Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q-Matrix

Published: 28 June 2024 Publication History

Abstract

This article proposed an image encryption scheme along a novel five-dimensional hyperchaotic system and a Fibonacci Q-matrix (FQ-matrix) for gray images. This designed algorithm follows two key stages: the confusion stage and the diffusion stage. In the confusion step and diffusion step, the placement of the plain image pixels is replaced by a 5D hyperchaotic map and pixel values are changed using the FQ-matrix, respectively. The fortitude of the designed encryption scheme is concluded by countering the algorithm on statistical analysis like histogram analysis, chi-square test, correlation coefficient analysis, information entropy analysis, differential attacks (NPCR, UACI), and NIST suite test. The produced algorithm’s experimental evaluation indicates that the entropy, NPCR, and UACI values tend to be ideal values. The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.

References

[1]
F. Yu, Z. Zhang, L. Liu, H. Shen, Y. Huang, C. Shi, S. Cai, Y. Song, S. Du, and Q. Xu, “Secure communication scheme based on a new 5d multistable four-wing memristive hyperchaotic system with disturbance inputs,” Complexity, vol. 2020, pp. 1–16, 2020.
[2]
P. Rashmi, M. Supriya, and Q. Hua, “Enhanced lorenz-chaotic encryption method for partial medical image encryption and data hiding in big data healthcare,” Security and communication networks, vol. 2022, 2022.
[3]
B. Zolfaghari and T. Koshiba, “Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap,” Applied System Innovation, vol. 5, no. 3, 2022.
[4]
R. A. Matthews, “The use of genetic algorithms in cryptanalysis,” Cryptologia, vol. 17, no. 2, pp. 187–201, 1993.
[5]
N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006.
[6]
X. Wang, L. Teng, and X. Qin, “A novel colour image encryption algorithm based on chaos,” Signal Processing, vol. 92, no. 4, pp. 1101–1108, 2012.
[7]
C. Li, G. Luo, K. Qin, and C. Li, “An image encryption scheme based on chaotic tent map,” Nonlinear Dynamics, vol. 87, no. 1, pp. 127–133, 2017.
[8]
S. S. Askar, A. A. Karawia, A. Al-Khedhairi, and F. S. Al-Ammar, “An algorithm of image encryption using logistic and two-dimensional chaotic economic maps,” Entropy, vol. 21, no. 1, 2019.
[9]
Q. Lai, G. Hu, U. Erkan, and A. Toktas, “A novel pixel-split image encryption scheme based on 2d salomon map,” Expert Systems with Applications, vol. 213, 2023.
[10]
S. Khaitan, S. Sagar, and R. Agarwal, “Withdrawn: chaos based image encryption using 3-dimension logistic mapdimension logistic map,” Materials Today: Proceedings, 2021.
[11]
B. Ran, T. Zhang, L. Wang, S. Liu, and X. Zhou, “Image security based on three dimensional chaotic system and random dynamic selection,” Entropy, vol. 24, no. 7, 2022.
[12]
K. M. Hosny, S. T. Kamal, and M. M. Darwish, “Novel encryption for color images using fractional-order hyperchaotic system,” Journal of Ambient Intelligence and Humanized Computing, vol. 13, no. 2, pp. 973–988, 2022.
[13]
K. M. Hosny, S. T. Kamal, M. M. Darwish, and G. A. Papakostas, “New image encryption algorithm using hyperchaotic system and fibonacci q-matrix,” Electronics, vol. 10, no. 9, 2021.
[14]
X. Li, J. Zeng, Q. Ding, and C. Fan, “A novel color image encryption algorithm based on 5d hyperchaotic system and dna sequence,” Entropy, vol. 24, no. 9, 2022.
[15]
L. Gong, C. Deng, S. Pan, and N. Zhou, “Image compression-encryption algorithms by combining hyperchaotic system with discrete fractional random transform,” Optics and Laser Technology, vol. 103, pp. 48–58, 2018.
[16]
