An Efficient Image Encryption Method Based on Enhanced Josephus Problem and a Non-Invertible Economic Map
DOI:
https://doi.org/10.47839/ijc.22.4.3357Keywords:
Josephus problem, Image encryption, Two-dimensional chaotic map, Chaos-based cryptographyAbstract
As an increasing number of digital images are created and transmitted over the internet, there is growing concern over their unauthorized use, which has a big impact on both security and privacy concerns. In this research, we provide a fast and secure image encryption scheme by using an enhanced Josephus problem and two-dimensional non-invertible economic chaotic map (2D-ECM) to safely and covertly protect digital image information throughout public channel transmission. First, the initial values of the 2D-ECM map are generated based on Secure Hash Algorithm (SHA-256) and the input secret key. Then, the Josephus problem is enhanced by substituting the extract operation with location exchange and dynamic start location and step size is employed to scramble the image pixels. In order to integrate the confusion process and diffusion process, the enhanced Josephus problem is utilized indirectly to choose two random columns from the scrambled image and random image to XOR them with the current column. The evaluation results prove that the proposed image cryptosystem is more efficient compared to existing cryptosystems.
References
M. T. Elkandoz and W. Alexan, “Image encryption based on a combination of multiple chaotic maps,” Multimed. Tools Appl., pp. 1–22, 2022, https://doi.org/10.1007/s11042-022-12595-8.
Y. Xian and X. Wang, “Fractal sorting matrix and its application on chaotic image encryption,” Inf. Sci. (Ny)., vol. 547, pp. 1154–1169, https://doi.org/10.1016/j.ins.2020.09.055.
M. Shariatzadeh, M. J. Rostami, and M. Eftekhari, “Proposing a novel dynamic AES for image encryption using a chaotic map key management approach,” Optik (Stuttg)., vol. 246, no. August, p. 167779, 2021, https://doi.org/10.1016/j.ijleo.2021.167779.
G. Spasova and M. Karova, “A new secure image encryption model based on symmetric key,” Proceedings of the 2021 International Conference on Biomedical Innovations and Applications (BIA), 2022, vol. 1, pp. 107–110. https://doi.org/10.1109/BIA52594.2022.9831258.
Z. Chen and G. Ye, “An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing,” Optik (Stuttg)., vol. 267, p. 169676, 2022, https://doi.org/10.1016/j.ijleo.2022.169676.
T. S. Ali and R. Ali, “A new chaos based color image encryption algorithm using permutation substitution and Boolean operation,” Multimed. Tools Appl., vol. 79, no. 27, pp. 19853–19873, 2020, https://doi.org/10.1007/s11042-020-08850-5.
M. H. Ahmed, A. K. Shibeeb, and F. H. Abbood, “An efficient confusion-diffusion structure for image encryption using plain image related Henon map,” Int. J. Comput., vol. 19, issue 3, pp. 464–473, 2020, https://doi.org/10.47839/ijc.19.3.1895.
C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949, https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.
B. Zolfaghari and T. Koshiba, “Chaotic image encryption: State-of-the-art, ecosystem, and future roadmap,” Appl. Syst. Innov., vol. 5, no. 3, p. 57, 2022, https://doi.org/10.3390/asi5030057.
J. Yu, W. Xie, Z. Zhong, and H. Wang, “Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation,” Chaos, Solitons & Fractals, vol. 162, p. 112456, 2022, https://doi.org/10.1016/j.chaos.2022.112456.
J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” Int. J. Bifurc. Chaos, vol. 8, no. 6, pp. 1259–1284, 1998. https://doi.org/10.1142/S021812749800098X.
E. Solak, C. Çokal, O. T. Yildiz, and T. Biyikoğlu, “Cryptanalysis of Fridrich’s chaotic image encryption,” Int. J. Bifurc. Chaos, vol. 20, no. 5, pp. 1405–1413, 2010. https://doi.org/10.1142/S0218127410026563.
S. Amina and F. K. Mohamed, “An efficient and secure chaotic cipher algorithm for image content preservation,” Commun. Nonlinear Sci. Numer. Simul., vol. 60, pp. 12–32, 2018, https://doi.org/10.1016/j.cnsns.2017.12.017.
C. Pak and L. Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017, https://doi.org/10.1016/j.sigpro.2017.03.011.
J. Chen, F. Han, W. Qian, Y.-D. Yao, and Z.-L. Zhu, “Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map,” Nonlinear Dyn., vol. 93, no. 4, pp. 2399–2413, 2018, https://doi.org/10.1007/s11071-018-4332-9.
Y. Li, C. Wang, and H. Chen, “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation,” Opt. Lasers Eng., vol. 90, pp. 238–246, 2017, https://doi.org/10.1016/j.optlaseng.2016.10.020.
X. Wang, Q. Wang, and Y. Zhang, “A fast image algorithm based on rows and columns switch,” Nonlinear Dyn., vol. 79, no. 2, pp. 1141–1149, 2015, https://doi.org/10.1007/s11071-014-1729-y.
M. Z. Talhaoui, X. Wang, and A. Talhaoui, “A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme,” Vis. Comput., vol. 37, no. 7, pp. 1757–1768, 2021, https://doi.org/10.1007/s00371-020-01936-z.
