Affiliation:
1. Faculty of Computer Science, Dian Nuswantoro University, Semarang 50131, Indonesia
Abstract
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.
Funder
Directorate General of Higher Education, Research and Technology of Indonesia
Subject
Applied Mathematics,Modeling and Simulation,General Computer Science,Theoretical Computer Science
Reference42 articles.
1. An Overview of Encryption Algorithms in Color Images;Ghadirli;Signal Process.,2019
2. Digital Image Steganography Survey and Investigation (Goal, Assessment, Method, Development, and Dataset);Setiadi;Signal Process.,2023
3. Santos, D.F., and Espitia, H.E. (2022). Secure Medical Image Transmission Scheme Using Lorenz’s Attractor Applied in Computer Aided Diagnosis for the Detection of Eye Melanoma. Computation, 10.
4. Medical Image Cryptosystem Using Dynamic Josephus Sequence and Chaotic-Hash Scrambling;Setiadi;J. King Saud Univ.—Comput. Inf. Sci.,2022
5. Alnajim, A.M., Abou-Bakr, E., Alruwisan, S.S., Khan, S., and Elmanfaloty, R.A. (2023). Hybrid Chaotic-Based PRNG for Secure Cryptography Applications. Appl. Sci., 13.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献