An Efficient Method for Digital Image Encryption Based on Improved Chaotic Map
Year 2022,
Volume: 18 Issue: 2, 87 - 96, 31.12.2022
Muhammed Milani
,
Salim Ceyhan
Abstract
With the development of information technologies and the increasing possibility of unauthorized access to data published on the Internet, the need to take care of data has become an important issue. One method that can be useful in data security is encryption. By using data encryption, data can be easily distributed in different environments safely. This paper presents and investigates an encryption method based on chaos theory for digital images. The tests and analyses performed on encrypted images show that the presented method has the necessary efficiency.
References
- 1Chen, L., Chen, J., Zhao, G., & Wang, S. (2019). Cryptanalysis and improvement of a chaos-based watermarking scheme. IEEE Access, 7, 97549-97565.
- Dou, Y., & Li, M. (2020). Cryptanalysis of a new color image encryption using combination of the 1d chaotic map. Applied Sciences, 10(6), 2187.
- Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An overview of image steganography. In ISSA (Vol. 1, No. 2, pp. 1-11).
- Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE access, 9, 23409-23423.
- Wadhera, S., Kamra, D., Rajpal, A., Jain, A., & Jain, V. (2022). A Comprehensive Review on Digital Image Watermarking. arXiv preprint arXiv:2207.06909.
- Mahto, D. K., & Singh, A. K. (2021). A survey of color image watermarking: State-of-the-art and research directions. Computers & Electrical Engineering, 93, 107255.
- Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. The Journal of Supercomputing, 75(10), 6663-6682.
- Anandkumar, R., and Kalpana, R. “A Review on Chaos-Based Image Encryption Using Fractal Function”, In Examining Fractal Image Processing and Analysis (pp. 23-37). IGI Global (2020).
- Singh, L. D., & Singh, K. M. (2015). Implementation of text encryption using elliptic curve cryptography. Procedia Computer Science, 54, 73-82.
- Sangwan, N. (2012). Text encryption with huffman compression. International Journal of Computer Applications, 54(6).
- Liu, S., Guo, C., & Sheridan, J. T. (2014). A review of optical image encryption techniques. Optics & Laser Technology, 57, 327-342.
- Hua, Z., Zhou, Y., & Huang, H. (2019). Cosine-transform-based chaotic system for image encryption. Information Sciences, 480, 403-419.
- Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75(14), 8403-8418.
- Hasimoto-Beltrán, R. (2008). High-performance multimedia encryption system based on chaos. Chaos: An Interdisciplinary Journal of Nonlinear Science, 18(2), 023110.
- Darwish, S. M., and Noori, Z. H. “Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding”, IET Signal Processing, 13(3), 286-295 (2018).
- Wang, X. Y., Yang, L., Liu, R., and Kadir, A. “A chaotic image encryption algorithm based on perceptron model”, Nonlinear Dynamics, 62(3), 615-621 (2010).
- Abd-El-Atty, B., Iliyasu, A. M., Alanezi, A., & Abd El-latif, A. A. (2021). Optical image encryption based on quantum walks. Optics and Lasers in Engineering, 138, 106403.
- Yan, X., Wang, X., & Xian, Y. (2021). Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimedia Tools and Applications, 80(7), 10949-10983.
- Suneja, K., Dua, S., & Dua, M. (2019, March). A review of chaos based image encryption. In 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) (pp. 693-698). IEEE.
- Kumar, M., Saxena, A., & Vuppala, S. S. (2020). A survey on chaos based image encryption techniques. In Multimedia security using chaotic maps: principles and methodologies (pp. 1-26). Springer, Cham.
- Gu, G., & Han, G. (2006, September). An enhanced chaos based image encryption algorithm. In First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC'06) (Vol. 1, pp. 492-495). IEEE.
- Talhaoui, M. Z., and Wang, X. “A new fractional one-dimensional chaotic map and its application in high-speed image encryption”, Information Sciences, 550, 13-26 (2021).
- Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., and Mosavi, M. R. “A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos”, Multimedia Tools and Applications, 74(3), 781-811 (2015).
