RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System
The exponential growth in transmission of multimedia over the Internet and unsecured channels of communications is putting pressure on scientists and engineers to develop effective and efficient security schemes. In this paper, an image encryption scheme is proposed to help solve such a problem. The...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-02-01
|
Series: | Symmetry |
Subjects: | |
Online Access: | https://www.mdpi.com/2073-8994/14/3/443 |
_version_ | 1797441618328944640 |
---|---|
author | Wassim Alexan Mohamed ElBeltagy Amr Aboshousha |
author_facet | Wassim Alexan Mohamed ElBeltagy Amr Aboshousha |
author_sort | Wassim Alexan |
collection | DOAJ |
description | The exponential growth in transmission of multimedia over the Internet and unsecured channels of communications is putting pressure on scientists and engineers to develop effective and efficient security schemes. In this paper, an image encryption scheme is proposed to help solve such a problem. The proposed scheme is implemented over three stages. The first stage makes use of Rule 30 cellular automata to generate the first encryption key. The second stage utilizes a well-tested S-box, whose design involves a transformation, modular inverses, and permutation. Finally, the third stage employs a solution of the Lorenz system to generate the second encryption key. The aggregate effect of this 3-stage process insures the application of Shannon’s confusion and diffusion properties of a cryptographic system and enhances the security and robustness of the resulting encrypted images. Specifically, the use of the PRNG bitstreams from both of the cellular automata and the Lorenz system, as keys, combined with the S-box, results in the needed non-linearity and complexity inherent in well-encrypted images, which is sufficient to frustrate attackers. Performance evaluation is carried out with statistical and sensitivity analyses, to check for and demonstrate the security and robustness of the proposed scheme. On testing the resulting encrypted Lena image, the proposed scheme results in an MSE value of 8923.03, a PSNR value of 8.625 dB, an information entropy of 7.999, NPCR value of 99.627, and UACI value of 33.46. The proposed scheme is shown to encrypt images at an average rate of 0.61 Mbps. A comparative study with counterpart image encryption schemes from the literature is also presented to showcase the superior performance of the proposed scheme. |
first_indexed | 2024-03-09T12:25:43Z |
format | Article |
id | doaj.art-5d5ffa1e38f34f148982edafedf32f53 |
institution | Directory Open Access Journal |
issn | 2073-8994 |
language | English |
last_indexed | 2024-03-09T12:25:43Z |
publishDate | 2022-02-01 |
publisher | MDPI AG |
record_format | Article |
series | Symmetry |
spelling | doaj.art-5d5ffa1e38f34f148982edafedf32f532023-11-30T22:34:42ZengMDPI AGSymmetry2073-89942022-02-0114344310.3390/sym14030443RGB Image Encryption through Cellular Automata, S-Box and the Lorenz SystemWassim Alexan0Mohamed ElBeltagy1Amr Aboshousha2Faculty of IET, The German University in Cairo, Cairo 11835, EgyptFaculty of IET, The German University in Cairo, Cairo 11835, EgyptThe Physics Department, The German University in Cairo, Cairo 11835, EgyptThe exponential growth in transmission of multimedia over the Internet and unsecured channels of communications is putting pressure on scientists and engineers to develop effective and efficient security schemes. In this paper, an image encryption scheme is proposed to help solve such a problem. The proposed scheme is implemented over three stages. The first stage makes use of Rule 30 cellular automata to generate the first encryption key. The second stage utilizes a well-tested S-box, whose design involves a transformation, modular inverses, and permutation. Finally, the third stage employs a solution of the Lorenz system to generate the second encryption key. The aggregate effect of this 3-stage process insures the application of Shannon’s confusion and diffusion properties of a cryptographic system and enhances the security and robustness of the resulting encrypted images. Specifically, the use of the PRNG bitstreams from both of the cellular automata and the Lorenz system, as keys, combined with the S-box, results in the needed non-linearity and complexity inherent in well-encrypted images, which is sufficient to frustrate attackers. Performance evaluation is carried out with statistical and sensitivity analyses, to check for and demonstrate the security and robustness of the proposed scheme. On testing the resulting encrypted Lena image, the proposed scheme results in an MSE value of 8923.03, a PSNR value of 8.625 dB, an information entropy of 7.999, NPCR value of 99.627, and UACI value of 33.46. The proposed scheme is shown to encrypt images at an average rate of 0.61 Mbps. A comparative study with counterpart image encryption schemes from the literature is also presented to showcase the superior performance of the proposed scheme.https://www.mdpi.com/2073-8994/14/3/443image encryptioncellular automataS-boxLorenz systemNIST analysis |
spellingShingle | Wassim Alexan Mohamed ElBeltagy Amr Aboshousha RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System Symmetry image encryption cellular automata S-box Lorenz system NIST analysis |
title | RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System |
title_full | RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System |
title_fullStr | RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System |
title_full_unstemmed | RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System |
title_short | RGB Image Encryption through Cellular Automata, S-Box and the Lorenz System |
title_sort | rgb image encryption through cellular automata s box and the lorenz system |
topic | image encryption cellular automata S-box Lorenz system NIST analysis |
url | https://www.mdpi.com/2073-8994/14/3/443 |
work_keys_str_mv | AT wassimalexan rgbimageencryptionthroughcellularautomatasboxandthelorenzsystem AT mohamedelbeltagy rgbimageencryptionthroughcellularautomatasboxandthelorenzsystem AT amraboshousha rgbimageencryptionthroughcellularautomatasboxandthelorenzsystem |