Image Encryption Using Modified Perturbed Logistic Map
The unique properties of chaotic maps have achieved more importance in data protection. The role of the initial parameters in generating the chaotic sequences is vital. In the proposed approach, a new modified perturbed logistic map is suggested. Image encryption is carried out in four steps. The chaotic sequences are attained using the proposed map at first. Secondly, permutation on the pixels of the image is handled by a modified zig zag transformation. Thirdly, permutation effect is further improved by dynamic quaternary DeoxyriboNucleic Acid (DNA) encoding and diffusion using DNA operations. Finally encryption is achieved by exercising DNA decoding. It can be observed from the experiment results of statistical analysis, differential attack analysis, Encryption Quality (EQ) analysis and performance analysis that the proposed scheme surpass existing schemes and can resist different attacks.
[1] Alawida M., “A Novel Chaos-Based Permutation for Image Encryption,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 6, pp. 101595, 2023. https://doi.org/10.1016/j.jksuci.2023.101595
[2] Al-Hazaimeh O., Al-Jamal M., Bawaneh M., Alhindawi N., and Hamdoni B., “A New Image Encryption Scheme Using Dual Chaotic Map Synchronization,” The International Arab Journal of Information Technology, vol. 18 no. 1, pp. 95- 102, 2021. https://www.iajit.org/portal/PDF/Vol%2018,%20 No.%201/19572.pdf
[3] Demirtas M., “A Novel Multiple Grayscale Image Encryption Method Based on 3D Bit-Scrambling and Diffusion,” Optik, vol. 266, pp. 169624, 2022. https://doi.org/10.1016/j.ijleo.2022.169624
[4] Gayathri J. and Subashini S., “A Spatiotemporal Chaotic Image Encryption Scheme Based on Self Adaptive Model and Dynamic Keystream Fetching Technique,” Multimedia Tools and Applications, vol. 77, no. 19, pp. 24751-24787, 2018. https://doi.org/10.1007/s11042-018-5675-4
[5] Hua Z., Zhang K., Li Y., and Zhou Y., “Visually Secure Image Encryption Using Adaptive- Image Encryption Using Modified Perturbed Logistic Map 877 Thresholding Sparsification and Parallel Compressive Sensing,” Signal Processing, vol. 183, pp. 107998, 2021. https://doi.org/10.1016/j.sigpro.2021.107998
[6] Jiang X., Jiang G., Wang Q., and Shu D., “Image Encryption Algorithm Based on 2D‐CLICM Chaotic System,” IET Image Processing, vol. 17, no. 7, pp. 2127-2141, 2023. https://doi.org/10.1049/ipr2.12778
[7] Khanzadi H., Eshghi M., and Borujeni S., “Image Encryption Using Random Bit Sequence Based on Chaotic Maps,” Arabian Journal for Science and Engineering, vol. 39, no. 2, pp. 1039-1047, 2014. https://doi.org/10.1007/s13369-013-0713-z
[8] Liu Y., Qin Z., Liao X., and Wu J., “A Chaotic Image Encryption Scheme based on Hénon- Chebyshev Modulation Map and Genetic Operations,” International Journal of Bifurcation and Chaos, vol. 30, no. 6, pp. 2050090, 2020. https://doi.org/10.1142/S021812742050090X
[9] Man Z., Li J., Di X., Sheng Y., and Liu Z., “Double Image Encryption Algorithm Based on Neural Network and Chaos,” Chaos, Solitons and Fractals, vol. 152, pp. 111318, 2021. https://doi.org/10.1016/j.chaos.2021.111318
[10] Patel S., Bharath K., and Kumar R., “Symmetric Keys Image Encryption and Decryption Using 3D Chaotic maps with DNA Encoding Technique,” Multimedia Tools and Applications, vol. 79, no. 43-44, pp. 31739-31757, 2020. https://doi.org/10.1007/s11042-020-09551-9
[11] Patro K., Soni A., Netam P., and Acharya B., “Multiple Grayscale Image Encryption Using Cross-Coupled Chaotic Maps,” Journal of Information Security and Applications, vol. 52, pp. 102470, 2020. https://doi.org/10.1016/j.jisa.2020.102470
[12] Ponuma R. and Amutha R., “Image Encryption Using Sparse Coding and Compressive Sensing,” Multidimensional Systems and Signal Processing, vol. 30, no. 4, pp. 1895-1909, 2019. https://doi.org/10.1007/s11045-019-00634-x
[13] Ponuma R. and Amutha R., “Compressive Sensing Based Image Compression-Encryption Using Novel 1D-Chaotic Map,” Multimedia Tools and Applications, vol. 77, no. 15, pp. 19209- 19234, 2018. https://doi.org/10.1007/s11042-017- 5378-2
[14] Ponuma R. and Amutha R., “Encryption of Image Data Using Compressive Sensing and Chaotic System,” Multimedia Tools and Applications, vol. 78, no. 9, pp. 11857-11881, 2019. https://doi.org/10.1007/s11042-018-6745-3
[15] Ponuma R., Amutha R., Aparna S., and Gopal G., “Visually Meaningful Image Encryption Using Data Hiding and Chaotic Compressive Sensing,” Multimedia Tools and Applications, vol. 78, no. 18, pp. 25707-25729, 2019. https://doi.org/10.1007/s11042-019-07808-6