- Liu, L., Xiang, H., & Li, X. (2021). A novel perturbation method to reduce the dynamical degradation of digital chaotic maps. Nonlinear Dynamics, 103(1), 1099-1115.
- Liu, L., & Miao, S. (2017). Delay-introducing method to improve the dynamical degradation of a digital chaotic map. Information Sciences, 396, 1-13.
- Bak, P., Tang, C., & Wiesenfeld, K. (1988). Self-organized criticality. Physical review A, 38(1), 364.
- Beek, P. J. (1989). Timing and phase locking in cascade juggling. Ecological Psychology, 1(1), 55-96.
- Lorenz, E. N. (1965). On the possible reasons for long-period fluctuations of the general circulation. In Proc. WMO-IUGG Symp. on Research and Development Aspects of Long-Range Forecasting.
- Li, S.J., Chen, G.R., Mou, X.Q.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15, 3119–3151 (2004)
- Wang, X., Feng, L., Li, R., & Zhang, F. (2019). A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dynamics, 95(4), 2797-2824.
- Chai, X. (2017). An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimedia Tools and Applications, 76(1), 1159-1175.
- Zhang, Y., & Tang, Y. (2018). A plaintext-related image encryption algorithm based on chaos. Multimedia Tools and Applications, 77(6), 6647-6669.
- Alawida, M., Samsudin, A., Teh, J. S., & Alkhawaldeh, R. S. (2019). A new hybrid digital chaotic system with applications in image encryption. Signal Processing, 160, 45-58
İyileştirilmiş Kaotik Haritaya Dayalı Bir Dijital Görüntü Şifreleme Yöntemi
Year 2022,
Volume: 18 Issue: 2, 87 - 96, 31.12.2022
Muhammed Milani
,
Salim Ceyhan
Abstract
Bilişim teknolojilerinin gelişmesi ve internette yayınlanan verilere yetkisiz erişim olasılığının artmasıyla birlikte verilerin korunması ihtiyacı önemli bir konu haline gelmiştir. Veri güvenliğinde faydalı olabilecek yöntemlerden biri şifrelemedir. Veri şifreleme kullanılarak, veriler farklı ortamlarda güvenli bir şekilde kolayca dağıtılabilir. Bu makale, dijital görüntüler için kaos teorisine dayalı bir şifreleme yöntemini sunmakta ve incelemektedir. Şifrelenmiş görüntüler üzerinde yapılan testler ve analizler, sunulan yöntemin gerekli verimliliğe sahip olduğunu göstermektedir.
References
- 1Chen, L., Chen, J., Zhao, G., & Wang, S. (2019). Cryptanalysis and improvement of a chaos-based watermarking scheme. IEEE Access, 7, 97549-97565.
- Dou, Y., & Li, M. (2020). Cryptanalysis of a new color image encryption using combination of the 1d chaotic map. Applied Sciences, 10(6), 2187.
- Morkel, T., Eloff, J. H., & Olivier, M. S. (2005, June). An overview of image steganography. In ISSA (Vol. 1, No. 2, pp. 1-11).
- Subramanian, N., Elharrouss, O., Al-Maadeed, S., & Bouridane, A. (2021). Image steganography: A review of the recent advances. IEEE access, 9, 23409-23423.
- Wadhera, S., Kamra, D., Rajpal, A., Jain, A., & Jain, V. (2022). A Comprehensive Review on Digital Image Watermarking. arXiv preprint arXiv:2207.06909.
- Mahto, D. K., & Singh, A. K. (2021). A survey of color image watermarking: State-of-the-art and research directions. Computers & Electrical Engineering, 93, 107255.
- Arab, A., Rostami, M. J., & Ghavami, B. (2019). An image encryption method based on chaos system and AES algorithm. The Journal of Supercomputing, 75(10), 6663-6682.
- Anandkumar, R., and Kalpana, R. “A Review on Chaos-Based Image Encryption Using Fractal Function”, In Examining Fractal Image Processing and Analysis (pp. 23-37). IGI Global (2020).
