Enhancing Satellite Image Security Through Multiple Image Encryption via Hyperchaos, SVD, RC5, and Dynamic S-Box Generation

被引:7
|
作者
Youssef, Mohammed [1 ]
Gabr, Mohamed [1 ]
Alexan, Wassim [2 ]
Mansour, Marvy Badr Monir [3 ]
Kamal, Karim [4 ]
Hosny, Hisham [5 ]
El-Damak, Dina [6 ]
机构
[1] German Univ Cairo GUC, Fac Media Engn & Technol, Comp Sci Dept, New Cairo 11835, Egypt
[2] German Univ Cairo GUC, Fac Informat Engn & Technol, Commun Dept, New Cairo 11835, Egypt
[3] British Univ Egypt, Fac Engn, Dept Elect Engn, El Sherouk City 11837, Egypt
[4] German Univ Cairo GUC, Fac Basic Sci, Dept Math, New Cairo 11835, Egypt
[5] Univ Canada Egypt, Fac Math & Computat Sci, New Administrative Capita 11835, Egypt
[6] German Univ Cairo GUC, Fac Informat Engn & Technol, Elect Dept, New Cairo 11835, Egypt
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Encryption; Cryptography; Security; Satellite images; Sensitivity; Resistance; Chaotic communication; Singular value decomposition; Chaos theory; image encryption; RC5; S-box; Singular Value Decomposition (SVD); XORshift;
D O I
10.1109/ACCESS.2024.3454512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel image encryption scheme is presented that leverages a combination of hyperchaotic systems, Singular Value Decomposition (SVD), RC5 operations, permutation techniques, and a custom S-box generated via the XORshift algorithm. Multiple satellite images are merged into a single augmented image prior to encryption by this algorithm, effectively protecting against traffic analysis attacks that could compromise individual encrypted images. Once the augmented image is created, it is split into RGB color channels, and each channel undergoes a four-stage encryption process. The encryption process is initiated by the generation of a chaotic sequence from a six-dimensional (6D) hyperchaotic system. This initial key sequence is then manipulated and transformed into a new key using SVD. The transformed key sequence is utilized to XOR the original image, providing an initial layer of encryption. Subsequently, the image is divided into blocks, and RC5 operations are applied to each block to enhance the security of the encryption process. Following this, a permutation operation is performed on the image using the chaotic sequence generated earlier. Finally, an S-box, created from a random sequence generated by the XORshift algorithm, is applied to the image to further obscure the pixel values. The robustness of the algorithm is validated by numerical tests, demonstrating its effectiveness against both statistical, differential attacks and brute-force attacks, making it extremely difficult for third parties, such as cloud service providers, to identify any relational patterns between the encrypted satellite images. Specific numerical values that demonstrated an enhanced security level include a key space of 2(7016), entropy exceeding 7.999, and a cross-correlation of approximate to 0. This encryption method not only strengthens the protection of satellite imagery against unauthorized access but also ensures the integrity and confidentiality of the images, which are crucial for applications ranging from national security to environmental monitoring in an increasingly data-driven world.
引用
收藏
页码:123921 / 123945
页数:25
相关论文
共 48 条
  • [1] Enhancing security with Aboodh transformation and S-box fusion in image encryption
    Rasappan S.
    Murugesan R.
    Kumaravel S.K.
    Mohan K.R.
    Nagaram N.B.
    International Journal of Information Technology, 2024, 16 (6) : 3949 - 3961
  • [2] A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5
    Alexan, Wassim
    Youssef, Mohamed
    Hussein, Hisham H.
    Ahmed, Karim K.
    Hosny, Khalid M.
    Fathy, Abdallah
    Mansour, Marvy Badr Monir
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [3] Cryptanalysis of hyperchaotic S-box generation and image encryption
    Hazzazi, Mohammad Mazyad
    Gulraiz
    Ali, Rashad
    Jamil, Muhammad Kamran
    Nooh, Sameer Abdullah
    Alblehai, Fahad
    AIMS MATHEMATICS, 2024, 9 (12): : 36116 - 36139
  • [4] Image encryption based on chaotic map and dynamic S-box
    Pham Anh Hung
    Klomkarn, Kitdakorn
    Sooraksa, Pitikhate
    2013 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS), 2013, : 435 - 439
  • [5] An image encryption algorithm using a dynamic S-box and chaotic maps
    Zheng, Jiming
    Zeng, Qingxia
    APPLIED INTELLIGENCE, 2022, 52 (13) : 15703 - 15717
  • [6] Efficient image encryption algorithm based on ECC and dynamic S-box
    Murtaza, Ghulam
    Hayat, Umar
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 90
  • [7] An image encryption algorithm using a dynamic S-box and chaotic maps
    Jiming Zheng
    Qingxia Zeng
    Applied Intelligence, 2022, 52 : 15703 - 15717
  • [8] Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain
    Shafique, Arslan
    Ahmed, Fawad
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (03) : 2243 - 2268
  • [9] Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain
    Arslan Shafique
    Fawad Ahmed
    Wireless Personal Communications, 2020, 115 : 2243 - 2268
  • [10] A New Image Encryption Algorithm Based on Single S-Box and Dynamic Encryption Step
    Jun, Wang Ji
    Fun, Tan Soo
    IEEE ACCESS, 2021, 9 : 120596 - 120612