APPLIED JOURNAL OF PHYSICAL SCIENCE
Integrity Research Journals

ISSN: 2756-6684
Model: Open Access/Peer Reviewed
DOI: 10.31248/AJPS
Start Year: 2018
Email: ajps@integrityresjournals.org


Encryption algorithm for RGB images using Rossler chaotic system

https://doi.org/10.31248/AJPS2024.110   |   Article Number: 4832BAF02   |   Vol.6 (1) - February 2025

Received Date: 23 November 2024   |   Accepted Date: 16 January 2025  |   Published Date: 28 February 2025

Authors:  Yakubu H. J.* , Samuel K. A. and Joseph S. B.

Keywords: Asymmetric/symmetric-key, cipher image, encryption/decryption algorithm, fixed point, RGB Image, Rössler attractor.

Providing privacy between two or more communicating parties on the Internet has been a major area of concern in our modern society due to the high cyber-attack rate. Some of this information is highly confidential and must be protected when it is stored in a computer and when it is in transit over the Internet. Cryptography has generally been acknowledged as the best method of information protection. Studies have shown that among the systems showing chaotic behaviour, 3-D continuous-time chaotic systems are found to contain abundant chaotic structures and complex dynamical behaviour which are highly useful in data security and hence, the need to explore the Rössler system. This paper proposed an image encryption algorithm for RGB images using the 3-D Rössler chaotic system. The proposed algorithm adopts the classic framework of the permutation substitution network in cryptography by using the rich chaotic properties of the Rössler system. This ensures both confusion and diffusion properties for a secure cipher. A standard test image namely Lena_colour_256.tif was used in testing the proposed scheme. Security analyses such as the Histogram Uniformity Analysis, Correlation Coefficient Analysis, Number of Pixels Change Rate (NPCR), and Unified Averaged Changing Intensity (UACI) were carried out on the proposed scheme. Results obtained from the analysis show that the proposed scheme is effective and strong against statistical, differential, and brute-force attacks.

Abd El-Samie, E. F., Ahmed, H. E. H., Elashry, F. I, Shahieen, H. M., Faragallah, S. O., El-Rabaie, M. E., & Alshebeili, A. S. (2014). Image encryption- A communication perspective (1st Edition). CRC Press, London. Pp. 1-86.
https://doi.org/10.1201/b16309
 
Abraham, L., & Daniel, N. (2013). Secure image encryption algorithms: A review. International Journal of Scientific and Technology Research, 2(4),186-189.
 
Alawida, M. (2023). A novel chaos-based permutation for image encryption. Journal of King Saud University-Computer and Information Sciences, 35(6), 101595.
https://doi.org/10.1016/j.jksuci.2023.101595
 
Alsafasfeh, Q. H., & Al-Arni, M. S. (2011). A new chaotic behaviour from Lorenz and Rossler systems and its electronic circuit implementation. Circuits and Systems, 2(2), 101-105.
https://doi.org/10.4236/cs.2011.22015
 
Cao, Y. (2013). A new hybrid chaotic map and its application on image encryption and hiding. Mathematical Problems in Engineering, 2013(1), 728375.
https://doi.org/10.1155/2013/728375
 
Darani, A. Y., Yengejeh, Y. K., Pakmanesh, H., & Navarro, G. (2024). Image encryption algorithm based on a new 3D chaotic system using cellular automata. Chaos, Solitons & Fractals, 179, 114396.
https://doi.org/10.1016/j.chaos.2023.114396
 
Delfs, H., & Knebl, H. (2007). Introduction to cryptography-principles and applications. Springer Berlin Heidelberg, New York, USA. 2nd Edition. Pp.1-65.
https://doi.org/10.1007/3-540-49244-5_1
 
Denning, D. E. (1982). Cryptography and data security. Addison-Wesley Publishing Company Inc. USA. Pp. 1-116.
 
Goldreich, O. (2004). Foundations of cryptography-basic techniques (2nd edition). Cambridge University Press, UK. Pp. 1-63.
 
Hanchinamani, G., & Kulakarni, L. (2014). Image encryption based on 2-D Zaslavskii chaotic map and pseudo hadmard transform. International Journal of Hybrid Information Technology, 7(4), 185-200.
https://doi.org/10.14257/ijhit.2014.7.4.16
 
Hoffstein, J., Pipher, J. & Silverman, J. H. (2008). An introduction to mathematical cryptography (1st edition). Springer Science + Business Media, New York, USA. Pp.10-65.
 
Mishkovski, I., & Kocarev, L. (2011). Chaos-based public-key cryptography. In Chaos-Based Cryptography: Theory, Algorithms and Applications (pp. 27-65). Berlin, Heidelberg: Springer Berlin Heidelberg.
https://doi.org/10.1007/978-3-642-20542-2_2
 
Mishra, M., & Mankar, V. H. (2011). Chaotic Encryption Scheme Using 1-D Chaotic Map. International Journal of Communications, Network and System Sciences, 4(10), 452-455.
https://doi.org/10.4236/ijcns.2011.47054
 
Mishra, M., Mishra, P., Adhikary, M. C., & Kumar, S. (2012). Image encryption using Fibonacci-Lucas Transformation. International Journal on Cryptography and Information Security, 2(3), 131-141.
https://doi.org/10.5121/ijcis.2012.2312
 
Nkapkop, D. J., Effa, Y. J., Fouda, E. A. J., Alidou, M., Bitjoka, L., & Borda, M. (2014). A fast image encryption algorithm based on chaotic maps and the linear diophantine equation. Computer Science and Applications, 1(4), 232-243.
 
Ramadan, N., Ahmed, H. H., Elkhamy, S. E., & Abd Abd El-Samie, F. E. (2016). Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map. American Journal of Signal Processing, 6(1), 1-13.
 
Ramahrishnan, S., Elakkiya, B., Geetha, R., & Vasuki, P. (2014). Image encryption using chaotic maps in Hybrid Domain. International Journal of Communication and Computer Technologies, 2(5), 44-48.
 
Rössler, O. E. (2020). On the Rössler Attractor. Chaos Theory and Applications, 2(1), 1-2.
https://doi.org/10.1007/978-3-030-44305-4_1
 
Stinson, D. R., (2006). Cryptography theory and practice (3rd edition). Chapman & Hall/CRC, New York, Pp. 1-186.
 
Wang, P., Wang, Y., Xiang, J., & Xiao, X. (2022). Fast image encryption algorithm using logistics-sine-cosine mapping. Sensing and Imaging, 22(24), 9929.
https://doi.org/10.3390/s22249929
 
Wikipedia (2023). Rossler Attractor. Retrieved from https://en.wikipedia.org/w/index.php?title=Rössler_attractor&oldid=1155904881
 
Wu, Y., Noonan, J. P., & Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications, 1(2), 31-38.
 
Wu, Y., Yang, G., Jin, H., & Noonan, J. P. (2012). Image encryption using the two-dimensional logistics chaotic map. Journal of Electronic Imaging, 21(1), 28p.
https://doi.org/10.1117/1.JEI.21.1.013014
 
Yakubu, H. J., & Aboiyar, T. (2018). A chaos-based image encryption algorithm using Shimizu-Morioka System. International Journal of Communication and Computer Technologies, 6(1), 07-11.
https://doi.org/10.31838/ijccts/06.01.02
 
Ye, R. (2013). A highly secure image encryption scheme using compound chaotic maps. Journal of Emerging Trends in Computing and Information Sciences, 4(6), 532-544.