Cover
Vol. 20 No. 2 (2024)

Published: December 31, 2024

Pages: 1-21

Original Article

A Secure Image Cryptographic Algorithm Based on Triple Incorporated Ciphering Stages

Abstract

Lately, image encryption has stand out as a highly urgent demand to provide high security for digital images against use and unauthorized distribution. A lot of existing researches use chaotic systems, symmetric or asymmetric schemes for image encryption, but cryptosystem based on one encryption technique only, faces many challenges like weak security and low complexity. Therefore, incorporating two or more different ciphering methods yields a secure and efficient algorithm to protect image information. In this work, a new image cryptosystem is suggested by joining zigzag scan technique, RSA algorithm and chaotic systems. These three security factors introduce Triple Incorporated Ciphering stages system (TIC). Initially, the plaintext image is divided into 8 × 8 non-overlapping blocks, then the odd blocks are isolated from the even blocks. After that, a new modified zigzag scan in two different directions is adopted for shuffling pixels in the odd and even blocks. This operation effectively enhances the shuffling degree. Next, the RSA algorithm is utilized after combining the scrambled blocks in one matrix. Finally, chaotic systems are implemented on the resultant encrypted matrix to complete the ciphering process. The chaos is implemented in two steps; confusion and diffusion. Duffing map is exploited in the confusion stage, whereas L¨u system is adopted on the shuffled matrix in the diffusion stage. The simulation results show the superiority of TIC in both security and attacks robustness compared to other cryptographic algorithms. Therefore, TIC can be exploited in real-time communication systems for secure image transmission.

