Page 18 - 2024-Vol20-Issue2
P. 18
14 | Yousif, Hameed & Al-Zuhairi
results. Thus, the combination of these three encryption meth- Asymmetric key RSA algorithm is applied secondly on the
ods (zigzag scan, RSA and chaos) makes the proposed TIC scrambled image. Finally, chaotic systems are utilized to
cryptosystem quite strong and robust. implement the confusion-diffusion processes. The important
conclusions about the proposed work can be summarized as
G. Comparison of Cryptosystem Performance with Related follows:
Methods
• Appling the zigzag scan in two different directions and
TIC performance is compared with many related existing with a variable starting pixel on the non-overlapping
image cryptosystems in order to evince its superiority. The blocks yields a higher secure scrambling degree.
sample images of size 256 × 256 are used in this comparison
and the outcomes are illustrated in Tables VIII-X. Table VIII • Appling the RSA technique increases the security level
shows the security comparison in terms of information en- of the TIC by selecting a large prime number modulo
tropy, PSNR, UACI, NPCR, and correlation values along the which requires an extremely long time to break it.
three directions. Table IX gives the key space comparison,
and Table X lists the speed analysis comparison with other • Adopting higher dimensional chaotic maps improves
approaches. the resistance against the exhaustive attack since the
size of key space depends on the values of system pa-
For Table VIII, it can found that the presented scheme rameters/initial conditions.
achieves higher entropy scores or equal to those outcomes
acquired via other approaches except for Ref. [44] at Lena • The proposed TIC is very sensitive to the key alteration
image, Ref. [34] at Baboon and Peppers image, and Ref. [36] such that the differences between the original and deci-
at Baboon, Boat and Peppers images. Also, the PSNR val- phered images are more than 99 % for a tiny change in
ues generated by the introduced algorithm are smaller than one of the TIC keys values.
the other current methods. Besides, this technique attains
better values in terms of NPCR except for Ref. [34] at Cam- • The presented cryptosystem is evaluated based on com-
eraman image. Moreover, the UACI results produced by this prehensive performance analysis and comparison anal-
cryptosystem are larger or closer to those gained by other ysis with several common existing methods; the results
algorithms expect for Ref. [44] at Lena image. Finally, the prove the encryption effectiveness of the TIC for all the
correlation coefficients scores obtained via this mechanism tested images.
along three directions are lower or nearer in comparison with
the existing references. • In summary, the TIC possesses a high sensibility to
the key change, a large key space, a high immunity
Table IX reveals that the key space size of the proposed to the cryptographic attacks, and fast processing time.
technology is the largest as compared with other methods. Therefore, the presented approach provides a perfect
This is because using high dimensional Duffing and Lu¨ chaotic candidate for secure image applications such as online
systems with multiple initial conditions/control parameters. wireless communication.
Furthermore, the described mechanism possesses the shortest
ciphering time among the compared references as clarified in • For future work, the proposed technique can be applied
Table X except for Ref. [16] at Cameraman, Lena, Barbara upon other types of digital images like color images,
and Peppers images of size (512 × 512), and Ref. [26] at Boat medical images, biometric images or remote sensing
image of size (256×256). It can be deduced from Tables VIII- images. Also, the decryption time of the suggested
X that the TIC possesses a superior security performance and cryptosystem is slightly longer than the encryption time;
high speed. Therefore, it is suitable for satisfying real-time this time can be improved to make it more adequate for
communication applications. real-time cryptographic applications.
V. CONCLUSION CONFLICT OF INTEREST
This article presents a new efficient image encryption strategy The authors have no conflict of relevant interest to this article.
based on combining zigzag scan, RSA coding and chaotic
systems. After splitting the input image into a specific number REFERENCES
of non-overlapping blocks, the zigzag scan is modified to
be with a variable starting pixel, then it is implemented in [1] A. S. Hameed, “Speech scrambling based on synchro-
two different directions in order to shuffle the image pixels. nization of jointed dynamic parameter chaotic map,”
Telecommunications and Radio Engineering, vol. 80,
no. 8, 2021.