Author:
Alkhonaini Mimouna Abdullah,Gemeay Entesar,Zeki Mahmood Firas Muhammad,Ayari Mohamed,Alenizi Farhan A.,Lee Sangkeum
Abstract
AbstractDue to their simplicity of implementation and compliance with the encryption issue, chaotic models are often utilized in picture encryption applications. Despite having many benefits, this approach still has a crucial space issue that makes encryption algorithms based on it susceptible to brute-force assaults. This research’s proposed novel picture encryption technique has a vast key space and great key sensitivity. To achieve this goal, the proposed method combines two-way chaotic maps and reversible cellular automata (RCA). First, this approach uses a two-way chaotic model named spatiotemporal chaos for image confusion. This step includes permuting the image pixels using a chaotic map at the byte level. Then, the RCA model is utilized for image diffusion. In this step, the RCA model iterates over image pixels to modify them at the bit level. The method’s performance in encrypting grayscale images was evaluated using various analysis methods. According to the results, the proposed method is a compelling image encryption algorithm with high robustness against brute-force, statistical, and differential attacks.
Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. Arul Murugan, C. & KarthigaiKumar, P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms. Mob. Netw. Appl. 1, 1–6 (2018).
2. Zeng, W. et al. (eds) Multimedia Security Technologies for Digital Rights Management (Elsevier, 2011).
3. Kumari, M., Gupta, S. & Sardana, P. A survey of image encryption algorithms. 3D Res. 8(4), 1–35 (2017).
4. Ibrahim, D. R., Teh, J. S. & Abdullah, R. An overview of visual cryptography techniques. Multimed. Tools Appl. 80(21), 31927–31952 (2021).
5. Samiullah, M. et al. Rating of modern color image cryptography: A next-generation computing perspective. Wirel. Commun. Mob. Comput. 2022, 7277992 (2022).