Page 16 - 2024-Vol20-Issue2
P. 16

12 |                                                                                     Yousif, Hameed & Al-Zuhairi

                                                   TABLE IV.
      RESULTS OF KEY SENSITIVITY AT DECRYPTION WITH SLIGHTLY MODIFIED KEYS

      Modified secret keys by adding ?  UACI (%)                    NPCR (%)  PSNR (dB)     rxy
                                         38.3964                       99.62    9.1753   0.0024
      (d) of RSA algorithm               35.1154                       99.63    10.5947  -0.0068
                                         35.0457                       99.60    10.6220  -0.0191
      (x0) of Duffing map                34.8304                       99.61    7.6114   -0.0104
      (a) of Duffing map                 34.8787                       99.59    7.6073   -0.0212
                                         35.0486                       99.64    7.5778   -0.0064
      (a) of Lu¨ system                  34.9767                       99.57    7.5902   -0.0232

      (b) of Lu¨ system

      (x0) of Lu¨ system
      z0 of Lu¨ system

analyze the algorithm performance. The algorithm speed              version of Boat is influenced by various densities of Gaus-
relies upon the time needed for both ciphering/deciphering          sian noise (0.1, 0.05, 0.02, 0.01 and 0.006, respectively), and
operations. The required time for these two processes depends       the obtained noisy decrypted images corresponding to the
on several parameters like operating system used and its con-       attacked cipher images are presented in Fig. 8. Furthermore,
figuration, code optimization, and the utilized programing          PSNR and correlation between the noisy restored images and
language [32, 33]. The information about the utilized environ-      original image Boat against noise density are shown in Fig. 9
ment for experiential findings has been mentioned in Section        to test the deciphered image quality at the receiver. It can be
IV. The six test grayscale images with different sizes are uti-     watched in these figures that the visual quality of the recon-
lized for assessing the TIC speed performance. The ciphering        structed image increases progressively as the noise intensity
and deciphering time required for each image size are listed        decreases, but the manifestation of the plain image can be
in Table V. It is observed from Table V that the requisite time     readily recognized from the retrieved image even at high level
for encryption and decryption stages is influenced by the im-       of noise density in the ciphered image. Additionally, it is
age size, which implies that big image requires longer time.        evident from Fig. 9 that PSNR and correlation values increase
As an example, the proposed scheme needs 0.154946 s and             gradually with noise intensity decreasing, such that PSNR and
0.670657 s, respectively to cipher/decipher the Cameraman           correlation change from 14.8482 dB to be 26.6204 dB, and
test image with size 256 × 256, while this time is increased        from 0.6977 to be 0.9242, respectively when the noise inten-
to be 1.580442 s and 2.502797 s, respectively for the same          sity varies from 0.1 to 0.006. It can be manifested from the
image with size 1024 × 1024. Also, the decryption time is           above simulation outcomes that in the existence of noise, the
more than the encryption time for all test images. For in-          deciphered image is shown visibly in spite of the high degree
stance, the time needed to encrypt the Lena image of size           of noise density. Hence, the TIC can successfully resist the
256 × 256 is 0.162288 s, whereas the time required to decrypt       noise attack.
the same image of same size is 0.643419 s. Based on the
computed encryption/decryption time outcomes in Table V,            2) Cropping Attack Analysis:
it can be found that the ciphering time obtained by the pre-
sented work is considered very short for system having three        Cropping attack analysis intends to evaluate the robustness
stages of encryption: zigzag shuffling, RSA and chaotic maps        of cryptosystem against cutting parts of the encrypted image
with two phases: confusion and diffusion. Therefore, the            through transmission [47]. The cipher image Peppers is at-
TIC is efficient and fast to be utilized in practical applications  tacked by cutting parts of various sizes from it to produce the
to encrypt/decrypt images of various sizes throughout open          attacked cipher images as exhibited in Figs. (10a-10e). Then,
networks.                                                           the attacked cipher images are deciphered to get the restored
                                                                    outcomes as revealed in Figs. (10f-10j), whereas the results
E. Robustness Analysis                                              of PSNR and correlation between the input and deciphered
1) Noise Attack Analysis:                                           images for Peppers test image are tabulated in Table VI. It is
Robustness of the ciphered image to noise is an essential re-       obvious in these figures that when the cropping size is large
quirement for an efficient encryption scheme. Gaussian noise        (for example, 1/2 of the cipher image), the visible quality of
is the most common noise that may impact on the encrypted           deciphered image decreased; this quality is enhanced as the
image during transmission [20]. This noise with different           cropping size becomes small (for example, 1/8 of the cipher
levels is added at the simulation to the encrypted image Boat       image). In addition, PSNR and correlation values in Table
for assessing the current algorithm performance. The cipher         VI increase with the decreasing of crop size, such that these
                                                                    values vary from 10.0189 dB and 0.3957 to be 18.9409 dB
   11   12   13   14   15   16   17   18   19   20   21