<italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems

This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Chua system and the hyper-chaotic nature of the Chen system, the algorithm carries ou...

Full description

Bibliographic Details
Main Authors: Mohamed Gabr, Yousef Korayem, Yen-Lin Chen, Por Lip Yee, Chin Soon Ku, Wassim Alexan
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10292629/
_version_ 1797635417234735104
author Mohamed Gabr
Yousef Korayem
Yen-Lin Chen
Por Lip Yee
Chin Soon Ku
Wassim Alexan
author_facet Mohamed Gabr
Yousef Korayem
Yen-Lin Chen
Por Lip Yee
Chin Soon Ku
Wassim Alexan
author_sort Mohamed Gabr
collection DOAJ
description This work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Chua system and the hyper-chaotic nature of the Chen system, the algorithm carries out rescaling, rotation, and randomization on the target image. The intrinsic unpredictability and sensitivity to initial conditions of these chaotic systems endow the encryption algorithm with an expansive key space of 25208. This feature not only bolsters its resilience against brute-force attacks but also magnifies its overall security profile. The algorithm&#x2019;s efficiency is evident in its rapid computational speed and lean resource consumption, making it suitable for real-time applications. To gauge its robustness, a battery of rigorous tests and analyses, spanning differential attacks, statistical attacks, and brute-force assaults, were employed. The results validate its ability to resist a diverse spectrum of threats. With its expansive key space, exceptional efficiency, and sturdy defenses, the proposed algorithm emerges as a potential cornerstone for safeguarding digital images in arenas like secure communication, data storage, and multimedia transmission. In sum, this research pushes the boundaries of high-security image encryption methodologies, catering to the burgeoning demands of the digital age.
first_indexed 2024-03-11T12:20:52Z
format Article
id doaj.art-7b8a7d7402034ac4ac8e79e64c2394b3
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-11T12:20:52Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-7b8a7d7402034ac4ac8e79e64c2394b32023-11-07T00:02:52ZengIEEEIEEE Access2169-35362023-01-011111928411931210.1109/ACCESS.2023.332684810292629<italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic SystemsMohamed Gabr0https://orcid.org/0000-0003-3690-9585Yousef Korayem1https://orcid.org/0009-0002-5842-5952Yen-Lin Chen2https://orcid.org/0000-0001-7717-9393Por Lip Yee3https://orcid.org/0000-0001-5865-1533Chin Soon Ku4https://orcid.org/0000-0003-0793-3308Wassim Alexan5https://orcid.org/0000-0001-6159-4971Computer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), Cairo, EgyptComputer Science Department, Faculty of Media Engineering and Technology, German University in Cairo (GUC), Cairo, EgyptDepartment of Computer Science and Information Engineering, National Taipei University of Technology, Taipei, TaiwanDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, Universiti Malaya, Kuala Lumpur, MalaysiaDepartment of Computer Science, Universiti Tunku Abdul Rahman, Kampar, MalaysiaCommunications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), Cairo, EgyptThis work proposes a novel image encryption algorithm that integrates unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. By harnessing the unpredictable behavior of the Chua system and the hyper-chaotic nature of the Chen system, the algorithm carries out rescaling, rotation, and randomization on the target image. The intrinsic unpredictability and sensitivity to initial conditions of these chaotic systems endow the encryption algorithm with an expansive key space of 25208. This feature not only bolsters its resilience against brute-force attacks but also magnifies its overall security profile. The algorithm&#x2019;s efficiency is evident in its rapid computational speed and lean resource consumption, making it suitable for real-time applications. To gauge its robustness, a battery of rigorous tests and analyses, spanning differential attacks, statistical attacks, and brute-force assaults, were employed. The results validate its ability to resist a diverse spectrum of threats. With its expansive key space, exceptional efficiency, and sturdy defenses, the proposed algorithm emerges as a potential cornerstone for safeguarding digital images in arenas like secure communication, data storage, and multimedia transmission. In sum, this research pushes the boundaries of high-security image encryption methodologies, catering to the burgeoning demands of the digital age.https://ieeexplore.ieee.org/document/10292629/Chaos theoryChen hyper-chaotic systemChua chaotic systemimage cryptosystemimage encryptionrotation
spellingShingle Mohamed Gabr
Yousef Korayem
Yen-Lin Chen
Por Lip Yee
Chin Soon Ku
Wassim Alexan
<italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
IEEE Access
Chaos theory
Chen hyper-chaotic system
Chua chaotic system
image cryptosystem
image encryption
rotation
title <italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
title_full <italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
title_fullStr <italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
title_full_unstemmed <italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
title_short <italic>R</italic><sup>3</sup>&#x2014;Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems
title_sort italic r italic sup 3 sup x2014 rescale rotate and randomize a novel image cryptosystem utilizing chaotic and hyper chaotic systems
topic Chaos theory
Chen hyper-chaotic system
Chua chaotic system
image cryptosystem
image encryption
rotation
url https://ieeexplore.ieee.org/document/10292629/
work_keys_str_mv AT mohamedgabr italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems
AT yousefkorayem italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems
AT yenlinchen italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems
AT porlipyee italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems
AT chinsoonku italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems
AT wassimalexan italicritalicsup3supx2014rescalerotateandrandomizeanovelimagecryptosystemutilizingchaoticandhyperchaoticsystems