Color image encryption using a Zigzag Transformation and sine–cosine maps

This research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized by inherent complexity, sensitivity to initial conditions, and resilience to...

Full description

Bibliographic Details
Main Authors: F. ElAzzaby, K.H. Sabour, N. ELakkad, W. El-Shafai, A. Torki, S.R. Rajkumar
Format: Article
Language:English
Published: Elsevier 2023-11-01
Series:Scientific African
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2468227623004106
_version_ 1827615705632079872
author F. ElAzzaby
K.H. Sabour
N. ELakkad
W. El-Shafai
A. Torki
S.R. Rajkumar
author_facet F. ElAzzaby
K.H. Sabour
N. ELakkad
W. El-Shafai
A. Torki
S.R. Rajkumar
author_sort F. ElAzzaby
collection DOAJ
description This research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized by inherent complexity, sensitivity to initial conditions, and resilience to attacks, are foundational elements in the realm of image encryption. The proposed encryption algorithm firmly adheres to the principles of confusion and diffusion, thereby constructing a secure framework. Within the permutation phase of the algorithm, a meticulously crafted scrambling technique takes center stage. This technique adeptly disperses adjacent pixels within an image across the red, green, and blue channels through both horizontal and vertical zigzag transformations. This intricate process significantly elevates the level of intricacy and unpredictability within the encryption procedure, bolstering security measures. To further fortify security, the substitution stage integrates two one-dimensional chaotic systems, specifically 1-DSP and 1-DCP. These systems serve as mechanisms to introduce subtle alterations to the original image, affecting all pixels within the encrypted image. The extent of these alterations hinges on the values of the three least significant bits (LSB) of each pixel. The incorporation of this dual chaotic system approach introduces an additional layer of complexity and security into the encryption methodology. The effectiveness of the proposed system is subjected to rigorous evaluation through a comprehensive security analysis. This analysis encompasses an array of performance metrics, including NPCR (Normalized Pixel Change Rate), UACI (Unified Average Changing Intensity), correlation coefficient, histogram analysis, and key sensitivity analysis. These metrics collectively serve to assess the viability and feasibility of the suggested approach, functioning as a litmus test for the system’s resilience and efficiency. The results of this evaluation underscore the robust security and superior performance of the proposed image encryption method, positioning it favorably when compared to various advanced image encryption algorithms.
first_indexed 2024-03-09T09:15:30Z
format Article
id doaj.art-1a5db0993ada409c84192a3bb72fa4f8
institution Directory Open Access Journal
issn 2468-2276
language English
last_indexed 2024-03-09T09:15:30Z
publishDate 2023-11-01
publisher Elsevier
record_format Article
series Scientific African
spelling doaj.art-1a5db0993ada409c84192a3bb72fa4f82023-12-02T07:06:26ZengElsevierScientific African2468-22762023-11-0122e01955Color image encryption using a Zigzag Transformation and sine–cosine mapsF. ElAzzaby0K.H. Sabour1N. ELakkad2W. El-Shafai3A. Torki4S.R. Rajkumar5Department of Mathematics, Faculty of Sciences, Ibn Tofail University, Kenitra, 14000, Morocco; Corresponding author.Department of Mathematics, Faculty of Sciences, Ibn Tofail University, Kenitra, 14000, MoroccoLaboratory of Engineering, Systems and Applications, ENSA of Fez, Sidi Mohamed Ben Abdellah University of Fez, Fez, 30200, MoroccoDepartment Electronics and Electrical Communications Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, EgyptComputer Science Department, Community College, King Saud University, 11451, 95, Riyadh 11362, Saudi ArabiaDepartment of Computer Science, Cardiff School of Technologies, Cardiff Metropolitan University, Llandaff Campus, Western Avenue, Cardiff CF5 2YB, United KingdomThis research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized by inherent complexity, sensitivity to initial conditions, and resilience to attacks, are foundational elements in the realm of image encryption. The proposed encryption algorithm firmly adheres to the principles of confusion and diffusion, thereby constructing a secure framework. Within the permutation phase of the algorithm, a meticulously crafted scrambling technique takes center stage. This technique adeptly disperses adjacent pixels within an image across the red, green, and blue channels through both horizontal and vertical zigzag transformations. This intricate process significantly elevates the level of intricacy and unpredictability within the encryption procedure, bolstering security measures. To further fortify security, the substitution stage integrates two one-dimensional chaotic systems, specifically 1-DSP and 1-DCP. These systems serve as mechanisms to introduce subtle alterations to the original image, affecting all pixels within the encrypted image. The extent of these alterations hinges on the values of the three least significant bits (LSB) of each pixel. The incorporation of this dual chaotic system approach introduces an additional layer of complexity and security into the encryption methodology. The effectiveness of the proposed system is subjected to rigorous evaluation through a comprehensive security analysis. This analysis encompasses an array of performance metrics, including NPCR (Normalized Pixel Change Rate), UACI (Unified Average Changing Intensity), correlation coefficient, histogram analysis, and key sensitivity analysis. These metrics collectively serve to assess the viability and feasibility of the suggested approach, functioning as a litmus test for the system’s resilience and efficiency. The results of this evaluation underscore the robust security and superior performance of the proposed image encryption method, positioning it favorably when compared to various advanced image encryption algorithms.http://www.sciencedirect.com/science/article/pii/S2468227623004106Card chaoticSHA-256Zigzag transformationImage encryptionSecurity
spellingShingle F. ElAzzaby
K.H. Sabour
N. ELakkad
W. El-Shafai
A. Torki
S.R. Rajkumar
Color image encryption using a Zigzag Transformation and sine–cosine maps
Scientific African
Card chaotic
SHA-256
Zigzag transformation
Image encryption
Security
title Color image encryption using a Zigzag Transformation and sine–cosine maps
title_full Color image encryption using a Zigzag Transformation and sine–cosine maps
title_fullStr Color image encryption using a Zigzag Transformation and sine–cosine maps
title_full_unstemmed Color image encryption using a Zigzag Transformation and sine–cosine maps
title_short Color image encryption using a Zigzag Transformation and sine–cosine maps
title_sort color image encryption using a zigzag transformation and sine cosine maps
topic Card chaotic
SHA-256
Zigzag transformation
Image encryption
Security
url http://www.sciencedirect.com/science/article/pii/S2468227623004106
work_keys_str_mv AT felazzaby colorimageencryptionusingazigzagtransformationandsinecosinemaps
AT khsabour colorimageencryptionusingazigzagtransformationandsinecosinemaps
AT nelakkad colorimageencryptionusingazigzagtransformationandsinecosinemaps
AT welshafai colorimageencryptionusingazigzagtransformationandsinecosinemaps
AT atorki colorimageencryptionusingazigzagtransformationandsinecosinemaps
AT srrajkumar colorimageencryptionusingazigzagtransformationandsinecosinemaps