Multiple image encryption algorithm using channel randomization and multiple chaotic maps

被引:0
|
作者
Hosny, Khalid M. [1 ]
Elnabawy, Yasmin M. [2 ]
Salama, Rania A. [3 ]
Elshewey, Ahmed M. [2 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Dept Informat Technol, POB 44519, Zagazig, Egypt
[2] Suez Univ, Fac Comp & Informat, Dept Comp Sci, POB 43221, Suez, Egypt
[3] Suez Univ, Fac Comp & Informat, Dept Informat Technol, POB 43221, Suez, Egypt
来源
SCIENTIFIC REPORTS | 2024年 / 14卷 / 01期
关键词
Multiple image encryption; Color images; Channel randomization; Baker chaotic map; Henon Map; 2-D logistic chaotic map; DNA-SEQUENCE;
D O I
10.1038/s41598-024-79282-6
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. This necessity arises from the limitations of single-image encryption techniques in managing the escalating volume of extensive data. This paper introduces a novel three-layer multiple-image encryption (MIE) technique to encrypt batch images based on three 2D-chaotic maps. All multiple-color images are divided into RGB channels in the first layer. The images in each channel go through a randomization process to be arranged at random before being combined to form a single image (batch) used as the input for the following layer. In the second layer, chaotic sequences for scrambling pixels in each channel independently are generated using Baker, Henon, and 2-D Logistic chaotic maps, resulting in a scrambled image. The diffusion process is applied in the final layer by independently changing the values of the pixels in each channel using different chaotic sequences generated from the three maps and the XORing operation. The efficiency of the proposed scheme is validated through key sensitivity, key space analysis, complexity analysis, entropy assessment, and tests, including horizontal, vertical, and diagonal correlation, MSE, PSNR, UACI, and NPCR. Moreover, experimental results and a thorough security analysis affirm that the proposed encryption technique has effectively attained confidentiality and robust resistance against various attacks.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] An image encryption algorithm using a dynamic S-box and chaotic maps
    Jiming Zheng
    Qingxia Zeng
    Applied Intelligence, 2022, 52 : 15703 - 15717
  • [42] Chaotic Image Encryption Algorithm Using Multi-Generalized Logistic Maps
    Ye, Guodong
    JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2013, 10 (11) : 2789 - 2795
  • [43] A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application
    Sathishkumar, G. A.
    Bhoopathybagan, K.
    Sriraam, N.
    Venkatachalam, S. P.
    Vignesh, R.
    ADVANCED COMPUTING, PT III, 2011, 133 : 290 - +
  • [44] An image encryption algorithm using a dynamic S-box and chaotic maps
    Zheng, Jiming
    Zeng, Qingxia
    APPLIED INTELLIGENCE, 2022, 52 (13) : 15703 - 15717
  • [45] Color multiple image encryption scheme based on 3D-chaotic maps
    Malik, Dania Saleem
    Shah, Tariq
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2020, 178 (178) : 646 - 666
  • [46] Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps
    Fan, Haiju
    Zhang, Chenjiu
    Lu, Heng
    Li, Ming
    Liu, Yanfang
    ENTROPY, 2021, 23 (12)
  • [47] Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map
    Karawia, A. A.
    ENTROPY, 2018, 20 (10):
  • [48] Multiple-image encryption algorithm based on DNA encoding and chaotic system
    Zhang, Xiaoqiang
    Wang, Xuesong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (06) : 7841 - 7869
  • [49] Multiple-image encryption algorithm based on DNA encoding and chaotic system
    Xiaoqiang Zhang
    Xuesong Wang
    Multimedia Tools and Applications, 2019, 78 : 7841 - 7869
  • [50] Image encryption algorithm based on the finite fields in chaotic maps
    Broumandnia, Ali
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54