Color image encryption using a Zigzag Transformation and sine–cosine maps
This research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized by inherent complexity, sensitivity to initial conditions, and resilience to...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2023-11-01
|
Series: | Scientific African |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2468227623004106 |
_version_ | 1827615705632079872 |
---|---|
author | F. ElAzzaby K.H. Sabour N. ELakkad W. El-Shafai A. Torki S.R. Rajkumar |
author_facet | F. ElAzzaby K.H. Sabour N. ELakkad W. El-Shafai A. Torki S.R. Rajkumar |
author_sort | F. ElAzzaby |
collection | DOAJ |
description | This research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized by inherent complexity, sensitivity to initial conditions, and resilience to attacks, are foundational elements in the realm of image encryption. The proposed encryption algorithm firmly adheres to the principles of confusion and diffusion, thereby constructing a secure framework. Within the permutation phase of the algorithm, a meticulously crafted scrambling technique takes center stage. This technique adeptly disperses adjacent pixels within an image across the red, green, and blue channels through both horizontal and vertical zigzag transformations. This intricate process significantly elevates the level of intricacy and unpredictability within the encryption procedure, bolstering security measures. To further fortify security, the substitution stage integrates two one-dimensional chaotic systems, specifically 1-DSP and 1-DCP. These systems serve as mechanisms to introduce subtle alterations to the original image, affecting all pixels within the encrypted image. The extent of these alterations hinges on the values of the three least significant bits (LSB) of each pixel. The incorporation of this dual chaotic system approach introduces an additional layer of complexity and security into the encryption methodology. The effectiveness of the proposed system is subjected to rigorous evaluation through a comprehensive security analysis. This analysis encompasses an array of performance metrics, including NPCR (Normalized Pixel Change Rate), UACI (Unified Average Changing Intensity), correlation coefficient, histogram analysis, and key sensitivity analysis. These metrics collectively serve to assess the viability and feasibility of the suggested approach, functioning as a litmus test for the system’s resilience and efficiency. The results of this evaluation underscore the robust security and superior performance of the proposed image encryption method, positioning it favorably when compared to various advanced image encryption algorithms. |
first_indexed | 2024-03-09T09:15:30Z |
format | Article |
id | doaj.art-1a5db0993ada409c84192a3bb72fa4f8 |
institution | Directory Open Access Journal |
issn | 2468-2276 |
language | English |
last_indexed | 2024-03-09T09:15:30Z |
publishDate | 2023-11-01 |
publisher | Elsevier |
record_format | Article |
series | Scientific African |
spelling | doaj.art-1a5db0993ada409c84192a3bb72fa4f82023-12-02T07:06:26ZengElsevierScientific African2468-22762023-11-0122e01955Color image encryption using a Zigzag Transformation and sine–cosine mapsF. ElAzzaby0K.H. Sabour1N. ELakkad2W. El-Shafai3A. Torki4S.R. Rajkumar5Department of Mathematics, Faculty of Sciences, Ibn Tofail University, Kenitra, 14000, Morocco; Corresponding author.Department of Mathematics, Faculty of Sciences, Ibn Tofail University, Kenitra, 14000, MoroccoLaboratory of Engineering, Systems and Applications, ENSA of Fez, Sidi Mohamed Ben Abdellah University of Fez, Fez, 30200, MoroccoDepartment Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, EgyptComputer Science Department, Community College, King Saud University, 11451, 95, Riyadh 11362, Saudi ArabiaDepartment of Computer Science, Cardiff School of Technologies, Cardiff Metropolitan University, Llandaff Campus, Western Avenue, Cardiff CF5 2YB, United KingdomThis research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized by inherent complexity, sensitivity to initial conditions, and resilience to attacks, are foundational elements in the realm of image encryption. The proposed encryption algorithm firmly adheres to the principles of confusion and diffusion, thereby constructing a secure framework. Within the permutation phase of the algorithm, a meticulously crafted scrambling technique takes center stage. This technique adeptly disperses adjacent pixels within an image across the red, green, and blue channels through both horizontal and vertical zigzag transformations. This intricate process significantly elevates the level of intricacy and unpredictability within the encryption procedure, bolstering security measures. To further fortify security, the substitution stage integrates two one-dimensional chaotic systems, specifically 1-DSP and 1-DCP. These systems serve as mechanisms to introduce subtle alterations to the original image, affecting all pixels within the encrypted image. The extent of these alterations hinges on the values of the three least significant bits (LSB) of each pixel. The incorporation of this dual chaotic system approach introduces an additional layer of complexity and security into the encryption methodology. The effectiveness of the proposed system is subjected to rigorous evaluation through a comprehensive security analysis. This analysis encompasses an array of performance metrics, including NPCR (Normalized Pixel Change Rate), UACI (Unified Average Changing Intensity), correlation coefficient, histogram analysis, and key sensitivity analysis. These metrics collectively serve to assess the viability and feasibility of the suggested approach, functioning as a litmus test for the system’s resilience and efficiency. The results of this evaluation underscore the robust security and superior performance of the proposed image encryption method, positioning it favorably when compared to various advanced image encryption algorithms.http://www.sciencedirect.com/science/article/pii/S2468227623004106Card chaoticSHA-256Zigzag transformationImage encryptionSecurity |
spellingShingle | F. ElAzzaby K.H. Sabour N. ELakkad W. El-Shafai A. Torki S.R. Rajkumar Color image encryption using a Zigzag Transformation and sine–cosine maps Scientific African Card chaotic SHA-256 Zigzag transformation Image encryption Security |
title | Color image encryption using a Zigzag Transformation and sine–cosine maps |
title_full | Color image encryption using a Zigzag Transformation and sine–cosine maps |
title_fullStr | Color image encryption using a Zigzag Transformation and sine–cosine maps |
title_full_unstemmed | Color image encryption using a Zigzag Transformation and sine–cosine maps |
title_short | Color image encryption using a Zigzag Transformation and sine–cosine maps |
title_sort | color image encryption using a zigzag transformation and sine cosine maps |
topic | Card chaotic SHA-256 Zigzag transformation Image encryption Security |
url | http://www.sciencedirect.com/science/article/pii/S2468227623004106 |
work_keys_str_mv | AT felazzaby colorimageencryptionusingazigzagtransformationandsinecosinemaps AT khsabour colorimageencryptionusingazigzagtransformationandsinecosinemaps AT nelakkad colorimageencryptionusingazigzagtransformationandsinecosinemaps AT welshafai colorimageencryptionusingazigzagtransformationandsinecosinemaps AT atorki colorimageencryptionusingazigzagtransformationandsinecosinemaps AT srrajkumar colorimageencryptionusingazigzagtransformationandsinecosinemaps |