AN IMAGE ENCRYPTION METHOD BASED ON LOGISTICAL CHAOTIC MAPS TO ENCRYPT COMMUNICATION DATA

Authors

  • Heba Abdul-Jaleel Al-Asady Department of Electrical Engineering, College of Engineering, University of Kufa, Kufa, Iraq
  • Hassan Falah Fakhruldeen Department of Electrical Engineering, College of Engineering, University of Kufa, Kufa, Iraq
  • Yousif Mudhafar Department of Computer Technical Engineering, College of Technical Engineering, The Islamic University, Najaf, Iraq

DOI:

https://doi.org/10.30572/2018/KJE/150405

Keywords:

Encryption;, Image;, Binary vector;, Chaotic signal;, Logistic map;

Abstract

Encryption is crucial because of how integral to daily life things like smartphones, computers, and the internet have become. It's almost inconceivable to think about getting by without it. Everything from paying bills and buying goods to email and social networking is done online nowadays. Participating in measures that can prevent illegal access to our accounts, data, and devices is more crucial than ever. In this study, we combined a 256-by-256-pixel cover picture with a 128-by-128-pixel inner image using the logistic map (the chaotic function), where both images were in the PNG format. where the encrypted image is converted to a grayscale image and then encrypted through the logistic function. the output of this process is chaotic data that has been converted into binary data to be encrypted again through the colors of the cover image (red, green and blue) each separately and measuring the standard factors to know the strength of the system. The bit error rate was calculated after measuring the signal-to-noise ratio (SNR), system similarity(SSIM), and Peak Signal to Noise Ratio(PSNR) for these three hues. Using the logistic map, all three colors were found to be equally secure during encryption in the chaotic signal and due to unpredictability.

Downloads

Download data is not yet available.

References

Abd, A.S. and Hussein, E.A., 2022. Design secure multi-level communication system based on duffing chaotic map and steganography. Indonesian Journal of Electrical Engineering and Computer Science, 25(1), pp.238-246.

Ahmad, I. and Shin, S., 2021. A novel hybrid image encryption–compression scheme by combining chaos theory and number theory. Signal Processing: Image Communication, 98, p.116418.

Alasadi, A.L.H.A.J., 2017. Watermarking Algorithm Based On Discrete Wavelet Transform Using Two Types Of Images. International Journal of Science, Engineering and Technology Research (IJSETR), 6(05).

Al-Asady, H.A.J., Al-Thahab, O.Q.J. and Hreshee, S.S., 2021, March. Robust encryption system based watermarking theory by using chaotic algorithms: A reviewer paper. In Journal of Physics: Conference Series (Vol. 1818, No. 1, p. 012086). IOP Publishing.

Al-Kaabi, R.A., Fakhruldeen, H.F. and Al-Asady, H.A.J., 2023, March. An overview of the status, challenges, and trends of the advanced crypto algorithms to enhance the security of wireless networks. In AIP Conference Proceedings (Vol. 2591, No. 1). AIP Publishing.

Al-Thahab, O.Q. and Hussein, A.A., 2020, July. Implementation of stego-watermarking technique by encryption image based on turbo code for copyright application. In 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA (pp. 148-153). IEEE.

Bindu, K., Ganpati, A. and Sharma, A.K., 2012. A comparative study of image compression algorithms. International Journal of Research in Computer Science, 2(5), p.37.

Dhawan, S., 2011. A review of image compression and comparison of its algorithms. International Journal of electronics & Communication technology, 2(1), pp.22-26.

Doğan, Ş., 2016. A new data hiding method based on chaos embedded genetic algorithm for color image. Artificial Intelligence Review, 46, pp.129-143.

Dubey, S.K. and Chandra, V., 2017. Steganography Cryptography and Watermarking: A Review. International Journal of Innovative Research in Science, Engineering and Technology, 6(2), pp.2595-2599.

Emad, E., Safey, A., Refaat, A., Osama, Z., Sayed, E. and Mohamed, E., 2018. A secure image steganography algorithm based on least significant bit and integer wavelet transform. Journal of Systems Engineering and Electronics, 29(3), pp.639-649.

Fadhil, S.A. and K Farhan, A., 2022. Color visual cryptography based on three dimensional chaotic map. Iraqi Journal of Computers, Communications, Control and Systems Engineering, 22(2), pp.1-12.

Jalali, A. and Farsi, H., 2020. A new steganography algorithm based on video sparse representation. Multimedia Tools and Applications, 79(3-4), pp.1821-1846.

Muhammad, Z.M.Z. and Özkaynak, F., 2019. Security problems of chaotic image encryption algorithms based on cryptanalysis driven design technique. IEEE Access, 7, pp.99945-99953.

Narayana, V.L. and Kumar, N.A., 2018. Different techniques for hiding the text information using text steganography techniques: A survey. Ingénierie des Systèmes d'Information, 23(6).

Odeh, A. and Al-Haija, Q.A., 2023. Medical image encryption techniques: a technical survey and potential challenges. no. January, pp.3170-3177.

Pourasad, Y., Ranjbarzadeh, R. and Mardani, A., 2021. A new algorithm for digital image encryption based on chaos theory. Entropy, 23(3), p.341.

Setyono, A. and Muljono, M., 2018. Dual encryption techniques for secure image transmission. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(3-2), pp.41-46.

Shah, A.A., Parah, S.A., Rashid, M. and Elhoseny, M., 2020. Efficient image encryption scheme based on generalized logistic map for real time image processing. Journal of Real-Time Image Processing, 17(6), pp.2139-2151.

Shen, J., Zuo, X., Li, J., Yang, W. and Ling, H., 2017. A novel pixel neighborhood differential statistic feature for pedestrian and face detection. Pattern Recognition, 63, pp.127-138.

Zamani, M. and Manaf, A.B.A., 2015. Genetic algorithm for fragile audio watermarking. Telecommunication Systems, 59, pp.291-304.

Downloads

Published

2024-11-01

How to Cite

Abdul-Jaleel Al-Asady, Heba, et al. “AN IMAGE ENCRYPTION METHOD BASED ON LOGISTICAL CHAOTIC MAPS TO ENCRYPT COMMUNICATION DATA”. Kufa Journal of Engineering, vol. 15, no. 4, Nov. 2024, pp. 55-64, https://doi.org/10.30572/2018/KJE/150405.

Share