{"title":"An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers","authors":"Mohammed Es-sabry , Nabil El Akkad , Lahbib Khrissi , Khalid Satori , Walid El-Shafai , Torki Altameem , Rajkumar Singh Rathore","doi":"10.1016/j.eij.2024.100449","DOIUrl":null,"url":null,"abstract":"<div><p>In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four matrices within our encryption system, assigning exclusive integers ranging from 0 to 255. Our proposed methodology employs 16 × 16 matrices to represent the four channels (red, green, blue, and alpha) of a 32-bit color image, strategically utilizing specific grids for channel encryption. The top-left and bottom-right grids facilitate the encryption of the red and alpha channels, respectively, while the top-right and bottom-left grids are employed for encrypting the green and blue channels. The algorithm initiates by extracting decimal values from each pixel in the source image, mapping them to their corresponding positions in the matrices. A subsequent right circular shift operation on each pixel, determined by its row and column coordinates, is performed to prevent the encryption of areas with uniform color. To enhance security further, we employ the Four-square cipher method to encrypt the decimal values of the pixels. In the confusion stage, we apply the Arnold Cat Map transformation to strategically rearrange the position of all pixels, introducing an additional layer of complexity. Rigorous assessments using various security criteria were conducted to evaluate our algorithm's performance against common attacks, yielding consistently excellent results. Our method demonstrated superior outcomes, including a 25 % to 44 % increase in resistance to common attacks compared to existing methods.</p></div>","PeriodicalId":56010,"journal":{"name":"Egyptian Informatics Journal","volume":null,"pages":null},"PeriodicalIF":5.0000,"publicationDate":"2024-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1110866524000124/pdfft?md5=46ed048013dd5672d6cf2e032bce3552&pid=1-s2.0-S1110866524000124-main.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Egyptian Informatics Journal","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1110866524000124","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four matrices within our encryption system, assigning exclusive integers ranging from 0 to 255. Our proposed methodology employs 16 × 16 matrices to represent the four channels (red, green, blue, and alpha) of a 32-bit color image, strategically utilizing specific grids for channel encryption. The top-left and bottom-right grids facilitate the encryption of the red and alpha channels, respectively, while the top-right and bottom-left grids are employed for encrypting the green and blue channels. The algorithm initiates by extracting decimal values from each pixel in the source image, mapping them to their corresponding positions in the matrices. A subsequent right circular shift operation on each pixel, determined by its row and column coordinates, is performed to prevent the encryption of areas with uniform color. To enhance security further, we employ the Four-square cipher method to encrypt the decimal values of the pixels. In the confusion stage, we apply the Arnold Cat Map transformation to strategically rearrange the position of all pixels, introducing an additional layer of complexity. Rigorous assessments using various security criteria were conducted to evaluate our algorithm's performance against common attacks, yielding consistently excellent results. Our method demonstrated superior outcomes, including a 25 % to 44 % increase in resistance to common attacks compared to existing methods.
期刊介绍:
The Egyptian Informatics Journal is published by the Faculty of Computers and Artificial Intelligence, Cairo University. This Journal provides a forum for the state-of-the-art research and development in the fields of computing, including computer sciences, information technologies, information systems, operations research and decision support. Innovative and not-previously-published work in subjects covered by the Journal is encouraged to be submitted, whether from academic, research or commercial sources.