A Synergistic Approach for Enhancing Image Encryption by Implementing Double Random Permutation and Memristive Chaos

Main Article Content

Ritu Sharma
Sunil Kumar

Abstract

The growing academic interest in the secure transmission of optical digital images has led to a surge in awareness of information security within photonics circumstances. This work presents a hybrid encryption strategy based on the memristor hyperchaotic system and a double random transform for pictures in the frequency and spatial domains. This study presents a robust and secure picture encryption technique that combines compressed sensing, double random phase encoding (DRPE), and Lorenz map. We also make doublerandom-phase masks using Lorenz maps, which enhance the unpredictability and key sensitivity, thereby improving the security of the encryption method. Experimental studies utilize a range of performance metrics, such as the PSNR, NPCR, MSE, and SSIM, to show the value of the suggested approach.

Downloads

Download data is not yet available.

Article Details

Section

Articles

How to Cite

[1]
Ritu Sharma and Sunil Kumar , Trans., “A Synergistic Approach for Enhancing Image Encryption by Implementing Double Random Permutation and Memristive Chaos”, IJEAT, vol. 14, no. 4, pp. 5–14, Apr. 2025, doi: 10.35940/ijeat.D4577.14040425.
Share |

References

Liang X, Zhang C, Luo Y, Wang X, Qiu K. Secure encryption and key management for OFDM-PON based on chaotic Hilbert motion. Journal of Lightwave Technology. 2023 Mar 15;41(6):1619–25. Doi: https://doi.org/10.1109/jlt.2022.3226768

Luo Y, Zhang C, Wang X, Liang X, Qiu K. Robust key update with controllable accuracy using support vector machine for secure OFDMA-PON. Journal of Lightwave Technology .2023 Jul 15;41(14):4663–71. Doi: https://doi.org/10.1109/jlt.2023.3244202

Wu T, Zeng W, Liu Y, Song S, Zhao L, Chen C, et al. Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping. Optics Letters . 2023 Jan24;48(3):684. Doi: https://doi.org/10.1364/ol.480981

Li C, Lin D, Lü J, Hao F. Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia.2018 Oct1;25(4):46–56. Doi: https://doi.org/10.1109/mmul.2018.2873472

Li X, Zhou L, Tan F. An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks. Soft Computing. 2021 Nov 22;26(2): 511–25. Doi: https://doi.org/10.1007/s00500-021-06500-y

Tiwari D, Mondal B, Singh SK, Koundal D. Lightweight encryption for privacy protection of data transmission in cyber physical systems. Cluster Computing. 2022 Oct 26;26(4):2351–65. Doi: https://doi.org/10.1007/s10586-022-03790-1

Ding Y, Liu W, Wang H, Sun K. A new class of discrete modular memristors and application in chaotic systems. The European Physical Journal Plus. 2023 Jul 21;138(7). Doi: https://doi.org/10.1140/epjp/s13360-023-04242-4

Liu X, Sun K, Wang H, He S. A class of novel discrete memristive chaotic map. Chaos Solitons & Fractals. 2023 Sep 1;174:113791. Doi: https://doi.org/10.1016/j.chaos.2023.113791

Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons & Fractals. 2021 Nov 1;152:111318. Doi: https://doi.org/10.1016/j.chaos.2021.111318

Chen L, Li C, Li C. Security measurement of a medical communication scheme based on chaos and DNA coding. Journal of Visual Communication and Image Representation. 2022 Feb 1;83:103424. Doi: https://doi.org/10.1016/j.jvcir.2021.103424

Hu M, Li J, Di X. Quantum image encryption scheme based on 2D $varvec{Sine^{2}-Logistic}$ chaotic map. Nonlinear Dynamics. 2022 Oct 23;111(3):2815–39. Doi: https://doi.org/10.1007/s11071-022-07942-1

Man Z, Li J, Di X, Zhang R, Li X, Sun X. Research on cloud data encryption algorithm based on bidirectional activation neural network. Information Sciences. 2023 Apr 1;622:629–51 Doi: https://doi.org/10.1016/j.ins.2022.11.089

Slimane NB, Aouf N, Bouallegue K, Machhout M. A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model. Multimedia Tools and Applications. 2018 Jun 4;77(23):30993–1019. Doi: https://doi.org/10.1007/s11042-018-6145-8

Abduljabbar ZA, Abduljaleel IQ, Ma J, Sibahee M a. A, Nyangaresi VO, Honi DG, et al. Provably secure and fast color image encryption algorithm based on S-Boxes and Hyperchaotic Map. IEEE Access. 2022 Jan 1;10:26257–70. Doi: https://doi.org/10.1109/access.2022.3151174

Kumari P, Mondal B. An encryption scheme based on grain stream cipher and Chaos for privacy protection of image data on IoT network. Wireless Personal Communications. 2023 Apr 3;130(3):2261–80. Doi: https://doi.org/10.1007/s11277-023-10382-8

