
تعداد نشریات | 21 |
تعداد شمارهها | 610 |
تعداد مقالات | 9,027 |
تعداد مشاهده مقاله | 67,082,819 |
تعداد دریافت فایل اصل مقاله | 7,656,334 |
MLCM: An efficient image encryption technique for IoT application based on multi-layer chaotic maps | ||
International Journal of Nonlinear Analysis and Applications | ||
مقاله 129، دوره 13، شماره 2، مهر 2022، صفحه 1591-1615 اصل مقاله (1.28 M) | ||
نوع مقاله: Research Paper | ||
شناسه دیجیتال (DOI): 10.22075/ijnaa.2022.6571 | ||
نویسندگان | ||
Kadhum Al-Majdi1؛ Ahmed Salman2؛ Noor Alhuda Abbas2؛ Mohammed Mahdi Hashim3؛ Mustafa Taha4؛ Abdullah Abdulabbas Nahi4؛ Salim Saleh4، 5 | ||
1Ashur University College, Baghdad, Iraq | ||
2Department of Computer Technologies Engineering, AL-Esraa University College, Baghdad, Iraq | ||
3Faculty of Engineering, Uruk University, Baghdad, Iraq | ||
4Department of Computer Science, Cihan University-Erbil, Kurdistan Region, Iraq | ||
5Department of Mathematics, Hodeidah University-Hodeidah, Yemen | ||
تاریخ دریافت: 19 دی 1400، تاریخ بازنگری: 01 اسفند 1400، تاریخ پذیرش: 05 فروردین 1401 | ||
چکیده | ||
The importance of image encryption has considerably increased especially after the dramatic evolution of the internet of things (IOT) and due to the simplicity of capturing and transferring digital images. Although there are several encryption approaches, chaos-based image encryption is considered the most appropriate approach for image applications because of its sensitivity to initial conditions and control parameters. This research aims at generating an encrypted image free of statistical information to make cryptanalysis infeasible. Therefore, a new method was introduced in this paper called Multi-layer Chaotic Maps (MLCM) based on confusion and diffusion. Basically, the confusion method uses the Sensitive Logistic Map (SLM), Hénon Map, and the additive white Gaussian noise to generate random numbers to be used in the pixel permutation method. However, the diffusion method uses Extended Bernoulli Map (EBM), Tinkerbell, Burgers, and Ricker maps to generate the random matrix. The correlation between adjacent pixels was minimized to have a very small value $(x 10-3)$. Besides, the keyspace was extended to be very large $\left(2^{450}\right)$ considering the key sensitivity to hinder brute force attack. Finally, a histogram was idealized to be perfectly equal in all occurrences and the resulted information entropy was equal to the ideal value(8), which means that the resulted encrypted image is free of statistical properties in terms of histogram and information entropy. Based on the findings, the high randomness of the generated random sequences of the proposed confusion and diffusion methods is capable of producing a robust image encryption framework against all types of cryptanalysis attacks. | ||
کلیدواژهها | ||
IoT applications؛ Chaotic Maps؛ Image encryption؛ Logistic Map؛ Bernoulli Map | ||
مراجع | ||
[1] M.Z. Abdullah and Z.J. Khaleefah, Design and implement of a hybrid cryptography textual system, Int. Conf. Engin. Technol. (ICET), 2017, pp. 1–6. [2] M.A. Al-Khasawneh, I. Uddin, S.A.A. Shah, A.M. Khasawneh, L. Abualigah and M. Mahmoud, An improved chaotic image encryption algorithm using hadoop-based mapreduce framework for massive remote sensed images in parallel iot applications, Cluster Comput. 25 (2022), no. 2, 999–1013. [3] X. Bai, L. Zhang, J. Li, Z. Yu, Z. Yang, Y. Wang, X. Chen and X. Zhou, Coherent imaging of objects through thin-layer highly scattering medium based on optical encryption, Optics Commun. 