Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Khan, Jan Shera; * | Ahmad, Jawadb | Ahmed, Saygin Siddiqa | Siddiqa, Hafza Ayeshac | Abbasi, Saadullah Farooqd | Kayhan, Sema Koça
Affiliations: [a] Department of Electrical and Electronics, University of Gaziantep, Gaziantep, Turkey | [b] Glasgow Caledonian University, School of Engineering and Built Environment, Glasgow, United Kingdom | [c] Department of Electrical Engineering, HITEC University Taxila, Taxila, Pakistan | [d] Department of Electrical Engineering, ISRA University Islamabad, Islamabad, Pakistan
Correspondence: [*] Corresponding author. Jan Sher Khan, Department of Electrical and Electronics, University of Gaziantep, 27310 Gaziantep, Turkey. E-mail: [email protected].
Abstract: With the exponential growth of Internet technologies, digital information exchanged over the Internet is also significantly increased. In order to ensure the security of multimedia contents over the open natured Internet, data should be encrypted. In this paper, the quantum chaotic map is utilized for random vectors generation. Initial conditions for the chaos map are computed from a DNA (Deoxyribonucleic acid) sequence along with plaintext image through Secure Hash Algorithm-512 (SHA-512). The first two random vectors break the correlation among pixels of the original plaintext image via row and column permutation, respectively. For the diffusion characteristics, the permuted image is bitwise XORed with a random matrix generated through the third random vectors. The diffused image is divided into Least Significant Bit (LSB) and Most Significant Bits (MSBs) and Discrete Wavelet Transform (DWT) is applied to the carrier image. The HL and HH blocks of the carrier image are replaced with LSBs and MSBs of the diffused image for the generation of a visually encrypted image. The detailed theoretical analysis and experimental simulation of the designed scheme show that the proposed encryption algorithm is highly secured. Efficiency and robustness of the proposed visually image encryption scheme is also verified via a number of attack analyses, i.e., sensitivity attack analysis (> 99%), differential attack analysis (NPCR > 99, UACI > 33), brute force attack (almost 7.9892), statistical attack (correlation coefficient values are almost 0 or less than zero), noise tolerance, and cropping attack. Further security analyses such as encryption quality (ID ≅ 1564, DH = 3.000), homogeneity (0.3798), contrast (10.4820) and energy (0.0144) of the scheme are also evaluated.
Keywords: Light-weight, secure, visual image encryption, chaos, Deoxyribonucleic acid, permutation, diffusion
DOI: 10.3233/JIFS-182778
Journal: Journal of Intelligent & Fuzzy Systems, vol. 37, no. 2, pp. 2549-2561, 2019
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]