The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography

In the digital age, strong methods for safeguarding sensitive data are essential. Image steganography is a practical technique for data protection that hides information inside seemingly authentic images. The proposed method increases security by using chaotic based image encryption and decryption. Encryption approaches based on chaotic logistic theory present an abundance of attractive and novel opportunities for developing secure image encryption methods. Nevertheless, these maps are frequently used for specific, unpredictable starting parameters. This problem is addressed by the research's Tabu search optimisation method. This method optimises chaotic map initial settings using a fitness function with numerous objectives. For image encryption, the most efficient methods are used to produce confidential keys. The input picture undergoes horizontal and vertical diffusion and permutation during encryption. These operations further scramble the image data, making it even more difficult to detect the hidden information. The primary goal is to develop a safe method for encrypting both color and grayscale images. Two common grayscale and color images that are accessible to the public were used to test the suggested strategy. Compare our method with key existing works, specifically on the basis of Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Peak Signal-to-Noise Ratio (PSNR) and speed, respectively, our approach improves upon these studies. Our results demonstrate that 7.9981, 99.8245, 35.6507, and 78.871 are the greatest values of entropy, NPCR, UACI, and PSNR, respectively. Whereas the respective speeds of encryption and decryption increase to 0.8433 and 1.4387 seconds. This innovative approach presents a powerful tool for applications requiring secure image steganography.

[1] Abdullah A., Enayatifar R., and Lee M., “A Hybrid Genetic Algorithm and Chaotic Function Model for Image Encryption,” Aeu-International Journal of Electronics and Communications, vol. 66, no. 10, pp. 806-816, 2012. DOI:10.1016/j.aeue.2012.01.015

[2] Abed Q. and Al-Jawher W., “An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization,” Journal Port Science Research, vol. 6, no. 4, pp. 332-343, 2023. DOI:10.36371/port.2023.4.3

[3] Alanzy M., Alomrani R., Alqarni B., and Almutairi S., “Image Steganography Using LSB and Hybrid Encryption Algorithms,” Applied Sciences, vol. 13, no. 21, pp. 11771, 2023. DOI:10.3390/app132111771

[4] Alawida M., “A novel Chaos-Based Permutation for Image Encryption,” Journal of King Saud University-Computer and Information Sciences, vol. 35, no. 6, pp. 101595, 2023. DOI:10.1016/j.jksuci.2023.101595

[5] Aparna H. and Madhumitha J., “Combined Image Encryption and Steganography Technique for Enhanced Security Using Multiple Chaotic Maps,” Computers and Electrical Engineering, vol. 110, pp. 108824, 2023. DOI:10.1016/j.compeleceng.2023.108824

[6] Benaissi S., Chikouche N., and Hamza R., “A Novel Image Encryption Algorithm Based on Hybrid Chaotic Maps Using a Key Image,” Optik, vol. 272, pp. 170316, 2023. DOI:10.1016/j.ijleo.2022.170316

[7] Hossain M., Rahman M., Rahman A., and Islam S., “A New Approach of Image Encryption Using 3D Chaotic Map to Enhance Security of Multimedia Component,” in Proceedings of the International Conference on Informatics, Electronics and Vision, Dhaka, pp. 1-6, 2014. DOI:10.1109/ICIEV.2014.6850856

[8] Jaradat A., Taqieddin E., and Mowafi M., “A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization,” Security and Communication Networks, vol. 2021, pp. 1-11, 2021. DOI:10.1155/2021/6679284.