References

  1. A. S. Hameed, “Speech scrambling based on synchro- nization of jointed dynamic parameter chaotic map,” Telecommunications and Radio Engineering, vol. 80, no. 8, 2021.
  2. O. A. Imran, S. F. Yousif, I. S. Hameed, W. N. A.-D. Abed, and A. T. Hammid, “Implementation of el-gamal algorithm for speech signals encryption and decryption,” Procedia Computer Science, vol. 167, pp. 1028–1037, 2020.
  3. S. F. Yousif, “Encryption and decryption of audio signal based on rsa algorithn,” International Journal of Engi- neering Technologies and Management Research, vol. 5, no. 7, pp. 57–64, 2018.
  4. S. F. Yousif, “Secure voice cryptography based on diffie- hellman algorithm,” in IOP Conference Series: Materi- als Science and Engineering, vol. 1076, p. 012057, IOP Publishing, 2021.
  5. S. F. Yousif, A. J. Abboud, and H. Y. Radhi, “Ro- bust image encryption with scanning technology, the el- gamal algorithm and chaos theory,” IEEE Access, vol. 8, pp. 155184–155209, 2020.
  6. U. Zia, M. McCartney, B. Scotney, J. Martinez, M. Abu- Tair, J. Memon, and A. Sajjad, “Survey on image encryp- tion techniques using chaotic maps in spatial, transform and spatiotemporal domains,” International Journal of Information Security, vol. 21, no. 4, pp. 917–935, 2022.
  7. Z. Tang, Y. Yang, S. Xu, C. Yu, X. Zhang, et al., “Image encryption with double spiral scans and chaotic maps,” Security and Communication Networks, vol. 2019, 2019.
  8. C. Fu, G.-y. Zhang, M. Zhu, Z. Chen, and W.-m. Lei, “A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy,” Security and Communication Networks, vol. 2018, pp. 1– 13, 2018.
  9. A. S. Hameed, “Speech compression and encryption based on discrete wavelet transform and chaotic sig- nals,” Multimedia Tools and Applications, vol. 80, no. 9, pp. 13663–13676, 2021.
  10. S. F. Yousif, A. J. Abboud, and R. S. Alhumaima, “A new image encryption based on bit replacing, chaos and dna coding techniques,” Multimedia Tools and Applications, vol. 81, no. 19, pp. 27453–27493, 2022.
  11. H. N. Abdullah, S. F. Yousif, and A. A. Valenzuela, “Ef- ficient steganography scheme for color images based on wavelets and chaotic maps,” Iraqi Journal of Infor- mation and Communication Technology, vol. 2, no. 4, pp. 11–20, 2019.
  12. S. F. Yousif, “Speech encryption based on zaslavsky map,” J. Eng. Appl. Sci, vol. 14, no. 17, pp. 6392–6399, 2019.
  13. S. F. Yousif, “Grayscale image confusion and diffusion based on multiple chaotic maps,” in 2018 1st Interna- tional scientific conference of engineering sciences-3rd scientific conference of engineering science (ISCES), pp. 114–119, IEEE, 2018.
  14. S. F. Yousif, “A new speech cryptosystem using dna encoding, genetic and rsa algorithms,” International 17 | Yousif, Hameed & Al-Zuhairi Journal of Engineering & Technology, vol. 7, no. 4, pp. 4550–4557, 2018.
  15. A. S. Hameed, “High data rate of a novel modulation scheme based on orthogonal chaotic signals,” Telecom- munications and Radio Engineering, vol. 75, no. 18, 2016.
  16. R. M. Rad, A. Attar, and R. E. Atani, “A new fast and simple image encryption algorithm using scan patterns and xor,” International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 6, no. 5, pp. 275–290, 2013.
  17. X. Deng, C. Liao, C. Zhu, and Z. Chen, “A novel im- age encryption algorithm based on hyperchaotic system and shuffling scheme,” in 2013 IEEE 10th International Conference on High Performance Computing and Com- munications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, pp. 109–116, IEEE, 2013.
  18. Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on dna sequence operation and hyper-chaotic system,” Optik-International Journal for Light and Electron Optics, vol. 124, no. 18, pp. 3596– 3600, 2013.
  19. B. Stoyanov, K. Kordov, et al., “Novel image encryption scheme based on chebyshev polynomial and duffing map,” The Scientific World Journal, vol. 2014, 2014.
  20. E. A. Naeem, M. M. Abd Elnaby, N. F. Soliman, A. M. Abbas, O. S. Faragallah, N. Semary, M. M. Hadhoud, S. A. Alshebeili, and F. E. Abd El-Samie, “Efficient im- plementation of chaotic image encryption in transform domains,” Journal of Systems and Software, vol. 97, pp. 118–127, 2014.
  21. H. Niu, C. Zhou, B. Wang, X. Zheng, and S. Zhou, “Splicing model and hyper–chaotic system for image encryption,” Journal of Electrical Engineering, vol. 67, no. 2, pp. 78–86, 2016.
