Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques

Muhammad Naufal Erza Farandi, Sri Winarno, Zahrah Asri Nur Fauzyah

Abstract


This study develops a digital image encryption method using a 4D hyperchaotic system combined with a hybrid key to maximize data security. By generating a random and uniform pixel distribution, the method makes decryption significantly harder for unauthorized access. Evaluations are conducted through histogram analysis, robustness tests, NPCR, UACI, and information entropy. The findings reveal that the method effectively breaks pixel correlation, rendering the encrypted image unrecognizable. Histogram analysis confirms a uniform pixel distribution, while robustness tests show the system can maintain image quality despite manipulations or attacks. NPCR and UACI tests highlight the method’s high sensitivity to even minor changes in the original image, further enhancing security. Information entropy demonstrates a higher level of randomness compared to other encryption techniques. This 4D hyperchaotic and hybrid key-based approach holds considerable promise for applications requiring highly secure image transmission and storage, ensuring reliable data protection in sensitive environments.

Full Text:

PDF

References


B. Mahardhika, P. Waseso, and N. A. Setiyanto, “Web Phishing Classification using Combined Machine Learning Methods,” Journal of Computing Theories and Applications, vol. 1, no. 1, pp. 11–18, Aug. 2023, doi: 10.33633/JCTA.V1I1.8898.

L. Teng, X. Wang, F. Yang, and Y. Xian, “Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion,” Nonlinear Dyn, vol. 105, no. 2, pp. 1859–1876, Jul. 2021, doi: 10.1007/s11071-021-06663-1.

M. I. Akazue, I. A. Debekeme, A. E. Edje, C. Asuai, and U. J. Osame, “UNMASKING FRAUDSTERS: Ensemble Features Selection to Enhance Random Forest Fraud Detection,” Journal of Computing Theories and Applications, vol. 1, no. 2, pp. 201–211, Dec. 2023, doi: 10.33633/JCTA.V1I2.9462.

J. Kolapo Oladele et al., “BEHeDaS: A Blockchain Electronic Health Data System for Secure Medical Records Exchange,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 231–242, Jan. 2024, doi: 10.62411/JCTA.9509.

E. U. Omede, A. E. Edje, M. I. Akazue, H. Utomwen, and A. A. Ojugo, “IMANoBAS: An Improved Multi-Mode Alert Notification IoT-based Anti-Burglar Defense System,” Journal of Computing Theories and Applications, vol. 1, no. 3, pp. 273–283, Feb. 2024, doi: 10.62411/jcta.9541.

V. Manikandan, V. Raj, S. Janakiraman, R. Sivaraman, and R. Amirtharajan, “Let wavelet authenticate and tent-map encrypt: a sacred connect against a secret nexus,” Soft comput, vol. 28, no. 9–10, pp. 6839–6853, May 2024, doi: 10.1007/S00500-023-09580-0.

T. Li, J. Shi, X. Li, J. Wu, and F. Pan, “Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin Cubes,” Entropy, vol. 21, no. 3, Mar. 2019, doi: 10.3390/e21030319.

J. Li, J. Wang, and X. Di, “Image encryption algorithm based on bit-level permutation and ‘Feistel-like network’ diffusion,” Multimed Tools Appl, vol. 81, no. 30, pp. 44335–44362, Dec. 2022, doi: 10.1007/S11042-022-12736-Z/TABLES/12.

X. Wang and S. Gao, “Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory,” Inf Sci (N Y), vol. 507, pp. 16–36, Jan. 2020, doi: 10.1016/J.INS.2019.08.041.

S. C. Wang, C. H. Wang, and C. Xu, “An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm,” Opt Lasers Eng, vol. 128, p. 105995, May 2020, doi: 10.1016/J.OPTLASENG.2019.105995.

Y. He, Y. Q. Zhang, X. He, and X. Y. Wang, “A new image encryption algorithm based on the OF-LSTMS and chaotic sequences,” Scientific Reports 2021 11:1, vol. 11, no. 1, pp. 1–22, Mar. 2021, doi: 10.1038/s41598-021-85377-1.

X. Wang and Y. Su, “Color image encryption based on chaotic compressed sensing and two-dimensional fractional Fourier transform,” Sci Rep, vol. 10, no. 1, Dec. 2020, doi: 10.1038/S41598-020-75562-Z.

R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, “A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2,” Nonlinear Dyn, vol. 83, no. 3, pp. 1123–1136, Feb. 2016, doi: 10.1007/S11071-015-2392-7.

H. Wen, S. Yu, and J. Lü, “Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos,” Entropy 2019, Vol. 21, Page 246, vol. 21, no. 3, p. 246, Mar. 2019, doi: 10.3390/E21030246.

