Image Encryption based on Chaotic Blocks Shuffling and RC4
DOI:
https://doi.org/10.21123/bsj.2024.9781Keywords:
Chaotic Blocks, Image Encryption, Lorenz System, RC4, Rossler System.Abstract
The necessity for image encryption has grown significantly, especially the rapid development of the Internet of Things (IoT) fast development and the ease with which images can be taken and transferred, including those related to travel, health care, the agricultural sector, the military and autos. Additionally, since every image has significant characteristics like size, high correlation, and massive redundant positions, encrypting it with a conventional key via IoT communication technology exposes it to numerous threats. Chaotic image cryptography is considered the most suitable method for image application due to its sensitivy to the initial conditions and control parameters. This research contributes in encrypted image devoid of statistical information to make cryptanalysis impossible. Thus, this research offered a new algorithm based on confusion and diffusion to strengthen the algorithm security. In essence, the confusion method creates random numbers for the block shuffling approach using Lorenz and Rossler system. Nonetheless, RC4 cipher and XOR operation are utilized in the diffusion approach. A very low value (x10-3) of the correlation between neighboring pixels was achieved. Moreover, to prevent brute force attacks, the key space was expanded to a relatively large 2594 and key sensitivity. The resultant encrypted image is free of statistical features in terms of histogram and entropy since a histogram was idealized to be completely equal in all instances and the entropy produced was almost equal to the ideal value(8).
Received 30/09/2023
Revised 05/02/2024
Accepted 07/02/2024
Published Online First 20/12/2024
References
Kumar S, Kumar S, Ranjan N, Tiwari S, Kumar TR, Goyal D, et al. Digital watermarking-based cryptosystem for cloud resource provisioning. Int J Cloud Appl Comput . 2022; 12(1): 1–20. http://dx.doi.org/10.4018/ijcac.311033
S. Kumar N. Kumar.Conceptual service level agreement mechanism to minimize the SLA violation with SLA negotiation process in cloud computing environment.Baghdad Sci. J. 2021; vol. 18, no. 2: pp. 1020–1029http://dx.doi.org/10.21123/bsj.2021.18.2(Suppl.).1020
Kumar S, Samriya JK, Yadav AS, Kumar M. To improve scalability with Boolean matrix using efficient gossip failure detection and consensus algorithm for PeerSim simulator in IoT environment. Int J Inf Technol . 2022; 14(5): 2297–307. http://dx.doi.org/10.1007/s41870-022-00989-8
Kumar N, Kumar S. A salp swarm optimization for dynamic resource management to improve Quality of service in cloud computing and IoT environment. Int J Sens Wirel Commun Control . 2022; 12(1): 88–94. http://dx.doi.org/10.2174/2210327911666210126122119
Yadav AS, Kumar S, Karetla GR, Cotrina-Aliaga JC, Arias-Gonzáles JL, Kumar V, et al. A feature extraction using probabilistic neural network and BTFSC-Net model with deep learning for brain tumor classification. J Imaging. 2022; 9(1): 10. http://dx.doi.org/10.3390/jimaging9010010
Patel S, Bharath K P, Rajesh Kumar M. Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed Tools Appl . 2020; 79(43–44): 31739–57. http://dx.doi.org/10.1007/s11042-020-09551-9
Yasi̇n E, Saraçoğlu R. Haar wavelet transformation and RC4 algorithm based Image Encryption. Int J Appl Math Electron Comput. 2020;8(3):45–9. http://dx.doi.org/10.18100/ijamec.763283
Essaid M, Akharraz I, Saaidi A, Mouhib et A. Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. J Inf Secur Appl. 2019; 47:173–87. http://dx.doi.org/10.1016/j.jisa.2019.05.006
S Tunçer, C Karakuzu, F Uçar. RC4 Stream Cipher Based Digital Color Image Encryption Using Chaotic Systems. ICATCES’18. 2018 pp. 302–305.
Kumari M, Gupta S. A novel image encryption scheme based on intertwining chaotic maps and RC4 stream cipher. 3D Res. 2018; 9(1): 1-20. http://dx.doi.org/10.1007/s13319-018-0162-2
Susanto A, Setiadi DRIM, Rachmawanto EH, Wahyu Mulyono IU, Sari CA, Sarker MK, et al. Triple layer image security using bit-shift, chaos, and stream encryption. Bull Electr Eng Inform.2020; 9(3): 980–987. http://dx.doi.org/10.11591/eei.v9i3.2001
Mehdi SA, Kadhim AA. Image encryption algorithm based on a new five dimensional hyperchaotic system and Sudoku matrix. In: 2019 International Engineering Conference (IEC). IEEE; 2019.https://doi.org/10.1109/IEC47844.2019.8950560
Chen E, Min L, Chen G. Discrete chaotic systems with one-line equilibria and their application to image encryption. Int J Bifurcat Chaos. 2017; 27(03): 1750046. http://dx.doi.org/10.1142/s0218127417500468
Pourjabbar Kari A, Habibizad Navin A, Bidgoli AM, Mirnia M. A new image encryption scheme based on hybrid chaotic maps. Multimed Tools Appl. 2021; 80(2): 2753–72. http://dx.doi.org/10.1007/s11042-020-09648-1
Hamza YA, Dahar Omer M. An Efficient Method of Image Encryption Using Rossler Chaotic System. Acad J Nawroz Univ . 2021 Apr.28 [cited 2024Jan.21]; 10(2): 11-22.
