Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques
Abstract
Full Text:
PDFReferences
B. Mahardhika, P. Waseso, and N. A. Setiyanto, “Web Phishing Classification using Combined Machine Learning Methods,” Journal of Computing Theories and Applications, vol. 1, no. 1, pp. 11–18, Aug. 2023, doi: 10.33633/JCTA.V1I1.8898.
L. Teng, X. Wang, F. Yang, and Y. Xian, “Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion,” Nonlinear Dyn, vol. 105, no. 2, pp. 1859–1876, Jul. 2021, doi: 10.1007/s11071-021-06663-1.
M. I. Akazue, I. A. Debekeme, A. E. Edje, C. Asuai, and U. J. Osame, “UNMASKING FRAUDSTERS: Ensemble Features Selection to Enhance Random Forest Fraud Detection,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 201–211, Dec. 2023, doi: 10.33633/JCTA.V1I2.9462.
J. Kolapo Oladele et al., “BEHeDaS: A Blockchain Electronic Health Data System for Secure Medical Records Exchange,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 231–242, Jan. 2024, doi: 10.62411/JCTA.9509.
E. U. Omede, A. E. Edje, M. I. Akazue, H. Utomwen, and A. A. Ojugo, “IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 273–283, Feb. 2024, doi: 10.62411/jcta.9541.
V. Manikandan, V. Raj, S. Janakiraman, R. Sivaraman, and R. Amirtharajan, “Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus,” Soft comput, vol. 28, no. 9–10, pp. 6839–6853, May 2024, doi: 10.1007/S00500-023-09580-0.
T. Li, J. Shi, X. Li, J. Wu, and F. Pan, “Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin Cubes,” Entropy, vol. 21, no. 3, Mar. 2019, doi: 10.3390/e21030319.
J. Li, J. Wang, and X. Di, “Image encryption algorithm based on bit-level permutation and ‘Feistel-like network’ diffusion,” Multimed Tools Appl, vol. 81, no. 30, pp. 44335–44362, Dec. 2022, doi: 10.1007/S11042-022-12736-Z/TABLES/12.
X. Wang and S. Gao, “Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory,” Inf Sci (N Y), vol. 507, pp. 16–36, Jan. 2020, doi: 10.1016/J.INS.2019.08.041.
S. C. Wang, C. H. Wang, and C. Xu, “An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm,” Opt Lasers Eng, vol. 128, p. 105995, May 2020, doi: 10.1016/J.OPTLASENG.2019.105995.
Y. He, Y. Q. Zhang, X. He, and X. Y. Wang, “A new image encryption algorithm based on the OF-LSTMS and chaotic sequences,” Scientific Reports 2021 11:1, vol. 11, no. 1, pp. 1–22, Mar. 2021, doi: 10.1038/s41598-021-85377-1.
X. Wang and Y. Su, “Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform,” Sci Rep, vol. 10, no. 1, Dec. 2020, doi: 10.1038/S41598-020-75562-Z.
R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, “A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2,” Nonlinear Dyn, vol. 83, no. 3, pp. 1123–1136, Feb. 2016, doi: 10.1007/S11071-015-2392-7.
H. Wen, S. Yu, and J. Lü, “Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos,” Entropy 2019, Vol. 21, Page 246, vol. 21, no. 3, p. 246, Mar. 2019, doi: 10.3390/E21030246.
H. Liu, Y. Zhang, A. Kadir, and Y. Xu, “Image encryption using complex hyper chaotic system by injecting impulse into parameters,” Appl Math Comput, vol. 360, pp. 83–93, Nov. 2019, doi: 10.1016/J.AMC.2019.04.078.
S. Zhu, X. Deng, W. Zhang, and C. Zhu, “Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random Number Generator Design and Color Image Encryption,” Mathematics, vol. 11, no. 14, Jul. 2023, doi: 10.3390/math11143171.
