Image Encryption Using Lorenz Chaotic System

Authors

  • Daniah Abul Qahar Shakir University of Anbar, Anbar, Iraq.
  • Ahmad Salim Middle Technical University
  • Seddiq Q. Abd Al-Rahman University of Anbar, Anbar, Iraq.
  • Ali Makki Sagheer University of Anbar, Anbar, Iraq.

DOI:

https://doi.org/10.51173/jt.v5i1.840

Keywords:

Data Security, Cryptography, Image Encryption, Chaos System, Lorenz Chaotic System, Pixel Destroy

Abstract

In the age of the Internet, a lot of images are circulated among users, and some of these images contain financial or personal information that requires confidentiality. Encryption algorithms existed for a long time, and the data used was focused on the text data, while the multimedia data was neglected for a long time. In addition, there are significant shortcomings in 3D image coding techniques. This paper proposed a method for image encrypted and decrypted electronically using the Lorenz chaotic system, the supposed algorithm was developed by using the three equations of the Lorenz system, before that, the image pixels are destroyed using reversible shifting and rotating processes to increase the randomness of the encrypted pixels and thus the difficulty of cracking the cipher. Then he supposed technique gave the following results: The average entropy calculation was (7.285) before image encryption and (7.9974) after image encryption with an average NPCR of (99.65%) and UACI was (30.35%) this confirms that the proposed method is reliable and applicable. Moreover, the suggested technique gives the best outcomes when compared to other similar works.

Downloads

Download data is not yet available.

References

S. R. Maniyath and V. Thanikaiselvan, “An efficient image encryption using deep neural network and chaotic map,” Microprocessors and Microsystems, vol. 77, p. 103134, 2020.

M. T. Gaata and F. F. Hantoosh, “An efficient image encryption technique using chaotic logistic map and rc4 stream cipher,” International Journal of Modern Trends in Engineering and Research, vol. 3, no. 9, pp. 213–218, 2016.

S. Ahadpour, Y. Sadra, and Z. ArastehFard, “A novel chaotic encryption scheme based on pseudorandom bit padding,” arXiv preprint arXiv:1201.1449, 2012.

C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, “Analytical study of hybrid techniques for image encryption and decryption,” Sensors, vol. 20, no. 18, p. 5162, 2020.

A. Xing-Xing, S. Ke-Hui, H. Shao-Bo, and W. Hui-Hai, “Design and application of multi-scroll chaotic attractors based on simplified Lorenz system,” Acta Physica Sinica, vol. 63, no. 12, 2014.

G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.

G. Alvarez, F. Montoya, M. Romera, and G. Pastor, “Cryptanalysis of a discrete chaotic cryptosystem using external key,” Physics Letters A, vol. 319, no. 3–4, pp. 334–339, 2003.

M. Zeghid, M. Machhout, L. Khriji, A. Baganne, and R. Tourki, “A modified AES based algorithm for image encryption,” International Journal of Computer and Information Engineering, vol. 1, no. 3, pp. 745–750, 2007.

C. He, K. Ming, Y. Wang, and Z. J. Wang, “A deep learning based attack for the chaos-based image encryption,” arXiv preprint arXiv:1907.12245, 2019.

M. W. Fakhr, “A multi-key compressed sensing and machine learning privacy preserving computing scheme,” in 2017 5th International Symposium on Computational and Business Intelligence (ISCBI), 2017, pp. 75–80.

F. Hu, J. Wang, X. Xu, C. Pu, and T. Peng, “Batch image encryption using generated deep features based on stacked autoencoder network,” Mathematical Problems in Engineering, vol. 2017, 2017.

A. N. Kengnou Telem, H. B. Fotsin, and J. Kengne, “Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems,” Multimedia Tools and Applications, vol. 80, no. 12, pp. 19011–19041, 2021.

M. Tanveer et al., “Multi-images encryption scheme based on 3D chaotic map and substitution box,” IEEE Access, vol. 9, pp. 73924–73937, 2021.

M. A. Lone and S. Qureshi, “RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher,” Optik, vol. 260, p. 168880, 2022.

F. Masood, J. Ahmad, S. A. Shah, S. S. Jamal, and I. Hussain, “A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map,” Entropy, vol. 22, no. 3, p. 274, 2020.

T. Li, W. Yan, and Z. Chi, “A new image encryption algorithm based on optimized Lorenz chaotic system,” Concurrency and Computation: Practice and Experience, vol. 34, no. 13, p. e5902, 2022.

O. M. Al-Hazaimeh, M. F. Al-Jamal, N. Alhindawi, and A. Omari, “Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys,” Neural Computing and Applications, vol. 31, no. 7, pp. 2395–2405, 2019.

Z. Wu, P. Pan, C. Sun, and B. Zhao, “Plaintext-related dynamic key chaotic image encryption algorithm,” Entropy, vol. 23, no. 9, p. 1159, 2021.

I. Grigorenko and E. Grigorenko, “Chaotic dynamics of the fractional Lorenz system,” Physical review letters, vol. 91, no. 3, p. 34101, 2003.

J. Ahmad, F. Masood, S. A. Shah, S. S. Jamal, and I. Hussain, “A novel secure occupancy monitoring scheme based on multi-chaos mapping,” Symmetry, vol. 12, no. 3, p. 350, 2020.

Lorenz system chaotic attractors

Downloads

Published

2023-04-03

How to Cite

Daniah Abul Qahar Shakir, Ahmad Salim, Seddiq Q. Abd Al-Rahman, & Ali Makki Sagheer. (2023). Image Encryption Using Lorenz Chaotic System. Journal of Techniques, 5(1), 122–128. https://doi.org/10.51173/jt.v5i1.840

Issue

Section

Engineering

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.