A Synergistic Approach for Enhancing Image Encryption by Implementing Double Random Permutation and Memristive Chaos
Main Article Content
Abstract
The growing academic interest in the secure transmission of optical digital images has led to a surge in awareness of information security within photonics circumstances. This work presents a hybrid encryption strategy based on the memristor hyperchaotic system and a double random transform for pictures in the frequency and spatial domains. This study presents a robust and secure picture encryption technique that combines compressed sensing, double random phase encoding (DRPE), and Lorenz map. We also make doublerandom-phase masks using Lorenz maps, which enhance the unpredictability and key sensitivity, thereby improving the security of the encryption method. Experimental studies utilize a range of performance metrics, such as the PSNR, NPCR, MSE, and SSIM, to show the value of the suggested approach.
Downloads
Article Details
Section

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
How to Cite
References
Liang X, Zhang C, Luo Y, Wang X, Qiu K. Secure encryption and key management for OFDM-PON based on chaotic Hilbert motion. Journal of Lightwave Technology. 2023 Mar 15;41(6):1619–25. Doi: https://doi.org/10.1109/jlt.2022.3226768
Luo Y, Zhang C, Wang X, Liang X, Qiu K. Robust key update with controllable accuracy using support vector machine for secure OFDMA-PON. Journal of Lightwave Technology .2023 Jul 15;41(14):4663–71. Doi: https://doi.org/10.1109/jlt.2023.3244202
Wu T, Zeng W, Liu Y, Song S, Zhao L, Chen C, et al. Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping. Optics Letters . 2023 Jan24;48(3):684. Doi: https://doi.org/10.1364/ol.480981
Li C, Lin D, Lü J, Hao F. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia.2018 Oct1;25(4):46–56. Doi: https://doi.org/10.1109/mmul.2018.2873472
Li X, Zhou L, Tan F. An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks. Soft Computing. 2021 Nov 22;26(2): 511–25. Doi: https://doi.org/10.1007/s00500-021-06500-y
Tiwari D, Mondal B, Singh SK, Koundal D. Lightweight encryption for privacy protection of data transmission in cyber physical systems. Cluster Computing. 2022 Oct 26;26(4):2351–65. Doi: https://doi.org/10.1007/s10586-022-03790-1
Ding Y, Liu W, Wang H, Sun K. A new class of discrete modular memristors and application in chaotic systems. The European Physical Journal Plus. 2023 Jul 21;138(7). Doi: https://doi.org/10.1140/epjp/s13360-023-04242-4
Liu X, Sun K, Wang H, He S. A class of novel discrete memristive chaotic map. Chaos Solitons & Fractals. 2023 Sep 1;174:113791. Doi: https://doi.org/10.1016/j.chaos.2023.113791
Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons & Fractals. 2021 Nov 1;152:111318. Doi: https://doi.org/10.1016/j.chaos.2021.111318
Chen L, Li C, Li C. Security measurement of a medical communication scheme based on chaos and DNA coding. Journal of Visual Communication and Image Representation. 2022 Feb 1;83:103424. Doi: https://doi.org/10.1016/j.jvcir.2021.103424
Hu M, Li J, Di X. Quantum image encryption scheme based on 2D $varvec{Sine^{2}-Logistic}$ chaotic map. Nonlinear Dynamics. 2022 Oct 23;111(3):2815–39. Doi: https://doi.org/10.1007/s11071-022-07942-1
Man Z, Li J, Di X, Zhang R, Li X, Sun X. Research on cloud data encryption algorithm based on bidirectional activation neural network. Information Sciences. 2023 Apr 1;622:629–51 Doi: https://doi.org/10.1016/j.ins.2022.11.089
Slimane NB, Aouf N, Bouallegue K, Machhout M. A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimedia Tools and Applications. 2018 Jun 4;77(23):30993–1019. Doi: https://doi.org/10.1007/s11042-018-6145-8
Abduljabbar ZA, Abduljaleel IQ, Ma J, Sibahee M a. A, Nyangaresi VO, Honi DG, et al. Provably secure and fast color image encryption algorithm based on S-Boxes and Hyperchaotic Map. IEEE Access. 2022 Jan 1;10:26257–70. Doi: https://doi.org/10.1109/access.2022.3151174
Kumari P, Mondal B. An encryption scheme based on grain stream cipher and Chaos for privacy protection of image data on IoT network. Wireless Personal Communications. 2023 Apr 3;130(3):2261–80. Doi: https://doi.org/10.1007/s11277-023-10382-8
Andono PN, Setiadi DRIM. Improved Pixel and Bit Confusion-Diffusion based on mixed chaos and hash operation for image encryption. IEEE Access. 2022 Jan 1;10:115143–56. Doi: https://doi.org/10.1109/access.2022.3218886
Zahid AH, Arshad MJ, Ahmad M, Soliman NF, El-Shafai W. Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking. Computers, Materials & Continua/Computers, Materials & Continua (Print). 2023 Jan 1;75(2):3011–26. Doi: https://doi.org/10.32604/cmc.2023.037516
Manzoor A, Zahid AH, Hassan MT. A new dynamic substitution box for data security using an innovative Chaotic map. IEEE Access. 2022 Jan 1;10:74164–74. Doi: https://doi.org/10.1109/access.2022.3184012
Mondal B, Singh JP. A lightweight image encryption scheme based on chaos and diffusion circuit. Multimedia Tools and Applications. 2022 Jan 8;81(24):34547–71. Doi: https://doi.org/10.1007/s11042-021-11657-7.
