An approach for encrypting images using a four-dimensional logistic map

Authors

  • Baydaa-Jaffer Al-khafaji Computer Science Department College of Education for Pure Science/ Ibn Al-Haitham University of Baghdad, IRAQ

DOI:

https://doi.org/10.31185/wjps.343

Keywords:

AES, chaotic maps, chaotic flows, PSNR, NPCR, UACI

Abstract

Encrypting image transmission has been one of the most complex challenges with communication technology ever. Millions of people utilize and share photographs via the internet for personal and professional purposes. One approach to secure picture transfer over the network is to use encryption techniques to transform the original picture into an unreadable or garbled version. Several novel and encouraging possibilities for creating secure Image data encryption techniques are presented by cryptographic algorithms grounded in chaotic logistic theory. Developing a foolproof method for encrypting both black-and-white and color image is the primary focus of this work. Both grayscale and color images can be encrypted using the keys generated by combining the chaotic logistic with the image's density in the first stage of the proposed system's encryption process. The original image can then be recovered in the second stage, which is the inverse of the encryption process. Two publicly available standard grayscale and color photographs were analyzed to evaluate the suggested approach. Peak signal-to-noise ratio (PSNR), unified average changing intensity (UACI), and number of pixels change rate (NPCR) were found to be 6.6268, 51.3011, and 100, respectively, according to the test findings. 

References

W. A. Shukur, A. Badrulddin, and M. K. Nsaif, "A proposed encryption technique of different texts using circular link lists," Periodicals of Engineering and Natural Sciences, vol. 9, pp. 1115-1123, 2021

FA Abdullatif, WA Shukur Blind Color Image Steganography in Spatial Domain - Ibn AL-Haitham Journal For Pure and Applied Science 2011,24(1),338-346cy44

Baydaa Jaffer Al-Khafaji, Abdul Monem S Rahma. Proposed new modification of AES algorithm for data security, Global Journal of Engineering and Technology Advances, , (2023) Vol. 3, No. 12, pp 117–122

B.J AlKhafaji, M Salih, S Shnain, Z Nabat,segmenting video frame images using genetic algorithms,2020 Periodicals of Engineering and Natural Sciences 8 (2), 1106-1114.

M. Francois and D. Defour, “A pseudo-random bit generator using three chaotic logistic maps,” HAL Sci. Ouvert., pp. 1–22, 2013.

S. Lian, “A block cipher based on chaotic neural networks,” Neurocomputing, vol. 72, pp. 1296–1301, 2009, doi: 10.1016/j.neucom.2008.11.005.

W. H. Abdulsalam, R. S. Alhamdani, and M. N. Abdullah, "Speech Emotion Recognition Using Minimum Extracted Features," 1st Annual International Conference on Information and Sciences (AiCIS), pp. 58-61, 2018.

Y. Dong, X. Huang, Q. Mei, and Y. Gan, “Self-adaptive image encryption algorithm based on quantum logistic map,” Secur. Commun. Networks, vol. 2021, pp. 1–12, Jan. 2021, doi: 10.1155/2021/6674948.

B.J AlKhafaji, MA Salih, SAH Shnain, OA Rashid, AA Rashid, MT Hussein,2021, Applying the Artificial Neural Networks with Multiwavelet Transform on Phoneme recognition ,Journal of Physics: Conference Series 1804 (1), 012040.

N. Masuda, G. Jakimoski, K. Aihara, and L. Kocarev, "Chaotic block ciphers: from theory to practical algorithms," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 53, no. 6, pp. 1341-1352, 2006.

May A. Salih , Shaymaa AbdulHussein Shnain , Baydaa Jaffer AlKhafaji, Using RC6 in embedding information in spatial parts of image construction, Turkish Journal of Computer and Mathematics Education,2021,12,(11).

Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System.WA Shukur, ZMJ Kubba International Journal of Advances in Soft Computing & Its Applications 2023, 15 (2),

S. SH. Hussein, S. SH. Altyar, L. A. Tawfeeq, and E. S. Harba, Reconstruction of Three-Dimensional Objects from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation, Baghdad Science Journal, 2020, 17(3):899–908, 2020.

Bushra Kh AlSaidi, Baydaa Jaffer Al-Khafaji, Suad Abed Al Wahab, Content Based Image clustering Technique Using Statistical Features and Genetic Algorithm. Engineering, Technology & Applied Science Research 2019,9(2).

Iptehaj Alhakam, Nassir H Salman, An Improved Probability Density Function (PDF) for Face Skin Detection, Iraqi Journal of Science, 2022,Vol. 63, No. 10, pp: 4460-4473, DOI: 10.24996/ijs..63.10.31

H. S. Harba,E.S. Harba, S. SH. Hussein, and M. K. Farttoos, “ Improving accuracy of CADx system by hybrid PCA and backpropagation”, IEEEXplore,2018.

] B.J AlKhafaji, M Salih, S Shnain, Z Nabat ,improved technique for hiding data in a colored and a monochrome images, Periodicals of Engineering and Natural Sciences , 2020, 8 (2), 1000-1010

Prof. Abdul Monem S. RahmaPh.D Baydaa Jaffer Al-Khafaji, Optimizing Symmetric vs. Asymmetric Image encryption mathematically, International Journal of Advances in Engineering and Management (IJAEM) ,2022,4(9).

D. Roohbakhsh and M. Yaghoobi, "Color Image Encryption using Hyper Chaos Chen," International Journal of Computer Applications, vol. 110, pp. 9-12, 2015.

N. Ramadan, H. E. H. Ahmed, S. E. Elkhamy and F. E. Abd El-Samie, "Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map," American Journal of Signal Processing, vol. 6, pp. 1-13, 2016..

A. K. A. Hassan, "Proposed Hyperchaotic System for Image Encryption," (IJACSA) International Journal of Advanced Computer Science and Applications,, vol. 7, pp. 37-40, 2016.

Y. Alghamdi, A. Munir, and J. Ahmad, “A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution,” Entropy, vol. 24, no. 10, pp. 1–25, 2022, doi: 10.3390/e24101344.

Downloads

Published

2024-06-30

Issue

Section

Computer

How to Cite

Al-khafaji, B.-J. (2024). An approach for encrypting images using a four-dimensional logistic map. Wasit Journal for Pure Sciences , 3(2), 140-145. https://doi.org/10.31185/wjps.343