S. S. Yu, N. R. Zhou, L. H. Gong, and Z. Nie, “Optical image encryption algorithm based on phase-truncated short-time fractional fourier transform and hyper-chaotic system,” Optics and Lasers in Engineering, vol. 124, 2020.
[17]
C. Zou, X. Wang, and H. Li, “Image encryption algorithm with matrix semi-tensor product,” Nonlinear Dynamics, vol. 105, no. 1, pp. 859–876, 2021.
[18]
P. R. Krishna, C. V. S. Teja, and V. Thanikaiselvan, “A chaos based image encryption using tinkerbell map functions,” in Proceeding of the Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), pp. 578–582, Coimbatore, India, March 2018.
[19]
R. Enayatifar, A. H. Abdullah, I. F. Isnin, A. Altameem, and M. Lee, “Image encryption using a synchronous permutation-diffusion technique,” Optics and Lasers in Engineering, vol. 90, pp. 146–154, 2017.
[20]
D. R. I. M. Setiadi and N. Rijati, “An image encryption scheme combining 2D cascaded logistic map and permutation-substitution operations,” Computation, vol. 11, no. 9, 2023.
[21]
D. R. I. M. Setiadi, R. Robet, O. Pribadi, S. Widiono, and M. K. Sarker, “Image encryption using half-inverted cascading chaos cipheration,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 61–77, 2023.
[22]
D. R. I. M. Setiadi and M. Akrom, “Hybrid quantum key distribution protocol with chaotic system for securing data transmission,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 188–200, 2023.
[23]
W. Alexan, M. Gabr, E. Mamdouh, R. Elias, and A. Aboshousha, “Color image cryptosystem based on sine chaotic map, 4d Chen hyperchaotic map of fractional-order and hybrid DNA coding,” IEEE Access, vol. 11, 2023.
[24]
M. Gabr, R. Elias, K. Hosny, G. A. Papakostas, and W. Alexan, “Image encryption via base-n PRNGs and parallel base-n S-boxes,” IEEE Access, vol. 11, 2023.
[25]
M. Gabr, Y. Korayem, Y. L. Chen, P. L. Yee, C. S. Ku, and W. Alexan, “R 3-rescale, rotate and randomize: a novel image cryptosystem utilizing chaotic and hyperchaotic systems,” IEEE Access, vol. 11, 2023.
[26]
W. Alexan, D. El-Damak, and M. Gabr, “Image encryption based on fourier-DNA coding for hyperchaotic chen system, chen-based binary quantization S-box, and variable-base modulo operation,” IEEE Access, vol. 12, 2024.
[27]
S. Kanwal, S. Inam, M. T. B. Othman, A. Waqar, M. Ibrahim, F. Nawaz, Z. Nawaz, and H. Hamam, “An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices,” Sensors, vol. 22, no. 12, 2022.
[28]
S. Kanwal, S. Inam, F. Hajjej, O. Cheikhrouhou, Z. Nawaz, A. Waqar, and M. Khan, “A new image encryption technique based on sine map, chaotic tent map, and circulant matrices,” Security and Communication Networks, vol. 2022, 17 pages, 2022.
[29]
S. Kanwal, S. Inam, S. Quddus, and F. Hajjej, “Research on color image encryption approach based on chaotic Duffing map,” Physica Scripta, vol. 98, no. 12, 2023.
[30]
P. Kumari and B. Mondal, “Lightweight encryption scheme based on a new NLFSR,” Multimedia Tools and Applications, pp. 1–25, 2024, https://link.springer.com/article/10.1007/s11042-024-18222-y#citeas.
[31]
P. Kumari and B. Mondal, “Lightweight encryption with data and device integrity using NLFSR and PUF for the Internet of Medical Things,” Internet of Things, vol. 25, 2024.
[32]
P. Kumari and B. Mondal, “An encryption scheme based on grain stream cipher and chaos for privacy protection of image data on IoT network,” Wireless Personal Communications, vol. 130, no. 3, pp. 2261–2280, 2023.
[33]
P. Kumari and B. Mondal, “Lightweight stream cipher for health care IoT,” in Proceeding of the 2023 IEEE 2nd International Conference on Industrial Electronics: Developments and Applications (ICIDeA), pp. 444–449, IEEE, Imphal, India, September 2023.
