Page 16 - 2024-Vol20-Issue2
P. 16
12 | Yousif, Hameed & Al-Zuhairi
TABLE IV.
RESULTS OF KEY SENSITIVITY AT DECRYPTION WITH SLIGHTLY MODIFIED KEYS
Modified secret keys by adding ? UACI (%) NPCR (%) PSNR (dB) rxy
38.3964 99.62 9.1753 0.0024
(d) of RSA algorithm 35.1154 99.63 10.5947 -0.0068
35.0457 99.60 10.6220 -0.0191
(x0) of Duffing map 34.8304 99.61 7.6114 -0.0104
(a) of Duffing map 34.8787 99.59 7.6073 -0.0212
35.0486 99.64 7.5778 -0.0064
(a) of Lu¨ system 34.9767 99.57 7.5902 -0.0232
(b) of Lu¨ system
(x0) of Lu¨ system
z0 of Lu¨ system
analyze the algorithm performance. The algorithm speed version of Boat is influenced by various densities of Gaus-
relies upon the time needed for both ciphering/deciphering sian noise (0.1, 0.05, 0.02, 0.01 and 0.006, respectively), and
operations. The required time for these two processes depends the obtained noisy decrypted images corresponding to the
on several parameters like operating system used and its con- attacked cipher images are presented in Fig. 8. Furthermore,
figuration, code optimization, and the utilized programing PSNR and correlation between the noisy restored images and
language [32, 33]. The information about the utilized environ- original image Boat against noise density are shown in Fig. 9
ment for experiential findings has been mentioned in Section to test the deciphered image quality at the receiver. It can be
IV. The six test grayscale images with different sizes are uti- watched in these figures that the visual quality of the recon-
lized for assessing the TIC speed performance. The ciphering structed image increases progressively as the noise intensity
and deciphering time required for each image size are listed decreases, but the manifestation of the plain image can be
in Table V. It is observed from Table V that the requisite time readily recognized from the retrieved image even at high level
for encryption and decryption stages is influenced by the im- of noise density in the ciphered image. Additionally, it is
age size, which implies that big image requires longer time. evident from Fig. 9 that PSNR and correlation values increase
As an example, the proposed scheme needs 0.154946 s and gradually with noise intensity decreasing, such that PSNR and
0.670657 s, respectively to cipher/decipher the Cameraman correlation change from 14.8482 dB to be 26.6204 dB, and
test image with size 256 × 256, while this time is increased from 0.6977 to be 0.9242, respectively when the noise inten-
to be 1.580442 s and 2.502797 s, respectively for the same sity varies from 0.1 to 0.006. It can be manifested from the
image with size 1024 × 1024. Also, the decryption time is above simulation outcomes that in the existence of noise, the
more than the encryption time for all test images. For in- deciphered image is shown visibly in spite of the high degree
stance, the time needed to encrypt the Lena image of size of noise density. Hence, the TIC can successfully resist the
256 × 256 is 0.162288 s, whereas the time required to decrypt noise attack.
the same image of same size is 0.643419 s. Based on the
computed encryption/decryption time outcomes in Table V, 2) Cropping Attack Analysis:
it can be found that the ciphering time obtained by the pre-
sented work is considered very short for system having three Cropping attack analysis intends to evaluate the robustness
stages of encryption: zigzag shuffling, RSA and chaotic maps of cryptosystem against cutting parts of the encrypted image
with two phases: confusion and diffusion. Therefore, the through transmission [47]. The cipher image Peppers is at-
TIC is efficient and fast to be utilized in practical applications tacked by cutting parts of various sizes from it to produce the
to encrypt/decrypt images of various sizes throughout open attacked cipher images as exhibited in Figs. (10a-10e). Then,
networks. the attacked cipher images are deciphered to get the restored
outcomes as revealed in Figs. (10f-10j), whereas the results
E. Robustness Analysis of PSNR and correlation between the input and deciphered
1) Noise Attack Analysis: images for Peppers test image are tabulated in Table VI. It is
Robustness of the ciphered image to noise is an essential re- obvious in these figures that when the cropping size is large
quirement for an efficient encryption scheme. Gaussian noise (for example, 1/2 of the cipher image), the visible quality of
is the most common noise that may impact on the encrypted deciphered image decreased; this quality is enhanced as the
image during transmission [20]. This noise with different cropping size becomes small (for example, 1/8 of the cipher
levels is added at the simulation to the encrypted image Boat image). In addition, PSNR and correlation values in Table
for assessing the current algorithm performance. The cipher VI increase with the decreasing of crop size, such that these
values vary from 10.0189 dB and 0.3957 to be 18.9409 dB