A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation

Main Article Content

Mustafa Dhiaa Al-Hassani


The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).


Download data is not yet available.

Article Details

How to Cite
Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci.J [Internet]. 2022 Aug. 1 [cited 2022 Nov. 30];19(4):0905. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382


Ying Niu, Xuncai Zhang. A Novel Plaintext-Related Image Encryption Scheme Based on Chaotic System and Pixel Permutation. IEEE Access. 2020; 8(1): 22082-93. DOI:10.1109/ACCESS.2020.2970103 .

Wen W, Zhang Y, Su M, Zhang R. Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture. Nonlinear Dyn. 2017; 87(1): 383-90. DOI:10.1007/s11071-016-3049-x.

Hossam Diab. An Efficient Chaotic Image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access. 2018; 6(1): 42227-44. DOI:10.1109/ACCESS.2018.2858839.

Mustafa D. Al-Hassani, B. Z. Jaafar. An Innovative Data Encryption Technique through Keys Distributed over Websites using Linked-Lists. International Conference ICASEA – Proceedings. 2018: 85–89. DOI:10.1109/ICASEA.2018.8370961.

Unnikrishnan Menon, Atharva Hudlikar, Anirudh Rajiv. A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm. Int J Adv Comput. Sci Appl. 2020; 11(10): 34-40. DOI:10.14569/IJACSA.2020.0111005.

William Stallings. Cryptography and Network Security-Principles and Practice. 7th Edition Pearson Education Limited England; 2017. 767 p.

Anchal Jain, Navin Rajpal. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. University School of Information and Communication Technology. Springer Science and Business Media. New York. 2015; 29(1). DOI:10.1007/s11042-015-2515-7.

Xiaoqiang Di, Jinqing Li, Hui Qi. A semi-symmetric image encryption scheme Based on the function projective synchronization of two hyper chaotic systems. PLOS ONE. 2017; Available from: https://doi.org/10.1371/journal.pone.0184586. DOI:10.1371/journal.pone.0184586.

Luo Y, Ouyang X, Liu J, Cao L. An image encryption method based on elliptic curve elgamal encryption and chaotic systems. IEEE Access. 2019; 7(1): 38507-22. DOI:10.1109/ACCESS.2019.2906052.

Chai X, Gan Z, Yuan K, Chen Y, Liu X. A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput Appl. 2019; 31(9): 219-37. DOI:10.1007/s00521-017-2993-9.

Jun Xiao, Wang Zhu, Zhang Miao. An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn. 2015; 80(3):1493–508. DOI:10.1007/s11071-015-1957-9.

Jannatul Ferdush, Mahbuba Begum, Mohammad S. Uddin. Chaotic Lightweight Cryptosystem for Image Encryption. Adv Multimedia. 2021; 1: 1-16. Available from: https://doi.org/10.1155/2021/5527295. DOI:10.1155/2021/5527295.

Yousif Bedir, Khalifa Fahmi. A novel image encryption/decryption scheme based on integrating multiple chaotic maps. AIP Adv. 2020; 10(7): 075220-9. Available from: https://doi.org/10.1063/5.0009225.

Feng W, He Y, Li H. Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access. 2019; 7(14): 12584–97. Available from: https://doi.org/10.1109/access.2019.2893760.

Zhou Y, Bao L, Philip C. A new 1D chaotic system for image encryption. Signal Process. 2014; 97(1): 172–82. Available from: https://doi.org/10.1016/j.sigpro.2013.10.034.

Liansheng S, Bei Z, Xiaojuan N, Ailing T. Optical multiple-image encryption based on the chaotic structured phase masks under the illumination of a vortex beam in the gyrator domain. Opt Express. 2016; 24(18): 1–17. Available from: https://doi.org/10.1364/oe.24.000499.

Tabash F K, Rafiq M Q, Izharrudin M. Image encryption algorithm based on chaotic map. Int J Comput Appl. 2013; 64(13): 1–14. Available from: https://doi.org/10.5120/10691-5600.

Khan M, Masood F. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl. 2019; 78(18): 26203-22. DOI:10.1007/s11042-019-07818-4.

Kanso A, Ghebleh M. A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul. 2012; 17(7): 2943–59. DOI:10.1016/j.cnsns.2011.11.030.

Christof Paar, Jan Pelzl, Bart Preneel. Understanding Cryptography: A Textbook for Students and Practitioners. Springer-Verlag. Berlin. Heidelberg 1st edition 2010.

Ahmad J, Ahmed F. Efficiency Analysis and Security Evaluation of Image Encryption Schemes. IJVIPNS. 2012; 12(4): 18-31.

Chong F, Jun-Bin H, Ning-Ning W. A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy. Entropy ISSN 1099-4300. 2014; 16(2): 770-88. DOI:10.3390/e16020770

Mohammed A Shreef, Haider K Hmood. Image Encryption using Lagrange-Least Squares Interpolation. IJACSIT. 2013; 2(4): 35-55. Available from: http://ssrn.com/abstract=2376654

Nehal A Mohamed, Mostafa A El-Azeim, Alaa Z. Improving Image Encryption using 3D Cat Map and Turing Machine. IJACSA. 2016; 7(1): 208-15. DOI:10.14569/IJACSA.2016.070129.

Salim KG, Al-alak SM, Jawad MJ. Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES. Baghdad Sci J. 2021;18(2):04-17.

Tawfeeq FG, Abdul-Hadi AM. Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA). Baghdad Sci J. 2020 Sep 8;17(3 (Suppl.)):10-29.