Fourth Order MCA and Chaos-Based Image Encryption Scheme
This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the di...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8692412/ |
_version_ | 1828884583223918592 |
---|---|
author | Aslam Li Akram Belazi Sofiane Kharbech Muhammad Talha Wei Xiang |
author_facet | Aslam Li Akram Belazi Sofiane Kharbech Muhammad Talha Wei Xiang |
author_sort | Aslam Li |
collection | DOAJ |
description | This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the digest of the input plaintext, known as a hash value, which can be considered as a unique signature of the input. This makes the keys more plaintext dependent, which is a desirable property of a robust cryptosystem. These key streams are used as the secret keys (i.e., initial conditions and control parameters) of an improved one-dimensional (1-D) chaotic map, i.e., the Logistic-Sine map. As far as we know, this paper is a first that combines the well-known diffusion-confusion architecture and the fourth order 1-D memory cellular automata (MCA) for image encryption. First, a pixel-wise XOR operation is applied to the original image, followed by a pixel-wise random permutation. The resulting image is decomposed into four blocks according to the quadtree decomposition strategy. Then, a fourth order reversible MCA is applied, the blocks obtained from the quadtree decomposition are considered as the initial MCA configurations, and the transition rules are determined using the chaotic map. The performance analyses show that the proposed encryption scheme presents a high immunity against all kind of attacks while maintaining a low complexity, which outcome a notably better performance/complexity trade-off compared to some recently proposed image schemes. |
first_indexed | 2024-12-13T11:09:31Z |
format | Article |
id | doaj.art-6a2fae5790de42f89a0bc3823382d894 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-13T11:09:31Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-6a2fae5790de42f89a0bc3823382d8942022-12-21T23:48:47ZengIEEEIEEE Access2169-35362019-01-017663956640910.1109/ACCESS.2019.29115598692412Fourth Order MCA and Chaos-Based Image Encryption SchemeAslam Li0Akram Belazi1Sofiane Kharbech2Muhammad Talha3https://orcid.org/0000-0002-4246-2524Wei Xiang4https://orcid.org/0000-0002-0608-065XPiro Technologies Pvt. Ltd., New Delhi, IndiaRISC Laboratory, National Engineering School of Tunis, Tunis El Manar University, Tunis, TunisiaLaboratory Sys’Com-ENIT (LR-99-ES21), Tunis El Manar University, Tunis, TunisiaDeanship of Scientific Research, King Saud University, Riyadh, Saudi ArabiaCollege of Science and Engineering, James Cook University, Cairns, QLD, AustraliaThis paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the digest of the input plaintext, known as a hash value, which can be considered as a unique signature of the input. This makes the keys more plaintext dependent, which is a desirable property of a robust cryptosystem. These key streams are used as the secret keys (i.e., initial conditions and control parameters) of an improved one-dimensional (1-D) chaotic map, i.e., the Logistic-Sine map. As far as we know, this paper is a first that combines the well-known diffusion-confusion architecture and the fourth order 1-D memory cellular automata (MCA) for image encryption. First, a pixel-wise XOR operation is applied to the original image, followed by a pixel-wise random permutation. The resulting image is decomposed into four blocks according to the quadtree decomposition strategy. Then, a fourth order reversible MCA is applied, the blocks obtained from the quadtree decomposition are considered as the initial MCA configurations, and the transition rules are determined using the chaotic map. The performance analyses show that the proposed encryption scheme presents a high immunity against all kind of attacks while maintaining a low complexity, which outcome a notably better performance/complexity trade-off compared to some recently proposed image schemes.https://ieeexplore.ieee.org/document/8692412/Logistic-Sine mapchaoscellular automataimage encryptionquadtree decompositionhash functions |
spellingShingle | Aslam Li Akram Belazi Sofiane Kharbech Muhammad Talha Wei Xiang Fourth Order MCA and Chaos-Based Image Encryption Scheme IEEE Access Logistic-Sine map chaos cellular automata image encryption quadtree decomposition hash functions |
title | Fourth Order MCA and Chaos-Based Image Encryption Scheme |
title_full | Fourth Order MCA and Chaos-Based Image Encryption Scheme |
title_fullStr | Fourth Order MCA and Chaos-Based Image Encryption Scheme |
title_full_unstemmed | Fourth Order MCA and Chaos-Based Image Encryption Scheme |
title_short | Fourth Order MCA and Chaos-Based Image Encryption Scheme |
title_sort | fourth order mca and chaos based image encryption scheme |
topic | Logistic-Sine map chaos cellular automata image encryption quadtree decomposition hash functions |
url | https://ieeexplore.ieee.org/document/8692412/ |
work_keys_str_mv | AT aslamli fourthordermcaandchaosbasedimageencryptionscheme AT akrambelazi fourthordermcaandchaosbasedimageencryptionscheme AT sofianekharbech fourthordermcaandchaosbasedimageencryptionscheme AT muhammadtalha fourthordermcaandchaosbasedimageencryptionscheme AT weixiang fourthordermcaandchaosbasedimageencryptionscheme |