506 (2022), 127558. [4] E. Balamurugan, L.R. Flaih, D. Yuvaraj, K. Sangeetha, A. Jayanthiladevi and T.S. Kumar, Use case of artificial intelligence in machine learning manufacturing 4.0, Int. Conf. Comput. Intell. Knowledge Econ. (ICCIKE), 2019, pp. 656–659. [5] M. Budiman, A neural cryptography approach for digital image security using vigenere cipher and tree parity machine, J. Phys.: Conf. Ser. 1898 (2021), 012039. [6] J. Choi and N. Y. Yu, Secure image encryption based on compressed sensing and scrambling for internet-ofmultimedia things, IEEE Access 10 (2022), 10706–10718. [7] V. Dahiphale, G. Bansod, and J. Patil, Anu-ii: A fast and efficient lightweight encryption design for security in iot, Int. Conf. Big Data, IoT and Data Sci. (BID), 2017, pp. 130–137. [8] K. Dharavathu and S.A. Mosa. Efficient transmission of an encrypted image through a mimo–ofdm system with different encryption schemes, Sens. Imag. 21 (2020), no. 1, 1–31. [9] R. Durga, E. Poovammal, K. Ramana, R.H. Jhanveri, S. Singh and B. Yoon. Ces blocks-a novel chaotic encryption schemes based blockchain system for an iot environment, IEEE Access 10 (2022), 11354–11371. [10] M. Farah, A. Farah and T. Farah, An image encryption scheme based on a new hybrid chaotic map and optimized substitution box, Nonlinear Dyn. 99 (2020), no. 4, 3041–3064. [11] V. Gaur, R.K. Gujral, A. Mehta, N. Gupta and R. Bansal, Enhanced digital image encryption using sine transformed complex chaotic sequence, Proc. Int. Conf. Artific. Intell. Appl., 2021, pp. 149–160. [12] A. Hafsa, A. Sghaier, J. Malek, and M. Machhout, Image encryption method based on improved ecc and modified aes algorithm, Multimedia Tools Appl. 80 (2021), no. 13, 19769–19801. [13] M. Hashim, M.S. Taha, A.H.M. Aman, A.H.A. Hashim, M.S.M. Rahim and S. Islam, Securing medical data transmission systems based on integrating algorithm of encryption and steganography, 7th Int. Conf. Mechatronics Engin. (ICOM), 2019, pp. 1–6. [14] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in fingerprints based steganography, Proc. 3rd Int. Symp. Comput. Sci. Intell. Control, 2019, pp. 1–8. [15] Z. Hu and S. Kais, A quantum encryption design featuring confusion, diffusion, and mode of operation, arXiv preprint arXiv:2010.03062, (2020).[16] Z. Hua, Y. Zhou and H. Huang, Cosine-transform-based chaotic system for image encryption, Inf. Sci. 480 (2019), 403–419. [17] S.T. Kamal, K.M. Hosny, T.M. Elgindy, M.M. Darwish and M.M. Fouda, A new image encryption algorithm for grey and color medical images, IEEE Access 9 (2021), 37855–37865. [18] J. Khan, J. P. Li, B. Ahamad, S. Parveen, A.U. Haq, G.A. Khan and A.K. Sangaiah, Smsh: Secure surveillance mechanism on smart healthcare iot system with probabilistic image encryption, IEEE Access 8 (2020), 15747– 15767. [19] P.R. Krishna, C.V.S. Teja and V. Thanikaiselvan, A chaos based image encryption using Tinkerbell map functions, Second Int. Conf. Electron. Commun. Aerospace Technol. (ICECA), 2018, pp. 578–582. [20] K.S. Kumar, G. Sreenivasulu and S. V. Rajan, Block based svd approach for additive white gaussian noise level estimation in satellite images, 3rd Int. Conf. Comput. Sustain. Glob. Dev. (INDIACom), 2016, pp. 1464–1468. [21] T. M. Kumar, K.S. Reddy, S. Rinaldi, B.D. Parameshachari and K. Arunachalam, A low area high speed fpga implementation of aes architecture for cryptography application, Electron. 10 (2021), no. 16, 2023. [22] V. Kumar and A. Girdhar, A 2d logistic map and lorenz-rossler chaotic system based rgb image encryption approach, Multimedia Tools Appl. 80 (2021), no. 3, 3749–3773. [23] B. Li, Y. Feng, Z. Xiong, W. Yang and G. Liu. Research on ai security enhanced encryption algorithm of autonomous iot systems, Inf. Sci. 575 (2021), 379–398. [24] W. Li, X. Chang, A. Yan and H. Zhang, Asymmetric multiple image elliptic curve cryptography, Optics Lasers Engin. 136 (2021), 106319. [25] C.-H. Lin, G.-H. Hu, C.-Y. Chan and J.-J. Yan, Chaos-based synchronized dynamic keys and their application to image encryption with an improved aes algorithm, Appl. Sci. 11 (2021), no. 3, 1329. [26] A.A. Maryoosh, Z.S. Dhaif and R.A. Mustafa, Image confusion and diffusion based on multi-chaotic system and mix-column, Bull. Electric. Engin. Inf. 10 (2021), no. 4, 2100–2109. [27] M.M. Matalgah and A.M. Magableh, Simple encryption algorithm with improved performance in wireless communications, IEEE Radio Wireless Symp., 2011, pp. 215–218. [28] A.N. Mazher and J. Waleed, Implementation of modified gso based magic cube keys generation in cryptography, Eastern-Eur. J. Enterprise Technol. 