Abstract

In the age of Information Technology, the day-life required transmitting millions of images between users. Securing these images is essential. Digital image encryption is a well-known technique used in securing image content. In image encryption techniques, digital images are converted into noise images using secret keys, where restoring them to their originals required the same keys. Most image encryption techniques depend on two steps: confusion and diffusion. In this work, a new algorithm presented for image encryption using a hyperchaotic system and Fibonacci Q-matrix. The original image is confused in this algorithm, utilizing randomly generated numbers by the six-dimension hyperchaotic system. Then, the permutated image diffused using the Fibonacci Q-matrix. The proposed image encryption algorithm tested using noise and data cut attacks, histograms, keyspace, and sensitivity. Moreover, the proposed algorithm’s performance compared with several existing algorithms using entropy, correlation coefficients, and robustness against attack. The proposed algorithm achieved an excellent security level and outperformed the existing image encryption algorithms.

Highlights

  • The transmission of digital images through various networks is a routine process where thousands of digital images are transmitted every moment

  • The authors proposed a new algorithm for gray image encryption

  • The Fibonacci Q-matrix is integrated with a 6D hyperchaotic system

Read more

Summary

Introduction

The transmission of digital images through various networks is a routine process where thousands of digital images are transmitted every moment. Users do not want others to access their images. Medical images are sensitive where any misuse of these images may lead to wrong diagnoses and inaccurate medical decisions. Transmission of the military images via different networks requires high-security levels to prevent intruders from getting them. Owners of digital images do not want others to access their images without permission. For these reasons, securing images’ contents has become an important issue. Several security approaches are used to achieve image confidentiality, so an unauthorized user cannot access image content

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call