A New Image Encryption Algorithm Using a Hyperchaotic Lorenz System to Produce Efficient and Sufficiently Swift Responses to Different Security Needs of Clients
الموضوعات : فصلنامه نانوساختارهای اپتوالکترونیکیZahra Kaviyani 1 , Mahnaz Mohammadi 2 , abbas kamaly 3
1 - Department of Electrical Engineering Telecommunications, Faculty of Engineering Sciences, Shiraz Branch, Islamic Azad University, Shiraz, Iran
2 - Department of Electrical Engineering Telecommunications, Faculty of Engineering Sciences, Shiraz Branch, Islamic Azad University, Shiraz, Iran
3 - Department of Electrical Engineering, Faculty of Engineering Sciences, Fasa Branch, Islamic Azad University, Fasa, Iran
الکلمات المفتاحية: Hyperchaotic Sequences, Image Decryption, Image Encryption, Symmetric,
ملخص المقالة :
Abstract
This paper proposes a new plaintext-related mechanism based on plaintext encryption. For simplicity, PCODE was proposed as the image encryption code. The original picture was encoded to get the proposed encryption and plaintext encryption with a chaotic sequence to control the PCODE rules. Another chaotic sequence was encoded into a PCODE sequence for the PCODE XOR operation. The remaining two chaotic sequences were then processed with the proposed scheme to get two key streams for the permutation phase. The cipher image was obtained after the conventional permutation and PCODE XOR operations. The use of the proposed plaintext encryption leads to the correlation between the keystreams used in the displacement phase and both the secret key and the plaintext image. This correlation increases the sensitivity and security of the encryption system with respect to the plaintext. The experimental findings from simulation show that the proposed encryption system shows significant efficiency and security.
[1] Ning, H., Liu, H., Ma, J., Yang, L. T., & Huang, R.. Cybermatics: Cyber–physical–social–thinking hyperspace based science and technology. Future generation computer systems, 56, (2016) 504-522.
Available:https://www.sciencedirect.com/science/article/abs/pii/S0167739X15002356
[2] Amor, A. B., Abid, M., & Medb, A. Secure blockchain-based e-learning scheme. IEEE Access, 8, (2020) 31920-31933.
Available:https://ieeexplore.ieee.org/ielaam/6287639/8600701/8917991-aam.pdf
[3] Ding, S., Li, C., & Li, H. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 6, (2018) 27336-27345.
Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8359407
[4] Zhang, Y., Li, J., & Yan, H. Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure. IEEE Access, 7, (2019) 47982-47990.
Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8681522
[5] Ning, J., Cao, Z., Dong, X., & Wei, L. White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Transactions on Dependable and Secure Computing, 15(5), (2016) 883-897.
[6] Chuman, T., Sirichotedumrong, W., & Kiya, H. Encryption-then-compression systems using grayscale-based image encryption for jpeg images. IEEE Transactions on Information Forensics and security, 14(6), (2018)1515-1525. Available: https://ieeexplore.ieee.org/document/8537968
[7] Yang, Y. G., Zou, L., Zhou, Y. H., & Shi, W. M. Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik, 213, (2020) 16442 Available:https://www.sciencedirect.com/science/article/abs/pii/S0030402620302564
[8] Ghadirli, H. M., Nodehi, A., & Enayatifar, R. An overview of encryption algorithms in color images. Signal Processing, 164, (2019)163-185.
Available:https://www.sciencedirect.com/science/article/abs/pii/S016516841930218X
[9] Farah, M. B., Farah, A., & Farah, T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, (2019) 1-24.
Available:https://www.hindawi.com/journals/complexity/2020/9597619/
[10] Khan, P. W., & Byun, Y. A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy, 22(2), (2020) 175.
Available: https://www.mdpi.com/1099-4300/22/2/175
[11] Mondal, B., Kumar, P., & Singh, S. A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools and Applications, 77(23), (2018) 31177-31198.
Available: https://link.springer.com/article/10.1007/s11042-018-6214-z
[12] Chowdhary, C. L., Patel, P. V., Kathrotia, K. J., Attique, M., Perumal, K., & Ijaz, M. F. Analytical study of hybrid techniques for image encryption and decryption. Sensors, 20(18), (2020) 5162.
Available: https://www.mdpi.com/1424-8220/20/18/5162
[13] Wang, J., Zhi, X., Chai, X., & Lu, Y. Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion. Multimedia Tools and Applications, 1-36. (2021)
Available: https://link.springer.com/article/10.1007/s11042-020-10413-7
[14] Bashier, E., & Jabeur, T. B. An Efficient Secure Image Encryption Algorithm Based on Total Shuffling, Integer Chaotic Maps and Median Filter (No. 5028). (2021) EasyChair.
Available: https://jisis.org/article/jisis-2021-vol11-no2-04/69464/
[15] Zhang, L., Liang, P., & Mu, Y. Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 6, (2018) 12736-12745.
Available :https://ro.uow.edu.au/cgi/viewcontent.cgi?article=228
[16] Alshehri, M., & Panda, B. Minimizing Data Breach by a Malicious Blockchain Node within a Blockchain Federation. 7th IEEE International Conference on Cyber Security and Cloud Computing (2020, August) (pp. 36-43). Available :https://www.researchgate.net/publication/343756473
[17] Ismail, S. M., Said, L. A., Radwan, A. G., Madian, A. H., & Abu-ElYazeed, M. F. A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Processing, 167, (2020) 107280.
Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9387309
[18] Ahmad, M., Al Solami, E., Wang, X. Y., Doja, M. N., Beg, M. M., & Alzaidi, A. Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos. Symmetry, 10(7), (2018) 266.
Available:https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9465166R
[19] Yahyazadeh , Z.Hashempour , Effect of Hydrostatic Pressure on Optical Absorption Coefficient of InGaN/GaN of Multiple Quantum Well Solar Cells , (Spring 2021). Vol. 6, No. 2.
[20] M. Mohammadi , A.Zolghadr , M. Pourmina , Comparison of two Public Key Cryptosystems, Summer 2018 / Vol. 3, No. 3.
[21] M.Momeni , M Javadian Sarraf , F.Khatib ,Design of high sensitivity and high FoM refractive index biosensor based on 2D-photonic crystal, Winter 2021 / Vol. 6, No. 1.
[22] M.Rajaee, S. Rabiee , Analysis and Implementation of a New Method to Increase the Efficiency of Photovoltaic Cells by Applying a Dual Axis Sun Tracking System and Fresnel Lens Array, Summer 2021 / Vol. 6, No. 3.
[23] Sh.Shahi, P. Momayezan , M. Ranjbaran, S. Wadi Harun, Observation of Raman Gain in Reduced Length of Bismuth Erbium Doped Fiber, Summer 2020 / Vol. 5, No. 3.
[24] Wang, Q., Peng, L., Xiong, H., Sun, J., & Qin, Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access, 6, (2017) 760-771.
Available: https://ieeexplore.ieee.org/document/8119793
[25] Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. Blockchain computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), (2017) 34-42.
Available:https://www.sciencedirect.com/science/article/pii/S187705091830872X