A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic Fusion

Authors

  • Jun Li School of Intelligent Manufacturing, Shunde Polytechnic, Foshan, Guangdong, 528300, China
  • Weijun Huang Shanghai Communications Polytechnic, Shanghai, 200030, China

DOI:

https://doi.org/10.13052/jcsm2245-1439.1337

Keywords:

Image encryption, Chaotic mapping, Firefly algorithm

Abstract

Aiming at the shortcomings of current image encryption, such as simple structure, few parameters and small key space, we propose the Tent-Ushiki chaotic mapping image encryption method based on the improved firefly optimization algorithm. First, a chaotic mapping model based on the fusion of Tent and Ushiki is proposed. Second, for the lack of parameter optimization in chaotic models in general, we introduce the firefly optimization algorithm and optimize the algorithm for the shortcomings in terms of the adaptive step size, the adjustment factor and the inertia weights. Finally, the improved firefly algorithm is used for the fusion of the chaotic parameters of Tent and Ushiki. In the simulation experiments, this paper’s algorithm performs well in the statistical analysis and adjacent element correlation of the classical image test and significantly outperforms the comparative algorithms in terms of information entropy and anti-attack, which demonstrates that the algorithm is able to optimize the image encryption effect better.

Downloads

Download data is not yet available.

Author Biographies

Jun Li, School of Intelligent Manufacturing, Shunde Polytechnic, Foshan, Guangdong, 528300, China

Jun Li received her Bachelor’s degree in Computer Science and Technology from Wuhan University in 2003 and a Master’s degree in Computer Application Technology from Wuhan University in 2005. She is currently a lecturer in Shunde Polytechnic, with research interests in computer algorithms, big data, and cloud computing.

Weijun Huang, Shanghai Communications Polytechnic, Shanghai, 200030, China

Weijun Huang is an senior lecturer at Shanghai Communications Polytechnic. He received B.S. degree in Industrial Electrification and Automation from Hunan University of Science and Technology in 1988. His research interests include Information Technology and algorithm design

References

Liu S, Guo C, Sheridan J T. A review of optical image encryption techniques[J]. Optics & Laser Technology, 2014, 57: 327–342.

Davis R. The data encryption standard in perspective[J]. IEEE Communications Society Magazine, 1978, 16(6): 5–9.

Nechvatal J, Barker E, Bassham L, et al. Report on the development of the Advanced Encryption Standard (AES)[J]. Journal of research of the National Institute of Standards and Technology, 2001, 106(3): 511–576

Zimmermann R, Curiger A, Bonnenberg H, et al. A 177 Mb/s VLSI implementation of the international data encryption algorithm[J]. IEEE Journal of Solid-State Circuits, 1994, 29(3): 303–307.

Ye G, Pan C, Huang X, et al. An efficient pixel-level chaotic image encryption algorithm[J]. Nonlinear Dynamics, 2018, 94: 745–756.

Ye G, Huang X. An efficient symmetric image encryption algorithm based on an intertwining logistic map[J]. Neurocomputing, 2017, 251: 45–53.

Artz D. Digital steganography: hiding data within data[J]. IEEE Internet computing, 2001, 5(3): 75–80.

Cox I, Miller M, Bloom J, et al. Digital watermarking[J]. Journal of Electronic Imaging, 2002, 11(3): 414–414.

Çavuşoğlu Ü, Kaçar S. A novel parallel image encryption algorithm based on chaos[J]. Cluster Computing, 2019, 22: 1211–1223.

Wang X, Liu L, Zhang Y. A novel chaotic block image encryption algorithm based on dynamic random growth technique[J]. Optics and Lasers in Engineering, 2015, 66: 10–18.

Wang R, Deng G Q, Duan X F. An image encryption scheme based on double chaotic cyclic shift and Josephus problem[J]. Journal of Information Security and Applications, 2021, 58: 102699.

Huang X, Ye G, Chai H, et al. Compression and encryption for remote sensing image using chaotic system[J]. Security and Communication Networks, 2015, 8(18): 3659–3666.

Huang R, Rhee K H, Uchida S. A parallel image encryption method based on compressive sensing[J]. Multimedia tools and applications, 2014, 72: 71–93.

Yao L, Yuan C, Qiang J, et al. An asymmetric color image encryption method by using deduced gyrator transform[J]. Optics and Lasers in Engineering, 2017, 89: 72–79.

Kanso A, Ghebleh M. An algorithm for encryption of secret images into meaningful images[J]. Optics and lasers in engineering, 2017, 90: 196–208.

