Image Encryption using Half-Inverted Cascading Chaos Cipheration

Authors

  • De Rosal Ignatius Moses Setiadi Dian Nuswantoro University https://orcid.org/0000-0001-6615-4457
  • Robet Robet STMIK TIME, Medan
  • Octara Pribadi STMIK TIME, Medan
  • Suyud Widiono University of Technology Yogyakarta
  • Md Kamruzzaman Sarker Bowie State University

DOI:

https://doi.org/10.33633/jcta.v1i2.9388

Keywords:

Chaotic Encryption, Cryptography, Image encryption, Novel image encryption, Secure image transmission

Abstract

This research introduces an image encryption scheme combining several permutations and substitution-based chaotic techniques, such as Arnold Chaotic Map, 2D-SLMM, 2D-LICM, and 1D-MLM. The proposed method is called Half-Inverted Cascading Chaos Cipheration (HIC3), designed to increase digital image security and confidentiality. The main problem solved is the image's degree of confusion and diffusion. Extensive testing included chi-square analysis, information entropy, NCPCR, UACI, adjacent pixel correlation, key sensitivity and space analysis, NIST randomness testing, robustness testing, and visual analysis. The results show that HIC3 effectively protects digital images from various attacks and maintains their integrity. Thus, this method successfully achieves its goal of increasing security in digital image encryption

Author Biography

De Rosal Ignatius Moses Setiadi, Dian Nuswantoro University

Sinta ID: 6007744Scopus ID: 57200208474

References

B. M. P. Waseso and N. A. Setiyanto, “Web Phishing Classification using Combined Machine Learning Methods,” J. Comput. Theor. Appl., vol. 1, no. 1, pp. 11–18, Aug. 2023, doi: 10.33633/jcta.v1i1.8898.

A. A. Ojugo et al., “Forging a User-Trust Memetic Modular Neural Network Card Fraud Detection Ensemble: A Pilot Study,” J. Comput. Theor. Appl., vol. 1, no. 2, pp. 1–11, Oct. 2023, doi: 10.33633/jcta.v1i2.9259.

J. G. Sekar, E. Periyathambi, and A. Chokkalingam, “Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map with deoxyribonucleic acid sequence and its performance evaluation,” Int. J. Electr. Comput. Eng., vol. 13, no. 6, p. 6952, Dec. 2023, doi: 10.11591/ijece.v13i6.pp6952-6963.

J. Zheng and T. Bao, “An image encryption algorithm based on cascade chaotic map and DNA coding,” IET Image Process., 2023, doi: 10.1049/ipr2.12882.

P. Kumari and B. Mondal, “Lightweight image encryption algorithm using NLFSR and CBC mode,” J. Supercomput., vol. 79, no. 17, pp. 19452–19472, 2023, doi: 10.1007/s11227-023-05415-9.

Y. Alghamdi and A. Munir, “An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution,” SN Comput. Sci., vol. 4, no. 6, p. 713, Sep. 2023, doi: 10.1007/s42979-023-02172-7.

P. Kumari and B. Mondal, “An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network,” Wirel. Pers. Commun., vol. 130, no. 3, pp. 2261–2280, Jun. 2023, doi: 10.1007/s11277-023-10382-8.

S. Bhowmik and S. Acharyya, “Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm,” J. Inf. Secur. Appl., vol. 72, no. December 2022, p. 103391, 2023, doi: 10.1016/j.jisa.2022.103391.

S. Dhall, S. K. Pal, and K. Sharma, “A chaos-based probabilistic block cipher for image encryption,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 1, pp. 1533–1543, Jan. 2022, doi: 10.1016/j.jksuci.2018.09.015.

N. Wang et al., “Galois Field-Based Image Encryption for Remote Transmission of Tumor Ultrasound Images,” IEEE Access, vol. 7, pp. 49945–49950, 2019, doi: 10.1109/ACCESS.2019.2910563.

B. Harjo and D. R. I. M. Setiadi, “Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method,” Int. J. Intell. Eng. Syst., vol. 14, no. 2, pp. 157–165, 2021, doi: 10.22266/ijies2021.0430.14.

