Page 22 - 2024-Vol20-Issue2
P. 22

18 |                                                                                   Yousif, Hameed & Al-Zuhairi

[36] A. A. Neamah, “An image encryption scheme based on                           TABLE X.
      a seven-dimensional hyperchaotic system and pascal’s                  SPEED COMPARISON
      matrix,” Journal of King Saud University-Computer and
      Information Sciences, vol. 35, no. 3, pp. 238–248, 2023.   Image         Size    Method     Encryption time
                                                                 Cameraman  256 × 256  Ref. [24]         0.71
[37] R. Candra, S. Madenda, S. A. Sudiro, and M. Subali,         Cameraman  512 × 512  Ref. [34]        3.319
      “The implementation of an efficient zigzag scan,” Jour-    Lena       256 × 256  Proposed
      nal of Telecommunication, Electronic and Computer                                Ref. [16]      0.154946
      Engineering (JTEC), vol. 9, no. 2, pp. 95–98, 2017.        Lena       512 × 512  Proposed        0.1120
                                                                                       Ref. [24]      0.527656
[38] R. L. Rivest, A. Shamir, and L. Adleman, “A method          Baboon     256 × 256  Ref. [28]         0.58
      for obtaining digital signatures and public-key cryp-                            Ref. [34]        2.227
      tosystems,” Communications of the ACM, vol. 21, no. 2,     Baboon     512 × 512  Proposed         3.222
      pp. 120–126, 1978.                                         Barbara    512 × 512  Ref. [7]       0.162288
                                                                 Boat       256 × 256  Ref. [16]        2.792
[39] J. Lu¨ and G. Chen, “A new chaotic attractor coined,”       Boat       512 × 512  Ref. [25]       0.1022
      International Journal of Bifurcation and chaos, vol. 12,   Peppers    256 × 256  Ref. [28]         19.2
      no. 03, pp. 659–661, 2002.                                 Peppers    512 × 512  Ref. [32]       9.5097
                                                                                       Ref. [47]        0.336
[40] S. Pang and Y. Liu, “A new hyperchaotic system from                               Proposed          7.75
      the lu¨ system and its control,” Journal of Computational                        Ref. [24]      0.378125
      and Applied Mathematics, vol. 235, no. 8, pp. 2775–                              Ref. [28]         0.47
      2789, 2011.                                                                      Ref. [34]       2.2441
                                                                                       Ref. [36]        3.259
[41] Y. Chen, C. Tang, and Z. Yi, “A novel image encryption                            Proposed       0.250984
      scheme based on pwlcm and standard map,” Complexity,                             Ref. [25]      0.131102
      vol. 2020, pp. 1–23, 2020.                                                       Ref. [28]         18.7
                                                                                       Ref. [36]       8.8939
[42] Z. Li, C. Peng, W. Tan, and L. Li, “An effective chaos-                           Proposed       0.684918
      based image encryption scheme using imitating jigsaw                             Ref. [16]      0.384833
      method,” Complexity, vol. 2021, pp. 1–18, 2021.                                  Proposed        0.1010
                                                                                       Ref. [26]      0.390394
[43] K. A. K. Patro, A. Soni, P. K. Netam, and B. Acharya,                             Ref. [36]        0.137
      “Multiple grayscale image encryption using cross-                                Proposed       0.259434
      coupled chaotic maps,” Journal of Information Security                           Ref. [33]      0.149949
      and Applications, vol. 52, p. 102470, 2020.                                      Ref. [36]       1.4375
                                                                                       Proposed       0.707523
[44] Q. Zhang, L. Guo, and X. Wei, “Image encryption us-                               Ref. [24]      0.339793
      ing dna addition combining with chaotic maps,” Math-                             Ref. [34]         0.66
      ematical and Computer Modelling, vol. 52, no. 11-12,                             Ref. [36]        3.316
      pp. 2028–2035, 2010.                                                             Proposed       0.253761
                                                                                       Ref. [16]      0.143553
[45] A. S. Hameed, “Image encryption based on fractional                               Ref. [25]       0.1051
      order lorenz system and wavelet transform,” Diyala jour-                         Ref. [36]         19.5
      nal of engineering sciences, pp. 81–91, 2017.                                    Proposed       0.688577
                                                                                                      0.356593
[46] J. N. Shehab, H. Y. Radhi, and R. A. Ibrahim, “Multime-
      dia cryptography based on liu and chen systems,” Diyala
      Journal of Engineering Sciences, pp. 24–35, 2016.

[47] J. Wu, X. Liao, and B. Yang, “Cryptanalysis and
      enhancements of image encryption based on three-
      dimensional bit matrix permutation,” Signal Processing,
      vol. 142, pp. 292–300, 2018.
   17   18   19   20   21   22   23   24   25   26   27