Page 22 - 2024-Vol20-Issue2
P. 22
18 | Yousif, Hameed & Al-Zuhairi
[36] A. A. Neamah, “An image encryption scheme based on TABLE X.
a seven-dimensional hyperchaotic system and pascal’s SPEED COMPARISON
matrix,” Journal of King Saud University-Computer and
Information Sciences, vol. 35, no. 3, pp. 238–248, 2023. Image Size Method Encryption time
Cameraman 256 × 256 Ref. [24] 0.71
[37] R. Candra, S. Madenda, S. A. Sudiro, and M. Subali, Cameraman 512 × 512 Ref. [34] 3.319
“The implementation of an efficient zigzag scan,” Jour- Lena 256 × 256 Proposed
nal of Telecommunication, Electronic and Computer Ref. [16] 0.154946
Engineering (JTEC), vol. 9, no. 2, pp. 95–98, 2017. Lena 512 × 512 Proposed 0.1120
Ref. [24] 0.527656
[38] R. L. Rivest, A. Shamir, and L. Adleman, “A method Baboon 256 × 256 Ref. [28] 0.58
for obtaining digital signatures and public-key cryp- Ref. [34] 2.227
tosystems,” Communications of the ACM, vol. 21, no. 2, Baboon 512 × 512 Proposed 3.222
pp. 120–126, 1978. Barbara 512 × 512 Ref. [7] 0.162288
Boat 256 × 256 Ref. [16] 2.792
[39] J. Lu¨ and G. Chen, “A new chaotic attractor coined,” Boat 512 × 512 Ref. [25] 0.1022
International Journal of Bifurcation and chaos, vol. 12, Peppers 256 × 256 Ref. [28] 19.2
no. 03, pp. 659–661, 2002. Peppers 512 × 512 Ref. [32] 9.5097
Ref. [47] 0.336
[40] S. Pang and Y. Liu, “A new hyperchaotic system from Proposed 7.75
the lu¨ system and its control,” Journal of Computational Ref. [24] 0.378125
and Applied Mathematics, vol. 235, no. 8, pp. 2775– Ref. [28] 0.47
2789, 2011. Ref. [34] 2.2441
Ref. [36] 3.259
[41] Y. Chen, C. Tang, and Z. Yi, “A novel image encryption Proposed 0.250984
scheme based on pwlcm and standard map,” Complexity, Ref. [25] 0.131102
vol. 2020, pp. 1–23, 2020. Ref. [28] 18.7
Ref. [36] 8.8939
[42] Z. Li, C. Peng, W. Tan, and L. Li, “An effective chaos- Proposed 0.684918
based image encryption scheme using imitating jigsaw Ref. [16] 0.384833
method,” Complexity, vol. 2021, pp. 1–18, 2021. Proposed 0.1010
Ref. [26] 0.390394
[43] K. A. K. Patro, A. Soni, P. K. Netam, and B. Acharya, Ref. [36] 0.137
“Multiple grayscale image encryption using cross- Proposed 0.259434
coupled chaotic maps,” Journal of Information Security Ref. [33] 0.149949
and Applications, vol. 52, p. 102470, 2020. Ref. [36] 1.4375
Proposed 0.707523
[44] Q. Zhang, L. Guo, and X. Wei, “Image encryption us- Ref. [24] 0.339793
ing dna addition combining with chaotic maps,” Math- Ref. [34] 0.66
ematical and Computer Modelling, vol. 52, no. 11-12, Ref. [36] 3.316
pp. 2028–2035, 2010. Proposed 0.253761
Ref. [16] 0.143553
[45] A. S. Hameed, “Image encryption based on fractional Ref. [25] 0.1051
order lorenz system and wavelet transform,” Diyala jour- Ref. [36] 19.5
nal of engineering sciences, pp. 81–91, 2017. Proposed 0.688577
0.356593
[46] J. N. Shehab, H. Y. Radhi, and R. A. Ibrahim, “Multime-
dia cryptography based on liu and chen systems,” Diyala
Journal of Engineering Sciences, pp. 24–35, 2016.
[47] J. Wu, X. Liao, and B. Yang, “Cryptanalysis and
enhancements of image encryption based on three-
dimensional bit matrix permutation,” Signal Processing,
vol. 142, pp. 292–300, 2018.