Color image encryption using chaotic-based cryptosystem

2024;
: pp. 883–892
https://doi.org/10.23939/mmc2024.03.883
Received: March 14, 2024
Revised: October 26, 2024
Accepted: October 28, 2024

Mamat A. R., Mohamed M. A., Abidin A. F. A., Mohamed R. R., Sambas A., Rusyn V., Lisnichuk A. Ye., Markovych B. M.  Color image encryption using chaotic-based cryptosystem.  Mathematical Modeling and Computing. Vol. 11, No. 3, pp. 883–892 (2024)

1
Universiti Sultan Zainal Abidin Gong Badak
2
Universiti Sultan Zainal Abidin Gong Badak
3
Universiti Sultan Zainal Abidin Gong Badak
4
Universiti Tenaga Nasional
5
Universiti Sultan Zainal Abidin Gong Badak; Universitas Muhammadiyah Tasikmalaya
6
Yuriy Fedkovych Chernivtsi National University
7
Lviv Polytechnic National University
8
Lviv Polytechnic National University

This paper presents research on a proposed project involving image encryption using a chaotic-based cryptosystem.  The purpose is to create an image encryption environment with additional features derived from chaos theory.  This cryptosystem applies the element of uncertainty and sensitivity to initial conditions.  The encryption uses a symmetric key; generating a key is based on a chaotic map — a nonlinear mathematical function that exhibits uncertainty and randomness based on initial values. Any change in the initial conditions affects the function's outcome.  Furthermore, this encryption aims to create a secure image-sharing environment over a public network, as image or text data can be intercepted or eavesdropped on by unauthorized users.  A comparison based on image histogram analysis, pixel changes between the original and encrypted images, and encryption and decryption calculations were performed, demonstrating that the plain image differs from the encrypted image.

