Abstract
This research introduces an innovative color image encryption algorithm that uses a 5D chaotic system and delta feature to modify the initial conditions during key generation. It employs diffusion and confusion processes across multiple stages. Furthermore, a single pixel value in the image is altered, and the delta features are recalculated to generate new encryption keys, Subsequently, the image is encrypted once again. The number of revised keys and the similarity between the encrypted images can be measured using the Hamming distance metric. The algorithm’s effectiveness in encrypting color images is validated through simulation, testing, and comparisons with existing methods, demonstrating its effectiveness in terms of encryption quality, computational efficiency, and resistance against various attacks. The presented approach offers a promising solution for secure color image encryption, suitable for applications requiring reliable protection of sensitive visual information. The evaluation results of the algorithm, A high NPCR value (99.6099), suggest that a sizable part of the pixels has been altered during encryption, which is desirable for security. The PSNR value (7.738) shows minimal information loss during encryption, crucial to maintaining image quality. An ideal UACI value (31.131%–35.225%) suggests minimal visual artifacts and distortion in the encrypted image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aljazaery, I.A., Alrikabi, H.S., Rabea, A.M.: Combination of hiding and encryption for data security. Int. J. Interact. Mobile Technol. 14(9), 34–47 (2020). https://doi.org/10.3991/ijim.v14i09.14173
Amigó, J.M., Kocarev, L., Szczepanski, J.: Theory and practice of chaotic cryptography. Phys. Lett. Sect. A: General, Atomic and Solid-State Phys. 366(3), 211–216 (2007). https://doi.org/10.1016/j.physleta.2007.02.021
Gatta, M.T., Al-Latief, S.T.A.: Medical image security using a modified chaos-based cryptography approach. J. Phys. Conf. Ser. 1003(1) (2018). https://doi.org/10.1088/1742-6596/1003/1/012036
Shakir, H.R., Mehdi, S.A., Hattab, A.A.: A dynamic S-box generation based on a hybrid method of new chaotic system and DNA computing. TELKOMNIKA 20(6), 1230 (2022). https://doi.org/10.12928/telkomnika. v20i6.23449
Mehdi, S.A., Jabbar, K.K., Abbood, F.H.: Image Encryption Based on the Novel 5d Hyper-Chaotic System Via Improved Aes Algorithm. Int. J. Civil Eng. Technol. 9(10), 1841–1855 (2018). Article ID: IJCIET_09_10_183
Fang, D., Sun, S.: A new secure image encryption algorithm based on a 5D hyperchaotic map. PLoS ONE 15(11), e0242110. https://doi.org/10.1371/journal.pone.0242110
Liang, Z., Qin, Q., Zhou, C.: Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. PLoS ONE 16(11), e0260014. https://doi.org/10.1371/journal.pone.0260014. eCollection 2021
Ahmed, S.S., Mehdi, S.A.: Image encryption algorithm based on a novel 5D chaotic system. In: 8th International Conference on Contemporary Information Technology and Mathematics, ICCITM (2022), pp. 249–255. https://doi.org/10.1109/ICCITM56309.2022.10031883
Bazzi, S., Ebert, J., Hogan, N., Sternad, D.: Stability and predictability in human control of complex objects. Chaos 28(10) (2018). https://doi.org/10.1063/1.5042090
Jasim, O.A., Hussein, K.A.: A hyper-chaotic system and adaptive substitution box (S-Box) for image encryption. Corpus ID: 244841618 https://doi.org/10.1109/ACA52198.2021.9626793
Wang, Z., Ma, J., Chen, Z., Zhang, Q.: A new chaotic system with positive topological entropy. Entropy 17(8), 5561–5579 (2015). https://doi.org/10.3390/e17085561
Mehdi, S.A.: Image encryption algorithm based on a novel 4D chaotic system. Int. J. Inf. Secur. Priv. 15(4), 118–131 (2021)
Lian, S.H., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A: Stat. Mech. Appl. 351(2), 645–661 (2005). https://doi.org/10.1016/j.physa.2005.01.001
Zeboon, H.T., Abdullah, H.N., Mansor, A.J.: Robust encryption system based on novel chaotic sequence. Res. J. Appl. Sci. Eng. Technol. 14(1), 48–55 (2017). https://doi.org/10.19026/rjaset.14.3988
Wu, X., Li, Y., Kurths, J.: A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS One (2015). https://doi.org/10.1371/journal.pone.0119660
Munir, R.: Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. In: 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (2012). https://doi.org/10.1109/TSSA.2012.6366039
Qayyum, J.A.: Chaos-based confusion and diffusion of image pixels using dynamic substitution. https://doi.org/10.1109/ACCESS.2020.3012912
Petrenko, K., Mashatan, A., Shirazi, F.: Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. J. Inform. Secur. Appl. 46, 151–163 (2019). https://doi.org/10.1016/j.jisa.2019.03.007
Ali, S.I., Kausar, F., Khan, F.A.: A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multimed. Tools Appl. 66(2), 201–214 (2013). https://doi.org/10.1007/s11042-011-0791-4
Fan, X., Tong, J., Li, Y., Duan, X., Ren, Y.: Power analysis attack based on hamming weight model without brute force cracking. Secur. Commun. Netw. (2022). https://doi.org/10.1155/2022/7375097
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Shnaen, H.J., Mehdi, S.A. (2024). Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization. In: Al-Bakry, A.M., et al. New Trends in Information and Communications Technology Applications. NTICT 2023. Communications in Computer and Information Science, vol 2096. Springer, Cham. https://doi.org/10.1007/978-3-031-62814-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-62814-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-62813-9
Online ISBN: 978-3-031-62814-6
eBook Packages: Computer ScienceComputer Science (R0)