Affiliation:
1. School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
Abstract
In today’s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor product, Hill cipher, and sigmoid logistic Map. Our proposed algorithm begins by shifting the values in each row of the state matrix to the left by a predetermined number of positions, then encrypting the resulting image using the Hill Cipher. The top value of each odd or even column is used to perform an xor operation with all values in the corresponding even or odd column, excluding the top value. The resulting image is then diffused using a sigmoid logistic map and subjected to the Kronecker xor product operation among the pixels to create a secure image. The image is then diffused again with other keys from the sigmoid logistic map for the final product. We compared our proposed method to recent work and found it to be safe and efficient in terms of performance after conducting statistical analysis, differential attack analysis, brute force attack analysis, and information entropy analysis. The results demonstrate that our proposed method is robust, lightweight, and fast in performance, meets the requirements for encryption and decryption, and is resistant to various attacks.
Funder
National Natural Science Foundation of China
Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund
Liaoning Province Science and Technology Innovation Leading Talents Program Project
Key R&D Projects of Liaoning Province
Jinan City 20 Universities Funding Projects Introducing Innovation Team Program
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference40 articles.
1. Ramasamy, P., Ranganathan, V., Kadry, S., Damaševičius, R., and Blažauskas, T. (2019). An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using Enhanced Logistic-Tent Map. Entropy, 21.
2. 2D Logistic-Sine-coupling map for image encryption;Hua;Signal Process.,2018
3. Numerical study of quadratic area-preserving mappings;Q. Appl. Math.,1969
4. Logistic map: A possible random-number generator;Phatak;Phys. Rev. E,1995
5. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain;Ravichandran;Med Biol. Eng. Comput.,2021
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Chaos based image encryption scheme to secure sensitive multimedia content in cloud storage;Expert Systems with Applications;2024-12
2. A Review of Genome to Chaos: Exploring DNA Dynamics in Security;Multimedia Tools and Applications;2024-08-24
3. Photo Management Assistant;2024 5th International Conference on Computer Engineering and Application (ICCEA);2024-04-12
4. Secured Quantum Image Communication Using New Two Dimensional Chaotic Map Based Encryption Methods;International Journal of Theoretical Physics;2024-02-16
5. Industry 4.0;Advances in Logistics, Operations, and Management Science;2024-01-19