A novel color image encryption method using Fibonacci transformation and chaotic systems

Authors

DOI:

https://doi.org/10.4108/eetsis.5452

Keywords:

Image encryption, Pixel Decomposition, Fibonacci transformation, Image scrambling, Chaotic system

Abstract

INTRODUCTION: With the rapid increase in network information data, the protection of image data has become a challenging task, where image encryption technology can play an important role. This paper studies color image encryption algorithms and proposes a novel method for color image encryption to enhance the security and effectiveness of image encryption.
OBJECTIVES: The purpose of this study is to effectively integrate different channel information of color images, thereby improving the effect of pixel decomposition based image encryption algorithm. Different indicators are used to analyze the effect of image encryption, and it is also compared with existing image encryption algorithms.
METHODS: Initially, through pixel decomposition, the pixel values of the R, G, B channels of the color image, each with a depth of 8 bits, are decomposed into two integers between 0-15 and combined into a new data matrix. Then, multiple rounds of scrambling are performed on the transformed matrix. Next, the Fibonacci transformation matrix is applied to the scanned matrix to further change the values of its elements. Finally, XOR diffusion operation is carried out to obtain the encrypted image.
RESULTS: Experimental results show that the proposed method achieves relatively good results in multiple image encryption indicator tests. The algorithm not only inherits the advantages of existing image encryption but also effectively integrates the information of each channel of the color image, providing better security.
CONCLUSION: This study further proves the effectiveness of image encryption algorithms based on pixel decomposition and provides a new idea for better color image encryption algorithms, which is expected to be applied to other issues such as information hiding and data protection.

References

Yin J, Tang M, Cao J, S, et al. Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery. IEEE Transactions on Industrial Informatics. 2023, 19(4) : 5593-5601.

You M, Yin J, Wang H, et al. A knowledge graph empowered online learning framework for access control decision-making. World Wide Web. 2023, 26: 827–848.

Dharmaraj R Patil, Tareek M Pattewar. Majority voting and feature selection based network intrusion detection system. EAI Endorsed Transactions on Scalable Information Systems. 2022, 9(6), 2022: e6.

Venkateswaran N, Prabaharan S P. An efficient neuro deep learning intrusion detection system for mobile adhoc networks. EAI Endorsed Transactions on Scalable Information Systems. 2022, 9(6), 2022: e7.

Yan S H, Li L, Gu B X, et al. Design of hyperchaotic system based on multi-scroll and its encryption algorithm in color image. Integration. 2023, 88: 203-221.

Qu G, Meng X, Yin Y. Optical color image encryption based on Hadamard single-pixel imaging and Arnold transform. Optics and Lasers in Engineering. 2021, 137(20) : 106392.

Wang X, Su Y. Image encryption based on compressed sensing and DNA encoding. Signal Processing Image Communication. 2021, 12: 116246.

Naim M, Pacha A A, Serief C. A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus Problem. Progress in space research. 2021, 67(7): 2077-2103.

Zhang X, Wang L, Wang Y, et al. An image encryption algorithm based on hyperchaotic system and variable-step josephus problem. International Journal of Optics. 2020, 4:1-15.

Gao H, Wang X Y. An image encryption algorithm based on dynamic row scrambling and ZigZag transform. Chaos, Solitons and Fractals. 2021, 147(6) :110962.

Diffie W, Hellman M E. Exhaustive Cryptanalysis of the NBS Data Encryption Standard. IEEE Computer. 1977, 10(6) :74-84.

Stinson D R. Cryptanalysis of the AES: A Brief Survey. Journal of Cryptology. 2002, 15(2) :143-158.

Rivest R L., Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978, 21(2) : 120-126.

Smart N P. The discrete logarithm problem on elliptic curves of trace one. Journal of Cryptology. 2004, 17(3):143-145.

Huang H, Cheng D. 3-image bit-level encryption algorithm based on 3D nonequilateral arnold transform and hyperchaotic system. Security and Communication Networks. 2020,7:1-13.

Dong H, Bai E, Jiang X Q . Color image compression-encryption using fractional-order hyperchaotic system and DNA coding. IEEE Access. 2020, 8:163524-163540.

Wang X Y, Wang X L , Teng L, et al. Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing. Chinese Physics B. 2023, 2: 020503.

Wang X Y, Guan N N. A novel chaotic image encryption algorithm based on extended Zigzag confusion and RNA operation. Optics and Laser Technology. 2020, 131(11):106366.

Xu X, Feng J. Research and implementation of image encryption algorithm based on zigzag transformation and inner product polarization vector. IEEE International Conference on Granular Computing. San Jose, California, USA, 2010:556-561.

Wang X Y, Sun H H. A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function Optics and Laser Technology. 2020, 122 (2):105854.

Guo Y, Shao L P, Yang L . Bit-level image encryption algorithm based on Josephus and Henon chaotic map. Application Research of Computers. 2015, 32 (4): 1131-1137.

Singh P, Yadav A K, Singh K. Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Optics and Lasers in Engineering. 2017, 91 (4):187-195.

Chen L F, Zhao D M, Ge F. Image encryption based on singular value decomposition and Arnold transform in fractional domain. Optics Communications. 2013, 291:98-103.

Xiong G Q, Cai Z C, Zhao S F. A bit-plane encryption algorithm for RGB image based on modulo negabinary code and chaotic system. Digital Signal Processing. 2023, 141(9):104153.

Wu J H, Liao X F, Yang B. Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Processing.

, 142 (7):292-300.

Zhang W , Hai Y, Zhao Y L, et al. Image encryption based on three-dimensional bit matrix permutation. Signal Process. 2016, 118(1):36-50.

Xu C, Zhang Y. Image encryption based on pixel decomposition. International Journal of Network Security. 2024, 26(4): 686-693.

Dong C W. Dynamic analysis of a novel 3D chaotic system with hidden and coexisting attractors: offset boosting, synchronization, and circuit realization. Fractal and Fractional. 2022, 6(10):547.

Liang Z Y, Qin Q X, Zhou C J. An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm. Neural Computing and Applications. 2022, 34:19313–19341.

Zhou S , Qiu Y., Wang X, et al. Novel image cryptosystem based on new 2d hyperchaotic map and dynamical chaotic s-box. Nonlinear dynamics. 2023, 111: 9571-9589.

Wang J, Zhi X, Chai X, et al. Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion. Multimedia Tools And Applications. 2021, 80(4) : 1-36.

Hosny K M, Kamal S T, Darwish M M. Novel encryption for color images using fractional-order hyperchaotic system. Journal of Ambient Intelligence and Humanized Computing. 2022, 13(2) : 973-988.

Wu X J , Wang K S, Wang X Y , et al. Color image DNA encryption using nca map-based cml and one-time keys. Signal Process. 2018, 148 (7) : 272–287.

Malik M G A, Bashir Z , Iqbal N, et al. Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access. 2020, 8: 88093–88107.

Downloads

Published

23-07-2024

How to Cite

1.
Xu C. A novel color image encryption method using Fibonacci transformation and chaotic systems. EAI Endorsed Scal Inf Syst [Internet]. 2024 Jul. 23 [cited 2024 Jul. 26];11. Available from: https://publications.eai.eu/index.php/sis/article/view/5452

Issue

Section

Research articles