[34]
D. Tiwari, B. Mondal, and A. Singh, “Fast encryption scheme for secure transmission of e-healthcare images,” International Journal of Image, Graphics and Signal Processing, vol. 15, no. 5, pp. 88–99, 2023.
[35]
C. Batra, N. Gupta, R. Chugh, and R. Kumar, “Generalized viscosity extragradient algorithm for pseudomonotone equilibrium and fixed point problems for finite family of demicontractive operators,” Journal of Applied Mathematics and Computing, vol. 68, no. 6, pp. 4195–4222, 2022.
[36]
R. Chugh, C. Batra, G. Biban, and A. Ahuja, “New four step iteration process for approximating fixed point of contraction mappings,” Journal MESA, vol. 13, no. 4, pp. 1071–1087, 2022.
[37]
P. A. Geeta, “Data analysis of COVID-19 pandemic: a mathematical approach,” The Journal of Mathematics and Computer Science, vol. 11, no. 6, pp. 7568–7623, 2021.
[38]
R. C. Gonzalez, Digital Image Processing, Pearson Education India, Bangalore, India, 2009.
[39]
R. C. Gonzalez, S. L. Eddins, and R. E. Woods, Digital Image Publishing Using MATLAB, Prentice Hall, Hoboken, NY, USA, 2004.
[40]
N. Gupta, M. Postolache, A. Nandal, and R. Chugh, “A cyclic iterative algorithm for multiple-sets split common fixed point problem of demicontractive mappings without prior knowledge of operator norm,” Mathematics, vol. 9, no. 4, 2021.
[41]
A. Kumar, J. Alzabut, S. Kumari, M. Rani, and R. Chugh, “Dynamical properties of a novel one dimensional chaotic map,” Mathematical Biosciences and Engineering, vol. 19, no. 3, pp. 2489–2505, 2022.
[42]
S. Kumari and R. Chugh, “A new experiment with the convergence and stability of logistic map via sp orbit,” International Journal of Applied Engineering Research, vol. 14, pp. 797–801, 2019.
[43]
S. Kumari, R. Chugh, and R. Miculescu, “On the complex and chaotic dynamics of standard logistic sine square map,” Analele Universitatii Ovidius Constanta-Seria Matematica, vol. 29, no. 3, pp. 201–227, 2021.
[44]
M. Rani, A. Kumar, S. Kumari, and R. Chugh, “Superior tent map,” Nonlinear Studies, vol. 28, no. 3, 2021.
[45]
G. Biban, R. Chugh, and A. Panwar, “Image encryption based on 8D hyperchaotic system using fibonacci Q-matrix,” Solitons Chaos, Solitons and Fractals Fractals, vol. 170, 2023.
[46]
K. Benkouider, A. Sambas, I. M. Sulaiman, M. Mamat, and S. N. Kottakkaran, “Secure communication scheme based on a new hyperchaotic system,” Computers, Materials and Continua, vol. 2022, pp. 1–15, 2022.
[47]
S. Vaidyanathan, M. E. Yalcin, T. Bouden, and K. Benkouider, “A new family of 5D, 6D, 7D and 8D hyperchaotic systems from the 4D hyperchaotic Vaidyanathan system, the dynamic analysis of the 8D hyperchaotic system with six positive Lyapunov exponents and an application to secure communication design,” International Journal of Modelling, Identification and Control, vol. 35, no. 3, pp. 241–257, 2020.
[48]
Q. Yang and M. Bai, “A new 5d hyperchaotic system based on modified generalized lorenz system,” Nonlinear Dynamics, vol. 88, no. 1, pp. 189–221, 2017.
[49]
V. E. Hoggatt, Fibonacci and Lucas Numbers, Houghton Mifflin, Boston, MA, USA, 1969.
[50]
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, A statistical test suite for random and pseudorandom number generators for cryptographic applications, US Department of Commerce, Technology Administration, National Institute of Standards and Technology, Gaithersburg, MD, USA, 2001.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Complexity
Complexity  Volume 2024, Issue
2024
1625 pages
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 28 June 2024

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media