  1. Li C., Lin D., Lu J.  Cryptanalyzing an image-scrambling encryption algorithm of pixel bits.  IEEE MultiMedia.  24 (3), 64–71 (2017).
  2. Heron S.  Encryption: Advanced Encryption Standard (AES).  Network Security.  2009 (12), 8–12 (2009).
  3. Vahdati Z., Yasin S. M., Ghasempour A., Salehi M.  Comparison of ECC and RSA Algorithms in IOT Devices.  Journal of Theoretical and Applied Information Technology.  97 (16), 4293–4308 (2019).
  4. Mohamed M. A.  A Survey on Elliptic Curve Cryptography.  Applied Mathematical Sciences.  8 (154), 7665–7691 (2014).
  5. Liu Y., Chen L.  A Survey of Chaos Theory.  Chaos in Attitude Dynamics of Spacecraft. Springer, Berlin, Heidelberg (2013).
  6. Baptista M. S.  Cryptography with chaos.  Physics Letters A.  240 (1–2), 50–54 (1998).
  7. Chlouverakis K. E, Sprott J. C.  Chaotic hyperjerk systems.  Chaos, Solitons & Fractals.  28 (3), 739–746 (2005).
  8. Rusyn V., Mujiarto, Mamat M., Azharul M., Mada Sanjaya W. S., Sambas A., Dwipriyoko E., Sutoni A.  Computer Modelling of the Information Properties of Hyper Chaotic Lorenz System and its Application in Secure Communication System.  Journal of Physics: Conference Series.  1764 (1), 012205 (2021).
  9. Sambas A., Vaidyanathan S., Bonny T., Zhang S., Sukono F., Hidayat Y., Mamat M.  Mathematical Model and FPGA Realization of a Multi-Stable Chaotic Dynamical System with a Closed Butterfly-Like Curve of Equilibrium Points.  Applied Sciences.  11 (2), 788 (2021).
  10. Rusyn V., Subbotin S., Sambas A.  Simple autonomous security system based on Arduino UNO platform and fingerprint scanner module: A study case.  CEUR Workshop Proceedings.  2864, 262–271 (2021).
  11. Pehlivan I., Uyaroglu Y.  A new chaotic attractor from general Lorenz system family and its electronic experimental implementation.  Turkish Journal of Electrical Engineering.  18 (2), 171–184 (2010).
  12. Rusyn V.  Modeling and Research Information Properties of Rucklidge Chaotic System Using LabView.  2017 10th Chaotic Modeling and Simulation International Conference.  739–744 (2017).
  13. Sambas A., Mohammadzadeh A., Vaidyanathan S., Ayob A. F. M., Aziz A., Mohamed M. A., Nawi M. A. A.  Investigation of chaotic behavior and adaptive type-2 fuzzy controller approach for Permanent Magnet Synchronous Generator (PMSG) wind turbine system.  AIMS Mathematics.  8 (3), 5670–5686 (2023).
  14. Rusyn V., Mohamad M., Titaley J., Nainggolan N., Mamat M.  Design, Computer Modelling, Analysis and Control of the New Chaotic Generator.  Journal of Advanced Research in Dynamical & Control Systems.  12, 2306–2311 (2020).
  15. Sambas A., Vaidyanathan S., Zhang S., Zeng Y., Mohamed M. A., Mamat M.  A New Double-Wing Chaotic System with Coexisting Attractors and Line Equilibrium: Bifurcation Analysis and Electronic Circuit Simulation.  IEEE Access.  7, 115454–115462 (2019).
  16. Rusyn V., Khrapko S.  Memristor: Modeling and Research of Information Properties.  11th Chaotic Modeling and Simulation International Conference.  229–238 (2019).
  17. Pecora L. M., Carroll T. L.  Synchronization in chaotic systems.  Physical Review Letters.  64 (8), 821–825 (1990).
  18. Lawande Q. V., Ivan B. R., Dhodapkar S. D.  Chaos based cryptography: a new approach to secure communications.  BARC Newsletter.  258, 1–12 (2005).
  19. Alvarez G., Li S.  Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption.  Communications in Nonlinear Science and Numerical Simulation.  14 (11), 3743–3749 (2009).
  20. Cheng H., Li X.  Partial encryption of compressed images and videos.  IEEE Transactions on Signal Processing.  48 (8), 2439–2451 (2000).
  21. Rhouma R., Belghith S.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos.  Physics Letters A.  372 (38), 5973–5978 (2008).
  22. Gaspard P.  Rossler systems.  Encyclopedia of Nonlinear Science.  231, 808–811 (2005).
  23. Kamali S. H., Shakerian R., Hedayati M., Rahmani M.  A new modified version of Advanced Encryption Standard based algorithm for image encryption.  2010 International Conference on Electronics and Information Engineering, V1-141–V1-145 (2010).
  24. Li S., Zheng X., Mou X., Cai Y.  Chaotic encryption scheme for real-time digital video.  Proceedings of SPIE – The International Society for Optical Engineering.  4666, 149–161 (2002).
  25. Ravishankar K. C., Venkateshmurthy M. G.  Region based selective image encryption.  International Conference on Computing & Informatics.  1–6 (2006).
  26. Van Droogenbroeck M., Benedett R.  Techniques for a selective encryption of uncompressed and compressed images.  Advanced Concepts For Intelligent Vision Systems (ACIVS), Ghent, Belgium.  90–97 (2002).
  27. Yen J.-C., Guo J.-I.  A New Chaotic Image Encryption Algorithm.  IEEE Int. Conf. Circuits and Systems.  4, 49–52 (2000).
  28. Gautam A., Panwar M., Gupta P. R.  A new image encryption approach using block based transformation algorithm.  International Journal of Advanced Engineering Sciences and Technologies.  8 (1), 90–96 (2011).
  29. Agung K., Fatmawati, Suprajitno H.  Image encryption based on pixel bit modification.  Journal of Physics: Conference Series.  1008, 012016 (2018).
  30. Dey S.  SD-EI: A cryptographic technique to encrypt images.  2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).  28–32 (2012).
  31. Nag A., Singh J. P., Khan S., Ghosh S., Biswas S., Sarkar D., Sarkar P. P.  Image encryption using affine transform and XOR operation.  International Conference on Signal Processing, Communication, Computing and Networking Technologies.  309–312 (2011).
  32. Delei J., Sen B., Wenming D.  An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-filter.  2008 International Conference on Computer Science and Software Engineering.  251–255 (2008).