D. E. Mfungo, X. Fu, Y. Xian, and X. Wang, “A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information,” Appl. Sci., vol. 13, no. 12, p. 7113, Jun. 2023, doi: 10.3390/app13127113.

A. Toktas, U. Erkan, S. Gao, and C. Pak, “A robust bit-level image encryption based on Bessel map,” Appl. Math. Comput., vol. 462, no. March 2023, p. 128340, Feb. 2024, doi: 10.1016/j.amc.2023.128340.

Q. Lai and H. Zhang, “A new image encryption method based on memristive hyperchaos,” Opt. Laser Technol., vol. 166, no. March, p. 109626, 2023, doi: 10.1016/j.optlastec.2023.109626.

Y. Hu, H. Wu, and L. Zhou, “Color image encryption base on a 2D hyperchaotic enhanced Henon map and cross diffusion,” Alexandria Eng. J., vol. 73, pp. 385–402, 2023, doi: 10.1016/j.aej.2023.04.060.

M. I. Moussa, E. I. Abd El-Latif, and A. H. Abu El-Atta, “Diagonalize three-dimensional nonlinear chaotic map to encrypt color image,” Egypt. Informatics J., vol. 24, no. 3, p. 100376, 2023, doi: 10.1016/j.eij.2023.05.001.

M. Wang, X. Wang, C. Wang, S. Zhou, Z. Xia, and Q. Li, “Color image encryption based on 2D enhanced hyperchaotic logistic-sine map and two-way Josephus traversing,” Digit. Signal Process., vol. 132, p. 103818, Jan. 2023, doi: 10.1016/j.dsp.2022.103818.

B. Zhang and L. Liu, “Chaos-Based Image Encryption: Review, Application, and Challenges,” Mathematics, vol. 11, no. 11, 2023, doi: 10.3390/math11112585.

D. R. I. M. Setiadi and N. Rijati, “An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations,” Computation, vol. 11, no. 9, p. 178, Sep. 2023, doi: 10.3390/computation11090178.

W. Alexan, N. Alexan, and M. Gabr, “Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs,” Fractal Fract., vol. 7, no. 4, p. 287, Mar. 2023, doi: 10.3390/fractalfract7040287.

W. Feng, X. Zhao, J. Zhang, Z. Qin, J. Zhang, and Y. He, “Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform,” Mathematics, vol. 10, no. 15, pp. 1–24, 2022, doi: 10.3390/math10152751.

P. N. Andono and D. R. I. M. Setiadi, “Improved Pixel and Bit Confusion-Diffusion Based on Mixed Chaos and Hash Operation for Image Encryption,” IEEE Access, vol. 10, no. November, pp. 115143–115156, 2022, doi: 10.1109/ACCESS.2022.3218886.

D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling,” J. King Saud Univ. - Comput. Inf. Sci., vol. 34, no. 9, pp. 6818–6828, Oct. 2022, doi: 10.1016/j.jksuci.2022.04.002.

R. Wang, G.-Q. Deng, and X.-F. Duan, “An image encryption scheme based on double chaotic cyclic shift and Josephus problem,” J. Inf. Secur. Appl., vol. 58, p. 102699, May 2021, doi: 10.1016/j.jisa.2020.102699.

E. Winarno, K. Nugroho, P. W. Adi, and D. R. I. M. Setiadi, “Integrated dual hyperchaotic and Josephus traversing based 3D confusion-diffusion pattern for image encryption,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 9, p. 101790, Oct. 2023, doi: 10.1016/j.jksuci.2023.101790.

J. Xu, C. Zhao, and J. Mou, “A 3D Image Encryption Algorithm Based on the Chaotic System and the Image Segmentation,” IEEE Access, vol. 8, pp. 145995–146005, 2020, doi: 10.1109/ACCESS.2020.3005925.

