تحليل كفاءة طريقة جديدة لتشفير الصور بناء على تحويلات أبوده
محتوى المقالة الرئيسي
الملخص
الهدف من هذا البحث هو تطوير طريقة تشفير فريدة من نوعها تستخدم طريقة Aboodh وتحويلها العكسي مع طريقة S-Box. تشير نتائج التقييمات إلى أن هذا العمل مناسب للاستخدام في تطبيقات التشفير الآمنة، ويوفر أدلة فيما يتعلق ببناء نظام تشفير للصور بناءً على السلوكيات المعقدة التي يوضحها. بعد تطبيق المنهجيات التي تم تقديمها لتصوير البيانات المأخوذة من مواقف الحياة الواقعية، تم تقييم النتائج باستخدام مجموعة واسعة من المعايير الإحصائية ومعايير الأداء. نتائج هذا التحقيق تؤدي إلى تحسين موثوقية نظام التشفير.
Received 02/01/2024
Revised 20/04/2024
Accepted 22/04/2024
Published 25/05/2024
تفاصيل المقالة
هذا العمل مرخص بموجب Creative Commons Attribution 4.0 International License.
كيفية الاقتباس
المراجع
Kamrani A, Zenkouar K, Najah S. A new set of image encryption algorithms based on discrete orthogonal moments and Chaos theory. Multimed Tools Appl. 2020 Jul; 79: 20263-79. https://doi.org/10.1007/s11042-020-08879-6.
Kang Y, Huang L, He Y, Xiong X, Cai S, Zhang H. On a symmetric image encryption algorithm based on the peculiarity of plaintext DNA coding. Symmetry. 2020 Aug 21; 12(9): 1393. https://doi.org/10.3390/sym12091393.
Khan JS, Kayhan SK. Chaos and compressive sensing based novel image encryption scheme. J Inf Secur Appl. 2021 May 1; 58: 102711. https://doi.org/10.1016/j.jisa.2020.102711.
Khan M, Azam NA. Right translated AES gray S‐boxes. Secur Commun Netw. 2015 Jun; 8(9): 1627-35. https://doi.org/10.1002/sec.1110.
Abd El-Latif AA, Abd-El-Atty B, Amin M, Iliyasu AM. Quantum-inspired cascaded discrete-time quantum walks with induced chaotic dynamics and cryptographic applications. Sci Rep. 2020 Feb 6; 10(1): 1930. https://doi.org/10.1038/s41598-020-58636-w.
El-Latif AA, Abd-El-Atty B, Belazi A, Iliyasu AM. Efficient chaos-based substitution-box and its application to image encryption. Electronics. 2021 Jun 10; 10(12): 1392. https://doi.org/10.3390/electronics10121392.
Rajagopal K, Kingni ST, Khalaf AJ, Shekofteh Y, Nazarimehr F. Coexistence of attractors in a simple chaotic oscillator with fractional-order-memristor component: Analysis, FPGA implementation, chaos control and synchronization. Eur Phys J Spec Top. 2019 Oct; 228: 2035-51. https://doi.org/10.1140/epjst/e2019-900001-8.
Wen H, Yu S, Lü J. Breaking an image encryption algorithm based on DNA encoding and spatiotemporal chaos. Entropy. 2019 Mar 5; 21(3): 246. https://doi.org/10.3390/e21030246.
Lambić D. S-box design method based on improved one-dimensional discrete chaotic map. J Inf Telecommun. 2018 Apr 3; 2(2): 181-91. https://doi.org/10.1080/24751839.2018.1434723.
Özkaynak F, Özer AB. A method for designing strong S-Boxes based on chaotic Lorenz system. Phys Lett A. 2010 Aug 9; 374(36): 3733-8. https://doi.org/10.1016/j.physleta.2010.07.019.
Wang Y, Wong KW, Li C, Li Y. A novel method to design S-box based on chaotic map and genetic algorithm. Phys Lett A. 2012 Jan 30; 376 (6-7): 827-33. https://doi.org/10.1016/j.physleta.2012.01.009.
Badr AM, Fourati LC, Ayed S. A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology. Baghdad Sci J. 2023 Dec. 5; 20(6(Suppl.): 2651. http://dx.doi.org/10.21123/bsj.2023.9203
Hamza YA, Tewfiq NE, Ahmed MQ. An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing. Baghdad Sci J. 2022 Feb. 1; 19(1): 0197. https://doi.org/10.21123/bsj.2022.19.1.0197.
Al-Bahrani EA, Kadhum RN. A new cipher based on Feistel structure and chaotic maps. Baghdad Sci J. 2019 Jan 2; 16(1): 270-80. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270.
Jakimoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE Trans Circuits Syst. 2001 Feb; 148(2): 163-9. https://doi.org/10.1109/81.904880.
