AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
With the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5-stage image encryption algorithm adhering to Shannon’s confusion and diffusion paradigm. In the first stage, La...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10264057/ |
_version_ | 1797666892959186944 |
---|---|
author | Wassim Alexan Yousef Korayem Mohamed Gabr Minar El-Aasser Engy Aly Maher Dina El-Damak Amr Aboshousha |
author_facet | Wassim Alexan Yousef Korayem Mohamed Gabr Minar El-Aasser Engy Aly Maher Dina El-Damak Amr Aboshousha |
author_sort | Wassim Alexan |
collection | DOAJ |
description | With the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5-stage image encryption algorithm adhering to Shannon’s confusion and diffusion paradigm. In the first stage, Langton’s Ant is employed to induce chaos and perturb the pixel distribution of the original image. The second and fourth stages apply Mersenne Twister generated keys to confuse the image via XOR operations. An S-box substitution is utilized in the third stage to disrupt pixel statistical properties. Finally, Arnold’s Cat map further scrambles and diffuses the pixel positions over the image. Extensive security analyses reveal the algorithm’s robustness against various attacks such as visual, entropy, brute-force, statistical and differential attacks. Additionally, it successfully passes the NIST SP 800–22 test suite. Performance results demonstrate the proposed algorithm’s efficacy for real-time secure image transmission with low computational overheads. The algorithm’s security level combined with high-speed performance makes it well-suited for practical image encryption applications. |
first_indexed | 2024-03-11T20:05:08Z |
format | Article |
id | doaj.art-2387a0ebf7b04b2190e094ad549399f7 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-11T20:05:08Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-2387a0ebf7b04b2190e094ad549399f72023-10-03T23:00:29ZengIEEEIEEE Access2169-35362023-01-011110624910627610.1109/ACCESS.2023.331933510264057AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt ImagesWassim Alexan0https://orcid.org/0000-0001-6159-4971Yousef Korayem1https://orcid.org/0009-0002-5842-5952Mohamed Gabr2https://orcid.org/0000-0003-3690-9585Minar El-Aasser3https://orcid.org/0000-0002-2499-018XEngy Aly Maher4https://orcid.org/0000-0003-3030-8543Dina El-Damak5https://orcid.org/0000-0001-7530-498XAmr Aboshousha6Communications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptComputer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptComputer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptNetworking Department, Faculty Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptCommunications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptElectronics Department, Faculty Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptPhysics Department, Faculty of Basic Sciences, German University in Cairo (GUC), New Cairo, EgyptWith the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5-stage image encryption algorithm adhering to Shannon’s confusion and diffusion paradigm. In the first stage, Langton’s Ant is employed to induce chaos and perturb the pixel distribution of the original image. The second and fourth stages apply Mersenne Twister generated keys to confuse the image via XOR operations. An S-box substitution is utilized in the third stage to disrupt pixel statistical properties. Finally, Arnold’s Cat map further scrambles and diffuses the pixel positions over the image. Extensive security analyses reveal the algorithm’s robustness against various attacks such as visual, entropy, brute-force, statistical and differential attacks. Additionally, it successfully passes the NIST SP 800–22 test suite. Performance results demonstrate the proposed algorithm’s efficacy for real-time secure image transmission with low computational overheads. The algorithm’s security level combined with high-speed performance makes it well-suited for practical image encryption applications.https://ieeexplore.ieee.org/document/10264057/Arnold’s cat mapchaos theoryimage cryptosystemimage encryptionLangton’s AntMersenne Twister |
spellingShingle | Wassim Alexan Yousef Korayem Mohamed Gabr Minar El-Aasser Engy Aly Maher Dina El-Damak Amr Aboshousha AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images IEEE Access Arnold’s cat map chaos theory image cryptosystem image encryption Langton’s Ant Mersenne Twister |
title | AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images |
title_full | AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images |
title_fullStr | AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images |
title_full_unstemmed | AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images |
title_short | AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images |
title_sort | anteater when arnold x2019 s cat meets langton x2019 s ant to encrypt images |
topic | Arnold’s cat map chaos theory image cryptosystem image encryption Langton’s Ant Mersenne Twister |
url | https://ieeexplore.ieee.org/document/10264057/ |
work_keys_str_mv | AT wassimalexan anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages AT yousefkorayem anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages AT mohamedgabr anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages AT minarelaasser anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages AT engyalymaher anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages AT dinaeldamak anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages AT amraboshousha anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages |