Fourth Order MCA and Chaos-Based Image Encryption Scheme

This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the di...

Full description

Bibliographic Details
Main Authors: Aslam Li, Akram Belazi, Sofiane Kharbech, Muhammad Talha, Wei Xiang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8692412/
_version_ 1828884583223918592
author Aslam Li
Akram Belazi
Sofiane Kharbech
Muhammad Talha
Wei Xiang
author_facet Aslam Li
Akram Belazi
Sofiane Kharbech
Muhammad Talha
Wei Xiang
author_sort Aslam Li
collection DOAJ
description This paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the digest of the input plaintext, known as a hash value, which can be considered as a unique signature of the input. This makes the keys more plaintext dependent, which is a desirable property of a robust cryptosystem. These key streams are used as the secret keys (i.e., initial conditions and control parameters) of an improved one-dimensional (1-D) chaotic map, i.e., the Logistic-Sine map. As far as we know, this paper is a first that combines the well-known diffusion-confusion architecture and the fourth order 1-D memory cellular automata (MCA) for image encryption. First, a pixel-wise XOR operation is applied to the original image, followed by a pixel-wise random permutation. The resulting image is decomposed into four blocks according to the quadtree decomposition strategy. Then, a fourth order reversible MCA is applied, the blocks obtained from the quadtree decomposition are considered as the initial MCA configurations, and the transition rules are determined using the chaotic map. The performance analyses show that the proposed encryption scheme presents a high immunity against all kind of attacks while maintaining a low complexity, which outcome a notably better performance/complexity trade-off compared to some recently proposed image schemes.
first_indexed 2024-12-13T11:09:31Z
format Article
id doaj.art-6a2fae5790de42f89a0bc3823382d894
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T11:09:31Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-6a2fae5790de42f89a0bc3823382d8942022-12-21T23:48:47ZengIEEEIEEE Access2169-35362019-01-017663956640910.1109/ACCESS.2019.29115598692412Fourth Order MCA and Chaos-Based Image Encryption SchemeAslam Li0Akram Belazi1Sofiane Kharbech2Muhammad Talha3https://orcid.org/0000-0002-4246-2524Wei Xiang4https://orcid.org/0000-0002-0608-065XPiro Technologies Pvt. Ltd., New Delhi, IndiaRISC Laboratory, National Engineering School of Tunis, Tunis El Manar University, Tunis, TunisiaLaboratory Sys’Com-ENIT (LR-99-ES21), Tunis El Manar University, Tunis, TunisiaDeanship of Scientific Research, King Saud University, Riyadh, Saudi ArabiaCollege of Science and Engineering, James Cook University, Cairns, QLD, AustraliaThis paper presents a fast and efficient cryptosystem for enciphering digital images. It employs two of the most prominent dynamical systems-chaotic maps and cellular automata. The key streams in the proposed encryption scheme are derived from the SHA-256 hash function. Hash functions produce the digest of the input plaintext, known as a hash value, which can be considered as a unique signature of the input. This makes the keys more plaintext dependent, which is a desirable property of a robust cryptosystem. These key streams are used as the secret keys (i.e., initial conditions and control parameters) of an improved one-dimensional (1-D) chaotic map, i.e., the Logistic-Sine map. As far as we know, this paper is a first that combines the well-known diffusion-confusion architecture and the fourth order 1-D memory cellular automata (MCA) for image encryption. First, a pixel-wise XOR operation is applied to the original image, followed by a pixel-wise random permutation. The resulting image is decomposed into four blocks according to the quadtree decomposition strategy. Then, a fourth order reversible MCA is applied, the blocks obtained from the quadtree decomposition are considered as the initial MCA configurations, and the transition rules are determined using the chaotic map. The performance analyses show that the proposed encryption scheme presents a high immunity against all kind of attacks while maintaining a low complexity, which outcome a notably better performance/complexity trade-off compared to some recently proposed image schemes.https://ieeexplore.ieee.org/document/8692412/Logistic-Sine mapchaoscellular automataimage encryptionquadtree decompositionhash functions
spellingShingle Aslam Li
Akram Belazi
Sofiane Kharbech
Muhammad Talha
Wei Xiang
Fourth Order MCA and Chaos-Based Image Encryption Scheme
IEEE Access
Logistic-Sine map
chaos
cellular automata
image encryption
quadtree decomposition
hash functions
title Fourth Order MCA and Chaos-Based Image Encryption Scheme
title_full Fourth Order MCA and Chaos-Based Image Encryption Scheme
title_fullStr Fourth Order MCA and Chaos-Based Image Encryption Scheme
title_full_unstemmed Fourth Order MCA and Chaos-Based Image Encryption Scheme
title_short Fourth Order MCA and Chaos-Based Image Encryption Scheme
title_sort fourth order mca and chaos based image encryption scheme
topic Logistic-Sine map
chaos
cellular automata
image encryption
quadtree decomposition
hash functions
url https://ieeexplore.ieee.org/document/8692412/
work_keys_str_mv AT aslamli fourthordermcaandchaosbasedimageencryptionscheme
AT akrambelazi fourthordermcaandchaosbasedimageencryptionscheme
AT sofianekharbech fourthordermcaandchaosbasedimageencryptionscheme
AT muhammadtalha fourthordermcaandchaosbasedimageencryptionscheme
AT weixiang fourthordermcaandchaosbasedimageencryptionscheme