[PDF][PDF] A new four-dimensional hyper-chaotic system for image encryption

HR Shakir, SA Mehdi, AA Hattab - International Journal of Electrical …, 2023 - academia.edu
HR Shakir, SA Mehdi, AA Hattab
International Journal of Electrical and Computer Engineering, 2023academia.edu
Currently, images are very important with the rapid growth of communication networks.
Therefore, image encryption is a process to provide security for private information and
prevent unwanted access to sensitive data by unauthorized individuals. Chaos systems
provide an important role for key generation, with high randomization properties and
accurate performance. In this study, a new four-dimensional hyper-chaotic system has been
suggested that is used in the keys generation, which are utilized in the image encryption …
Currently, images are very important with the rapid growth of communication networks. Therefore, image encryption is a process to provide security for private information and prevent unwanted access to sensitive data by unauthorized individuals. Chaos systems provide an important role for key generation, with high randomization properties and accurate performance. In this study, a new four-dimensional hyper-chaotic system has been suggested that is used in the keys generation, which are utilized in the image encryption process to achieve permutation and substitution operations. Firstly, color bands are permuted using the index of the chaotic sequences to remove the high correlation among neighboring pixels. Secondly, dynamic S-boxes achieve the principle of substitution, which are utilized to diffuse the pixel values of the color image. The efficiency of the proposed method is tested by the key space, histogram, and so on. Security analysis shows that the proposed method for encrypting images is secure and resistant to different attacks. It contains a big key space of (2627) and a high sensitivity to a slight change in the secret key, a fairly uniform histogram, and entropy values nearby to the best value of 8. Moreover, it consumes a very short time for encryption and decryption.
academia.edu
以上显示的是最相近的搜索结果。 查看全部搜索结果