[9] Kaddouri Z. and Omary F., “Application of the Tabu Search Algorithm to Cryptography,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 7, 2017. DOI:10.14569/IJACSA.2017.080712

[10] Kalaiarasan D., Ahilan A., and Ramalingam S., “A Harris Hawk Optimization with Chaotic Map Based Image Encryption for Multimedia Application,” Journal of Intelligent and Fuzzy Systems: Applications in Engineering and Technology, vol. 45, no. 6, pp. 11035-11057, 2023. DOI:10.3233/JIFS-213337

[11] Kaur M. and Kumar V., “Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption,” Arabian Journal for Science and Engineering, vol. 43, no. 12, pp. 8127-8144, 2018. https://doi.org/10.1007/s13369-018-3355-3

[12] Kaur M., Sandhu M., and Singh S., “A New Hybrid Chaotic System and its Analysis,” International Journal of Advanced Computer Science and Applications, vol. 23, no. 3, pp. 271- 293, 2023. DOI:10.1504/IJICS.2023.10053890

[13] Kaur M., Singh D., Sun K., and Rawat U., “Color Image Encryption Using Non-Dominated Sorting Genetic Algorithm with Local Chaotic Search Based 5D Chaotic Map,” Future Generation Computer Systems-the International Journal of Escience, vol. 107, pp. 333-350, 2020. DOI:10.1016/j.future.2020.02.029

[14] Kaur M., Singh S., and Kaur M., “Computational Image Encryption Techniques: A Comprehensive Review,” Mathematical Problems in Engineering, vol. 2021, pp. 1-17, 2021. DOI:10.1155/2021/5012496

[15] Kaur M., Singh S., Kaur M., Singh A., and Singh D., “A Systematic Review of Metaheuristic-based Image Encryption Techniques,” Archives of Computational Methods in Engineering, vol. 29, no. 5, pp. 2563-2577, 2022. DOI:10.1007/s11831- 021-09656-w

[16] Kaur S. and Singh S., “A Digital Steganography Technique Using Hybrid Encryption Methods for Secure Communication,” in Proceedings of the International Conference on Information Technology and Applications, Lisbon, pp. 481- 489, 2023. DOI:10.1007/978-981-19-9331-2_41

[17] Kocak O., Erkan U., Toktas A., and Gao S., “PSO- based Image Encryption Scheme Using Modular 1072 The International Arab Journal of Information Technology, Vol. 21, No. 6, November 2024 Integrated Logistic Exponential Map,” Expert Systems with Applications, vol. 237, pp. 121452, 2024. DOI:10.1016/j.eswa.2023.121452

[18] Kumar S. and Sharma D., “Image Scrambling Encryption Using Chaotic Map and Genetic Algorithm: A Hybrid Approach for Enhanced Security,” Nonlinear Dyn, vol. 112, pp. 12537- 12564, 2024. DOI:10.1007/s11071-024-09670-0

[19] Li X., Cho S., and Kim S., “A 3D Image Encryption Technique Using Computer-Generated Integral Imaging and Cellular Automata Transform,” Optik, vol. 125, no. 13, pp. 2983- 2990, 2014. https://doi.org/10.1016/j.ijleo.2013.12.036

[20] Liu H., Zhu Z., Jiang H., and Wang B., “A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map,” in Proceedings of the 9th International Conference for Young Computer Scientists, Hunan, pp. 3016-3021, 2008. doi:10.1109/ICYCS.2008.449.

[21] Nguyen T., Arch-int S., and Arch-int N., “An Adaptive Multi Bit-Plane Image Steganography Using Block Data-Hiding,” Multimedia Tools and Applications, vol. 75, no. 14, pp. 8319-8345, 2016. DOI:10.1007/s11042-015-2752-9

[22] Rajagopalan S., Sharma S., Arumugham S., Upadhyay H., Rayappan J., and Amirtharajan R., “YRBS Coding with Logistic Map-A Novel Sanskrit Aphorism and Chaos for Image Encryption,” Multimedia Tools and Applications, vol. 78, no. 8, pp. 10513-10541, 2019. DOI:10.1007/s11042-018-6574-4

[23] Rashid A. and Hussein K., “Image Encryption Algorithm Based on the Density and 6D Logistic Map,” International Journal of Electrical Computer Engineering, vol. 13, no. 2, pp. 1903, 2023. DOI:10.11591/ijece.v13i2.pp1903-1913

[24] Rezaei B., Ghanbari H., and Enayatifar R., “An Image Encryption Approach Using Tuned Henon Chaotic Map and Evolutionary Algorithm,” Nonlinear Dyn, vol. 111, no. 10, pp. 9629-9647, 2023. DOI:10.1007/s11071-023-08331-y