X. Wang and L. Liu, “Application of chaotic Josephus scrambling and RNA computing in image encryption,” Multimed. Tools Appl., vol. 80, no. 15, 2021, https://doi.org/10.1007/s11042-020-10209-9.
G. Yang, H. Jin, and N. Bai, “Image encryption using the chaotic Josephus matrix,” Math. Probl. Eng., vol. 2014, pp. 1–13, 2014, https://doi.org/10.1155/2014/632060.
A. K. Singh and A. Mohan, Handbook of Multimedia Information Security: Techniques and Applications, 1st ed. Switzerland: Springer, 2019. https://doi.org/10.1007/978-3-030-15887-3.
W. Feng, J. Zhang, Q. Zhentao, and H. Yigang, “Cryptanalysis of image encryption algorithm based on variable step length Josephus traversing and DNA dynamic encoding,” Journal of Electronics and Information Technology, vol. 44, pp. 1–8, 2022, https://doi.org/10.11999/JEIT210791.
Y. Niu and X. Zhang, “A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation,” IEEE Access, vol. 8, pp. 22082–22093, 2020, https://doi.org/10.1109/ACCESS.2020.2970103.
X. Wang and H. Sun, “A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function,” Opt. Laser Technol., vol. 122, p. 105854, 2020, https://doi.org/10.1016/j.optlastec.2019.105854.
M. Naim, A. Ali Pacha, and C. Serief, “A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem,” Adv. Sp. Res., vol. 67, no. 7, pp. 2077–2103, 2021, https://doi.org/10.1016/j.asr.2021.01.018.
D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical image cryptosystem using dynamic Josephus sequence and chaotic-hash scrambling,” J. King Saud Univ. – Comput. Inf. Sci., vol. 34, issue 9, pp. 6818-6828, 2022, https://doi.org/10.1016/j.jksuci.2022.04.002.
A. Alkhayyat, M. Ahmad, N. Tsafack, M. Tanveer, D. Jiang, and A. A. Abd El-Latif, “A novel 4D hyperchaotic system assisted Josephus permutation for secure substitution-box generation,” J. Signal Process. Syst., vol. 94, no. 3, pp. 315-328, 2022, https://doi.org/10.1007/s11265-022-01744-9.
S. S. Askar and A. A. Elsadany, “Nonlinear dynamics of Cournot duopoly game: When one firm considers social welfare,” Discret. Dyn. Nat. Soc., vol. 2021, pp. 1–11, 2021, https://doi.org/10.1155/2021/6697341.
W. Stallings, Cryptography and Network Security: Principles and Practice, 4th ed. India: Pearson Upper Saddle River, 2006.
W. Feng, Y.-G. He, H.-M. Li, and C.-L. Li, “Cryptanalysis of the integrated chaotic systems based image encryption algorithm,” Optik (Stuttg)., vol. 186, pp. 449–457, 2019. https://doi.org/10.1016/j.ijleo.2018.12.103
B. Arpacı, E. Kurt, K. Çelik, and B. Ciylan, “Colored image encryption and decryption with a new algorithm and a hyperchaotic electrical circuit,” J. Electr. Eng. Technol., pp. 1–17, 2020, https://doi.org/10.1007/s42835-020-00393-x.
Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan, and P. Natarajan, “Local Shannon entropy measure with statistical tests for image randomness,” Inf. Sci. (Ny)., vol. 222, pp. 323–342, 2013, https://doi.org/10.1016/j.ins.2012.07.049.
S. Dhall, S. K. Pal, and K. Sharma, “A chaos-based probabilistic block cipher for image encryption,” J. King Saud Univ. – Comput. Inf. Sci., vol. 34, no. 1, pp. 1533–1543, 2022, https://doi.org/10.1016/j.jksuci.2018.09.015.
Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals Multidiscip. Journals Sci. Technol. J. Sel. Areas Telecommun., vol. 1, no. 2, pp. 31–38, 2011.
Q. Xu, K. Sun, C. Cao, and C. Zhu, “A fast image encryption algorithm based on compressive sensing and hyperchaotic map,” vol. 121, pp. 203–214, 2019, https://doi.org/10.1016/j.optlaseng.2019.04.011.
S. A. Jassim and A. K. Farhan, “Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things,” Int. J. Electr. Comput. Eng., vol. 12, no. 3, pp. 3287–3297, 2022, https://doi.org/10.11591/ijece.v12i3.pp3287-3297.
A. K. Shibeeb, M. H. Ahmed, and A. H. Mohammed, “A new chaotic image cryptosystem based on plaintext-associated mechanism and integrated confusion-diffusion operation,” Karbala Int. J. Mod. Sci., vol. 7, no. 3, 2021, https://doi.org/10.33640/2405-609X.3117.
Z. Qiao, S. El Assad, and I. Taralova, “Design of secure cryptosystem based on chaotic components and AES S-Box,” AEU – Int. J. Electron. Commun., vol. 121, p. 153205, 2020, https://doi.org/10.1016/j.aeue.2020.153205.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.