Andono PN, Setiadi DRIM. Improved Pixel and Bit Confusion-Diffusion based on mixed chaos and hash operation for image encryption. IEEE Access. 2022 Jan 1;10:115143–56. Doi: https://doi.org/10.1109/access.2022.3218886

Zahid AH, Arshad MJ, Ahmad M, Soliman NF, El-Shafai W. Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking. Computers, Materials & Continua/Computers, Materials & Continua (Print). 2023 Jan 1;75(2):3011–26. Doi: https://doi.org/10.32604/cmc.2023.037516

Manzoor A, Zahid AH, Hassan MT. A new dynamic substitution box for data security using an innovative Chaotic map. IEEE Access. 2022 Jan 1;10:74164–74. Doi: https://doi.org/10.1109/access.2022.3184012

Mondal B, Singh JP. A lightweight image encryption scheme based on chaos and diffusion circuit. Multimedia Tools and Applications. 2022 Jan 8;81(24):34547–71. Doi: https://doi.org/10.1007/s11042-021-11657-7.

Durafe A, Patidar V. Comparative analysis of chaotic image encryption using improved 2D Gingerbreadman Map and Chirikov Standard Map. 2022 International Conference for Advancement in Technology (ICONAT) .2022Jan21. Doi: https://doi.org/10.1109/iconat53423.2022.9725986

Wei D, Jiang M, Deng Y. A secure image encryption algorithm based on hyper-chaotic and bit-level permutation. Expert Systems With Applications. 2023 Mar1;213:119074. Doi: https://doi.org/10.1016/j.eswa.2022.119074

Xian Y, Wang X. Fractal sorting matrix and its application on chaotic image encryption. Information Sciences. 2021 Feb 1;547:1154–69. Doi: https://doi.org/10.1016/j.ins.2020.09.055

Wang X, Yang J. A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Information Sciences. 2021 Aug 1;569:217–40. Doi: https://doi.org/10.1016/j.ins.2021.04.013

Chai X, Wang Y, Chen X, Gan Z, Zhang Y. TPE-GAN: Thumbnail preserving encryption based on GAN with key. IEEE Signal Processing Letters. 2022 Jan 1;29:972–6. Doi: https://doi.org/10.1109/lsp.2022.3163685

Kumari P, Mondal B. Lightweight image encryption algorithm using NLFSR and CBC mode. The Journal of Supercomputing. 2023 May 29;79(17):19452–72. Doi: https://doi.org/10.1007/s11227-023-05415-9

Liu W, Sun K, He S, Wang H. The Parallel Chaotification Map and its application. IEEE Transactions on

Circuits and Systems I Regular Papers. 2023 Sep 1;70(9):3689–98. Doi: https://doi.org/10.1109/tcsi.2023.3279371

Wang Z, Zhuang L, Yu J, Jiang H, Xu W, Shi X. Hidden Dynamics of a New Jerk-like System with a Smooth Memristor and Applications in Image Encryption. Mathematics. 2023 Nov 10;11(22):4613. Doi: https://doi.org/10.3390/math11224613

USC School of Cinematic Arts. Leena. USC SIPI; n.d. [cited 2024 Sep 25]. https://sipi.usc.edu/database/database.php?volume=misc&image=12#top

Suneetha, CH., Surendra, T., & Neelima, CH. (2020). Implementation of Double Fold Text Encryption Based on Elliptic Curve Cryptography (ECC) with Digital Signature. In International Journal of Recent Technology and Engineering (IJRTE) (Vol. 8, Issue 5, pp. 3840–3846). Doi: https://doi.org/10.35940/ijrte.e6446.018520

Munish Mehta, Vijay Goyar, Vishnu Bairwa, Security and Authentication through Text Encryption and Decryption based on Substitution Method. (2019). In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 9S, pp. 112–115). Doi: https://doi.org/10.35940/ijitee.i1017.0789s19

Jaswanth, P. V., Reddy, B. R., Kumar, M. S. P., & Priyadarsini, M. J. P. (2020). Color Image Encryption using AES and RSA. In International Journal of Engineering and Advanced Technology (Vol. 9, Issue 5, pp. 547–550). Doi: https://doi.org/10.35940/ijeat.e9648.069520

Muthukrishnan, Dr. R., & Prakash, N. U. (2023). Validate Model Endorsed for Support Vector Machine Alignment with Kernel Function and Depth Concept to Get Superlative Accurateness. In International Journal of Basic Sciences and Applied Computing (Vol. 9, Issue 7, pp. 1–5). Doi: https://doi.org/10.35940/ijbsac.g0486.039723

Nagar, K., & Chawla, M. P. S. (2023). A Survey on Various Approaches for Support Vector Machine Based Engineering Applications. In International Journal of Emerging Science and Engineering (Vol. 11, Issue 11, pp. 6–11). Doi: https://doi.org/10.35940/ijese.k2555.10111123

Most read articles by the same author(s)

1 2 3 4 5 6 7 8 9 10 > >>