RAINBOW: Resilient Asymmetric Imaging Non-linear Bit-level Ordering with Hyperchaotic Operation for Color image Encryption

Authors

  • Wenhui Zhang

DOI:

https://doi.org/10.62051/x7y04r49

Keywords:

Cross-plane, Hyperchaotic, Color Image Encryption.

Abstract

Hyperchaotic encryption, known for its high level of unpredictability and complexity, is widely used in the field of image encryption. However, current hyperchaotic image encryption tech- niques have certain limitations, particularly in terms of their simplistic processing and lack of depth in layer interaction. These limitations ultimately hinder their effectiveness in ensuring security. In order to overcome these challenges, we propose RAINBOW, a method that integrates bit-level and pixel-level permutation and diffusion across color layer planes. RAINBOW accomplishes a highly complex and diversified permutation process by leveraging the division of bit planes and pixel-level manipulation across color layers. Moreover, we utilize a cross-layer three-dimensional approach in the diffusion process. This approach ensures that the current pixel is influenced by around adjacent pixels, effectively strengthening the image’s security. Through extensive testing on various public color im- age datasets, our results demonstrate that the RAINBOW scheme significantly improves encryption quality and effectively mitigates multiple types of attacks.

Downloads

Download data is not yet available.

References

Y. Pourasad, R. Ranjbarzadeh, and A. Mardani, “A new algorithm for digital image encryption based on chaos theory,” Entropy, vol. 23, no. 3, 2021. [Online]. Available: https://www.mdpi. com/1099-4300/23/3/341

C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, “Analytical study of hybrid techniques for image encryption and decryption,” Sensors, vol. 20, no. 18, 2020. [Online]. Available: https://www.mdpi.com/1424-8220/20/18/5162

P. T. Akkasaligar and S. Biradar, “Selective medical image encryption using dna cryptography,” Information Security Journal: A Global Perspective, vol. 29, no. 2, pp. 91–101, 2020.

R. Nithya and D. Dhanasekaran, “Novel dominant color subband image encryption in visual sen- sor network for smart military surveillance system,” Traitement du Signal, vol. 39, pp. 951–960, 06 2022.

G. Bortsova, C. González-Gonzalo, S. C. Wetstein, F. Dubost, I. Katramados, L. Hogeweg, B. Liefers, B. van Ginneken, J. P. Pluim, M. Veta, C. I. Sánchez, and M. de Bruijne, “Adversarial attack vulnerability of medical image analysis systems: Unexplored factors,” Medical Image Analysis, vol. 73, p. 102141, 2021. [Online]. Available: https://www.sciencedirect.com/science/ article/pii/S1361841521001870

Z. Hua, Z. Zhu, S. Yi, Z. Zhang, and H. Huang, “Cross-plane colour image encryption using a two-dimensional logistic tent modular map,” Information Sciences, vol. 546, pp. 1063–1083, 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/ S0020025520309427

H. Wen and Y. Lin, “Cryptanalysis of an image encryption algorithm using quantum chaotic map and dna coding,” Expert Systems with Applications, vol. 237, p. 121514, 2024. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S095741742302016X

M. Habek, Y. Genc, N. Aytas, A. Akkoc, E. Afacan, and E. Yazgan, “Digital image encryp- tion using elliptic curve cryptography: A review,” in 2022 International Congress on Human- Computer Interaction, Optimization and Robotic Applications (HORA), 2022, pp. 1–8.

X. Wang, S. Chen, and Y. Zhang, “A chaotic image encryption algorithm based on random dynamic mixing,” Optics & Laser Technology, vol. 138, p. 106837, 2021. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0030399220314705.

T. Li, B. Du, and X. Liang, “Image encryption algorithm based on logistic and two-dimensional lorenz,” IEEE Access, vol. 8, pp. 13 792–13 805, 2020.

R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989.

T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, “A secret key cryptosystem by iterating a chaotic map,” in Advances in Cryptology — EUROCRYPT ’91, D. W. Davies, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991, pp. 127–140.

C. Yang, P. Pan, and Q. Ding, “Image encryption scheme based on mixed chaotic bernoulli measurement matrix block compressive sensing,” Entropy, vol. 24, no. 2, 2022. [Online]. Available: https://www.mdpi.com/1099-4300/24/2/273

H. Wen, L. Ma, L. Liu, Y. Huang, Z. Chen, R. Li, Z. Liu, W. Lin, J. Wu, Y. Li, and C. Zhang, “High-quality restoration image encryption using dct frequency-domain compression coding and chaos,” Scientific Reports, vol. 12, 10 2022.