E. Winarno, K. Nugroho, P. W. Adi, and D. R. I. M. Setiadi, “Combined Interleaved Pattern to Improve Confusion-Diffusion Image Encryption Based on Hyperchaotic System,” IEEE Access, vol. 11, pp. 69005–69021, 2023, doi: 10.1109/ACCESS.2023.3285481.

F. Budiman and D. R. I. M. Setiadi, “A Combination of Block-Based Chaos with Dynamic Iteration Pattern and Stream Cipher for Color Image Encryption,” Int. J. Intell. Eng. Syst., vol. 13, no. 6, pp. 132–141, 2020, doi: 10.22266/ijies2020.1231.12.

F. Budiman, P. N. Andono, and D. R. I. M. Setiadi, “Image Encryption using Double Layer Chaos with Dynamic Iteration and Rotation Pattern,” Int. J. Intell. Eng. Syst., vol. 15, no. 2, pp. 57–67, 2022, doi: 10.22266/ijies2022.0430.06.

W. Alexan, Y.-L. Chen, L. Y. Por, and M. Gabr, “Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption,” Symmetry (Basel)., vol. 15, no. 5, p. 1081, May 2023, doi: 10.3390/sym15051081.

A. Belazi, M. Khan, A. A. A. El-Latif, and S. Belghith, “Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption,” Nonlinear Dyn., vol. 87, no. 1, pp. 337–361, 2017, doi: 10.1007/s11071-016-3046-0.

M. M. Al-Mhadawi, E. A. Albahrani, and S. H. Lafta, “Efficient and secure chaotic PRNG for color image encryption,” Microprocess. Microsyst., vol. 101, no. August 2022, p. 104911, 2023, doi: 10.1016/j.micpro.2023.104911.

S. H. AbdElHaleem, S. K. Abd-El-Hafiz, and A. G. Radwan, “A generalized framework for elliptic curves based PRNG and its utilization in image encryption,” Sci. Rep., vol. 12, no. 1, pp. 1–16, 2022, doi: 10.1038/s41598-022-17045-x.

R. Chu, S. Zhang, and X. Gao, “A Novel 3D Image Encryption Based on the Chaotic System and RNA Crossover and Mutation,” Front. Phys., vol. 10, no. March, pp. 1–14, 2022, doi: 10.3389/fphy.2022.844966.

Z. Hua, Y. Zhou, C. M. Pun, and C. L. P. Chen, “2D Sine Logistic modulation map for image encryption,” Inf. Sci. (Ny)., vol. 297, pp. 80–94, Mar. 2015, doi: 10.1016/J.INS.2014.11.018.

C. Cao, K. Sun, and W. Liu, “A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map,” Signal Processing, vol. 143, pp. 122–133, Feb. 2018, doi: 10.1016/j.sigpro.2017.08.020.

A. Z. Hussain and M. A. A. Khodher, “Medical image encryption using multi chaotic maps,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 21, no. 3, pp. 556–565, 2023, doi: 10.12928/TELKOMNIKA.v21i3.24324.

A. Susanto et al., “Triple layer image security using bit-shift, chaos, and stream encryption,” Bull. Electr. Eng. Informatics, vol. 9, no. 3, pp. 980–987, Jun. 2020, doi: 10.11591/eei.v9i3.2001.

N. A. Abbas, “Image encryption based on Independent Component Analysis and Arnold’s Cat Map,” Egypt. Informatics J., vol. 17, no. 1, pp. 139–146, Mar. 2016, doi: 10.1016/j.eij.2015.10.001.

C. Han, “An image encryption algorithm based on modified logistic chaotic map,” Optik (Stuttg)., vol. 181, no. December 2018, pp. 779–785, Mar. 2019, doi: 10.1016/j.ijleo.2018.12.178.

S. Vaidyanathan et al., “A Novel 3-D Jerk System, Its Bifurcation Analysis, Electronic Circuit Design and a Cryptographic Application,” Electronics, vol. 12, no. 13, p. 2818, Jun. 2023, doi: 10.3390/electronics12132818.

