An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization

Qutaiba K. Abed, W. A. Al-Jawher
{"title":"An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization","authors":"Qutaiba K. Abed, W. A. Al-Jawher","doi":"10.36371/port.2023.4.3","DOIUrl":null,"url":null,"abstract":"Through the development of communication technology, fast and efficient tools are required to practically secure the process of data exchange in securing images. This paper presents a new method of encryption for protecting images against many attacks from unsafe public networks. Lorenz chaos map is used to generate a sequence of random numbers for each stage depending on the initial parameters. The Hunter Prey optimization algorithm is applied in order to obtain these parameters to use them based on the original image. Therefore, the random sequence number generated by the Lorenz chaotic map will be different from one image to another. That will make it unpredictable and very difficult to discover the process of encryption. The results of simulation experiments demonstrate that the encryption algorithm have passed the plaintext sensitivity test with the NPCR of 0.99785 and the UACI of 0.33623. As well as the correlation coefficient test values in the three directions gave the values of (v = -0.0007, h = -0.0000, d = 0.0005). Also, the calculated information entropy test value was 7.9983. These results demonstrate that this algorithm is very strong enough to withstand the various types of attacks that images can be exposed during transmission on the Internet or any public network. The security analysis's comparison of the proposed changes to similar ones revealed that the proposed encryption system is more efficient.","PeriodicalId":502904,"journal":{"name":"Journal Port Science Research","volume":"113 3","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal Port Science Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36371/port.2023.4.3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Through the development of communication technology, fast and efficient tools are required to practically secure the process of data exchange in securing images. This paper presents a new method of encryption for protecting images against many attacks from unsafe public networks. Lorenz chaos map is used to generate a sequence of random numbers for each stage depending on the initial parameters. The Hunter Prey optimization algorithm is applied in order to obtain these parameters to use them based on the original image. Therefore, the random sequence number generated by the Lorenz chaotic map will be different from one image to another. That will make it unpredictable and very difficult to discover the process of encryption. The results of simulation experiments demonstrate that the encryption algorithm have passed the plaintext sensitivity test with the NPCR of 0.99785 and the UACI of 0.33623. As well as the correlation coefficient test values in the three directions gave the values of (v = -0.0007, h = -0.0000, d = 0.0005). Also, the calculated information entropy test value was 7.9983. These results demonstrate that this algorithm is very strong enough to withstand the various types of attacks that images can be exposed during transmission on the Internet or any public network. The security analysis's comparison of the proposed changes to similar ones revealed that the proposed encryption system is more efficient.
基于洛伦兹混沌图和猎人-猎物优化的图像加密方法
随着通信技术的发展,需要快速高效的工具来切实保障图像数据交换过程的安全。本文提出了一种新的加密方法,用于保护图像免受来自不安全公共网络的多种攻击。洛伦兹混沌图用于根据初始参数为每个阶段生成随机数序列。为了获得这些参数,采用了 Hunter Prey 优化算法,以便根据原始图像使用这些参数。因此,洛伦兹混沌图生成的随机序列号在不同的图像中会有所不同。这将使加密过程变得不可预测,很难被发现。模拟实验结果表明,加密算法通过了明文敏感性测试,NPCR 为 0.99785,UACI 为 0.33623。三个方向的相关系数测试值分别为(v = -0.0007,h = -0.0000,d = 0.0005)。此外,计算得出的信息熵测试值为 7.9983。这些结果表明,该算法非常强大,足以抵御图像在互联网或任何公共网络传输过程中可能暴露的各种攻击。安全分析将拟议的修改与类似的修改进行比较后发现,拟议的加密系统更加有效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信