A Synergistic Approach for Enhancing Image Encryption by Implementing Double Random Permutation and Memristive Chaos
Creators
- 1. Department of Computer Science and Information Technology, Central University of (Haryana), Mahendergar, India.
- 1. Department of Computer Science and Information Technology, Central University of (Haryana), Mahendergar, India.
- 2. Assistant Professor, Department of Computer Science and Information Technology, Central University of (Haryana), Mahendergar, India.
Description
Abstract: The growing academic interest in the secure transmission of optical digital images has led to a surge in awareness of information security within photonics circumstances. This work presents a hybrid encryption strategy based on the memristor hyperchaotic system and a double random transform for pictures in the frequency and spatial domains. This study presents a robust and secure picture encryption technique that combines compressed sensing, double random phase encoding (DRPE), and Lorenz map. We also make doublerandom-phase masks using Lorenz maps, which enhance the unpredictability and key sensitivity, thereby improving the security of the encryption method. Experimental studies utilize a range of performance metrics, such as the PSNR, NPCR, MSE, and SSIM, to show the value of the suggested approach.
Files
D457714040425.pdf
Files
(820.3 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:eff82bbf95831695e1383ab7e44c8c36
|
820.3 kB | Preview Download |
Additional details
Identifiers
- DOI
- 10.35940/ijeat.D4577.14040425
- EISSN
- 2249-8958
Dates
- Accepted
-
2025-04-15Manuscript received on 16 November 2024 | First Revised Manuscript received on 01 December 2024 | Second Revised Manuscript received on 17 March 2025 | Manuscript Accepted on 15 April 2025 | Manuscript published on 30 April 2025.
References
- Liang X, Zhang C, Luo Y, Wang X, Qiu K. Secure encryption and key management for OFDM-PON based on chaotic Hilbert motion. Journal of Lightwave Technology. 2023 Mar 15;41(6):1619–25. Doi: https://doi.org/10.1109/jlt.2022.3226768
- Luo Y, Zhang C, Wang X, Liang X, Qiu K. Robust key update with controllable accuracy using support vector machine for secure OFDMAPON. Journal of Lightwave Technology .2023 Jul 15;41(14):4663–71. Doi: https://doi.org/10.1109/jlt.2023.3244202
- Wu T, Zeng W, Liu Y, Song S, Zhao L, Chen C, et al. Secure turbulenceresistant coherent free-space optical communications via chaotic regionoptimized probabilistic constellation shaping. Optics Letters . 2023 Jan24;48(3):684. Doi: https://doi.org/10.1364/ol.480981
- Li C, Lin D, Lü J, Hao F. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia.2018 Oct1;25(4):46–56. Doi: https://doi.org/10.1109/mmul.2018.2873472
- Li X, Zhou L, Tan F. An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks. Soft Computing. 2021 Nov 22;26(2): 511–25. Doi: https://doi.org/10.1007/s00500-021-06500-y
- Tiwari D, Mondal B, Singh SK, Koundal D. Lightweight encryption for privacy protection of data transmission in cyber physical systems. Cluster Computing. 2022 Oct 26;26(4):2351–65. Doi: https://doi.org/10.1007/s10586-022-03790-1
- Ding Y, Liu W, Wang H, Sun K. A new class of discrete modular memristors and application in chaotic systems. The European Physical Journal Plus. 2023 Jul 21;138(7). Doi: https://doi.org/10.1140/epjp/s13360-023-04242-4
- Liu X, Sun K, Wang H, He S. A class of novel discrete memristive chaotic map. Chaos Solitons & Fractals. 2023 Sep 1;174:113791. Doi: https://doi.org/10.1016/j.chaos.2023.113791
- Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons & Fractals. 2021 Nov 1;152:111318. Doi: https://doi.org/10.1016/j.chaos.2021.111318
- Chen L, Li C, Li C. Security measurement of a medical communication scheme based on chaos and DNA coding. Journal of Visual Communication and Image Representation. 2022 Feb 1;83:103424. Doi: https://doi.org/10.1016/j.jvcir.2021.103424
- Hu M, Li J, Di X. Quantum image encryption scheme based on 2D $\varvec{Sine^{2}-Logistic}$ chaotic map. Nonlinear Dynamics. 2022 Oct 23;111(3):2815–39. Doi: https://doi.org/10.1007/s11071-022- 07942-1
- Man Z, Li J, Di X, Zhang R, Li X, Sun X. Research on cloud data encryption algorithm based on bidirectional activation neural network. Information Sciences. 2023 Apr 1;622:629–51 Doi: https://doi.org/10.1016/j.ins.2022.11.089
- Slimane NB, Aouf N, Bouallegue K, Machhout M. A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimedia Tools and Applications. 2018 Jun 4;77(23):30993–1019. Doi: https://doi.org/10.1007/s11042-018-6145-8