H. Liu, Y. Zhang, A. Kadir, and Y. Xu, “Image encryption using complex hyper chaotic system by injecting impulse into parameters,” Appl Math Comput, vol. 360, pp. 83–93, Nov. 2019, doi: 10.1016/J.AMC.2019.04.078.

S. Zhu, X. Deng, W. Zhang, and C. Zhu, “Construction of a New 2D Hyperchaotic Map with Application in Efficient Pseudo-Random Number Generator Design and Color Image Encryption,” Mathematics, vol. 11, no. 14, Jul. 2023, doi: 10.3390/math11143171.

X. Gao, “Image encryption algorithm based on 2D hyperchaotic map,” Opt Laser Technol, vol. 142, Oct. 2021, doi: 10.1016/j.optlastec.2021.107252.

Y. Shen, J. Huang, L. Chen, T. Wen, T. Li, and G. Zhang, “Fast and Secure Image Encryption Algorithm with Simultaneous Shuffling and Diffusion Based on a Time-Delayed Combinatorial Hyperchaos Map,” Entropy, vol. 25, no. 5, May 2023, doi: 10.3390/e25050753.

M. N. E. Farandi, A. Marjuni, N. Rijati, and D. R. I. M. Setiadi, “Enhancing image encryption security through integration multi-chaotic systems and mixed pixel-bit level,” Imaging Science Journal, 2024, doi: 10.1080/13682199.2024.2398954.

J. Wu, J. Shi, and T. Li, “A novel image encryption approach based on a hyperchaotic system, pixel-level filtering with variable kernels, and DNA-level diffusion,” Entropy, vol. 22, no. 1, p. 5, Jan. 2020, doi: 10.3390/e22010005.

H. Liu, B. Zhao, and L. Huang, “A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map,” IEEE Access, vol. 7, pp. 65450–65459, 2019, doi: 10.1109/ACCESS.2019.2917498.

Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, Mar. 2018, doi: 10.1016/j.sigpro.2017.10.004.

A. ur Rehman, X. Liao, R. Ashraf, S. Ullah, and H. Wang, “A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2,” Optik (Stuttg), vol. 159, pp. 348–367, Apr. 2018, doi: 10.1016/J.IJLEO.2018.01.064.

L. Chen, S. Tang, Q. Li, and S. Zhong, “A new 4D hyperchaotic system with high complexity,” Math Comput Simul, vol. 146, pp. 44–56, Apr. 2018, doi: 10.1016/J.MATCOM.2017.10.002.

Z. Dong, Z. Zhang, H. Zhou, and X. Chen, “Color image compression and encryption algorithm based on 2d compressed sensing and hyperchaotic system,” Computers, Materials and Continua, vol. 78, no. 2, pp. 1977–1993, 2024, doi: 10.32604/cmc.2024.047233.

G. A. Gakam Tegue et al., “A Novel Image Encryption Scheme Combining a Dynamic S-Box Generator and a New Chaotic Oscillator with Hidden Behavior,” Arab J Sci Eng, vol. 48, no. 8, pp. 10653–10672, Aug. 2023, doi: 10.1007/S13369-023-07715-X.

A. Hasheminejad and M. J. Rostami, “A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map,” Optik (Stuttg), vol. 184, pp. 205–213, May 2019, doi: 10.1016/J.IJLEO.2019.03.065.

Z. W. Huang and N. R. Zhou, “Image encryption scheme based on discrete cosine Stockwell transform and DNA-level modulus diffusion,” Opt Laser Technol, vol. 149, p. 107879, May 2022, doi: 10.1016/J.OPTLASTEC.2022.107879.

Y. S. Najaf and M. K. Mahmood Al-Azawi, “Public key cryptosystem based on multiple chaotic maps for image encryption,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 22, no. 3, pp. 1457–1466, Jun. 2021, doi: 10.11591/ijeecs.v22.i3.pp1457-1466.

S. Zhu and C. Zhu, “Secure image encryption algorithm based on hyperchaos and dynamic DNA coding,” Entropy, vol. 22, no. 7, Jul. 2020, doi: 10.3390/e22070772.

S. Mortajez, M. Tahmasbi, J. Zarei, and A. Jamshidnezhad, “A novel chaotic encryption scheme based on efficient secret keys and confusion technique for confidential of DICOM images,” Inform Med Unlocked, vol. 20, p. 100396, Jan. 2020, doi: 10.1016/J.IMU.2020.100396.

S. A. Jassim and A. K. Farhan, “Designing a Novel Efficient Substitution-Box by Using a Flower Pollination Algorithm and Chaos System,” International Journal of Intelligent Engineering and Systems, vol. 15, no. 1, pp. 176–187, 2022, doi: 10.22266/IJIES2022.0228.17.




DOI: https://doi.org/10.32520/stmsi.v13i6.4675

Article Metrics

Abstract view : 34 times
PDF - 12 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.