Abstract

The need for cybersecurity increases to protect the exchange of information for improving the data privacy. This paper presents an investigation of the encryption efficiency of the chaotic-based image block ciphering in the spatial and Fractional Fourier Transform (FrFT) domains. The main aim of this investigation is to examine the efficiency of different chaotic maps, while considering the parameters of the FrFT as additional keys for encryption and achieving reliable cybersecurity for robust image communication. In this paper, Cat, Baker, and Logistic map confusion approaches are applied in the spatial and FrFT domains to study and analyze the cybersecurity and ciphering efficiency of chaos-based image cryptosystems. The confusion features of the chaotic maps in spatial and FrFT domains are investigated using information entropy, differential analysis, histograms, visual observation, attack analysis, impact of noise, and encryption quality tests. Simulation results prove that the chaotic-based image encryption in the FrFT domain increases the efficiency of the confusion process and achieves a high nonlinear relation between the plainimage and the cipherimage in a symmetric ciphering approach. Moreover, the results demonstrate that the Cat-FrFT scheme is more susceptible to channel noise attacks than the Baker-FrFT and the Logistic-FrFT schemes. Hence, they can be implemented efficiently in the scenarios of noisy channels due to their high robustness to channel noise.

Highlights

  • Cybersecurity comprises data security, the applications, and infrastructure utilized for storing, processing, and transmitting information

  • In this paper, we consider the parameters of the 2D Fractional Fourier Transform (FrFT) as additional keys for an efficient encryption process

  • The resulting ciphered images in the spatial and FrFT domains utilizing various chaotic maps are shown in Table 2 for the Cameraman, Peppers, and Boat images

Read more

Summary

INTRODUCTION

Cybersecurity comprises data security, the applications, and infrastructure utilized for storing, processing, and transmitting information. In [23], a color image ciphering algorithm based on a high-dimension chaotic map framework and a bit-level spatial permutation technique was investigated. In [26], the authors introduced a chaos-based selective image cryptosystem to achieve minimization of the communication overhead, low computational cost, and an efficient security performance in the presence of different types of multimedia attacks. This cryptosystem is based on employing the skew Tent chaotic map. The main contribution of this work is investigating and combining the main advantages of the FrFT and chaotic map encryption schemes for efficient transmission of digital images, securely. In this paper, we consider the parameters of the 2D FrFT as additional keys for an efficient encryption process

CHAOTIC MAP ENCRYPTION
CHAOTIC LOGISTIC MAP
SIMULATION RESULTS
VISUAL RESULTS
ENCRYPTION QUALITY ANALYSIS
DIFFERENTIAL ANALYSIS
KPA AND CPA ANALYSIS
EFFECT OF NOISE
FEATURE SIMILARITY INDEX
EFFECT OF FRFT ANGLES
VIII. CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.