  22. S. Somaraj and M. AliHussain, “An image encryption technique using scan based approach and image as key,” in Proceedings of the First International Conference on Computational Intelligence and Informatics: ICCII 2016, pp. 645–653, Springer, 2017.
  23. X. Chai, Z. Gan, K. Yuan, Y. Chen, and X. Liu, “A novel image encryption scheme based on dna sequence operations and chaotic systems,” Neural Computing and Applications, vol. 31, pp. 219–237, 2019.
  24. X. Chai, X. Zheng, Z. Gan, D. Han, and Y. Chen, “An image encryption algorithm based on chaotic system and compressive sensing,” Signal Processing, vol. 148, pp. 124–144, 2018.
  25. Nasrullah, J. Sang, M. A. Akbar, B. Cai, H. Xiang, and H. Hu, “Joint image compression and encryption us- ing iwt with spiht, kd-tree and chaotic maps,” Applied Sciences, vol. 8, no. 10, p. 1963, 2018.
  26. X. Huang and G. Ye, “An image encryption algorithm based on time-delay and random insertion,” Entropy, vol. 20, no. 12, p. 974, 2018.
  27. C. Liu and Q. Ding, “A color image encryption scheme based on a novel 3d chaotic mapping,” Complexity, vol. 2020, pp. 1–20, 2020.
  28. J. Ferdush, M. Begum, and M. S. Uddin, “Chaotic lightweight cryptosystem for image encryption,” Ad- vances in Multimedia, vol. 2021, pp. 1–16, 2021.
  29. T. S. Ali and R. Ali, “A novel color image encryption scheme based on a new dynamic compound chaotic map and s-box,” Multimedia Tools and Applications, vol. 81, no. 15, pp. 20585–20609, 2022.
  30. X. Gao, M. Miao, and X. Chen, “Multi-image encryption algorithm for 2d and 3d images based on chaotic system,” Frontiers in Physics, vol. 10, p. 901800, 2022.
  31. N. Chaudhary, T. B. Shahi, and A. Neupane, “Secure im- age encryption using chaotic, hybrid chaotic and block cipher approach,” Journal of Imaging, vol. 8, no. 6, p. 167, 2022.
  32. Z. Cheng, W. Wang, Y. Dai, and L. Li, “A high-security privacy image encryption algorithm based on chaos and double encryption strategy,” Journal of Applied Mathe- matics, vol. 2022, 2022.
  33. N. A. E.-S. Mohamed, A. Youssif, H. A.-G. El-Sayed, et al., “Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system,” Complexity, vol. 2022, 2022.
  34. M. Akraam, T. Rashid, S. Zafar, et al., “A chaos-based image encryption scheme is proposed using multiple chaotic maps,” Mathematical Problems in Engineering, vol. 2023, 2023.
  35. H. Gururaj, M. Almeshari, Y. Alzamil, V. Ravi, and K. Sudeesh, “Efficient scan and chaotic map encryption system for securing e-healthcare images,” Information, vol. 14, no. 1, p. 47, 2023. 18 | Yousif, Hameed & Al-Zuhairi
  36. A. A. Neamah, “An image encryption scheme based on a seven-dimensional hyperchaotic system and pascal’s matrix,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 3, pp. 238–248, 2023.
  37. R. Candra, S. Madenda, S. A. Sudiro, and M. Subali, “The implementation of an efficient zigzag scan,” Jour- nal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 9, no. 2, pp. 95–98, 2017.
  38. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryp- tosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
  39. J. L¨u and G. Chen, “A new chaotic attractor coined,” International Journal of Bifurcation and chaos, vol. 12, no. 03, pp. 659–661, 2002.
  40. S. Pang and Y. Liu, “A new hyperchaotic system from the l¨u system and its control,” Journal of Computational and Applied Mathematics, vol. 235, no. 8, pp. 2775– 2789, 2011.
  41. Y. Chen, C. Tang, and Z. Yi, “A novel image encryption scheme based on pwlcm and standard map,” Complexity, vol. 2020, pp. 1–23, 2020.
  42. Z. Li, C. Peng, W. Tan, and L. Li, “An effective chaos- based image encryption scheme using imitating jigsaw method,” Complexity, vol. 2021, pp. 1–18, 2021.
  43. K. A. K. Patro, A. Soni, P. K. Netam, and B. Acharya, “Multiple grayscale image encryption using cross- coupled chaotic maps,” Journal of Information Security and Applications, vol. 52, p. 102470, 2020.
  44. Q. Zhang, L. Guo, and X. Wei, “Image encryption us- ing dna addition combining with chaotic maps,” Math- ematical and Computer Modelling, vol. 52, no. 11-12, pp. 2028–2035, 2010.
  45. A. S. Hameed, “Image encryption based on fractional order lorenz system and wavelet transform,” Diyala jour- nal of engineering sciences, pp. 81–91, 2017.
  46. J. N. Shehab, H. Y. Radhi, and R. A. Ibrahim, “Multime- dia cryptography based on liu and chen systems,” Diyala Journal of Engineering Sciences, pp. 24–35, 2016.
  47. J. Wu, X. Liao, and B. Yang, “Cryptanalysis and enhancements of image encryption based on three- dimensional bit matrix permutation,” Signal Processing, vol. 142, pp. 292–300, 2018.