1 (2021), no. 9, 43–49. [29] S. Medileh, A. Laouid, R. Euler, A. Bounceur, M. Hammoudeh, M. AlShaikh, A. Eleyan and O.A. Khashan, A flexible encryption technique for the internet of things environment, Ad Hoc Networks 106 (2020), 102240. [30] G. Ming, Eagle: A new symmetric encryption algorithm against any linear attacks and differential attacks (the existence of one-way function means p!= np), preprint. [31] P. Mohanakrishnan, K. Suthendran, S. Arumugam and T. Panneerselvam. Mixed noise elimination and data hiding for secure data transmission, Int. Conf. Theor. Comput. Sci. Discrete Math. 2016, pp. 156–164. [32] A. S. Muhammad and F. Ozkaynak, ¨ Siea: secure image encryption algorithm based on chaotic systems optimization algorithms and pufs, Symmetry 13 (2021), no. 5, 824. [33] K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S.W. Baik, Secure surveillance framework for iot systems using probabilistic image encryption, IEEE Trans. Ind. Inf. 14 (2018), no. 8, 3679–3689. [34] R. Munir. A block-based image encryption algorithm in frequency domain using chaotic permutation, 8th Int. Conf. Telecommun. Syst. Serv. Appl.(TSSA), 2014, pp. 1-5. [35] P.S.K. Oberko, V.-H.K.S. Obeng, and H. Xiong, A survey on multi-authority and decentralized attribute-based encryption, J. Ambient Intell. Humanized Comput. 13 (2022), no. 1, 515–533 [36] A. Ouannas, A.-A. Khennaoui, S. Bendoukha, T.P. Vo, V.-T. Pham and V.V. Huynh, The fractional form of the tinkerbell map is chaotic, Appl. Sci. 8 (2018), no. 12, 2640. [37] A. G. Radwan, On some generalized discrete logistic maps, J. Adv. Res. 4 (2013), no. 2, 163–171. [38] A. Sahasrabuddhe and D.S. Laiphrakpam, Multiple images encryption based on 3d scrambling and hyper-chaoticsystem, Inf. Sci. 550 (2021), 252–267. [39] R. Senkerik, M. Pluhacek, I. Zelinka and Z.K. Oplatkova, Utilization of the discrete chaotic systems as the pseudo random number generators, Modern Trends Tech. Comput. Sci., Springer, Cham, 2014, pp. 155–164. [40] A.A. Shah, S.A. Parah, M. Rashid and M. Elhoseny, Efficient image encryption scheme based on generalized logistic map for real time image processing, J. Real-Time Image Process. 17 (2020), no. 6, 2139–2151. [41] M.H. Shukur, Design a mobile medication dispenser based on iot technology, 3rd Int. Conf. Commun. Engin. Comput. Sci. (CIC-COCOS19), 2019. [42] M.S. Taha, M.S.M. Rahim, S.A. Lafta, M.M. Hashim and H.M. Alzuabidi, Combination of steganography and cryptography: A short survey, IOP Conf. Series: Mater. Sci. Engin. 518 (2019), 052003. [43] M.S.H. Talpur, M.Z.A. Bhuiyan and G. Wang. Shared–node iot network architecture with ubiquitous homomorphic encryption for healthcare monitoring, Int. J. Embed. Syst. 7 (2015), no. 1, 43–54. [44] A. Toktas, U. Erkan and D. Ustun. An image encryption scheme based on an optimal chaotic map derived by multi-objective optimization using abc algorithm, Nonlinear Dyn. 105 (2021), no. 2, 1885–1909. [45] D. Trujillo-Toledo, O. L´opez-Bonilla, E. Garcia-Guerrero, E. Tlelo-Cuautle, D. L´opez-Mancilla, O. Guill´enFern´andez, and E. Inzunza-Gonz´alez, Real-time rgb image encryption for iot applications using enhanced sequences from chaotic maps, Chaos, Solitons Fractals 153 (2021), 111506. [46] A.S. Unde and P. Deepthi. Design and analysis of compressive sensing-based lightweight encryption scheme for multimedia iot, IEEE Trans. Circ. Syst. II: Express Briefs 67 (2019), no. 1, 167–171. [47] H. Wang, J. Wang, Y.-C. Geng, Y. Song and J.-Q. Liu, Quantum image encryption based on iterative framework of frequency-spatial domain transforms, Int. J. Theor. Phys. 56 (2017), no. 10, 3029–3049. [48] J. Wu, X. Liao and B. Yang, Image encryption using 2d he´non-sine map and dna approach, Signal Process. 153 (2018), 11–23. [49] W. Zhang, Z. Zhu and H. Yu, A symmetric image encryption algorithm based on a coupled logistic–bernoulli map and cellular automata diffusion strategy, Entropy 21 (2019), no. 5, 504. [50] X. Zhang, G. Zhu and S. Ma, Remote-sensing image encryption in hybrid domains, Optics Commun. 285 (2012), no. 7, 1736–1743. | ||
آمار تعداد مشاهده مقاله: 44,030 تعداد دریافت فایل اصل مقاله: 576 |