Abstract
Due to the growing of the use of Internet and communication media, image encryption is rapidly increased. Image sharing through unsafe open channels is vulnerable for attacking and stealing. For protecting the images from attacks, encryption techniques are required. Recently, new and efficient chaos-based techniques have been suggested to develop secure image encryption. This study presents a novel image encryption framework based on integrating the chaotic maps and color codes. Three phases are involved in the proposed image encryption technique. Piecewise chaotic linear map (PWLCM) is used in the first phase for permuting the digital image. In the second phase, substitution is done using Hill cipher which is the mixing of color codes with the permuted image. The third phase is implemented by XORing, a sequence generated by the chaotic logistic map (CLM). The proposed approach enhances the diffusion ability of the image encryption making the encrypted images resistant to the statistical differential attacks. The results of several analyses such as information entropy, histogram correlation of adjacent pixels, unified average changing intensity (UACI), number of pixel change rate (NPCR), and peak signal-to-noise ratio (PSNR) guarantee the security and robustness of the proposed algorithm. The measurements show that the proposed algorithm is a noble overall solution for image encryption. Thorough comparison with other image encryption algorithms is also carried out.
Highlights
Images are a substantial source of information not limited to the daily routine of a common person, but having diverse applications in various fields of military, medical, and industry
We may enumerate military image records, trusted video conferencing, satellite imagery, planetary motion images, and keeping a person’s medical record [1]. e requirements of consistent, fast, and robust techniques to store and transmit digital images have led to the development of novel encryption techniques. e information conveyed through images is very complex as compared to simple text
Several assessment criteria including the information entropy, correlation between adjacent pixels, peak signal-tonoise ratio (PSNR), the number of pixels change rate (NPCR), and unified average changing intensity (UACI) related to the image encryption are essential for performance evaluation of the encryption algorithms. e algorithm for which the values of these criteria fulfill the standard expectation level can resist the statistical and differential
Summary
Shamsa Kanwal ,1 Saba Inam, Omar Cheikhrouhou ,2 Kinza Mahnoor, Atef Zaguia, and Habib Hamam. Image sharing through unsafe open channels is vulnerable for attacking and stealing. For protecting the images from attacks, encryption techniques are required. New and efficient chaos-based techniques have been suggested to develop secure image encryption. Is study presents a novel image encryption framework based on integrating the chaotic maps and color codes. Ree phases are involved in the proposed image encryption technique. Piecewise chaotic linear map (PWLCM) is used in the first phase for permuting the digital image. Substitution is done using Hill cipher which is the mixing of color codes with the permuted image. E measurements show that the proposed algorithm is a noble overall solution for image encryption. Orough comparison with other image encryption algorithms is carried out Substitution is done using Hill cipher which is the mixing of color codes with the permuted image. e third phase is implemented by XORing, a sequence generated by the chaotic logistic map (CLM). e proposed approach enhances the diffusion ability of the image encryption making the encrypted images resistant to the statistical differential attacks. e results of several analyses such as information entropy, histogram correlation of adjacent pixels, unified average changing intensity (UACI), number of pixel change rate (NPCR), and peak signal-to-noise ratio (PSNR) guarantee the security and robustness of the proposed algorithm. e measurements show that the proposed algorithm is a noble overall solution for image encryption. orough comparison with other image encryption algorithms is carried out
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.