X. Gao, “Image encryption algorithm based on 2D hyperchaotic map,” Opt Laser Technol, vol. 142, Oct. 2021, doi: 10.1016/j.optlastec.2021.107252.
Y. Shen, J. Huang, L. Chen, T. Wen, T. Li, and G. Zhang, “Fast and Secure Image Encryption Algorithm with Simultaneous Shuffling and Diffusion Based on a Time-Delayed Combinatorial Hyperchaos Map,” Entropy, vol. 25, no. 5, May 2023, doi: 10.3390/e25050753.
M. N. E. Farandi, A. Marjuni, N. Rijati, and D. R. I. M. Setiadi, “Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level,” Imaging Science Journal, 2024, doi: 10.1080/13682199.2024.2398954.
J. Wu, J. Shi, and T. Li, “A novel image encryption approach based on a hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion,” Entropy, vol. 22, no. 1, p. 5, Jan. 2020, doi: 10.3390/e22010005.
H. Liu, B. Zhao, and L. Huang, “A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map,” IEEE Access, vol. 7, pp. 65450–65459, 2019, doi: 10.1109/ACCESS.2019.2917498.
Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, Mar. 2018, doi: 10.1016/j.sigpro.2017.10.004.
A. ur Rehman, X. Liao, R. Ashraf, S. Ullah, and H. Wang, “A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2,” Optik (Stuttg), vol. 159, pp. 348–367, Apr. 2018, doi: 10.1016/J.IJLEO.2018.01.064.
L. Chen, S. Tang, Q. Li, and S. Zhong, “A new 4D hyperchaotic system with high complexity,” Math Comput Simul, vol. 146, pp. 44–56, Apr. 2018, doi: 10.1016/J.MATCOM.2017.10.002.
Z. Dong, Z. Zhang, H. Zhou, and X. Chen, “Color image compression and encryption algorithm based on 2d compressed sensing and hyperchaotic system,” Computers, Materials and Continua, vol. 78, no. 2, pp. 1977–1993, 2024, doi: 10.32604/cmc.2024.047233.
G. A. Gakam Tegue et al., “A Novel Image Encryption Scheme Combining a Dynamic S-Box Generator and a New Chaotic Oscillator with Hidden Behavior,” Arab J Sci Eng, vol. 48, no. 8, pp. 10653–10672, Aug. 2023, doi: 10.1007/S13369-023-07715-X.
A. Hasheminejad and M. J. Rostami, “A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map,” Optik (Stuttg), vol. 184, pp. 205–213, May 2019, doi: 10.1016/J.IJLEO.2019.03.065.
Z. W. Huang and N. R. Zhou, “Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion,” Opt Laser Technol, vol. 149, p. 107879, May 2022, doi: 10.1016/J.OPTLASTEC.2022.107879.
Y. S. Najaf and M. K. Mahmood Al-Azawi, “Public key cryptosystem based on multiple chaotic maps for image encryption,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 3, pp. 1457–1466, Jun. 2021, doi: 10.11591/ijeecs.v22.i3.pp1457-1466.
S. Zhu and C. Zhu, “Secure image encryption algorithm based on hyperchaos and dynamic DNA coding,” Entropy, vol. 22, no. 7, Jul. 2020, doi: 10.3390/e22070772.
S. Mortajez, M. Tahmasbi, J. Zarei, and A. Jamshidnezhad, “A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images,” Inform Med Unlocked, vol. 20, p. 100396, Jan. 2020, doi: 10.1016/J.IMU.2020.100396.
S. A. Jassim and A. K. Farhan, “Designing a Novel Efficient Substitution-Box by Using a Flower Pollination Algorithm and Chaos System,” International Journal of Intelligent Engineering and Systems, vol. 15, no. 1, pp. 176–187, 2022, doi: 10.22266/IJIES2022.0228.17.
DOI: https://doi.org/10.32520/stmsi.v13i6.4675
Article Metrics
Abstract view : 34 timesPDF - 12 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.