Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences

View through CrossRef
Abstract The paper introduces a novel approach that leverages the unique characteristics of users' authenticated usernames to determine the sequence in which image blocks are encrypted. This methodology employs two key strategies: the utilization of four individual chaotic maps - Sin, Chebyshev, Logistic, and Gaussian - for encryption, and the encryption of image blocks using a novel 4D chaotic map. The process begins with the segmentation of an N×N×3 color image into its red, blue, and green components, each of size N×N. The image components are further subdivided into four arrays, each sized (4×4) × (N/4) × (N/4). Chaotic sequences generated via schemes 1 and 2 aid in the encryption of various image bands, serving as fundamental encryption keys that guide both confusion and diffusion processes. The proposed encryption systems, Scheme 1 and Scheme 2, were rigorously evaluated using extensive simulations and compared to a standard approach. Both methods outperformed against statistical analysis differential attacks, with NPCR and UACI values approaching ideal standards. Notably, Scheme 2, with the proposed 4D map, performed better than Scheme 1, especially with regard to UACI and NPCR. Furthermore, the systems had a large key space, making decryption impossible within an astronomical timeframe. Entropy and correlation analysis validation yielded values consistent with established techniques, whereas pixel distribution analyses confirmed homogeneity in horizontal, vertical, and diagonal directions. The research presents a new encryption approach that takes advantage of user-specific attributes and outperforms standard methods in terms of security and performance.
Springer Science and Business Media LLC
Title: Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Description:
Abstract The paper introduces a novel approach that leverages the unique characteristics of users' authenticated usernames to determine the sequence in which image blocks are encrypted.
This methodology employs two key strategies: the utilization of four individual chaotic maps - Sin, Chebyshev, Logistic, and Gaussian - for encryption, and the encryption of image blocks using a novel 4D chaotic map.
The process begins with the segmentation of an N×N×3 color image into its red, blue, and green components, each of size N×N.
The image components are further subdivided into four arrays, each sized (4×4) × (N/4) × (N/4).
Chaotic sequences generated via schemes 1 and 2 aid in the encryption of various image bands, serving as fundamental encryption keys that guide both confusion and diffusion processes.
The proposed encryption systems, Scheme 1 and Scheme 2, were rigorously evaluated using extensive simulations and compared to a standard approach.
Both methods outperformed against statistical analysis differential attacks, with NPCR and UACI values approaching ideal standards.
Notably, Scheme 2, with the proposed 4D map, performed better than Scheme 1, especially with regard to UACI and NPCR.
Furthermore, the systems had a large key space, making decryption impossible within an astronomical timeframe.
Entropy and correlation analysis validation yielded values consistent with established techniques, whereas pixel distribution analyses confirmed homogeneity in horizontal, vertical, and diagonal directions.
The research presents a new encryption approach that takes advantage of user-specific attributes and outperforms standard methods in terms of security and performance.

Related Results

Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...

Back to Top