Özkaynak F. Construction of robust substitution boxes based on chaotic systems. Neural Comput & Applic. 2019 Aug; 31(8): 3317-26. https://doi.org/10.1007/s00521-017-3287-y.
Özkaynak F, Çelik V, Özer AB. A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video P. 2017 May; 11: 659-64. https://doi.org/10.1007/s11760-016-1007-1.
Wang Y, Zhang Z, Zhang LY, Feng J, Gao J, Lei P. A genetic algorithm for constructing bijective substitution boxes with high nonlinearity. Inf. Sci. 2020 Jun 1; 523: 152-66. https://doi.org/10.1016/j.ins.2020.03.025.
Yousaf MA, Alolaiyan H, Ahmad M, Dilbar M, Razaq A. Comparison of pre and post-action of a finite abelian group over certain nonlinear schemes. IEEE Access. 2020 Feb 24; 8: 39781-92. https://doi.org/10.1109/ACCESS.2020.2975880.
Zhang T, Chen CP, Chen L, Xu X, Hu B. Design of highly nonlinear substitution boxes based on I-Ching operators. IEEE Trans. Cybern. 2018 Jul 23; 48(12): 3349-58. https://doi.org/10.1109/TCYB.2018.2846186.
Gautam A, Gaba GS, Miglani R, Pasricha R. Application of chaotic functions for construction of strong substitution boxes. Indian J Sci Technol. 2015 Oct 23; 8(28): 1-5. https://doi.org/10.17485/ijst/2015/v8i28/71759.
Haider MI, Ali A, Shah D, Shah T. Block cipher’s nonlinear component design by elliptic curves: an image encryption application. Multimed Tools Appl. 2021 Jan; 80: 4693-718. https://doi.org/10.1007/s11042-020-09892-5.
Hussain I, Azam NA, Shah T. Stego optical encryption based on chaotic S-box transformation. Opt Laser Technol. 2014 Sep 1; 61: 50-6. https://doi.org/10.1016/j.optlastec.2014.01.018.
Siddiqui N, Naseer A, Ehatisham-ul-Haq M. A novel scheme of substitution-box design based on modified Pascal’s triangle and elliptic curve. Wirel Pers Commun. 2021 Feb; 116(4): 3015-30. https://doi.org/10.1007/s11277-020-07832-y.
Al-Hassani MD. A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation. Baghdad Sci J. 2022 Aug. 1; 19(4): 0905. https://doi.org/10.21123/bsj.2022.19.4.0905
Azam NA, Ullah I, Hayat U. A fast and secure public-key image encryption scheme based on Mordell elliptic curves. Opt Lasers Eng. 2021 Feb 1; 137: 106371. https://doi.org/10.1016/j.optlaseng.2020.106371.
Meranza-Castillón MO, Murillo-Escobar MA, López-Gutiérrez RM, Cruz-Hernández C. Pseudorandom number generator based on enhanced Hénon map and its implementation. Int J Electron Commun. 2019 Jul 1; 107: 239-51. https://doi.org/10.1016/j.aeue.2019.05.028.
Khudair ET, Naser EF, Mazher AN. Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy. Baghdad Sci J. 2022 Dec. 1; 19(6):1378. https://doi.org/10.21123/bsj.2022.6398
Mohan KR, Nagaram NB, Murugesan R, Rasappan S. A Cryptographic Technique Using Conformal Mapping. In Recent Trends in Computational Intelligence and Its Application.2023 Jun 15; (pp. 519-523). CRC Press. https://doi.org/10.1201/9781003388913-69.
Nagaram NB, Mohan KR, Kumaravel SK, Rasappan S. Secret Sharing of Information using First Order ODE and Variable Separable Method. In Recent Trends in Computational Intelligence and Its Application .2023 Jun; 15 (pp. 515-518). CRC Press. https://doi.org/10.1201/9781003388913-68.
Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM. Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess. Microsyst. 2016 Sep 1; 45: 297-309. https://doi.org/10.1016/j.micpro.2016.06.004
Wang X, Feng L, Zhao H. Fast image encryption algorithm based on parallel computing system. Inf. Sci.. 2019 Jun 1; 486: 340-58, https://doi.org/10.1016/j.ins.2019.02.049.
Diaconu AV. Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci.. 2016 Aug 10; 355: 314-27. https://doi.org/10.1016/j.ins.2015.10.027.
Abd El-Latif AA, Ramadoss J, Abd-El-Atty B, Khalifa HS, Nazarimehr F. A Novel Chaos-Based Cryptography Algorithm and Its Performance Analysis. Mathematics. 2022 Jul 1; 10(14): 2434. https://doi.org/10.3390/math10142434.
Gan ZH, Chai XL, Han DJ, Chen YR. A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Computing and Applications. 2019 Nov; 31: 7111-30. https://doi.org/10.1007/s00521-018-3541-y.