- Abduljabbar ZA, Abduljaleel IQ, Ma J, Sibahee M a. A, Nyangaresi VO, Honi DG, et al. Provably secure and fast color image encryption algorithm based on S-Boxes and Hyperchaotic Map. IEEE Access. 2022 Jan 1;10:26257–70. Doi: https://doi.org/10.1109/access.2022.3151174
- Kumari P, Mondal B. An encryption scheme based on grain stream cipher and Chaos for privacy protection of image data on IoT network. Wireless Personal Communications. 2023 Apr 3;130(3):2261–80. Doi: https://doi.org/10.1007/s11277-023-10382-8
- Andono PN, Setiadi DRIM. Improved Pixel and Bit ConfusionDiffusion based on mixed chaos and hash operation for image encryption. IEEE Access. 2022 Jan 1;10:115143–56. Doi: https://doi.org/10.1109/access.2022.3218886
- Zahid AH, Arshad MJ, Ahmad M, Soliman NF, El-Shafai W. Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking. Computers, Materials & Continua/Computers, Materials & Continua (Print). 2023 Jan 1;75(2):3011–26. Doi: https://doi.org/10.32604/cmc.2023.037516
- Manzoor A, Zahid AH, Hassan MT. A new dynamic substitution box for data security using an innovative Chaotic map. IEEE Access. 2022 Jan 1;10:74164–74. Doi: https://doi.org/10.1109/access.2022.3184012
- Mondal B, Singh JP. A lightweight image encryption scheme based on chaos and diffusion circuit. Multimedia Tools and Applications. 2022 Jan 8;81(24):34547–71. Doi: https://doi.org/10.1007/s11042-021- 11657-7
- Durafe A, Patidar V. Comparative analysis of chaotic image encryption using improved 2D Gingerbreadman Map and Chirikov Standard Map. 2022 International Conference for Advancement in Technology (ICONAT) .2022Jan21. Doi: https://doi.org/10.1109/iconat53423.2022.9725986
- Wei D, Jiang M, Deng Y. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Systems With Applications. 2023 Mar1;213:119074. Doi: https://doi.org/10.1016/j.eswa.2022.119074
- Xian Y, Wang X. Fractal sorting matrix and its application on chaotic image encryption. Information Sciences. 2021 Feb 1;547:1154–69. Doi: https://doi.org/10.1016/j.ins.2020.09.055
- Wang X, Yang J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Information Sciences. 2021 Aug 1;569:217–40. Doi: https://doi.org/10.1016/j.ins.2021.04.013
- Chai X, Wang Y, Chen X, Gan Z, Zhang Y. TPE-GAN: Thumbnail preserving encryption based on GAN with key. IEEE Signal Processing Letters. 2022 Jan 1;29:972–6. Doi: https://doi.org/10.1109/lsp.2022.3163685
- Kumari P, Mondal B. Lightweight image encryption algorithm using NLFSR and CBC mode. The Journal of Supercomputing. 2023 May 29;79(17):19452–72. Doi: https://doi.org/10.1007/s11227-023-05415-9
- Liu W, Sun K, He S, Wang H. The Parallel Chaotification Map and its application. IEEE Transactions on Circuits and Systems I Regular Papers. 2023 Sep 1;70(9):3689–98. Doi: https://doi.org/10.1109/tcsi.2023.3279371
- Wang Z, Zhuang L, Yu J, Jiang H, Xu W, Shi X. Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption. Mathematics. 2023 Nov 10;11(22):4613. Doi: https://doi.org/10.3390/math11224613
- USC School of Cinematic Arts. Leena. USC SIPI; n.d. [cited 2024 Sep 25]. https://sipi.usc.edu/database/database.php?volume=misc&image=12#to p
- Suneetha, CH., Surendra, T., & Neelima, CH. (2020). Implementation of Double Fold Text Encryption Based on Elliptic Curve Cryptography (ECC) with Digital Signature. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 5, pp. 3840–3846). Doi: https://doi.org/10.35940/ijrte.e6446.018520
- Munish Mehta, Vijay Goyar, Vishnu Bairwa, Security and Authentication through Text Encryption and Decryption based on Substitution Method. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 9S, pp. 112–115). Doi: https://doi.org/10.35940/ijitee.i1017.0789s19
- Jaswanth, P. V., Reddy, B. R., Kumar, M. S. P., & Priyadarsini, M. J. P. (2020). Color Image Encryption using AES and RSA. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 5, pp. 547–550). Doi: https://doi.org/10.35940/ijeat.e9648.069520
- Muthukrishnan, Dr. R., & Prakash, N. U. (2023). Validate Model Endorsed for Support Vector Machine Alignment with Kernel Function and Depth Concept to Get Superlative Accurateness. In International Journal of Basic Sciences and Applied Computing (Vol. 9, Issue 7, pp. 1–5). Doi: https://doi.org/10.35940/ijbsac.g0486.039723
- Nagar, K., & Chawla, M. P. S. (2023). A Survey on Various Approaches for Support Vector Machine Based Engineering Applications. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 11, pp. 6–11). Doi: https://doi.org/10.35940/ijese.k2555.10111123