Abstract
Unauthorized access to images in the digital age requires robust encryption techniques. This paper introduces a new two-layer colour image encryption algorithm that uses the chaotic dynamics of the Lorenz and Rossler systems. By processing XOR by deciding with chaotic random integers (CRINs) derived from these systems, the algorithm achieves a high level of protection for colour images. Each layer of randomness and inherent sensitivity to the initial conditions of chaotic systems makes encryption stronger for colour images. The decryption in the second party follows the same steps of encryption, ensuring efficient recovery of the original image from the encrypted image. The built-in encrypted layers form a highly secure image that is resistant to various types of attacks and other important advantages, such as enhanced security and computational efficiency, making it suitable for protecting images in diverse applications.
Keywords
Image encryption, chaotic systems, Stream and block ciphering, PSNR, SSIM, MSE
References
Abdullah, Hikmat N, Saad S Hreshee, and Ameer K Jawad. 2015. “Design of Efficient Noise Reduction Scheme for Secure Speech Masked by Chaotic Signals.” Journal of American Science 11(7): 49–55.
Abdullah, Hikmat N, Saad S Hreshee, Gholamreza Karimi, and Ameer K Jawad. 2022. “Performance Improvement of Chaotic Masking System Using Power Control Method.” In International Middle Eastern Simulation and Modelling Conference 2022, MESM 2022, , 19–23.
Al-Musawi, Wisal Adnan, Mohammed Abd Ali Al-Ibadi, and Wasan A. Wali. 2023. “Artificial Intelligence Techniques for Encrypt Images Based on the Chaotic System Implemented on Field-Programmable Gate Array.” IAES International Journal of Artificial Intelligence 12(1): 347–56.
Alexan, Wassim et al. 2023. “Color Image Encryption Through Chaos and KAA Map.” IEEE Access PP: 1.
Alsaabri, Huda H., and Saad S. Hreshee. 2021. “Robust Image Encryption Based on Double Hyper Chaotic Rabinovich System.” 7th International Conference on Contemporary Information Technology and Mathematics, ICCITM 2021: 146–52.
Ameen, Mohammed Jabbar Mohammed, and Saad Saffah Hasson Hreshee. 2022. “Hyperchaotic Modulo Operator Encryption Technique for Massive Multiple Input Multiple Output Generalized Frequency Division Multiplexing System.” International Journal on Electrical Engineering and Informatics 14(2): 311–29.
Ameer K. Jawad, Wa’il a. H. Hadi, and Hyayder F. Y. Husseain. 2016. Enhancement of Image Transmission Using Chaotic Interleaver over Wireless Sensor Network. www.ijntr.org.
Bakurov, Illya et al. 2022. “Structural Similarity Index (SSIM) Revisited: A Data-Driven Approach.” Expert Systems with Applications 189: 116087.
Fetteha, Marwan A., Wafaa S. Sayed, Lobna A. Said, and Ahmed G. Radwan. 2023. “Chaos-Based Image Encryption Using DNA Manipulation and a Modified Arnold Transform.” (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 13761 LNAI(December): 3–15. http://dx.doi.org/10.1007/978-3-031-21595-7_1.
Halboos, Estabraq Hussein Jasim, and Abbas M. Albakry. 2023. “Improve Steganography System Using Agents Software Based on Statistical and Classification Technique.” Bulletin of Electrical Engineering and Informatics 12(3): 1595–1606.
Hamood, Laith Abdulhussien, and Mahmood Khalel Ibrahem. 2018. “Video Encryption Based on Chaotic System and Stream Cipher.” Iraqi Journal of Information & Communications Technology 1(2): 33–40.
Hussein, E.A.R. Ehab AbdulRazzaq E.A.R., M.K. Murtadha K. Khashan, and A.K. Ameer K. Jawad. 2020. “A High Security and Noise Immunity of Speech Based on Double Chaotic Masking.” International Journal of Electrical and Computer Engineering 10(4): 4270–78.
Jawad, A.K., H.N. Abdullah, and S.S. Hreshee. 2018. “Secure Speech Communication System Based on Scrambling and Masking by Chaotic Maps.” In IEEE, International Conference on Advances in Sustainable Engineering and Applications, ICASEA 2018 – Proceedings, , 7–12.
Kari, Ahmad Pourjabbar, and Taher Ghomian. 2023. “An e Cient Image Cryptosystem Based on the Residue Number System and Hybrid Chaotic Maps.” research square: 0–22.
Long, Min, and Li Tan. 2010. “A Chaos-Based Data Encryption Algorithm for Image/Video.” 2010 International Conference on MultiMedia and Information Technology, MMIT 2010 1(5): 172–75.
Mahalingam, Hemalatha et al. 2023. “Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective.” Mathematics11(2): 1–25.
Mahdi, Amina, Ameer K Jawad, and Saad S Hreshee. 2016. “Digital Chaotic Scrambling of Voice Based on Duffing Map.” International Journal of Information and Communication Sciences 1(2): 16–21.
Mfungo, Dani Elias, Xianping Fu, Yongjin Xian, and Xingyuan Wang. 2023. “A Novel Image Encryption Scheme Using Chaotic Maps and Fuzzy Numbers for Secure Transmission of Information.” Applied Sciences 13(12): 1–25.
Rahman, Shahid et al. 2023. “A Huffman Code LSB Based Image Steganography Technique Using Multi-Level Encryption and Achromatic Component of an Image.” Scientific Reports 13(1): 1–20. https://doi.org/10.1038/s41598-023-41303-1.
Satish, E G et al. 2023. “Multimedia Multilevel Security by Integrating Steganography and Cryptography Techniques.” 01012: 1–13.
Shakir, Huda R., Sadiq A. Mehdi, and Anwar A. Hattab. 2023. “A New Four-Dimensional Hyper-Chaotic System for Image Encryption.” International Journal of Electrical and Computer Engineering 13(2): 1744–56.
Wang, Xingyuan, and Yining Su. 2020. “Color Image Encryption Based on Chaotic Compressed Sensing and Two-Dimensional Fractional Fourier Transform.” Scientific Reports 10(1).
Wen, Heping, and Yiting Lin. 2023. “Cryptanalyzing an Image Cipher Using Multiple Chaos and DNA Operations.” Journal of King Saud University – Computer and Information Sciences 35(7): 1–9. https://doi.org/10.1016/j.jksuci.2023.101612.
Witwit, Noor Haider, and Ali Yakoob Al-Sultan. 2023. “A High-Security Image Utilizing Triple Generators for the Rabinovitch System.” International Journal of Intelligent Engineering & Systems 16(4).
Yasser, Ibrahim, Mohamed A. Mohamed, Ahmed S. Samra, and Fahmi Khalifa. 2020. “A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.” Entropy 22(11): 1–23.