Z. Li, C. Peng, W. Tan, and L. Li, “A novel chaos-based color image encryption scheme using bit-level permutation,” Symmetry, vol. 12, no. 9, 2020. [Online]. Available: https: //www.mdpi.com/2073-8994/12/9/1497

T. Li and D. Zhang, “Hyperchaotic image encryption based on multiple bit permutation and diffusion,” Entropy, vol. 23, no. 5, 2021. [Online]. Available: https://www.mdpi.com/ 1099-4300/23/5/510.

M. Demirtaş, “A novel multiple grayscale image encryption method based on 3d bit- scrambling and diffusion,” Optik, vol. 266, p. 169624, 2022. [Online]. Available: https: //www.sciencedirect.com/science/article/pii/S0030402622009159.

W. Hou, S. Li, J. He, and Y. Ma, “A novel image-encryption scheme based on a non-linear cross-coupled hyperchaotic system with the dynamic correlation of plaintext pixels,” Entropy, vol. 22, no. 7, 2020. [Online]. Available: https://www.mdpi.com/1099-4300/22/7/779

W. Alexan, M. Elkandoz, M. Mashaly, E. Azab, and A. Aboshousha, “Color image encryption through chaos and kaa map,” IEEE Access, vol. 11, pp. 11 541–11 554, 2023.

K. Kumar, S. Roy, U. Rawat, and S. Malhotra, “Iehc: An efficient image encryption technique using hybrid chaotic map,” Chaos, Solitons & Fractals, vol. 158, p. 111994, 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0960077922002041.

Q. Lai and Z. Chen, “Grid-scroll memristive chaotic system with application to image encryption,” Chaos, Solitons & Fractals, vol. 170, p. 113341, 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0960077923002424.

W. Hao, T. Zhang, X. Chen, and X. Zhou, “A hybrid neqr image encryption cryptosystem using two-dimensional quantum walks and quantum coding,” Signal Processing, vol. 205, p. 108890, 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/ S0165168422004297.

X. Kong, F. Yu, W. Yao, C. Xu, J. Zhang, S. Cai, and C. Wang, “A class of 2n+1 dimensional simplest hamiltonian conservative chaotic systems and fast image encryption schemes,” Applied Mathematical Modelling, vol. 125, pp. 351–374, 2024. [Online]. Available: https: //www.sciencedirect.com/science/article/pii/S0307904X23004456

B. Jasra and A. Hassan Moon, “Color image encryption and authentication using dynamic dna encoding and hyper chaotic system,” Expert Systems with Applications, vol. 206, p. 117861, 2022. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0957417422011162.

W. Alexan, M. ElBeltagy, and A. Aboshousha, “Rgb image encryption through cellular automata, s-box and the lorenz system,” Symmetry, vol. 14, no. 3, 2022. [Online]. Available: https://www.mdpi.com/2073-8994/14/3/443

M. Gabr, H. Younis, M. Ibrahim, S. Alajmy, I. Khalid, E. Azab, R. Elias, and W. Alexan, “Application of dna coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem,” Symmetry, vol. 14, no. 12, 2022. [Online]. Available: https://www.mdpi.com/2073-8994/14/12/2559

M. Hui, X. Liu, S. Zhu, and J. Cao, “Event-triggered impulsive cluster synchronization of coupled reaction–diffusion neural networks and its application to image encryption,” Neural Networks, vol. 170, pp. 46–54, 2024. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/S0893608023006445

D. Wei, M. Jiang, and Y. Deng, “A secure image encryption algorithm based on hyper-chaotic and bit-level permutation,” Expert Systems with Applications, vol. 213, p. 119074, 2023. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0957417422020929

Y. Wu, L. Zhang, S. Berretti, and S. Wan, “Medical image encryption by content-aware dna com- puting for secure healthcare,” IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 2089–2098, 2023.

Y. Peng, Z. Lan, K. Sun, and W. Xu, “A simple color image encryption algorithm based on a discrete memristive hyperchaotic map and time-controllable operation,” Optics & Laser Technology, vol. 165, p. 109543, 2023. [Online]. Available: https://www.sciencedirect.com/ science/article/pii/S003039922300436X

Downloads

Published

20-06-2024

How to Cite

“RAINBOW: Resilient Asymmetric Imaging Non-linear Bit-level Ordering with Hyperchaotic Operation for Color image Encryption” (2024) Transactions on Computer Science and Intelligent Systems Research, 4, pp. 136–148. doi:10.62051/x7y04r49.

Similar Articles

1-10 of 12

You may also start an advanced similarity search for this article.