Enhancing Color Image Security: Encryption with Dynamic Chaotic Three-Dimensional System and Robust Security Analysis
DOI:
https://doi.org/10.23851/mjs.v34i4.1411Keywords:
Chaotic system, Image Encryption, Performance Evaluation, Key generation, Differential and Statistical attackAbstract
The rapid tech growth and widespread internet usage caused a surge in sharing multimedia (text, images, videos, audio) across public networks. Protecting this data is vital, demanding encryption to prevent unauthorized access. Image encryption distorts images for security. This paper highlights encryption's vital role in safeguarding multimedia, especially amid rising internet use and media exchange. It introduces a novel solution: a chaotic three-dimensional system for color image encryption. The study scrutinizes system traits using math software. It employs a new chaotic system to generate a crucial key sequence for pixel scrambling. Utilizing stream cipher encryption enhances security. Extensive security analysis tests its resilience against attacks like histogram and correlation techniques. Results are promising: a fairly uniform histogram, minimal correlation among pixels nearing zero, and entropy close to the ideal. Metrics like NPCR and UACI almost match ideal values, ensuring high security. Experiments confirm its effectiveness in encrypting diverse color images. The approach guarantees a uniform histogram, minimal pixel correlation nearing zero, entropy near the ideal value (8), and NPCR/UACI values close to ideals (99.61191% and 33.41068% respectively).
Received: 29/06/2023
Revised: 19/07/2023
Accepted: 23/07/2023
Downloads
References
H. Broer and F. Takens, Dynamical Systems and Chaos. Springer, New York, 2010.
Wang, X., LI, J., and Fang, J., Si'lnikov chaos of a 3-D quadratic autonomous system with a four-wing chaotic attractor. Proceedings of the 30th Chinese Control Conference, 2011, pp. 22-24.
S. A. Mehdi and Z. L. Ali, A New Six-Dimensional Hyper-Chaotic System, 2019 International Engineering Conference (IEC), IEEE, pp. 211 - 215, 2019.
M. Sueel, Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map. Sadhana, 34(5), pp.689-701, 2009.
S. A. Mehdi and A. A. Kadhim, Image Algorithm Based on a Novel Five Dimensional Hyper Chaotic System and Sudoku Matrix, 2019 International Engineering Conference (IEC), IEEE, pp. 188-193, 2019.
Z. H. Guan, F. Huang, and W. Guan, Chaos Based Image Encryption Algorithm. Physics Letters A,346, pp. 153- 157, 2005.
S. A. Mehdi, Image encryption algorithm based on a novel 4D chaotic system, International Journal of Information Security and Privacy, Vol.15(4), pp. 118-131, 2021.
Y. Zhang, P. Xu and L. Xiang, Research of image encryption algorithm based on chaotic magic square, in: Advances in Electronic Commerce, Web Application and Communication, pp. 103-109, Springer, Berlin, Heidelberg, 2012.
Q. A. Kester, Image encryption based on the RGB pixel transposition and shuffling, Int. J. Comput. Network Inform. Sec. 5 7, pp.43-50, 2013.
X. Wang and D. Luan, A novel image encryption algorithm using chaos and reversible cellular automata, Commun.11. N onlinear Sci. Numer. Simul. V.18, pp. 3075-3085, 2013.
A. N. Abdulraheem and B. M. Nema, "Secure IoT Model Based on PRESENT Lightweight Modified and Chaotic Key Generator," 2020 1st. Information Technology to Enhance e-learning and Other Application (IT-ELA, Baghdad, Iraq, pp. 12-18, 2020.
Downloads
Key Dates
Published
Issue
Section
License
Copyright (c) 2023 Al-Mustansiriyah Journal of Science
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
(Starting May 5, 2024) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgement of the work’s authorship and initial publication in this journal.