Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization

  • Conference paper
  • First Online:
New Trends in Information and Communications Technology Applications (NTICT 2023)

Abstract

This research introduces an innovative color image encryption algorithm that uses a 5D chaotic system and delta feature to modify the initial conditions during key generation. It employs diffusion and confusion processes across multiple stages. Furthermore, a single pixel value in the image is altered, and the delta features are recalculated to generate new encryption keys, Subsequently, the image is encrypted once again. The number of revised keys and the similarity between the encrypted images can be measured using the Hamming distance metric. The algorithm’s effectiveness in encrypting color images is validated through simulation, testing, and comparisons with existing methods, demonstrating its effectiveness in terms of encryption quality, computational efficiency, and resistance against various attacks. The presented approach offers a promising solution for secure color image encryption, suitable for applications requiring reliable protection of sensitive visual information. The evaluation results of the algorithm, A high NPCR value (99.6099), suggest that a sizable part of the pixels has been altered during encryption, which is desirable for security. The PSNR value (7.738) shows minimal information loss during encryption, crucial to maintaining image quality. An ideal UACI value (31.131%–35.225%) suggests minimal visual artifacts and distortion in the encrypted image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 94.15
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 90.94
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aljazaery, I.A., Alrikabi, H.S., Rabea, A.M.: Combination of hiding and encryption for data security. Int. J. Interact. Mobile Technol. 14(9), 34–47 (2020). https://doi.org/10.3991/ijim.v14i09.14173

  2. Amigó, J.M., Kocarev, L., Szczepanski, J.: Theory and practice of chaotic cryptography. Phys. Lett. Sect. A: General, Atomic and Solid-State Phys. 366(3), 211–216 (2007). https://doi.org/10.1016/j.physleta.2007.02.021

    Article  Google Scholar 

  3. Gatta, M.T., Al-Latief, S.T.A.: Medical image security using a modified chaos-based cryptography approach. J. Phys. Conf. Ser. 1003(1) (2018). https://doi.org/10.1088/1742-6596/1003/1/012036

  4. Shakir, H.R., Mehdi, S.A., Hattab, A.A.: A dynamic S-box generation based on a hybrid method of new chaotic system and DNA computing. TELKOMNIKA 20(6), 1230 (2022). https://doi.org/10.12928/telkomnika. v20i6.23449

  5. Mehdi, S.A., Jabbar, K.K., Abbood, F.H.: Image Encryption Based on the Novel 5d Hyper-Chaotic System Via Improved Aes Algorithm. Int. J. Civil Eng. Technol. 9(10), 1841–1855 (2018). Article ID: IJCIET_09_10_183

    Google Scholar 

  6. Fang, D., Sun, S.: A new secure image encryption algorithm based on a 5D hyperchaotic map. PLoS ONE 15(11), e0242110. https://doi.org/10.1371/journal.pone.0242110

  7. Liang, Z., Qin, Q., Zhou, C.: Medical image encryption algorithm based on a new five-dimensional three-leaf chaotic system and genetic operation. PLoS ONE 16(11), e0260014. https://doi.org/10.1371/journal.pone.0260014. eCollection 2021

  8. Ahmed, S.S., Mehdi, S.A.: Image encryption algorithm based on a novel 5D chaotic system. In: 8th International Conference on Contemporary Information Technology and Mathematics, ICCITM (2022), pp. 249–255. https://doi.org/10.1109/ICCITM56309.2022.10031883

  9. Bazzi, S., Ebert, J., Hogan, N., Sternad, D.: Stability and predictability in human control of complex objects. Chaos 28(10) (2018). https://doi.org/10.1063/1.5042090

  10. Jasim, O.A., Hussein, K.A.: A hyper-chaotic system and adaptive substitution box (S-Box) for image encryption. Corpus ID: 244841618 https://doi.org/10.1109/ACA52198.2021.9626793

  11. Wang, Z., Ma, J., Chen, Z., Zhang, Q.: A new chaotic system with positive topological entropy. Entropy 17(8), 5561–5579 (2015). https://doi.org/10.3390/e17085561

    Article  MathSciNet  Google Scholar 

  12. Mehdi, S.A.: Image encryption algorithm based on a novel 4D chaotic system. Int. J. Inf. Secur. Priv. 15(4), 118–131 (2021)

    Article  Google Scholar 

  13. Lian, S.H., Sun, J., Wang, Z.: Security analysis of a chaos-based image encryption algorithm. Phys. A: Stat. Mech. Appl. 351(2), 645–661 (2005). https://doi.org/10.1016/j.physa.2005.01.001

    Article  Google Scholar 

  14. Zeboon, H.T., Abdullah, H.N., Mansor, A.J.: Robust encryption system based on novel chaotic sequence. Res. J. Appl. Sci. Eng. Technol. 14(1), 48–55 (2017). https://doi.org/10.19026/rjaset.14.3988

  15. Wu, X., Li, Y., Kurths, J.: A new color image encryption scheme using CML and a fractional-order chaotic system. PLoS One (2015). https://doi.org/10.1371/journal.pone.0119660

  16. Munir, R.: Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. In: 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA) (2012). https://doi.org/10.1109/TSSA.2012.6366039

  17. Qayyum, J.A.: Chaos-based confusion and diffusion of image pixels using dynamic substitution. https://doi.org/10.1109/ACCESS.2020.3012912

  18. Petrenko, K., Mashatan, A., Shirazi, F.: Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization. J. Inform. Secur. Appl. 46, 151–163 (2019). https://doi.org/10.1016/j.jisa.2019.03.007

  19. Ali, S.I., Kausar, F., Khan, F.A.: A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multimed. Tools Appl. 66(2), 201–214 (2013). https://doi.org/10.1007/s11042-011-0791-4

  20. Fan, X., Tong, J., Li, Y., Duan, X., Ren, Y.: Power analysis attack based on hamming weight model without brute force cracking. Secur. Commun. Netw. (2022). https://doi.org/10.1155/2022/7375097

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hadeel Jabbar Shnaen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shnaen, H.J., Mehdi, S.A. (2024). Enhancing Data Security with a New Color Image Encryption Algorithm Based on 5D Chaotic System and Delta Feature for Dynamic Initialization. In: Al-Bakry, A.M., et al. New Trends in Information and Communications Technology Applications. NTICT 2023. Communications in Computer and Information Science, vol 2096. Springer, Cham. https://doi.org/10.1007/978-3-031-62814-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-62814-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-62813-9

  • Online ISBN: 978-3-031-62814-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation