Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture
In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, which is then used to encrypt the plaintext image. T...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10379670/ |
_version_ | 1797357118342299648 |
---|---|
author | Abeer Al-Hyari Charlie Obimbo Mua'ad M. Abu-Faraj Ismail Al-Taharwa |
author_facet | Abeer Al-Hyari Charlie Obimbo Mua'ad M. Abu-Faraj Ismail Al-Taharwa |
author_sort | Abeer Al-Hyari |
collection | DOAJ |
description | In recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, which is then used to encrypt the plaintext image. This study proposes an image encryption scheme based on CLMK, Collatz Conjecture, and indexing techniques; it uses a private key of a 15-digit size that is parsed in a novel way to generate a considerable keyspace reaches up to 297. The Collatz Conjecture generator is used to create variable length sequences that are used to generate the Chaotic parameters <inline-formula> <tex-math notation="LaTeX">$r_{1}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$r_{2}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$x_{1}$ </tex-math></inline-formula>, and <inline-formula> <tex-math notation="LaTeX">$x_{2}$ </tex-math></inline-formula>; these parameters are used to create a 2D CLMK for encrypting each color channel and a 1D vector that is used for permeation, both confusion and diffusion are performed in four consecutive rounds to ensure the robustness of the proposed approach. The random sequences generated by the Collatz Conjecture were tested for randomness using the NIST benchmark randomness test suit, and they passed most tests. The proposed method is robust against all the well-known attacks, including differential attacks, white Gaussian noise attacks, Salt-and-pepper noise attacks, clipping attacks, occlusion attacks, and known plaintext attacks. Various experiments were conducted to evaluate the performance of the proposed method in terms of encryption time, throughput, and several image quality metrics. The results indicate that the proposed method is efficient regarding encryption time, and throughput enhancement can reach up to 3.34 times the state-of-the-art chaotic encryption methods. |
first_indexed | 2024-03-08T14:40:18Z |
format | Article |
id | doaj.art-e949f2bafca1494b9be9f9524084d909 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-08T14:40:18Z |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-e949f2bafca1494b9be9f9524084d9092024-01-12T00:01:58ZengIEEEIEEE Access2169-35362024-01-01124825484410.1109/ACCESS.2024.334947010379670Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz ConjectureAbeer Al-Hyari0https://orcid.org/0000-0002-0295-9691Charlie Obimbo1Mua'ad M. Abu-Faraj2https://orcid.org/0000-0003-2489-4857Ismail Al-Taharwa3https://orcid.org/0000-0001-8775-0581Electrical Engineering Department, Al-Balqa Applied University, Al-Salt, JordanSchool of Computer Science, University of Guelph, Guelph, CanadaDepartment of Computer Information Systems, The University of Jordan, Aqaba, JordanDepartment of Computer Information Systems, The University of Jordan, Aqaba, JordanIn recent years, the chaotic logistic map key (CLMK) has been widely used for image encryption due to its ability to generate random and unpredictable sequences of numbers. The CLMK algorithm uses the chaotic logistic map to generate a key stream, which is then used to encrypt the plaintext image. This study proposes an image encryption scheme based on CLMK, Collatz Conjecture, and indexing techniques; it uses a private key of a 15-digit size that is parsed in a novel way to generate a considerable keyspace reaches up to 297. The Collatz Conjecture generator is used to create variable length sequences that are used to generate the Chaotic parameters <inline-formula> <tex-math notation="LaTeX">$r_{1}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$r_{2}$ </tex-math></inline-formula>, <inline-formula> <tex-math notation="LaTeX">$x_{1}$ </tex-math></inline-formula>, and <inline-formula> <tex-math notation="LaTeX">$x_{2}$ </tex-math></inline-formula>; these parameters are used to create a 2D CLMK for encrypting each color channel and a 1D vector that is used for permeation, both confusion and diffusion are performed in four consecutive rounds to ensure the robustness of the proposed approach. The random sequences generated by the Collatz Conjecture were tested for randomness using the NIST benchmark randomness test suit, and they passed most tests. The proposed method is robust against all the well-known attacks, including differential attacks, white Gaussian noise attacks, Salt-and-pepper noise attacks, clipping attacks, occlusion attacks, and known plaintext attacks. Various experiments were conducted to evaluate the performance of the proposed method in terms of encryption time, throughput, and several image quality metrics. The results indicate that the proposed method is efficient regarding encryption time, and throughput enhancement can reach up to 3.34 times the state-of-the-art chaotic encryption methods.https://ieeexplore.ieee.org/document/10379670/Chaotic logistic mapchaotic logistic map keychaotic parameterCollatz conjecturecryptography |
spellingShingle | Abeer Al-Hyari Charlie Obimbo Mua'ad M. Abu-Faraj Ismail Al-Taharwa Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture IEEE Access Chaotic logistic map chaotic logistic map key chaotic parameter Collatz conjecture cryptography |
title | Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture |
title_full | Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture |
title_fullStr | Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture |
title_full_unstemmed | Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture |
title_short | Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture |
title_sort | generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture |
topic | Chaotic logistic map chaotic logistic map key chaotic parameter Collatz conjecture cryptography |
url | https://ieeexplore.ieee.org/document/10379670/ |
work_keys_str_mv | AT abeeralhyari generatingpowerfulencryptionkeysforimagecryptographywithchaoticmapsbyincorporatingcollatzconjecture AT charlieobimbo generatingpowerfulencryptionkeysforimagecryptographywithchaoticmapsbyincorporatingcollatzconjecture AT muaadmabufaraj generatingpowerfulencryptionkeysforimagecryptographywithchaoticmapsbyincorporatingcollatzconjecture AT ismailaltaharwa generatingpowerfulencryptionkeysforimagecryptographywithchaoticmapsbyincorporatingcollatzconjecture |