Secure chaotic image encryption method using random graph traversal and three step diffusion

被引:3
|
作者
Agarwal, Varun [1 ]
Kumar, Dhirendra [1 ]
机构
[1] Delhi Technol Univ, Dept Appl Math, Delhi, India
关键词
Image encryption; Lorenz map; Random graph traversal; Chaotic sequence; ALGORITHM; PERMUTATION; MAP;
D O I
10.1007/s11042-023-17418-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have presented an image encryption technique using random graph traversal, chaotic maps, and a secure hashing algorithm. Due to the innate features of images, such as a high correlation between pixels, high redundancy, and the bulk capacity of images, traditional cryptography methods cannot be used for image encryption. Several theories can be exploited for image cryptography, but we choose random graph traversal because of its immense potential in this field. Chaotic maps are highly sensitive to initial conditions, which makes them suitable for encryption tasks. It is difficult to predict the dynamic properties of high-dimensional maps since they are more complex in nature. We use a three-dimensional Lorenz map to make our algorithm more robust. The initial parameters of the Lorenz map are modified by using the SHA-3 algorithm in the plain image. All the pixels of the image are assumed to be nodes of a graph, and a novel method is used to find a random path of pixel nodes in this graph network using a Lorenz map sequence such that each pixel node is visited exactly once. Finally, the chaotic sequences are used to diffuse the image into three sub-parts to obtain the final cipher image. The experiment has been performed on several standard images to compare the proposed approach with related methods in terms of qualitative and quantitative measures. The proposed approach fails to decrypt the cipher image even with a key deviation as low as 10(-7) compared to related methods, which show excellent key sensitivity compared to the proposed method. Experimental results show that the proposed algorithm is highly secure and can resist several attacks.
引用
收藏
页码:46799 / 46824
页数:26
相关论文
共 50 条
  • [1] Secure chaotic image encryption method using random graph traversal and three step diffusion
    Varun Agarwal
    Dhirendra Kumar
    Multimedia Tools and Applications, 2024, 83 : 46799 - 46824
  • [2] Chaotic image encryption based on spiral traversal and finite field bidirectional diffusion
    Huang, Lilian
    Chai, Bin
    Xiang, Jianhong
    Zhang, Zefeng
    Liu, Jin
    PHYSICA SCRIPTA, 2023, 98 (03)
  • [3] AN IMAGE ENCRYPTION USING CHAOTIC PERMUTATION AND DIFFUSION
    Gopalakrishnan, T.
    Ramakrishnan, S.
    Balakumar, M.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,
  • [4] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Bhaskar Mondal
    Prabhakar Kumar
    Shrey Singh
    Multimedia Tools and Applications, 2018, 77 : 31177 - 31198
  • [5] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Mondal, Bhaskar
    Kumar, Prabhakar
    Singh, Shrey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 31177 - 31198
  • [6] Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps
    Patro, K. Abhimanyu Kumar
    Acharya, Bibhudendra
    Nath, Vijay
    MICROSYSTEM TECHNOLOGIES-MICRO-AND NANOSYSTEMS-INFORMATION STORAGE AND PROCESSING SYSTEMS, 2019, 25 (12): : 4593 - 4607
  • [7] Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps
    K. Abhimanyu Kumar Patro
    Bibhudendra Acharya
    Vijay Nath
    Microsystem Technologies, 2019, 25 : 4593 - 4607
  • [8] Image Encryption through Using Chaotic Function and Graph
    Faridnia, Sa'ed
    Fae'z, Karim
    COMPUTER VISION AND GRAPHICS, PT I, 2010, 6374 : 352 - +
  • [9] Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion
    Annaby, M. H.
    Rushdi, M. A.
    Nehary, E. A.
    OPTICS AND LASERS IN ENGINEERING, 2018, 103 : 9 - 23
  • [10] A secure image encryption scheme based on three different chaotic maps
    De, Supriyo
    Bhaumik, Jaydeb
    Giri, Debasis
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (04) : 5485 - 5514