[25] Sameh S., Moustafa H., AbdelHay E., and Ata M., “An Effective Chaotic Maps Image Encryption Based on Metaheuristic Optimizers,” The Journal of Supercomputing, vol. 80, no. 1, pp. 141-201, 2024. DOI:10.1007/s11227-023-05413-x

[26] Sandhu M. and Singh S., “Review of Image Encryption and Compression Techniques,” in Proceedings of the 5th Scientific Conference for Electrical Engineering Techniques Research, Mohali, pp. 040006, 2022. DOI:10.1063/5.0108517

[27] Sandhu M., Singh S., and Kaur M., “A New Hybrid Chaotic System and its Analysis,” International Journal of Electrical Computer Engineering, vol. 23, no. 3, pp. 271-293, 2024. DOI:10.1504/IJICS.2024.138493

[28] Sandhu M., Singh S., and Kaur M., “Efficient Permutation and Diffusion Model based on TCMT for Image Encryption,” in Proceedings of the 2nd International Conference on Intelligent Technologies, Hubli, pp. 1-8, 2022. DOI:10.1109/CONIT55038.2022.9848007

[29] Shao S., Li J., Shao P., and Xu G., “Chaotic Image Encryption Using Piecewise-Logistic-Sine Map,” IEEE Access, vol. 11, pp. 27477-27488, 2023. DOI:10.1109/ACCESS.2023.3257349

[30] Sreelaja N. and Pai G., “Stream Cipher for Binary Image Encryption Using Ant Colony Optimization Based Key Generation,” Applied Soft Computing, vol. 12, no. 9, pp. 2879-2895, 2012. DOI:10.1016/j.asoc.2012.04.002

[31] Wang X. and Yang L., “A Novel Chaotic Image Encryption Scheme Based on Magic Cube Permutation and Dynamic Look-Up Table,” International Journal of Modern Physics B, vol. 26, no. 29, pp. 1250139, 2012.

[32] Wu X., Kurths J., and Kan H., “A Robust and Lossless DNA Encryption Scheme for Color Images,” Multimedia Tools and Applications, vol. 77, no. 10, pp. 12349-12376, 2018. DOI:10.1007/s11042-017-4885-5

[33] Xiang H. and Liu L., “An Improved Digital Logistic Map and its Application in Image Encryption,” Multimedia Tools and Applications, vol. 79, no. 41-42, pp. 30329-30355, 2020. DOI:10.1007/s11042-020-09595-x

[34] Yang Y., Wang B., Zhou Y., Shi W., and Liao X., “Efficient Color Image Encryption by Color- Grayscale Conversion Based on Steganography,” Multimedia Tools and Applications, vol. 82, no. 7, pp. 10835-10866, 2023. DOI:10.1007/s11042- 022-13689-z.

[35] Yao J., Yang H., Jiang D., Yan B., Pan J., and Wang M., “A Novel Quantum Image Steganography Algorithm Based on Double-Layer Gray Code,” International Journal of Theoretical Physics, vol. 62, no. 3, pp. 52, 2023. DOI:10.1007/s10773-023- 05303-1

[36] Zarebnia M., Pakmanesh H., and Parvaz R., “A fast Multiple-Image Encryption Algorithm Based on Hybrid Chaotic Systems for Gray Scale Images,” Optik, vol. 179, pp. 761-773, 2019. DOI:10.1016/j.ijleo.2018.10.025

[37] Zhang X., Wang L., Zhou Z., and Niu Y., “A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals,” IEEE ACCESS, vol. 7, pp. 74734-74746, 2019. DOI:10.1109/ACCESS.2019.2921309

[38] Zhou Y. and Agaian S., “Image Encryption Using the Image Steganography Concept and PLIP Model,” in Proceedings of the International Conference on System Science and Engineering, Macau, pp. 699-703, 2011. DOI:10.1109/ICSSE.2011.5961993