Javascript must be enabled to continue!
A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption
View through CrossRef
As information systems become more widespread, data security becomes increasingly important. While traditional encryption methods provide effective protection against unauthorized access, they often struggle with multimedia data like images and videos. This necessitates specialized image encryption approaches. With the rise of mobile and Internet of Things (IoT) devices, lightweight image encryption algorithms are crucial for resource-constrained environments. These algorithms have applications in various domains, including medical imaging and surveillance systems. However, the biggest challenge of lightweight algorithms is balancing strong security with limited hardware resources. This work introduces a novel nonlinear matrix permutation approach applicable to both confusion and diffusion phases in lightweight image encryption. The proposed method utilizes three different chaotic maps in harmony, namely a 2D Zaslavsky map, 1D Chebyshev map, and 1D logistic map, to generate number sequences for permutation and diffusion. Evaluation using various metrics confirms the method’s efficiency and its potential as a robust encryption framework. The proposed scheme was tested with 14 color images in the SIPI dataset. This approach achieves high performance by processing each image in just one iteration. The developed scheme offers a significant advantage over its alternatives, with an average NPCR of 99.6122, UACI of 33.4690, and information entropy of 7.9993 for 14 test images, with an average correlation value as low as 0.0006 and a vast key space of 2800. The evaluation results demonstrated that the proposed approach is a viable and effective alternative for lightweight image encryption.
Title: A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption
Description:
As information systems become more widespread, data security becomes increasingly important.
While traditional encryption methods provide effective protection against unauthorized access, they often struggle with multimedia data like images and videos.
This necessitates specialized image encryption approaches.
With the rise of mobile and Internet of Things (IoT) devices, lightweight image encryption algorithms are crucial for resource-constrained environments.
These algorithms have applications in various domains, including medical imaging and surveillance systems.
However, the biggest challenge of lightweight algorithms is balancing strong security with limited hardware resources.
This work introduces a novel nonlinear matrix permutation approach applicable to both confusion and diffusion phases in lightweight image encryption.
The proposed method utilizes three different chaotic maps in harmony, namely a 2D Zaslavsky map, 1D Chebyshev map, and 1D logistic map, to generate number sequences for permutation and diffusion.
Evaluation using various metrics confirms the method’s efficiency and its potential as a robust encryption framework.
The proposed scheme was tested with 14 color images in the SIPI dataset.
This approach achieves high performance by processing each image in just one iteration.
The developed scheme offers a significant advantage over its alternatives, with an average NPCR of 99.
6122, UACI of 33.
4690, and information entropy of 7.
9993 for 14 test images, with an average correlation value as low as 0.
0006 and a vast key space of 2800.
The evaluation results demonstrated that the proposed approach is a viable and effective alternative for lightweight image encryption.
Related Results
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
Abstract
To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper. This algorit...
Image encryption based on permutation polynomials over finite fields
Image encryption based on permutation polynomials over finite fields
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Multilayer Networks
Multilayer Networks
Abstract
Multilayer networks are formed by several networks that interact with each other and co-evolve. Multilayer networks include social networks, financial marke...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by...

