Color Image Encryption with a Novel Technique and Chaotic Singer Map
One of the extreme efficient, important, and necessary means used to preserve the information and contents of the image through sending it over the Internet or network communication is image encryption. In this paper, a novel technology for images encryption has been proposed by using different methods. The proposed method consists of five stages. In the first stage, the original color image is divided into eight parts and shuffles it. The second stage separates the R, G, B matrix of the original image and then converts them into a binary code. Third stage generates secret keys by using singer map, where it can generate high pseudorandom sequences with high-speed performance. In the fourth stage, the logical XOR operator is applied to encrypt the image based on the three matrix and secret keys. Fifth stage is the process of decrypting which is the opposite of the encryption process. The suggested approach efficiency is validated via entropy, correlation, UACI and NPCR tests. Likewise, empirical outcomes and security test displayed that the proposed technology achieved secrecy and was capable of facing attacks and challenges.
 Gan Z, Chai X, Zhang M, Lu Y (2018), "A double color image encryption scheme based on three-dimensional brownian motion". Multimed Tools Appl, 77(21):27919–27953.
 Sahari ML, Boukemara I (2018), " A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption". Nonlinear Dyn 94(1):723–744.
 Alvarez G, Li S (2006), "Some basic cryptographic requirements for chaos-based cryptosystems". Int J Bifurc Chaos 16(08):2129–2151.
 Liu H, Kadir A, Niu Y (2014), "Chaos-based color image block encryption scheme using S-box". AEU Int J Electron Commun 68(7):676–686.
 Fridrich J (1998), "Symmetric ciphers based on two-dimensional chaotic maps". Int J Bifurc Chaos 8(06):1259–1284
 Kiraz MS, Uzunkol O (2016), "Efficient and verifiable algorithms for secure outsourcing of cryptographic computations". Int J Inf Secur 15(5):519–537.
 Arpac B, Kurt E., Celik K., Ciylan B., (2020) "Colored Image Encryption and Decryption with a New Algorithm and a Hyperchaotic Electrical Circuit", Journal of Electrical Engineering & Technology, https ://doi.org/10.1007/ s42835-020-00393-x.
 Lian S, Sun J, Wang Z (2005), "Security analysis of a chaos-based image encryption algorithm". Phys A 351(2–4):645–661.
 Benlashram A., Al-Ghamdi M., AlTalhi R. and Laabidi K., (2020), " A novel approach of image encryption using pixel shuffling and 3D chaotic map", Journal of Physics: Conference Series, doi:10.1088/1742-6596/1447/1/012009.
 Pareek N. K., (2012), "Design and analysis of a novel digital image encryption scheme". International Journal of Network Security & Its Applications (IJNSA), 95-108.
 Kiraz MS, Uzunkol O (2016), " Efficient and verifiable algorithms for secure outsourcing of cryptographic computations". International journal of information security, 15(5):519–537.
 Zhang Y., (2020)," A new unified image encryption algorithm based on a lifting transformation and chaos", information science, 547, 307-327, https://doi.org/10.1016/j.ins.2020.07.058.
 Malik D. S. & Shah T., (2020), "Color multiple image encryption scheme based on 3D-chaotic maps", Mathematics and Computers in Simulation 178, 646–666, https://doi.org/10.1016/j.matcom.2020.07.007.
 Liu H., Zhao B., Huang L. & Liu Y, (2020), " A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map", security and communication networks, Article ID 7151836, 12 pages, https://doi.org/10.1155/2020/7151836.
 Jiao k., Ye G., Dong Y., Huang L., & He J., (2020), " Image Encryption Scheme Based on a Generalized Arnold Mapand RSA Algorithm", security and communication networks, Volume 2020, Article ID 9721675, 14 pages, https://doi.org/10.1155/2020/9721675.
 Yasser I., Khalifa F., Mohamed M. A., and Samrah A. S., (2020), "New Image Encryption Scheme Based on Hybrid Chaotic Maps", Volume 2020, Article ID 9597619, 23 pages, https://doi.org/10.1155/2020/9597619
 A. Hadj Brahim, A. Ali Pacha, N. Hadj Said, (2020) " Image encryption based on compressive sensing and chaos systems", Optics and Laser Technology, https://doi.org/10.1016/j.optlastec.2020.106489.
 Mondal B., Mandal T., (2016), "A light weight secure image encryption scheme based on chaos & DNA computing", Journal of King Saud University – Computer and Information Sciences, 29, 499–504,http://dx.doi.org/10.1016/ j.jksuci.2016.02.003
 Yoosefian S., Nezhad D., Safdarian N., Zadeh S., (2020), " New method for fingerprint images encryption using DNA sequence and chaotic tent map", S0030-4026(20)31492, https://doi.org/10.1016/j.ijleo.2020.165661.
 Chuang L.Y., Yang C.H., Li J.C., (2011), "Chaotic maps based on binary particle swarm optimization for feature selection". Applied Soft Computing. 11(1), 239–248.
 Luo H. and Ge B.,(2019), "Image encryption based on Henon chaotic system with nonlinear term", Multimedia Tools and Applications, vol. 78, no. 24, pp. 34323–34352.
 Amina S. and Mohamed F.K., (2018), "An efficient and secure chaotic cipher algorithm for image content preservation", Communications in Nonlinear Science and Numerical Simulation", vol. 60, pp. 12–32.
 Alawida M., Samsudin A., The J. S., and Alkhawaldeh R.S., (2019), "A new hybrid digital chaotic system with applications in image encryption" Signal Processing, vol. 160, pp. 45–58.
 Hasnat A., Barman D. and Mandal S. N., (2016), "A novel image encryption algorithm using pixel shuffling and pixel intensity reversal". International Conference on Emerging Technological Trends [ICETT].
 Hossain, M, Rahman, M, Rahman, A and Islam, S (2014), "A new approach of image encryption using 3D chaotic map to enhance security of multimedia component". 3rd International Conference on Informatics, Electronics & Vision.
 Jose A.P., Artiles, Chaves D. P. B., Pimentel C., (2019), "Image encryption using block cipher and chaotic sequences", Signal Processing: Image Communication, https://doi.org/10.1016/j.image.2019.08.014
Copyright (c) 2021 omar younis
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License [CC BY-NC-SA 4.0] that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work, with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online.