Durafe A, Patidar V. Comparative analysis of chaotic image encryption using improved 2D Gingerbreadman Map and Chirikov Standard Map. 2022 International Conference for Advancement in Technology (ICONAT) .2022Jan21. Doi: https://doi.org/10.1109/iconat53423.2022.9725986
Wei D, Jiang M, Deng Y. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Systems With Applications. 2023 Mar1;213:119074. Doi: https://doi.org/10.1016/j.eswa.2022.119074
Xian Y, Wang X. Fractal sorting matrix and its application on chaotic image encryption. Information Sciences. 2021 Feb 1;547:1154–69. Doi: https://doi.org/10.1016/j.ins.2020.09.055
Wang X, Yang J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Information Sciences. 2021 Aug 1;569:217–40. Doi: https://doi.org/10.1016/j.ins.2021.04.013
Chai X, Wang Y, Chen X, Gan Z, Zhang Y. TPE-GAN: Thumbnail preserving encryption based on GAN with key. IEEE Signal Processing Letters. 2022 Jan 1;29:972–6. Doi: https://doi.org/10.1109/lsp.2022.3163685
Kumari P, Mondal B. Lightweight image encryption algorithm using NLFSR and CBC mode. The Journal of Supercomputing. 2023 May 29;79(17):19452–72. Doi: https://doi.org/10.1007/s11227-023-05415-9
Liu W, Sun K, He S, Wang H. The Parallel Chaotification Map and its application. IEEE Transactions on
Circuits and Systems I Regular Papers. 2023 Sep 1;70(9):3689–98. Doi: https://doi.org/10.1109/tcsi.2023.3279371
Wang Z, Zhuang L, Yu J, Jiang H, Xu W, Shi X. Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption. Mathematics. 2023 Nov 10;11(22):4613. Doi: https://doi.org/10.3390/math11224613
USC School of Cinematic Arts. Leena. USC SIPI; n.d. [cited 2024 Sep 25]. https://sipi.usc.edu/database/database.php?volume=misc&image=12#top
Suneetha, CH., Surendra, T., & Neelima, CH. (2020). Implementation of Double Fold Text Encryption Based on Elliptic Curve Cryptography (ECC) with Digital Signature. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 5, pp. 3840–3846). Doi: https://doi.org/10.35940/ijrte.e6446.018520
Munish Mehta, Vijay Goyar, Vishnu Bairwa, Security and Authentication through Text Encryption and Decryption based on Substitution Method. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 9S, pp. 112–115). Doi: https://doi.org/10.35940/ijitee.i1017.0789s19
Jaswanth, P. V., Reddy, B. R., Kumar, M. S. P., & Priyadarsini, M. J. P. (2020). Color Image Encryption using AES and RSA. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 5, pp. 547–550). Doi: https://doi.org/10.35940/ijeat.e9648.069520
Muthukrishnan, Dr. R., & Prakash, N. U. (2023). Validate Model Endorsed for Support Vector Machine Alignment with Kernel Function and Depth Concept to Get Superlative Accurateness. In International Journal of Basic Sciences and Applied Computing (Vol. 9, Issue 7, pp. 1–5). Doi: https://doi.org/10.35940/ijbsac.g0486.039723
Nagar, K., & Chawla, M. P. S. (2023). A Survey on Various Approaches for Support Vector Machine Based Engineering Applications. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 11, pp. 6–11). Doi: https://doi.org/10.35940/ijese.k2555.10111123