Secure chaotic image encryption method using random graph traversal and three step diffusion

被引:3
|
作者
Agarwal, Varun [1 ]
Kumar, Dhirendra [1 ]
机构
[1] Delhi Technol Univ, Dept Appl Math, Delhi, India
关键词
Image encryption; Lorenz map; Random graph traversal; Chaotic sequence; ALGORITHM; PERMUTATION; MAP;
D O I
10.1007/s11042-023-17418-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we have presented an image encryption technique using random graph traversal, chaotic maps, and a secure hashing algorithm. Due to the innate features of images, such as a high correlation between pixels, high redundancy, and the bulk capacity of images, traditional cryptography methods cannot be used for image encryption. Several theories can be exploited for image cryptography, but we choose random graph traversal because of its immense potential in this field. Chaotic maps are highly sensitive to initial conditions, which makes them suitable for encryption tasks. It is difficult to predict the dynamic properties of high-dimensional maps since they are more complex in nature. We use a three-dimensional Lorenz map to make our algorithm more robust. The initial parameters of the Lorenz map are modified by using the SHA-3 algorithm in the plain image. All the pixels of the image are assumed to be nodes of a graph, and a novel method is used to find a random path of pixel nodes in this graph network using a Lorenz map sequence such that each pixel node is visited exactly once. Finally, the chaotic sequences are used to diffuse the image into three sub-parts to obtain the final cipher image. The experiment has been performed on several standard images to compare the proposed approach with related methods in terms of qualitative and quantitative measures. The proposed approach fails to decrypt the cipher image even with a key deviation as low as 10(-7) compared to related methods, which show excellent key sensitivity compared to the proposed method. Experimental results show that the proposed algorithm is highly secure and can resist several attacks.
引用
收藏
页码:46799 / 46824
页数:26
相关论文
共 50 条
  • [31] Improved reverse zigzag transform and DNA diffusion chaotic image encryption method
    Guo, Zhida
    Sun, Peng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (08) : 11301 - 11323
  • [32] Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method
    Chunxiao Yang
    Ina Taralova
    Safwan El Assad
    Jean-Jacques Loiseau
    Nonlinear Dynamics, 2022, 109 : 2103 - 2127
  • [33] An Improved Image Encryption Technique using Diffusion Method associated with Hill Cipher and Chaotic Logistic Map
    Devika
    Nayak, Monalisa
    Dash, Dillip
    Sa, Kodanda Dhar
    2017 2ND INTERNATIONAL CONFERENCE ON MAN AND MACHINE INTERFACING (MAMI), 2017,
  • [34] Image encryption based on fractional chaotic pseudo-random number generator and DNA encryption method
    Yang, Chunxiao
    Taralova, Ina
    El Assad, Safwan
    Loiseau, Jean-Jacques
    NONLINEAR DYNAMICS, 2022, 109 (03) : 2103 - 2127
  • [35] Chaotic image encryption using pseudo-random masks and pixel mapping
    Li, Xiaowei
    Li, Chengqing
    Lee, In-Kwon
    SIGNAL PROCESSING, 2016, 125 : 48 - 63
  • [36] Digital Image Encryption Based on Chaotic Map for Secure Transmission
    Ahmad, Musheer
    Gupta, Chanki
    Varshney, Ankit
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 292 - 295
  • [37] A novel image encryption using random matrix affine cipher and the chaotic maps
    Lone, Parveiz Nazir
    Singh, Deep
    Mir, Umar Hussain
    JOURNAL OF MODERN OPTICS, 2021, 68 (10) : 507 - 521
  • [38] Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps
    Singh, Deep
    Kumar, Sandeep
    Verma, Chaman
    Illes, Zoltan
    Kumar, Neerendra
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (10)
  • [39] Image Encryption Based on Logistic Chaotic Map for Secure Communications
    Rodriguez-Sahagun, M. T.
    Mercado-Sanchez, J. B.
    Lopez-Mancilla, D.
    Jaimes-Reategui, R.
    Garcia-Lopez, J. H.
    2010 IEEE ELECTRONICS, ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE (CERMA 2010), 2010, : 319 - 324
  • [40] Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1
    Ben Slimane, Nabil
    Bouallegue, Kais
    Machhout, Mohsen
    2016 4TH INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING & INFORMATION TECHNOLOGY (CEIT), 2016,