scholarly journals A New IOT Image Encryption Algorithm based on Chaotic Map

Webology ◽  
2021 ◽  
Vol 18 (2) ◽  
pp. 540-555
Author(s):  
Aqeel Mohsin Hamad

IOT information is always subjected to attacks, because component of the IOT system always unsupervised for most of time, also due to simplicity of wireless communication media, so there is high chance for attack, lastly, IOT is constraint device in terms of energy and computation complexity. So, different research and study are proposed to provide cryptographic algorithm. In this paper, a new image encryption is proposed based on anew chaotic map used to generate the binary key. The proposed map is three dimensional map, which is more sensitive to initial condition, each dimension of the 3-D chaotic map is depended on the others dimension, which may increase the randomness of the behavior trajectory for the next values and this gives the algorithm the ability to resist any attacks. At first, 3-D chaotic map is proposed, which is very sensitive for initial condition, the three dimension is depended on each other, which make the system more randomness, then the produced sequences is converted on binary key by using mod operation. The original image is scrambled based on mod operation to exchange the row and interleaving them, the same operations are repeated for column of the image. Later, the image is divided into blocks of size (8*8) and scrambled by using negative diagonal scan, the final pixels are converted into binary sequences, which are XORed with the generated key to produce the encrypted image. The experiment is performed on different images with different properties and tested with different metrics such as entropy, correlation, key sensitivity, number of pixel change rate (NPCR) and histogram of the original and encrypted images. T results shows that the proposed encryption algorithm is more efficient and outperform other methods.

Entropy ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. 504 ◽  
Author(s):  
Wei Zhang ◽  
Zhiliang Zhu ◽  
Hai Yu

In this paper, the properties of the classical confusion–substitution structure and some recently proposed pseudorandom number generators using one-dimensional chaotic maps are investigated. To solve the low security problem of the original structure, a new bit-level cellular automata strategy is used to improve the sensitivity to the cryptosystem. We find that the new evolution effects among different generations of cells in cellular automata can significantly improve the diffusion effect. After this, a new one-dimensional chaotic map is proposed, which is constructed by coupling the logistic map and the Bernoulli map (LBM). The new map exhibits a much better random behavior and is more efficient than comparable ones. Due to the favorable properties of the new map and cellular automata algorithm, we propose a new image-encryption algorithm in which three-dimensional bit-level permutation with LBM is employed in the confusion phase. Simulations are carried out, and the results demonstrate the superior security and high efficiency of the proposed scheme.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
S. S. Askar ◽  
A. A. Karawia ◽  
Ahmad Alshamrani

In literature, chaotic economic systems have got much attention because of their complex dynamic behaviors such as bifurcation and chaos. Recently, a few researches on the usage of these systems in cryptographic algorithms have been conducted. In this paper, a new image encryption algorithm based on a chaotic economic map is proposed. An implementation of the proposed algorithm on a plain image based on the chaotic map is performed. The obtained results show that the proposed algorithm can successfully encrypt and decrypt the images with the same security keys. The security analysis is encouraging and shows that the encrypted images have good information entropy and very low correlation coefficients and the distribution of the gray values of the encrypted image has random-like behavior.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1770
Author(s):  
Xiaoqiang Zhang ◽  
Xuangang Yan

To prevent the leakage of image content, image encryption technology has received increasing attention. Most current algorithms are only suitable for the images of certain types and cannot update keys in a timely manner. To tackle such problems, we propose an adaptive chaotic image encryption algorithm based on RNA and pixel depth. Firstly, a novel chaotic system, two-dimensional improved Logistic-adjusted-Sine map is designed. Then, we propose a three-dimensional adaptive Arnold transform for scrambling. Secondly, keys are generated by the hash values of the plain image and current time to achieve one-image, one-key, and one-time pad simultaneously. Thirdly, we build a pre-permuted RNA cube for 3D adaptive scrambling by pixel depth, chaotic sequences, and adaptive RNA coding. Finally, selective diffusion combined with pixel depth and RNA operations is performed, in which the RNA operators are determined by the chemical structure and properties of amino acids. Pixel depth is integrated into the whole procedure of parameter generation, scrambling, and diffusion. Experiments and algorithm analyses show that our algorithm has strong security, desirable performance, and a broader scope of application.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 23733-23746 ◽  
Author(s):  
Xingyuan Wang ◽  
Xiaoqiang Zhu ◽  
Yingqian Zhang

Sign in / Sign up

Export Citation Format

Share Document