Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications

被引:0
|
作者
Yassin, Mahmoud Y. M. [1 ,2 ]
Nasir, Ali A. [1 ,2 ]
Taha, Mostafa [3 ]
机构
[1] King Fahd Univ Petr & Minerals KFUPM, Dept Elect Engn, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals KFUPM, Ctr Commun Syst & Sensing, Dhahran 31261, Saudi Arabia
[3] Carleton Univ, Dept Syst & Comp Engn, Ottawa, ON K1S 5B6, Canada
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Logistics; Wavelet transforms; Wavelet domain; Histograms; Encryption; Internet; Computer security; Bit reversal; confusion; diffusion; image encryption; integer to integer wavelet transform; logistic map; ENCRYPTION ALGORITHM; SCHEME; HYPERCHAOS; WAVELET;
D O I
10.1109/ACCESS.2024.3454562
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The secrecy of various forms of multimedia data constitutes a significant aspect of the cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image encryption has been investigated in the literature using different transformation domains, such as spatial, discrete Fourier transform, wavelet transform, etc. Although some frequency-based cryptosystems exhibit favorable confusion properties, they may suffer in terms of diffusion properties and fail in terms of some statistical characteristics, which make them vulnerable to various statistical, analytical, and differential attacks. In this regard, we adopt a dual-domain (wavelet and spatial domains) image cryptosystem and propose a novel diffusion process in the wavelet domain to address the problem of weak resilience against the aforementioned attacks. The proposed diffusion process in the wavelet domain is applied only on 1/16 of the pixels of the plain image, which makes it computationally more efficient compared to the existing wavelet domain-based works. In addition, the proposed cryptosystem solves the bell shape histogram problem associated with some frequency-based cryptosystems, which has been verified using different performance metrics in our simulation results. We also introduce a novel key-dependent chaotic variable generator to generate the required initial conditions and control parameters for the adopted enhanced chaotic map. The superiority of the proposed algorithm compared to some of the existing state-of-the-art has been verified through various performance metrics. These include different types of correlation coefficients, histogram visualization, histogram deviation, irregular deviation, mean square error, chi-square test, entropy test, and differential analysis.
引用
收藏
页码:123694 / 123715
页数:22
相关论文
共 50 条
  • [31] Dual-Domain Image Synthesis using Segmentation-Guided GAN
    Bazazian, Dena
    Calway, Andrew
    Damen, Dima
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS, CVPRW 2022, 2022, : 506 - 515
  • [32] Dual-domain feature aggregation transformer network for underwater image enhancement
    Li, Yufeng
    Zhao, Zitian
    Li, Rui
    SIGNAL IMAGE AND VIDEO PROCESSING, 2025, 19 (03)
  • [33] A Novel Image Cryptosystem Based on S-AES and Chaotic Map
    Bai, Lan
    2015 7TH INTERNATIONAL CONFERENCE ON MECHANICAL AND ELECTRONICS ENGINEERING (ICMEE 2015), 2015, 31
  • [34] Novel chaotic image cryptosystem based on dynamic RNA and DNA computing
    Zhou, Shuang
    Wei, Yi
    Wang, Shiyu
    Iu, Herbert Ho-Ching
    Zhang, Yingqian
    JOURNAL OF APPLIED PHYSICS, 2024, 136 (18)
  • [35] Lightweight dual-domain token learning method for hyperspectral image classification
    Gao, Zheng
    Liu, Yan
    Li, Qingwu
    Yu, Dabing
    Yang, Xiaowen
    Huo, Guanying
    JOURNAL OF APPLIED REMOTE SENSING, 2024, 18 (03)
  • [36] Chaotic Lightweight Cryptosystem for Image Encryption
    Ferdush, Jannatul
    Begum, Mahbuba
    Uddin, Mohammad Shorif
    ADVANCES IN MULTIMEDIA, 2021, 2021
  • [37] New chaotic cryptosystem for the image encryption
    Merzoug A.
    Ali-Pacha A.
    Hadj-Said N.
    International Journal of Information and Computer Security, 2020, 12 (04) : 450 - 463
  • [38] Hyper Chaotic Color Image Cryptosystem
    Shaikh, Nazira
    Chapaneri, Santosh
    Jayaswal, Deepak
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 239 - 243
  • [39] Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications
    Faragallah, Osama S.
    Afifi, Ashraf
    El-Shafai, Walid
    El-Sayed, Hala S.
    Naeem, Ensherah A.
    Alzain, Mohammed A.
    Al-Amri, Jehad F.
    Soh, Ben
    Abd El-Samie, Fathi E.
    IEEE ACCESS, 2020, 8 : 42491 - 42503
  • [40] Real time region of interest based chaotic image cryptosystem for IoT applications
    Sheela, S. J.
    Suresh, K. V.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (06) : 16161 - 16177