ISSN: 2756-6684
Model: Open Access/Peer Reviewed
DOI: 10.31248/AJPS
Start Year: 2018
Email: ajps@integrityresjournals.org
https://doi.org/10.31248/AJPS2024.110 | Article Number: 4832BAF02 | Vol.6 (1) - February 2025
Received Date: 23 November 2024 | Accepted Date: 16 January 2025 | Published Date: 28 February 2025
Authors: Yakubu H. J.* , Samuel K. A. and Joseph S. B.
Keywords: Asymmetric/symmetric-key, cipher image, encryption/decryption algorithm, fixed point, RGB Image, Rössler attractor.
Providing privacy between two or more communicating parties on the Internet has been a major area of concern in our modern society due to the high cyber-attack rate. Some of this information is highly confidential and must be protected when it is stored in a computer and when it is in transit over the Internet. Cryptography has generally been acknowledged as the best method of information protection. Studies have shown that among the systems showing chaotic behaviour, 3-D continuous-time chaotic systems are found to contain abundant chaotic structures and complex dynamical behaviour which are highly useful in data security and hence, the need to explore the Rössler system. This paper proposed an image encryption algorithm for RGB images using the 3-D Rössler chaotic system. The proposed algorithm adopts the classic framework of the permutation substitution network in cryptography by using the rich chaotic properties of the Rössler system. This ensures both confusion and diffusion properties for a secure cipher. A standard test image namely Lena_colour_256.tif was used in testing the proposed scheme. Security analyses such as the Histogram Uniformity Analysis, Correlation Coefficient Analysis, Number of Pixels Change Rate (NPCR), and Unified Averaged Changing Intensity (UACI) were carried out on the proposed scheme. Results obtained from the analysis show that the proposed scheme is effective and strong against statistical, differential, and brute-force attacks.
Abd El-Samie, E. F., Ahmed, H. E. H., Elashry, F. I, Shahieen, H. M., Faragallah, S. O., El-Rabaie, M. E., & Alshebeili, A. S. (2014). Image encryption- A communication perspective (1st Edition). CRC Press, London. Pp. 1-86. https://doi.org/10.1201/b16309 |
||||
Abraham, L., & Daniel, N. (2013). Secure image encryption algorithms: A review. International Journal of Scientific and Technology Research, 2(4),186-189. | ||||
Alawida, M. (2023). A novel chaos-based permutation for image encryption. Journal of King Saud University-Computer and Information Sciences, 35(6), 101595. https://doi.org/10.1016/j.jksuci.2023.101595 |
||||
Alsafasfeh, Q. H., & Al-Arni, M. S. (2011). A new chaotic behaviour from Lorenz and Rossler systems and its electronic circuit implementation. Circuits and Systems, 2(2), 101-105. https://doi.org/10.4236/cs.2011.22015 |
||||
Cao, Y. (2013). A new hybrid chaotic map and its application on image encryption and hiding. Mathematical Problems in Engineering, 2013(1), 728375. https://doi.org/10.1155/2013/728375 |
||||
Darani, A. Y., Yengejeh, Y. K., Pakmanesh, H., & Navarro, G. (2024). Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos, Solitons & Fractals, 179, 114396. https://doi.org/10.1016/j.chaos.2023.114396 |
||||
Delfs, H., & Knebl, H. (2007). Introduction to cryptography-principles and applications. Springer Berlin Heidelberg, New York, USA. 2nd Edition. Pp.1-65. https://doi.org/10.1007/3-540-49244-5_1 |
||||
Denning, D. E. (1982). Cryptography and data security. Addison-Wesley Publishing Company Inc. USA. Pp. 1-116. | ||||
Goldreich, O. (2004). Foundations of cryptography-basic techniques (2nd edition). Cambridge University Press, UK. Pp. 1-63. | ||||
Hanchinamani, G., & Kulakarni, L. (2014). Image encryption based on 2-D Zaslavskii chaotic map and pseudo hadmard transform. International Journal of Hybrid Information Technology, 7(4), 185-200. https://doi.org/10.14257/ijhit.2014.7.4.16 |
||||
Hoffstein, J., Pipher, J. & Silverman, J. H. (2008). An introduction to mathematical cryptography (1st edition). Springer Science + Business Media, New York, USA. Pp.10-65. | ||||
Mishkovski, I., & Kocarev, L. (2011). Chaos-based public-key cryptography. In Chaos-Based Cryptography: Theory, Algorithms and Applications (pp. 27-65). Berlin, Heidelberg: Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_2 |
||||
Mishra, M., & Mankar, V. H. (2011). Chaotic Encryption Scheme Using 1-D Chaotic Map. International Journal of Communications, Network and System Sciences, 4(10), 452-455. https://doi.org/10.4236/ijcns.2011.47054 |
||||
Mishra, M., Mishra, P., Adhikary, M. C., & Kumar, S. (2012). Image encryption using Fibonacci-Lucas Transformation. International Journal on Cryptography and Information Security, 2(3), 131-141. https://doi.org/10.5121/ijcis.2012.2312 |
||||
Nkapkop, D. J., Effa, Y. J., Fouda, E. A. J., Alidou, M., Bitjoka, L., & Borda, M. (2014). A fast image encryption algorithm based on chaotic maps and the linear diophantine equation. Computer Science and Applications, 1(4), 232-243. | ||||
Ramadan, N., Ahmed, H. H., Elkhamy, S. E., & Abd Abd El-Samie, F. E. (2016). Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map. American Journal of Signal Processing, 6(1), 1-13. | ||||
Ramahrishnan, S., Elakkiya, B., Geetha, R., & Vasuki, P. (2014). Image encryption using chaotic maps in Hybrid Domain. International Journal of Communication and Computer Technologies, 2(5), 44-48. | ||||
Rössler, O. E. (2020). On the Rössler Attractor. Chaos Theory and Applications, 2(1), 1-2. https://doi.org/10.1007/978-3-030-44305-4_1 |
||||
Stinson, D. R., (2006). Cryptography theory and practice (3rd edition). Chapman & Hall/CRC, New York, Pp. 1-186. | ||||
Wang, P., Wang, Y., Xiang, J., & Xiao, X. (2022). Fast image encryption algorithm using logistics-sine-cosine mapping. Sensing and Imaging, 22(24), 9929. https://doi.org/10.3390/s22249929 |
||||
Wikipedia (2023). Rossler Attractor. Retrieved from https://en.wikipedia.org/w/index.php?title=Rössler_attractor&oldid=1155904881 | ||||
Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications, 1(2), 31-38. | ||||
Wu, Y., Yang, G., Jin, H., & Noonan, J. P. (2012). Image encryption using the two-dimensional logistics chaotic map. Journal of Electronic Imaging, 21(1), 28p. https://doi.org/10.1117/1.JEI.21.1.013014 |
||||
Yakubu, H. J., & Aboiyar, T. (2018). A chaos-based image encryption algorithm using Shimizu-Morioka System. International Journal of Communication and Computer Technologies, 6(1), 07-11. https://doi.org/10.31838/ijccts/06.01.02 |
||||
Ye, R. (2013). A highly secure image encryption scheme using compound chaotic maps. Journal of Emerging Trends in Computing and Information Sciences, 4(6), 532-544. |