Enhanced Hyperchaotic Image Encryption with CAW Transform and Sea-Lion Optimizer

Authors

  • Qutaiba Kadhim Abed Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad, Iraq
  • Waleed Ameen Mahmoud Al-Jawher Uruk University, Baghdad, Iraq

DOI:

https://doi.org/10.13052/jcsm2245-1439.13517

Keywords:

URUK chaotic system, sea lion optimization, DWT, SHA512, CAW transform, FAN transform

Abstract

One of the most effective methods for ensuring data security in the communication and information fields is encryption. There is an important role for multi-chaotic systems in the field of data encryption, due to its wide advantages and its sensitivity to the values of the coefficients and ergodicity. However, some multi-chaotic systems possess low complexity and randomness, which results in unacceptable security behaviour of the current data encryption systems. In this study, we introduce a novel hyperchaotic encryption scheme that enhances image security using a three-phase approach. First, SHA512 is combined with URUK chaos to generate plain-related random sequences. Next, a hybrid CAW transform (Cosine, Arnold, and Wavelet) improves randomness. Finally, the Sea Lion optimization algorithm shuffles pixels to achieve robust encryption. Our experimental results demonstrate that the proposed scheme effectively resists statistical attacks, with superior performance in NPCR, UACI, correlation coefficient, and information entropy tests

Downloads

Download data is not yet available.

Author Biographies

Qutaiba Kadhim Abed, Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad, Iraq

Qutaiba Kadhim Abed earned a Bachelor from Diyala University in Diyala, Iraq, in 2014 and a Master of Science in Computer Science from Diyala University in Diyala, Iraq, in 2019. Currently, he is a Ph.D. candidate at the Iraqi Commission for Computers and Informatics, Information Institute for Postgraduate Studies in Baghdad, Iraq. His research interests are image encryption, chaos, compressive sensing, and optimization algorithms.

Waleed Ameen Mahmoud Al-Jawher, Uruk University, Baghdad, Iraq

Waleed Ameen Mahmoud Al-Jawher President Assistance for Scientific Affairs, University of Uruk, Iraq. He received a School of Research in Digital Signal Processing (2005). He received his Ph.D. in Digital Signal Processing from the University of Wales, United Kingdom (1986). He has a teaching experience in Computer Science and Communication engineering for 44 years. A total of (15) National Awards. He published over (290) papers and supervised more than (210) MSc and PhD Students. He was the First Professor Award at the University of Baghdad, Iraq. His present areas of research interest are the field of Digital Signal Processing and its applications.

References

S. P. Praveen, V. S. Suntharam, S. Ravi, U. Harita, V. N. Thatha, and D. Swapna, “A Novel Dual Confusion and Diffusion Approach for Grey Image Encryption using Multiple Chaotic Maps,” International Journal of Advanced Computer Science and Applications, vol. 14, no. 8, 2023.

Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based chaotic system for image encryption,” Inf Sci (N Y), vol. 480, pp. 403–419, 2019.

A. A. Abdul-Kareem and W. A. M. Al-Jawher, “Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain,” International Journal of Computers and Applications, vol. 45, no. 4, pp. 306–322, 2023.

M. Muthumari, V. Akash, K. P. Charan, P. Akhil, V. Deepak, and S. P. Praveen, “Smart and multi-way attendance tracking system using an image-processing technique,” in 2022 4th International conference on smart systems and inventive technology (ICSSIT), IEEE, 2022, pp. 1805–1812.

Q. K. Abed and W. A. M. Al-Jawher, “A Robust Image Encryption Scheme Based on Block Compressive Sensing and Wavelet Transform,” International Journal of Innovative Computing, vol. 13, no. 1–2, pp. 7–13, 2022.

L. Liu and S. Miao, “A new simple one-dimensional chaotic map and its application for image encryption,” Multimed Tools Appl, vol. 77, pp. 21445–21462, 2018.

A. A. Abdul-Kareem and W. A. Mahmoud Al-Jawher, “Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos,” J Electron Imaging, vol. 32, no. 4, p. 43038, 2023.

