Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences

View through CrossRef
Abstract With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced encryption algorithms are utmost necessary. The proposed encryption scheme introduces a novel approach that capitalizes on the distinct characteristics of users' authenticated usernames to dictate the sequence in which image blocks are encrypted. The methodology encompasses two key strategies. Initially, a set of four individual chaotic maps - Sin, Chebyshev, Logistic, and Gaussian - are employed for encryption. Also, the image blocks are encrypted with a novel 4D chaotic map. The process begins with segmenting an N×N×3 color image into its red, blue, and green constituents, each of size N×N. These constituents are further subdivided into four arrays, each sized (4×4) × (N/4) × (N/4). The encryption process for various image bands is based on the use of chaotic sequences generated by schemes 1 and 2. These resulting sequences serve as the fundamental encryption keys, guiding a variety of processes including both confusion and diffusion. The proposed encryption schemes, Scheme 1 and Scheme 2 were rigorously evaluated through extensive simulations, comparing their performance with a traditional algorithm. Both procedures demonstrated robustness against statistical analysis differential attacks and showcased NPCR and UACI values closely approximating ideal standards of 99.6 and 33.4, respectively. Notably, Scheme 2, employing the proposed 4D map, outperformed Scheme 1, which used four different chaotic maps, particularly in terms of NPCR and UACI. The schemes exhibited a significant key space of 2540, rendering decryption infeasible within an astronomical time frame of 9.449 × 10130 years. Further, entropy and correlation analysis validation revealed values close to 7.99 and 0, aligning with traditional algorithms' values. Additionally, pixel distribution analyses indicated uniformity along horizontal, vertical, and diagonal directions. The paper introduces an innovative encryption approach that capitalizes on user-specific characteristics and demonstrates superior security and performance compared to conventional methods.
Springer Science and Business Media LLC
Title: Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Description:
Abstract With technological advances, sharing sensitive information, such as multimedia data, especially images, is common.
To protect the integrity of such data, advanced encryption algorithms are utmost necessary.
The proposed encryption scheme introduces a novel approach that capitalizes on the distinct characteristics of users' authenticated usernames to dictate the sequence in which image blocks are encrypted.
The methodology encompasses two key strategies.
Initially, a set of four individual chaotic maps - Sin, Chebyshev, Logistic, and Gaussian - are employed for encryption.
Also, the image blocks are encrypted with a novel 4D chaotic map.
The process begins with segmenting an N×N×3 color image into its red, blue, and green constituents, each of size N×N.
These constituents are further subdivided into four arrays, each sized (4×4) × (N/4) × (N/4).
The encryption process for various image bands is based on the use of chaotic sequences generated by schemes 1 and 2.
These resulting sequences serve as the fundamental encryption keys, guiding a variety of processes including both confusion and diffusion.
The proposed encryption schemes, Scheme 1 and Scheme 2 were rigorously evaluated through extensive simulations, comparing their performance with a traditional algorithm.
Both procedures demonstrated robustness against statistical analysis differential attacks and showcased NPCR and UACI values closely approximating ideal standards of 99.
6 and 33.
4, respectively.
Notably, Scheme 2, employing the proposed 4D map, outperformed Scheme 1, which used four different chaotic maps, particularly in terms of NPCR and UACI.
The schemes exhibited a significant key space of 2540, rendering decryption infeasible within an astronomical time frame of 9.
449 × 10130 years.
Further, entropy and correlation analysis validation revealed values close to 7.
99 and 0, aligning with traditional algorithms' values.
Additionally, pixel distribution analyses indicated uniformity along horizontal, vertical, and diagonal directions.
The paper introduces an innovative encryption approach that capitalizes on user-specific characteristics and demonstrates superior security and performance compared to conventional methods.

Related Results

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract The paper introduces a novel approach that leverages the unique characteristics of users' authenticated usernames to determine the sequence in which im...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
Image Statistics Preserving Encrypt-then-Compress Scheme Dedicated for JPEG Compression Standard
In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...

Back to Top