secure Chaotic Hash Function Based on Logistic and Tent Maps [J].
Rani, P. Jhansi ;
Rao, M. Sambasiva ;
Bhavani, S. Durga .
ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 :43-52
[42]   A New and Secure Cryptosystem for Image Encryption and Decryption [J].
Rao, K. Deergha ;
Kumar, K. Praveen ;
Krishna, P. V. Murali .
IETE JOURNAL OF RESEARCH, 2011, 57 (02) :165-171
[43]   Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion [J].
Shahna, K. U. ;
Mohamed, Anuj .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2021, 99
[44]   A novel image encryption cryptosystem based on true random numbers and chaotic systems [J].
Zhou, Shuang ;
Wang, Xingyuan ;
Zhang, Yingqian ;
Ge, Bin ;
Wang, Mingxu ;
Gao, Suo .
MULTIMEDIA SYSTEMS, 2022, 28 (01) :95-112
[45]   Efficient and secure cryptosystem for fingerprint images in wavelet domain [J].
Khaled Loukhaoukha ;
Ahmed Refaey ;
Khalil Zebbiche ;
Abdallah Shami .
Multimedia Tools and Applications, 2018, 77 :9325-9339
[46]   Cryptanalysis of an Asymmetric Image Cryptosystem Based on Synchronized Unified Chaotic System and CNN [J].
Ahmad, Musheer ;
Ahmad, Faiyaz ;
Javed, Syed Ashar .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND COMMUNICATION, 2017, 458 :559-567
[47]   A Provable Secure Image Encryption Schema Based on Fractional Order Chaotic Systems [J].
Aydin, Yilmaz ;
Ozkaynak, Fatih .
PROCEEDINGS OF THE 2019 23RD INTERNATIONAL CONFERENCE ELECTRONICS (ELECTRONICS 2019), 2019,
[48]   Study on Image Encryption Algorithm Based on Logistic Chaotic System [J].
Dong, Wen .
2019 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION PROCESSING (ICIIP 2019), 2019, :44-47
[49]   A New Image Encryption Algorithm Based on the Logistic Chaotic System [J].
Wang Feng-ying ;
Cui Guo-wei .
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, :192-194
[50]   Efficient and secure cryptosystem for fingerprint images in wavelet domain [J].
Loukhaoukha, Khaled ;
Refaey, Ahmed ;
Zebbiche, Khalil ;
Shami, Abdallah .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (08) :9325-9339