A. S. Reddy, S. P. Praveen, G. B. Ramudu, A. B. Anish, A. Mahadev, and D. Swapna, “A Network Monitoring Model based on Convolutional Neural Networks for Unbalanced Network Activity,” in 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT), IEEE, 2023, pp. 1267–1274.

J. Tang, Z. Yu, and L. Liu, “A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption,” Multimed Tools Appl, vol. 78, pp. 24765–24788, 2019.

O. M. Al-Hazaimeh, M. F. Al-Jamal, N. Alhindawi, and A. Omari, “Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys,” Neural Comput Appl, vol. 31, pp. 2395–2405, 2019.

S. Roy, U. Rawat, H. A. Sareen, and S. K. Nayak, “IECA: an efficient IoT friendly image encryption technique using programmable cellular automata,” J Ambient Intell Humaniz Comput, vol. 11, pp. 5083–5102, 2020.

M. Essaid, I. Akharraz, and A. Saaidi, “Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps,” Journal of Information Security and Applications, vol. 47, pp. 173–187, 2019.

A. A. Abdul-Kareem and W. A. M. Al-Jawher, “WAM 3D discrete chaotic map for secure communication applications,” International Journal of Innovative Computing, vol. 13, no. 1–2, pp. 45–54, 2022.

M. Ghazvini, M. Mirzadi, and N. Parvar, “A modified method for image encryption based on chaotic map and genetic algorithm,” Multimed Tools Appl, vol. 79, pp. 26927–26950, 2020.

U. Sirisha and B. S. Chandana, “Privacy preserving image encryption with optimal deep transfer learning based accident severity classification model,” Sensors, vol. 23, no. 1, p. 519, 2023.

A. A. Shah, S. A. Parah, M. Rashid, and M. Elhoseny, “Efficient image encryption scheme based on generalized logistic map for real time image processing,” J Real Time Image Process, vol. 17, no. 6, pp. 2139–2151, 2020.

X. Wang, L. Feng, R. Li, and F. Zhang, “A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model,” Nonlinear Dyn, vol. 95, pp. 2797–2824, 2019.

Q. K. Abed and W. A. M. Al-Jawher, “Anew Architecture of Key Generation Using DWT for Image Encryption with Three Levels Arnold Transform Permutation,” Journal Port Science Research, vol. 5, no. 3, pp. 166–177, 2022.

U. Sirisha and S. C. Bolem, “Aspect based sentiment & emotion analysis with ROBERTa, LSTM,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 11, 2022.

P. K. Naskar, S. Bhattacharyya, D. Nandy, and A. Chaudhuri, “A robust image encryption scheme using chaotic tent map and cellular automata,” Nonlinear Dyn, vol. 100, pp. 2877–2898, 2020.

L. Zhu et al., “A stable meaningful image encryption scheme using the newly-designed 2D discrete fractional-order chaotic map and Bayesian compressive sensing,” Signal Processing, vol. 195, p. 108489, 2022.

U. Sirisha, S. P. Praveen, P. N. Srinivasu, P. Barsocchi, and A. K. Bhoi, “Statistical analysis of design aspects of various YOLO-based deep learning models for object detection,” International Journal of Computational Intelligence Systems, vol. 16, no. 1, p. 126, 2023.

K. A. K. Patro, B. Acharya, and V. Nath, “Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps,” Microsystem Technologies, vol. 25, pp. 4593–4607, 2019.

S. P. Praveen, S. Sindhura, A. Madhuri, and D. A. Karras, “A novel effective framework for medical images secure storage using advanced cipher text algorithm in cloud computing,” in 2021 IEEE International Conference on Imaging Systems and Techniques (IST), IEEE, 2021, pp. 1–4.

Q. K. Abed and W. A. M. Al-Jawher, “An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization,” Journal Port Science Research, vol. 6, no. 4, pp. 332–343, 2023.

K. A. K. Patro, M. Prasanth Jagapathi Babu, K. Pavan Kumar, and B. Acharya, “Dual-layer DNA-encoding–decoding operation based image encryption using one-dimensional chaotic map,” in Advances in Data and Information Sciences: Proceedings of ICDIS 2019, Springer, 2020, pp. 67–80.