Chai X, Chen Y, Broyde L. A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Optics and Lasers in engineering, 2017, 88: 197–213.

Zhang Q, Han J, Ye Y. Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding[J]. IET Image Processing, 2019, 13(14): 2905–2915.

Mozaffari S. Parallel image encryption with bitplane decomposition and genetic algorithm[J]. Multimedia Tools and Applications, 2018, 77: 25799–25819.

Suri S, Vijay R. A biobjective genetic algorithm optimization of chaos-DNA based hybrid approach[J]. Journal of Intelligent Systems, 2019, 28(2): 333–346.

Liu X, Tong X, Wang Z, et al. Uniform nondegeneracy discrete chaotic system and its application in image encryption[J]. Nonlinear Dynamics, 2022, 108(1): 653–682.

Yavuz E, Yazıcı R, Kasapbaşı M C, et al. A chaos-based image encryption algorithm with simple logical functions[J]. Computers & Electrical Engineering, 2016, 54: 471–483.

Yu S S, Zhou N R, Gong L H, et al. Optical image encryption algorithm based on phase-truncated short-time fractional Fourier transform and hyperchaotic system[J]. Optics and Lasers in Engineering, 2020, 124: 105816.

Wang X Y, Li Z M. A color image encryption algorithm based on Hopfield chaotic neural network[J]. Optics and Lasers in Engineering, 2019, 115: 107–118.

Mansouri A, Wang X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme[J]. Information Sciences, 2020, 520: 46–62.

Luo H, Ge B. Image encryption based on Henon chaotic system with nonlinear term[J]. Multimedia Tools and Applications, 2019, 78: 34323–34352.

Ge B, Luo H B. Image encryption application of chaotic sequences incorporating quantum keys[J]. International Journal of Automation and Computing, 2020, 17(1): 123–138.

Arif J, Khan M A, Ghaleb B, et al. A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution[J]. IEEE Access, 2022, 10: 12966–12982.

Sang Y, Sang J, Alam M S. Image encryption based on logistic chaotic systems and deep autoencoder[J]. Pattern Recognition Letters, 2022, 153: 59–66.

Daoui A, Karmouni H, Sayyouri M, et al. Robust image encryption and zero-watermarking scheme using SCA and modified logistic map[J]. Expert Systems with Applications, 2022, 190: 116193.

Hosny K M, Kamal S T, Darwish M M. A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map[J]. The Visual Computer, 2023, 39(3): 1027–1044.

Lai Q, Hu G, Erkan U, et al. High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map[J]. Applied Mathematics and Computation, 2023, 442: 127738.

Wang Y, Chen L, Yu K, et al. An image encryption scheme based on logistic quantum chaos[J]. Entropy, 2022, 24(2): 251–272.

Shao S, Li J, Shao P, et al. Chaotic Image Encryption Using Piecewise-Logistic-Sine Map[J]. IEEE Access, 2023, 11: 27477–27488.

Alexan W, Elkandoz M, Mashaly M, et al. Color Image Encryption Through Chaos and KAA Map[J]. IEEE Access, 2023, 11: 11541–11554.

Gupta M, Singh V P, Gupta K K, et al. An efficient image encryption technique based on two-level security for internet of things[J]. Multimedia Tools and Applications, 2023, 82(4): 5091–5111.

Yang X S, He X. Firefly algorithm: recent advances and applications[J]. International journal of swarm intelligence, 2013, 1(1): 36–50.

Zhou Y Q. Research on Chaotic Parameter Optimization and Image Encryption Algorithm Based on Artificial Bee Colony Algorithm[D]. Haerbin: Heilongjiang University, 2022: 37–39.

Balaji K, Sai Kiran P, Sunil Kumar M. Power aware virtual machine placement in IaaS cloud using discrete firefly algorithm[J]. Applied Nanoscience, 2023, 13(3): 2003–2011.

Xie W, Wang L, Yu K, et al. Improved multilayer binary firefly algorithm for optimizing feature selection and classification of microarray data[J]. Biomedical Signal Processing and Control, 2023, 79: 104080.

Downloads

Published

2024-04-09

How to Cite

1.
Li J, Huang W. A Study of An Image Encryption Model Based on Tent-Ushiki Chaotic Fusion. JCSANDM [Internet]. 2024 Apr. 9 [cited 2024 Jul. 25];13(03):489-516. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24233

Issue

Section

Cyber Security Issues and Solutions