Analyzing the Efficiency of a New Image Encryption Method Based on Aboodh Transformations

Main Article Content

Suresh Rasappan
https://orcid.org/0000-0002-6779-9000
Regan Murugesan
Sathish Kumar Kumaravel
Kala Raja Mohan
Nagadevi Bala Nagaram

Abstract

The goal of this research is to develop a unique cryptographic method that makes use of Aboodh and its inverse transform in combination with the S-Box approach. The results of evaluations indicate that this work is appropriate for use in safe cryptographic applications, and it provides clues regarding the building of an image cryptosystem based on the complicated behaviors that it demonstrates. After applying the methodologies that have been provided to depict data taken from real-life situations, the results have been evaluated using a wide variety of statistical and performance criteria. The findings of this investigation result in an improvement to the reliability of the cryptosystem.

Article Details

How to Cite
1.
Analyzing the Efficiency of a New Image Encryption Method Based on Aboodh Transformations. Baghdad Sci.J [Internet]. 2024 May 25 [cited 2024 Jun. 17];21(5(SI):1850. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10565
Section
Special Issue - (ICCDA) International Conference on Computing and Data Analytics

How to Cite

1.
Analyzing the Efficiency of a New Image Encryption Method Based on Aboodh Transformations. Baghdad Sci.J [Internet]. 2024 May 25 [cited 2024 Jun. 17];21(5(SI):1850. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10565

References

Kamrani A, Zenkouar K, Najah S. A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimed Tools Appl. 2020 Jul; 79: 20263-79. https://doi.org/10.1007/s11042-020-08879-6.

Kang Y, Huang L, He Y, Xiong X, Cai S, Zhang H. On a symmetric image encryption algorithm based on the peculiarity of plaintext DNA coding. Symmetry. 2020 Aug 21; 12(9): 1393. https://doi.org/10.3390/sym12091393.

Khan JS, Kayhan SK. Chaos and compressive sensing based novel image encryption scheme. J Inf Secur Appl. 2021 May 1; 58: 102711. https://doi.org/10.1016/j.jisa.2020.102711.

Khan M, Azam NA. Right translated AES gray S‐boxes. Secur Commun Netw. 2015 Jun; 8(9): 1627-35. https://doi.org/10.1002/sec.1110.

Abd El-Latif AA, Abd-El-Atty B, Amin M, Iliyasu AM. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep. 2020 Feb 6; 10(1): 1930. https://doi.org/10.1038/s41598-020-58636-w.

El-Latif AA, Abd-El-Atty B, Belazi A, Iliyasu AM. Efficient chaos-based substitution-box and its application to image encryption. Electronics. 2021 Jun 10; 10(12): 1392. https://doi.org/10.3390/electronics10121392.

Rajagopal K, Kingni ST, Khalaf AJ, Shekofteh Y, Nazarimehr F. Coexistence of attractors in a simple chaotic oscillator with fractional-order-memristor component: Analysis, FPGA implementation, chaos control and synchronization. Eur Phys J Spec Top. 2019 Oct; 228: 2035-51. https://doi.org/10.1140/epjst/e2019-900001-8.

Wen H, Yu S, Lü J. Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2019 Mar 5; 21(3): 246. https://doi.org/10.3390/e21030246.

Lambić D. S-box design method based on improved one-dimensional discrete chaotic map. J Inf Telecommun. 2018 Apr 3; 2(2): 181-91. https://doi.org/10.1080/24751839.2018.1434723.

Özkaynak F, Özer AB. A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A. 2010 Aug 9; 374(36): 3733-8. https://doi.org/10.1016/j.physleta.2010.07.019.

Wang Y, Wong KW, Li C, Li Y. A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A. 2012 Jan 30; 376 (6-7): 827-33. https://doi.org/10.1016/j.physleta.2012.01.009.

Badr AM, Fourati LC, Ayed S. A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology. Baghdad Sci J. 2023 Dec. 5; 20(6(Suppl.): 2651. http://dx.doi.org/10.21123/bsj.2023.9203

Hamza YA, Tewfiq NE, Ahmed MQ. An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing. Baghdad Sci J. 2022 Feb. 1; 19(1): 0197. https://doi.org/10.21123/bsj.2022.19.1.0197.

Al-Bahrani EA, Kadhum RN. A new cipher based on Feistel structure and chaotic maps. Baghdad Sci J. 2019 Jan 2; 16(1): 270-80. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270.

Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Syst. 2001 Feb; 148(2): 163-9. https://doi.org/10.1109/81.904880.

Özkaynak F. Construction of robust substitution boxes based on chaotic systems. Neural Comput & Applic. 2019 Aug; 31(8): 3317-26. https://doi.org/10.1007/s00521-017-3287-y.

Özkaynak F, Çelik V, Özer AB. A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video P. 2017 May; 11: 659-64. https://doi.org/10.1007/s11760-016-1007-1.

Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P. A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf. Sci. 2020 Jun 1; 523: 152-66. https://doi.org/10.1016/j.ins.2020.03.025.

Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A. Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access. 2020 Feb 24; 8: 39781-92. https://doi.org/10.1109/ACCESS.2020.2975880.

Zhang T, Chen CP, Chen L, Xu X, Hu B. Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE Trans. Cybern. 2018 Jul 23; 48(12): 3349-58. https://doi.org/10.1109/TCYB.2018.2846186.

Gautam A, Gaba GS, Miglani R, Pasricha R. Application of chaotic functions for construction of strong substitution boxes. Indian J Sci Technol. 2015 Oct 23; 8(28): 1-5. https://doi.org/10.17485/ijst/2015/v8i28/71759.

Haider MI, Ali A, Shah D, Shah T. Block cipher’s nonlinear component design by elliptic curves: an image encryption application. Multimed Tools Appl. 2021 Jan; 80: 4693-718. https://doi.org/10.1007/s11042-020-09892-5.

Hussain I, Azam NA, Shah T. Stego optical encryption based on chaotic S-box transformation. Opt Laser Technol. 2014 Sep 1; 61: 50-6. https://doi.org/10.1016/j.optlastec.2014.01.018.

Siddiqui N, Naseer A, Ehatisham-ul-Haq M. A novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve. Wirel Pers Commun. 2021 Feb; 116(4): 3015-30. https://doi.org/10.1007/s11277-020-07832-y.

Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci J. 2022 Aug. 1; 19(4): 0905. https://doi.org/10.21123/bsj.2022.19.4.0905

Azam NA, Ullah I, Hayat U. A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Opt Lasers Eng. 2021 Feb 1; 137: 106371. https://doi.org/10.1016/j.optlaseng.2020.106371.

Meranza-Castillón MO, Murillo-Escobar MA, López-Gutiérrez RM, Cruz-Hernández C. Pseudorandom number generator based on enhanced Hénon map and its implementation. Int J Electron Commun. 2019 Jul 1; 107: 239-51. https://doi.org/10.1016/j.aeue.2019.05.028.

Khudair ET, Naser EF, Mazher AN. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy. Baghdad Sci J. 2022 Dec. 1; 19(6):1378. https://doi.org/10.21123/bsj.2022.6398

Mohan KR, Nagaram NB, Murugesan R, Rasappan S. A Cryptographic Technique Using Conformal Mapping. In Recent Trends in Computational Intelligence and Its Application.2023 Jun 15; (pp. 519-523). CRC Press. https://doi.org/10.1201/9781003388913-69.

Nagaram NB, Mohan KR, Kumaravel SK, Rasappan S. Secret Sharing of Information using First Order ODE and Variable Separable Method. In Recent Trends in Computational Intelligence and Its Application .2023 Jun; 15 (pp. 515-518). CRC Press. https://doi.org/10.1201/9781003388913-68.

Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM. Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 2016 Sep 1; 45: 297-309. https://doi.org/10.1016/j.micpro.2016.06.004

Wang X, Feng L, Zhao H. Fast image encryption algorithm based on parallel computing system. Inf. Sci.. 2019 Jun 1; 486: 340-58, https://doi.org/10.1016/j.ins.2019.02.049.

Diaconu AV. Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci.. 2016 Aug 10; 355: 314-27. https://doi.org/10.1016/j.ins.2015.10.027.

Abd El-Latif AA, Ramadoss J, Abd-El-Atty B, Khalifa HS, Nazarimehr F. A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis. Mathematics. 2022 Jul 1; 10(14): 2434. https://doi.org/10.3390/math10142434.

Gan ZH, Chai XL, Han DJ, Chen YR. A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Computing and Applications. 2019 Nov; 31: 7111-30. https://doi.org/10.1007/s00521-018-3541-y.

Similar Articles

You may also start an advanced similarity search for this article.