X. Wang, Y. Wang, X. Zhu, and S. Unar, “Image encryption scheme based on Chaos and DNA plane operations,” Multimed Tools Appl, vol. 78, pp. 26111–26128, 2019.

M. Z. Talhaoui, X. Wang, and A. Talhaoui, “A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme,” Vis Comput, vol. 37, pp. 1757–1768, 2021.

J. Xu, J. Mou, J. Liu, and J. Hao, “The image compression–encryption algorithm based on the compression sensing and fractional-order chaotic system,” Vis Comput, pp. 1–18, 2022.

M. Z. Talhaoui, X. Wang, and M. A. Midoun, “A new one-dimensional cosine polynomial chaotic map and its use in image encryption,” Vis Comput, vol. 37, pp. 541–551, 2021.

T. Krishna, S. P. Praveen, S. Ahmed, and P. N. Srinivasu, “Software-driven secure framework for mobile healthcare applications in IoMT,” Intelligent Decision Technologies, no. Preprint, pp. 1–14, 2022.

H. Aparna et al., “Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem,” Journal of Information Security and Applications, vol. 63, p. 102972, 2021.

J. S. Muthu and P. Murali, “A novel DICOM image encryption with JSMP map,” Optik (Stuttg), vol. 251, p. 168416, 2022.

B. Mondal and J. P. Singh, “A lightweight image encryption scheme based on chaos and diffusion circuit,” Multimed Tools Appl, vol. 81, no. 24, pp. 34547–34571, 2022.

R. Masadeh, B. A. Mahafzah, and A. Sharieh, “Sea lion optimization algorithm,” International Journal of Advanced Computer Science and Applications, vol. 10, no. 5, 2019.

W. A. Mahmoud, “A Smart Single Matrix Realization of Fast Walidlet Transform,” International Journal of Research and Reviews in Computer Science, vol. 2, no. 1, p. 144, 2011.

M. H. M. Hasan, W. A. A. Jouhar, and M. A. Alwan, “3-d face recognition using improved 3d mixed transform,” Int J Biom Bioinformatics, vol. 6, no. 1, p. 278, 2012.

W. A. Al-Jowher, N. N. Al-Ramahi, and M. Alfaouri, “Image identification and labeling using hybrid transformation and neural network,” Neural Network World, vol. 17, no. 4, p. 377, 2007.

W. A. Mahmoud and R. A. Jassim, “Image Denoising Using Hybrid Transforms,” Engineering and Technology Journal, vol. 25, no. 5, 2007.

W. A. Mahmoud, J. J. Stephan, and A. A. W. Razzak, “Facial Expression Recognition Using Fast Walidlet Hybrid Transform,” Journal Port Science Research, vol. 3, no. 1, pp. 59–69, 2020.

E. Candes, L. Demanet, D. Donoho, and L. Ying, “Fast discrete curvelet transforms,” multiscale modeling & simulation, vol. 5, no. 3, pp. 861–899, 2006.

M. N. Do and M. Vetterli, “Orthonormal finite ridgelet transform for image compression,” in Proceedings 2000 International Conference on Image Processing (Cat. No. 00CH37101), IEEE, 2000, pp. 367–370.

M. I. M. Al-Khuzaay and W. A. M. Al-Jawher, “New Proposed Mixed Transforms: CAW and FAW and Their Application in Medical Image Classification,” International Journal of Innovative Computing, vol. 13, no. 1–2, pp. 15–21, 2022.

A. A. Abdul-Kareem and W. A. M. Al-Jawher, “URUK 4D Discrete Chaotic Map for Secure Communication Applications,” Journal Port Science Research, vol. 5, no. 3, pp. 131–142, 2022.

A. A. Abdul-Kareem and W. A. M. Al-Jawher, “A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet–Fourier Transforms,” Journal of Cyber Security and Mobility, pp. 435–464, 2023.

Downloads

Published

2024-09-03

How to Cite

1.
Abed QK, Al-Jawher WAM. Enhanced Hyperchaotic Image Encryption with CAW Transform and Sea-Lion Optimizer. JCSANDM [Internet]. 2024 Sep. 3 [cited 2024 Sep. 12];13(05):1207-38. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/24849

Issue

Section

Articles