[16] Shakiba A., “A Novel Randomized Bit-Level Two-Dimensional Hyperchaotic Image Encryption Algorithm,” Multimedia Tools and Applications, vol. 79, no. 43-44, pp. 32575-32605, 2020. https://doi.org/10.1007/s11042-020-09434-z
[17] Sheela S., Sanjay A., Suresh K., Tandur D., and Shubha G., “Image Encryption Based on 5D Hyperchaotic System Using Hybrid Random Matrix Transform,” Multidimensional Systems and Signal Processing, vol. 33, no. 2, pp. 579-595, 2022. https://doi.org/10.1007/s11045-021-00814-8
[18] Wang Q., Zhang X., and Zhao X., “Image Encryption Algorithm Based on Improved Zig Zag Transformation and Quaternary DNA Coding,” Journal of Information Security and Applications, vol. 70, pp. 103340, 2022. https://doi.org/10.1016/j.jisa.2022.103340
[19] Wang X. and Si R., “A New Chaotic Image Encryption Scheme Based on Dynamic L-Shaped Scrambling and Combined Map Diffusion,” Optik, vol. 245, pp. 167658, 2021. https://doi.org/10.1016/j.ijleo.2021.167658
[20] Wang X. and Zhang M., “An Image Encryption Algorithm Based on New Chaos and Diffusion Values of a Truth Table,” Information Sciences, vol. 579, pp. 128-149, 2021. https://doi.org/10.1016/j.ins.2021.07.096
[21] Wang X. and Zhao M., “An Image Encryption Algorithm Based on Hyperchaotic System and DNA Coding,” Optics and Laser Technology, vol. 143, pp. 107316, 2021. https://doi.org/10.1016/j.optlastec.2021.107316
[22] Wang X., Guan N., and Yang J., “Image Encryption Algorithm with Random Scrambling Based on One-Dimensional Logistic Self- Embedding Chaotic Map,” Chaos, Solitons and Fractals, vol. 150, pp. 111117, 2021. https://doi.org/10.1016/j.chaos.2021.111117
[23] Wang X., Liu L., and Zhang Y., “A Novel Chaotic Block Image Encryption Algorithm Based on Dynamic Random Growth Technique,” Optics and Lasers in Engineering, vol. 66, pp. 10-18, 2015. https://doi.org/10.1016/j.optlaseng.2014.08.005
[24] Wang X., Zhang Y., and Bao X., “A Novel Chaotic Image Encryption Scheme Using DNA Sequence Operations,” Optics and Lasers in Engineering, vol. 73, pp. 53-61, 2015. https://doi.org/10.1016/j.optlaseng.2015.03.022
[25] Wei D., Jiang M., and Deng Y., “A Secure Image Encryption Algorithm Based on Hyper-Chaotic and Bit-Level Permutation,” Expert Systems with Applications, vol. 213, pp. 119074, 2023. https://doi.org/10.1016/j.eswa.2022.119074
[26] Wu Y., Zhou Y., Saveriades G., Agaian S., Noonan J., and Natarajan P., “Local Shannon Entropy Measure with Statistical Tests for Image Randomness,” Information Sciences, vol. 222, pp. 878 The International Arab Journal of Information Technology, Vol. 21, No. 5, September 2024 323-342, 2013. https://doi.org/10.1016/j.ins.2012.07.049
[27] Xian Y. and Wang X., “Fractal Sorting Matrix and its Application on Chaotic Image Encryption,” Information Sciences, vol. 547, pp. 1154-1169, 2021. https://doi.org/10.1016/j.ins.2020.09.055
[28] Xu C., Sun J., and Wang C., “An Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems,” International Journal of Bifurcation and Chaos, vol. 30, no. 4, pp. 2050060, 2020. https://doi.org/10.1142/S0218127420500601
[29] Xu D., Li G., Xu W., and Wei C., “Design of Artificial Intelligence Image Encryption Algorithm Based on Hyperchaos,” Ain Shams Engineering Journal, vol. 14, no. 3, pp. 101891, 2023. https://doi.org/10.1016/j.asej.2022.101891
[30] Yang F., Mou J., Cao Y., and Chu R., “An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System,” China Communications, vol. 17, no. 5, pp. 21-28, 2020. https://doi.org/10.23919/JCC.2020.05.003
[31] Ye G., Pan C., Dong Y., Shi Y., and Huang X., “Image Encryption and Hiding Algorithm Based on Compressive Sensing and Random Numbers Insertion,” Signal Processing, vol. 172, pp. 107563, 2020. https://doi.org/10.1016/j.sigpro.2020.107563
[32] Ye G., Wu H., Jiao K., and Mei D., “Asymmetric Image Encryption Scheme Based on the Quantum Logistic Map and Cyclic Modulo Diffusion,” Mathematical Biosciences and Engineering, vol. 18, no. 5, pp. 5427-5448, 2021. DOI:10.3934/mbe.2021275
[33] Zhang Q., Han J., and Ye Y., “Multi‐Image Encryption Algorithm Based on Image Hash, Bit‐ Plane Decomposition and Dynamic DNA Coding,” IET Image Processing, vol. 15, no. 4, pp. 885-896, 2021. https://doi.org/10.1049/ipr2.12069
[34] Zhang Q., Liu L., and Wei X., “Improved Algorithm for Image Encryption Based on DNA Encoding and Multi-Chaotic Maps,” AEU- International Journal of Electronics and Communications, vol. 68, no. 3, pp. 186-192, 2014. https://doi.org/10.1016/j.aeue.2013.08.007