Secure color image cryptosystem based on chaotic logistic in the FrFT domain

Recently, the digital multimedia security technology has been an interesting research theme due to fast advancement in employing real time multimedia through Internet and wireless networks. The market of multimedia streaming, such as exclusive video on demand (VoD) is a huge multi- billion-dollar market. This market is threatened by hackers. The multimedia streaming industry needs a cryptosystem that is both fast and secure. Chaotic cryptosystems have been proposed by many researchers in order to promote communication security. However, these chaotic schemes have some major problems, such as unacceptable expansion of data, slow performance speed, and shortcomings against differential attack. Therefore, this paper provides an efficient Fractional Fourier Transform (FrFT)-based logistic map (LM) color image encryption scheme by applying a 2D LM on FrFT. In the proposed FrFT-based LM color image encryption scheme, the 2D LM is employed as a confusion step to scramble the color image pixel positions in the FrFT and confuse the relationship between the cipherimage and the plainimage. For enhancing the encryption performance characteristics of the 2D LM under the FrFT, the angle of the FrFT is taken as an extra additional key in encryption. The proposed FrFT-based LM color image encryption scheme is examined and investigated using visual inspection, entropy, histograms, encryption quality, noise tests, and differential analysis. The obtained simulation tests demonstrate and verify the effectiveness of the FrFT-based LM color image encryption scheme. Moreover, our results also show a significant improvement in the performance of the confusion property with our proposed 2D LM encryption scheme using the FrFT. Also, we compared the proposed cryptosystem with recent state-of-the-art cryptosystems. Experimental results show that our proposed image cryptosystem is highly secure from the cryptographic point of view. Furthermore, the obtained test results ensured the superiority of our proposed cryptosystem for digital image transmission compared to the recent state-of-theart cryptosystems.

[1]  Lu Xu,et al.  A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion , 2017 .

[2]  Shabir A. Parah,et al.  Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications , 2019, Multimedia Tools and Applications.

[3]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[4]  Xiaoling Huang,et al.  A secure image encryption algorithm based on chaotic maps and SHA-3 , 2016, Secur. Commun. Networks.

[5]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[6]  Nouf A. Al-Otaibi,et al.  2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers , 2014 .

[7]  Adnan Abdul-Aziz Gutub,et al.  Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.

[8]  Shadi Aljawarneh,et al.  A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.

[9]  Ahmed A. Abd El-Latif,et al.  A chaotic block cipher algorithm for image cryptosystems , 2010 .

[10]  Adnan Abdul-Aziz Gutub,et al.  Security enhancement of shares generation process for multimedia counting-based secret-sharing technique , 2018, Multimedia Tools and Applications.

[11]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[12]  Adnan Abdul-Aziz Gutub,et al.  Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography , 2018 .

[13]  Atif Alamri,et al.  Efficient Quantum Information Hiding for Remote Medical Image Sharing , 2018, IEEE Access.

[14]  Dezhao Kong,et al.  Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform , 2014 .

[15]  Fatih Özkaynak,et al.  Cryptanalysis of a new image encryption algorithm based on chaos , 2016 .

[16]  Dharma P. Agrawal,et al.  Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .

[17]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[18]  Adnan Gutub,et al.  Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing , 2019, 3D Research.

[19]  Adnan Abdul-Aziz Gutub,et al.  Multi-Bits Stego-System For Hiding Text in Multimedia Images Based on User Security Priority , 2018 .

[20]  Lei Xu,et al.  Vector power multiple-parameter fractional Fourier transform of image encryption algorithm , 2014 .

[21]  A. A-A Gutub,et al.  Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[22]  Yiran Chen,et al.  A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .

[23]  Yueping Li,et al.  A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation , 2017 .

[24]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[25]  S. El-Rabaie,et al.  Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation , 2012, 2012 29th National Radio Science Conference (NRSC).

[26]  Abdennaceur Kachouri,et al.  Hash key-based image encryption using crossover operator and chaos , 2015, Multimedia Tools and Applications.

[27]  Adnan Gutub,et al.  Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator , 2010 .

[28]  Mahmoud Al-Ayyoub,et al.  Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2017, Multimedia Tools and Applications.

[29]  Zhiliang Zhu,et al.  Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption , 2018, Signal Process..

[30]  C. Seldev Christopher,et al.  Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption , 2016 .

[31]  Jianzhong Li,et al.  Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition , 2017, Multimedia Tools and Applications.

[32]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[33]  Adnan Gutub,et al.  3-LAYER PC TEXT SECURITYVIA COMBININGCOMPRESSION, AES CRYPTOGRAPHY2LSB IMAGE STEGANOGRAPHY , 2018, Journal of Research in Engineering and Applied Sciences.

[34]  Hai Yu,et al.  Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains , 2015 .

[35]  Hao Ding,et al.  Video Image Defogging Recognition Based on Recurrent Neural Network , 2018, IEEE Transactions on Industrial Informatics.

[36]  Adnan Abdul-Aziz Gutub,et al.  Pixel Indicator Technique for RGB Image Steganography , 2010 .

[37]  Erdem Yavuz,et al.  A chaos-based image encryption algorithm with simple logical functions , 2016, Comput. Electr. Eng..

[38]  Shadi Aljawarneh,et al.  Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..

[39]  Paolo Bellavista,et al.  A privacy-preserving cryptosystem for IoT E-healthcare , 2020, Inf. Sci..

[40]  Abrar Alsaidi,et al.  Compression Multi-Level Crypto Stego Security of Texts Utilizing Colored Email Forwarding , 2018, Journal of Computer Science & Computational Mathematics.

[41]  Shadi Aljawarneh,et al.  A multithreaded programming approach for multimedia big data: encryption system , 2017, Multimedia Tools and Applications.

[42]  Min Gao,et al.  A novel coverless information hiding method based on the average pixel value of the sub-images , 2018, Multimedia Tools and Applications.

[43]  Haoxiang Wang,et al.  Computer and Cyber Security , 2018 .

[44]  B. B. Gupta,et al.  Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.

[45]  A. Gutub,et al.  Vibrant Color Image Steganography using Channel Differences and Secret Data Distribution , 2010 .