Secure chaotic image encryption method using random graph traversal and three step diffusion

被引:3
|
作者
Agarwal, Varun [1 ]
Kumar, Dhirendra [1 ]
机构
[1] Delhi Technol Univ, Dept Appl Math, Delhi, India
关键词
Image encryption; Lorenz map; Random graph traversal; Chaotic sequence; ALGORITHM; PERMUTATION; MAP;
D O I
10.1007/s11042-023-17418-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have presented an image encryption technique using random graph traversal, chaotic maps, and a secure hashing algorithm. Due to the innate features of images, such as a high correlation between pixels, high redundancy, and the bulk capacity of images, traditional cryptography methods cannot be used for image encryption. Several theories can be exploited for image cryptography, but we choose random graph traversal because of its immense potential in this field. Chaotic maps are highly sensitive to initial conditions, which makes them suitable for encryption tasks. It is difficult to predict the dynamic properties of high-dimensional maps since they are more complex in nature. We use a three-dimensional Lorenz map to make our algorithm more robust. The initial parameters of the Lorenz map are modified by using the SHA-3 algorithm in the plain image. All the pixels of the image are assumed to be nodes of a graph, and a novel method is used to find a random path of pixel nodes in this graph network using a Lorenz map sequence such that each pixel node is visited exactly once. Finally, the chaotic sequences are used to diffuse the image into three sub-parts to obtain the final cipher image. The experiment has been performed on several standard images to compare the proposed approach with related methods in terms of qualitative and quantitative measures. The proposed approach fails to decrypt the cipher image even with a key deviation as low as 10(-7) compared to related methods, which show excellent key sensitivity compared to the proposed method. Experimental results show that the proposed algorithm is highly secure and can resist several attacks.
引用
收藏
页码:46799 / 46824
页数:26
相关论文
共 50 条
  • [21] Image Encryption Using Pseudo Random Number and Chaotic Sequence Generators
    Youssef, M. I.
    Zahara, M.
    Emam, A. E.
    Elghany, M. Abd
    NRSC: 2009 NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2009, VOLS 1 AND 2, 2009, : 650 - 664
  • [22] Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption
    Loan, Nazir A.
    Hurrah, Nasir N.
    Parah, Shabir A.
    Lee, Jong Weon
    Sheikh, Javaid A.
    Bhat, G. Mohiuddin
    IEEE ACCESS, 2018, 6 : 19876 - 19897
  • [23] A novel randomized one-dimensional chaotic Chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal
    Ali Shakiba
    Multimedia Tools and Applications, 2019, 78 : 34773 - 34799
  • [24] An RGB image encryption using diffusion process associated with chaotic map
    Kumar, Manish
    Powduri, Pradeep
    Reddy, Avinash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 20 - 30
  • [25] Digital Biometric Facial Image Encryption using Chaotic Cellular Automata for Secure Image Storages
    Cheepchol, S.
    San-Um, W.
    Kiattisin, S.
    Leelasantitham, A.
    2014 FOURTH JOINT INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONIC AND ELECTRICAL ENGINEERING (JICTEE 2014), 2014,
  • [26] A novel randomized one-dimensional chaotic Chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal
    Shakiba, Ali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) : 34773 - 34799
  • [27] Image encryption with chaotic random codes by grey relational grade and Taguchi method
    Huang, Chuan-Kuei
    Nien, Hsiau-Hsian
    Changchien, Shih-Kuen
    Shieh, Hong-Wei
    OPTICS COMMUNICATIONS, 2007, 280 (02) : 300 - 310
  • [28] Cryptanalysis of a chaotic image encryption method
    Li, SJ
    Zheng, X
    2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, PROCEEDINGS, 2002, : 708 - 711
  • [29] Secure Communication using TPC and Chaotic Encryption
    Chaware, Trushita S.
    Mishra, B. K.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 615 - 620
  • [30] Improved reverse zigzag transform and DNA diffusion chaotic image encryption method
    Zhida Guo
    Peng Sun
    Multimedia Tools and Applications, 2022, 81 : 11301 - 11323