- Singh, L. D., & Singh, K. M. (2015). Implementation of text encryption using elliptic curve cryptography. Procedia Computer Science, 54, 73-82.
- Sangwan, N. (2012). Text encryption with huffman compression. International Journal of Computer Applications, 54(6).
- Liu, S., Guo, C., & Sheridan, J. T. (2014). A review of optical image encryption techniques. Optics & Laser Technology, 57, 327-342.
- Hua, Z., Zhou, Y., & Huang, H. (2019). Cosine-transform-based chaotic system for image encryption. Information Sciences, 480, 403-419.
- Lima, J. B., & da Silva Neto, E. F. (2016). Audio encryption based on the cosine number transform. Multimedia Tools and Applications, 75(14), 8403-8418.
- Hasimoto-Beltrán, R. (2008). High-performance multimedia encryption system based on chaos. Chaos: An Interdisciplinary Journal of Nonlinear Science, 18(2), 023110.
- Darwish, S. M., and Noori, Z. H. “Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding”, IET Signal Processing, 13(3), 286-295 (2018).
- Wang, X. Y., Yang, L., Liu, R., and Kadir, A. “A chaotic image encryption algorithm based on perceptron model”, Nonlinear Dynamics, 62(3), 615-621 (2010).
- Abd-El-Atty, B., Iliyasu, A. M., Alanezi, A., & Abd El-latif, A. A. (2021). Optical image encryption based on quantum walks. Optics and Lasers in Engineering, 138, 106403.
- Yan, X., Wang, X., & Xian, Y. (2021). Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimedia Tools and Applications, 80(7), 10949-10983.
- Suneja, K., Dua, S., & Dua, M. (2019, March). A review of chaos based image encryption. In 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) (pp. 693-698). IEEE.
- Kumar, M., Saxena, A., & Vuppala, S. S. (2020). A survey on chaos based image encryption techniques. In Multimedia security using chaotic maps: principles and methodologies (pp. 1-26). Springer, Cham.
- Gu, G., & Han, G. (2006, September). An enhanced chaos based image encryption algorithm. In First International Conference on Innovative Computing, Information and Control-Volume I (ICICIC'06) (Vol. 1, pp. 492-495). IEEE.
- Talhaoui, M. Z., and Wang, X. “A new fractional one-dimensional chaotic map and its application in high-speed image encryption”, Information Sciences, 550, 13-26 (2021).
- Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., and Mosavi, M. R. “A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos”, Multimedia Tools and Applications, 74(3), 781-811 (2015).
- Liu, L., Xiang, H., & Li, X. (2021). A novel perturbation method to reduce the dynamical degradation of digital chaotic maps. Nonlinear Dynamics, 103(1), 1099-1115.
- Liu, L., & Miao, S. (2017). Delay-introducing method to improve the dynamical degradation of a digital chaotic map. Information Sciences, 396, 1-13.
- Bak, P., Tang, C., & Wiesenfeld, K. (1988). Self-organized criticality. Physical review A, 38(1), 364.
- Beek, P. J. (1989). Timing and phase locking in cascade juggling. Ecological Psychology, 1(1), 55-96.
- Lorenz, E. N. (1965). On the possible reasons for long-period fluctuations of the general circulation. In Proc. WMO-IUGG Symp. on Research and Development Aspects of Long-Range Forecasting.
- Li, S.J., Chen, G.R., Mou, X.Q.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. J. Bifurc. Chaos 15, 3119–3151 (2004)
- Wang, X., Feng, L., Li, R., & Zhang, F. (2019). A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dynamics, 95(4), 2797-2824.
- Chai, X. (2017). An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimedia Tools and Applications, 76(1), 1159-1175.
- Zhang, Y., & Tang, Y. (2018). A plaintext-related image encryption algorithm based on chaos. Multimedia Tools and Applications, 77(6), 6647-6669.
- Alawida, M., Samsudin, A., Teh, J. S., & Alkhawaldeh, R. S. (2019). A new hybrid digital chaotic system with applications in image encryption. Signal Processing, 160, 45-58