AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images

With the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5-stage image encryption algorithm adhering to Shannon’s confusion and diffusion paradigm. In the first stage, La...

Full description

Bibliographic Details
Main Authors: Wassim Alexan, Yousef Korayem, Mohamed Gabr, Minar El-Aasser, Engy Aly Maher, Dina El-Damak, Amr Aboshousha
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10264057/
_version_ 1797666892959186944
author Wassim Alexan
Yousef Korayem
Mohamed Gabr
Minar El-Aasser
Engy Aly Maher
Dina El-Damak
Amr Aboshousha
author_facet Wassim Alexan
Yousef Korayem
Mohamed Gabr
Minar El-Aasser
Engy Aly Maher
Dina El-Damak
Amr Aboshousha
author_sort Wassim Alexan
collection DOAJ
description With the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5-stage image encryption algorithm adhering to Shannon’s confusion and diffusion paradigm. In the first stage, Langton’s Ant is employed to induce chaos and perturb the pixel distribution of the original image. The second and fourth stages apply Mersenne Twister generated keys to confuse the image via XOR operations. An S-box substitution is utilized in the third stage to disrupt pixel statistical properties. Finally, Arnold’s Cat map further scrambles and diffuses the pixel positions over the image. Extensive security analyses reveal the algorithm’s robustness against various attacks such as visual, entropy, brute-force, statistical and differential attacks. Additionally, it successfully passes the NIST SP 800–22 test suite. Performance results demonstrate the proposed algorithm’s efficacy for real-time secure image transmission with low computational overheads. The algorithm’s security level combined with high-speed performance makes it well-suited for practical image encryption applications.
first_indexed 2024-03-11T20:05:08Z
format Article
id doaj.art-2387a0ebf7b04b2190e094ad549399f7
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-11T20:05:08Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-2387a0ebf7b04b2190e094ad549399f72023-10-03T23:00:29ZengIEEEIEEE Access2169-35362023-01-011110624910627610.1109/ACCESS.2023.331933510264057AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt ImagesWassim Alexan0https://orcid.org/0000-0001-6159-4971Yousef Korayem1https://orcid.org/0009-0002-5842-5952Mohamed Gabr2https://orcid.org/0000-0003-3690-9585Minar El-Aasser3https://orcid.org/0000-0002-2499-018XEngy Aly Maher4https://orcid.org/0000-0003-3030-8543Dina El-Damak5https://orcid.org/0000-0001-7530-498XAmr Aboshousha6Communications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptComputer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptComputer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptNetworking Department, Faculty Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptCommunications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptElectronics Department, Faculty Information Engineering and Technology, German University in Cairo (GUC), New Cairo, EgyptPhysics Department, Faculty of Basic Sciences, German University in Cairo (GUC), New Cairo, EgyptWith the proliferation of digital images over open networks, secure and efficient encryption schemes are imperative for safeguarding image privacy. This paper proposes a novel 5-stage image encryption algorithm adhering to Shannon’s confusion and diffusion paradigm. In the first stage, Langton’s Ant is employed to induce chaos and perturb the pixel distribution of the original image. The second and fourth stages apply Mersenne Twister generated keys to confuse the image via XOR operations. An S-box substitution is utilized in the third stage to disrupt pixel statistical properties. Finally, Arnold’s Cat map further scrambles and diffuses the pixel positions over the image. Extensive security analyses reveal the algorithm’s robustness against various attacks such as visual, entropy, brute-force, statistical and differential attacks. Additionally, it successfully passes the NIST SP 800–22 test suite. Performance results demonstrate the proposed algorithm’s efficacy for real-time secure image transmission with low computational overheads. The algorithm’s security level combined with high-speed performance makes it well-suited for practical image encryption applications.https://ieeexplore.ieee.org/document/10264057/Arnold’s cat mapchaos theoryimage cryptosystemimage encryptionLangton’s AntMersenne Twister
spellingShingle Wassim Alexan
Yousef Korayem
Mohamed Gabr
Minar El-Aasser
Engy Aly Maher
Dina El-Damak
Amr Aboshousha
AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
IEEE Access
Arnold’s cat map
chaos theory
image cryptosystem
image encryption
Langton’s Ant
Mersenne Twister
title AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
title_full AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
title_fullStr AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
title_full_unstemmed AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
title_short AntEater: When Arnold’s Cat Meets Langton’s Ant to Encrypt Images
title_sort anteater when arnold x2019 s cat meets langton x2019 s ant to encrypt images
topic Arnold’s cat map
chaos theory
image cryptosystem
image encryption
Langton’s Ant
Mersenne Twister
url https://ieeexplore.ieee.org/document/10264057/
work_keys_str_mv AT wassimalexan anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages
AT yousefkorayem anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages
AT mohamedgabr anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages
AT minarelaasser anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages
AT engyalymaher anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages
AT dinaeldamak anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages
AT amraboshousha anteaterwhenarnoldx2019scatmeetslangtonx2019santtoencryptimages