Gaffar A, A Joshi, Kumar D. Image Encryption using Gingerbreadman Map And RC4A Stream Cipher. AAM. 2020 Dec 1 [cited 2024 Jan 21];15(2).
Malik A, Dhall S, Gupta S. An improved bit plane image encryption technique using RC4 and quantum chaotic demeanour. Multimed Tools Appl . 2021; 80(5): 7911–37. http://dx.doi.org/10.1007/s11042-020-09973-5
Hanchinamani G, Kulkarni L. An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res . 2015; 6(3):30. http://dx.doi.org/10.1007/s13319-015-0062-7
Chalob DF, Maryoosh AA, Esa ZM, Abbud EN. A New Block Cipher For Image Encryption Based On Multi Chaotic Systems. Telkomnika . 2020; 18(6): 2983. http://dx.doi.org/10.12928/telkomnika.v18i6.13746
Crainicu B. On invariance weakness in the KSAm algorithm. Procedia Technol. 2015; 19: 850–7. http://dx.doi.org/10.1016/j.protcy.2015.02.122
Salih HM, Mahdawi RSA. The security of RC4 algorithm using keys generation depending on user’s retina. Indones J Electr Eng Comput Sci . 2021; 24(1) :452- 463.http://dx.doi.org/10.11591/ijeecs.v24.i1.pp452-463
Satam IA, N. Shahab S, Kamel HA, Al-Hamadani MNA. Execution of a smart street lighting system for energy saving enhancement. Bull Electr Eng Inform. 2021; 10(4): 1884–92. http://dx.doi.org/10.11591/eei.v10i4.2924
Al-Maadeed TA, Hussain I, Anees A, Mustafa MT. A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes. Multimed Tools Appl. 2021; 80(16): 24801–22.http://dx.doi.org/10.1007/s11042-021-10695-5
Al-Bahrani AE, Kadhum NR. A New Cipher Based on Feistel Structure and Chaotic Maps. Baghdad Sci J. 2019 Mar. 17 [cited 2024 Feb. 5]; 16(1(Suppl.): 0270-0280. https://doi.org/10.21123/bsj.2019.16.1(Suppl.).0270
Overill RE. Codes and ciphers: Julius Caesar, the enigma, and the internet. J Logic Comput . 2002; 12(3): 543–543. http://dx.doi.org/10.1093/logcom/12.3.543
Hanif M, Iqbal N, Ur Rahman F, Khan MA, Ghazal TM, Abbas S, et al. A novel grayscale image encryption scheme based on the block-level swapping of pixels and the chaotic system. Sensors (Basel). 2022; 22(16): 6243. http://dx.doi.org/10.3390/s22166243
Irawan C, Moses Setiadi DRI, Rachmawanto EH, Sari CA, Doheir M. Hybrid encryption using confused and stream cipher to improved medical images security. J Phys Conf Ser. 2019; 1201(1): 012022. http://dx.doi.org/10.1088/1742-6596/1201/1/012022
Ahmed WD, Jawad M., Jawad ML. An effective color image encryption scheme based on double piecewise linear chaotic map method and RC4 algorithm. J Eng Sci Technol. 2021 16(2): 1319–1341.
Abdullah HA, Abdullah HN. FPGA implementation of color image encryption using a new chaotic map. Indonesian J Electr Comput Eng. 2019 Jan 1; 13(1): 129-[ahe?.https://doi.org/10.11591/ijeecs.v13.i1.pp129-137
Momeni Asl, A., Broumandnia, A., Mirabedini, S. J. Color image encryption using linear feedback shift registers by three dimensional permutation and substitution operations. International Journal of Nonlinear Analysis and Applications, 2021; 12 (Special Issue): 903-921. https://doi.org/10.22075/ijnaa.2021.5520
Downloads
Issue
Section
License
Copyright (c) 2024 Donia Fadil Chalob , Rusul Hussein Hasan , Farah Neamah Abbas
This work is licensed under a Creative Commons Attribution 4.0 International License.