Y. Dong, G. Zhao, Y. Ma, Z. Pan, and R. Wu, “A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata,” Inf. Sci. (Ny)., vol. 593, pp. 121–154, 2022, doi: 10.1016/j.ins.2022.01.031.

Y. S. Najaf and M. K. Mahmood Al-Azawi, “Public key cryptosystem based on multiple chaotic maps for image encryption,” Indones. J. Electr. Eng. Comput. Sci., vol. 22, no. 3, pp. 1457–1466, 2021, doi: 10.11591/ijeecs.v22.i3.pp1457-1466.

O. Omoruyi, C. Okereke, K. Okokpujie, E. Noma-Osaghae, O. Okoyeigbo, and S. John, “Evaluation of the quality of an image encrytion scheme,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2968–2974, 2019, doi: 10.12928/TELKOMNIKA.v17i6.10488.

S. Mortajez, M. Tahmasbi, J. Zarei, and A. Jamshidnezhad, “A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images,” Informatics Med. Unlocked, vol. 20, p. 100396, Jan. 2020, doi: 10.1016/j.imu.2020.100396.

D. A. Q. Shakir and A. J. Dawood, “3D chaos graph deep learning method to encrypt and decrypt digital image,” Indones. J. Electr. Eng. Comput. Sci., vol. 25, no. 2, pp. 941–951, 2022, doi: 10.11591/ijeecs.v25.i2.pp941-951.

S. A. Jassim and A. K. Farhan, “Designing a Novel Efficient Substitution-Box by Using a Flower Pollination Algorithm and Chaos System,” Int. J. Intell. Eng. Syst., vol. 15, no. 1, pp. 176–187, 2022, doi: 10.22266/IJIES2022.0228.17.

J. S. Khan and S. K. Kayhan, “Chaos and compressive sensing based novel image encryption scheme,” J. Inf. Secur. Appl., vol. 58, no. January, p. 102711, May 2021, doi: 10.1016/j.jisa.2020.102711.

J. Wu, X. Liao, and B. Yang, “Color image encryption based on chaotic systems and elliptic curve ElGamal scheme,” Signal Processing, vol. 141, pp. 109–124, Dec. 2017, doi: 10.1016/j.sigpro.2017.04.006.

Y. Liu and J. Zhang, “A Multidimensional Chaotic Image Encryption Algorithm based on DNA Coding,” Multimed. Tools Appl., vol. 79, no. 29–30, pp. 21579–21601, Aug. 2020, doi: 10.1007/s11042-020-08880-z.

M. Kaur, D. Singh, K. Sun, and U. Rawat, “Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map,” Futur. Gener. Comput. Syst., vol. 107, pp. 333–350, Jun. 2020, doi: 10.1016/j.future.2020.02.029.

S. T. Kamal, K. M. Hosny, T. M. Elgindy, M. M. Darwish, and M. M. Fouda, “A New Image Encryption Algorithm for Grey and Color Medical Images,” IEEE Access, vol. 9, pp. 37855–37865, 2021, doi: 10.1109/ACCESS.2021.3063237.

S. Benaissi, N. Chikouche, and R. Hamza, “A novel image encryption algorithm based on hybrid chaotic maps using a key image,” Optik (Stuttg)., vol. 272, no. November 2022, p. 170316, Feb. 2023, doi: 10.1016/j.ijleo.2022.170316.

L. Moysis, A. Tutueva, C. Volos, D. Butusov, J. M. Munoz-Pacheco, and H. Nistazakis, “A Two-Parameter Modified Logistic Map and Its Application to Random Bit Generation,” Symmetry (Basel)., vol. 12, no. 5, p. 829, May 2020, doi: 10.3390/sym12050829.

Downloads

Published

2023-10-23

How to Cite

Setiadi, D. R. I. M., Robet, R., Pribadi, O., Widiono, S., & Sarker, M. K. (2023). Image Encryption using Half-Inverted Cascading Chaos Cipheration. Journal of Computing Theories and Applications, 1(2), 61–77. https://doi.org/10.33633/jcta.v1i2.9388