<italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Chua system and the hyper-chaotic nature of the Chen system, the algorithm carries ou...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10292629/ |
_version_ | 1797635417234735104 |
---|---|
author | Mohamed Gabr Yousef Korayem Yen-Lin Chen Por Lip Yee Chin Soon Ku Wassim Alexan |
author_facet | Mohamed Gabr Yousef Korayem Yen-Lin Chen Por Lip Yee Chin Soon Ku Wassim Alexan |
author_sort | Mohamed Gabr |
collection | DOAJ |
description | This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Chua system and the hyper-chaotic nature of the Chen system, the algorithm carries out rescaling, rotation, and randomization on the target image. The intrinsic unpredictability and sensitivity to initial conditions of these chaotic systems endow the encryption algorithm with an expansive key space of 25208. This feature not only bolsters its resilience against brute-force attacks but also magnifies its overall security profile. The algorithm’s efficiency is evident in its rapid computational speed and lean resource consumption, making it suitable for real-time applications. To gauge its robustness, a battery of rigorous tests and analyses, spanning differential attacks, statistical attacks, and brute-force assaults, were employed. The results validate its ability to resist a diverse spectrum of threats. With its expansive key space, exceptional efficiency, and sturdy defenses, the proposed algorithm emerges as a potential cornerstone for safeguarding digital images in arenas like secure communication, data storage, and multimedia transmission. In sum, this research pushes the boundaries of high-security image encryption methodologies, catering to the burgeoning demands of the digital age. |
first_indexed | 2024-03-11T12:20:52Z |
format | Article |
id | doaj.art-7b8a7d7402034ac4ac8e79e64c2394b3 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-11T12:20:52Z |
publishDate | 2023-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-7b8a7d7402034ac4ac8e79e64c2394b32023-11-07T00:02:52ZengIEEEIEEE Access2169-35362023-01-011111928411931210.1109/ACCESS.2023.332684810292629<italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic SystemsMohamed Gabr0https://orcid.org/0000-0003-3690-9585Yousef Korayem1https://orcid.org/0009-0002-5842-5952Yen-Lin Chen2https://orcid.org/0000-0001-7717-9393Por Lip Yee3https://orcid.org/0000-0001-5865-1533Chin Soon Ku4https://orcid.org/0000-0003-0793-3308Wassim Alexan5https://orcid.org/0000-0001-6159-4971Computer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), Cairo, EgyptComputer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), Cairo, EgyptDepartment of Computer Science and Information Engineering, National Taipei University of Technology, Taipei, TaiwanDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, MalaysiaDepartment of Computer Science, Universiti Tunku Abdul Rahman, Kampar, MalaysiaCommunications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), Cairo, EgyptThis work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Chua system and the hyper-chaotic nature of the Chen system, the algorithm carries out rescaling, rotation, and randomization on the target image. The intrinsic unpredictability and sensitivity to initial conditions of these chaotic systems endow the encryption algorithm with an expansive key space of 25208. This feature not only bolsters its resilience against brute-force attacks but also magnifies its overall security profile. The algorithm’s efficiency is evident in its rapid computational speed and lean resource consumption, making it suitable for real-time applications. To gauge its robustness, a battery of rigorous tests and analyses, spanning differential attacks, statistical attacks, and brute-force assaults, were employed. The results validate its ability to resist a diverse spectrum of threats. With its expansive key space, exceptional efficiency, and sturdy defenses, the proposed algorithm emerges as a potential cornerstone for safeguarding digital images in arenas like secure communication, data storage, and multimedia transmission. In sum, this research pushes the boundaries of high-security image encryption methodologies, catering to the burgeoning demands of the digital age.https://ieeexplore.ieee.org/document/10292629/Chaos theoryChen hyper-chaotic systemChua chaotic systemimage cryptosystemimage encryptionrotation |
spellingShingle | Mohamed Gabr Yousef Korayem Yen-Lin Chen Por Lip Yee Chin Soon Ku Wassim Alexan <italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems IEEE Access Chaos theory Chen hyper-chaotic system Chua chaotic system image cryptosystem image encryption rotation |
title | <italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems |
title_full | <italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems |
title_fullStr | <italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems |
title_full_unstemmed | <italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems |
title_short | <italic>R</italic><sup>3</sup>—Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems |
title_sort | italic r italic sup 3 sup x2014 rescale rotate and randomize a novel image cryptosystem utilizing chaotic and hyper chaotic systems |
topic | Chaos theory Chen hyper-chaotic system Chua chaotic system image cryptosystem image encryption rotation |
url | https://ieeexplore.ieee.org/document/10292629/ |
work_keys_str_mv | AT mohamedgabr italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems AT yousefkorayem italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems AT yenlinchen italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems AT porlipyee italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems AT chinsoonku italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems AT wassimalexan italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems |