| Literature DB >> 35735966 |
Nirmal Chaudhary1,2, Tej Bahadur Shahi1,2, Arjun Neupane2.
Abstract
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet. One way of achieving secure image transmission over the network is encryption techniques that convert the original image into a non-understandable or scrambled form, called a cipher image, so that even if the attacker gets access to the cipher they would not be able to retrieve the original image. In this study, chaos-based image encryption and block cipher techniques are implemented and analyzed for image encryption. Arnold cat map in combination with a logistic map are used as native chaotic and hybrid chaotic approaches respectively whereas advanced encryption standard (AES) is used as a block cipher approach. The chaotic and AES methods are applied to encrypt images and are subjected to measures of different performance parameters such as peak signal to noise ratio (PSNR), number of pixels change rate (NPCR), unified average changing intensity (UACI), and histogram and computation time analysis to measure the strength of each algorithm. The results show that the hybrid chaotic map has better NPCR and UACI values which makes it more robust to differential attacks or chosen plain text attacks. The Arnold cat map is computationally efficient in comparison to the other two approaches. However, AES has a lower PSNR value (7.53 to 11.93) and has more variation between histograms of original and cipher images, thereby indicating that it is more resistant to statistical attacks than the other two approaches.Entities:
Keywords: AES; Arnold cat map; block cipher; chaos theory; image encryption; logistic map
Year: 2022 PMID: 35735966 PMCID: PMC9224607 DOI: 10.3390/jimaging8060167
Source DB: PubMed Journal: J Imaging ISSN: 2313-433X
Figure 1The high level block diagram of the proposed method.
Figure 2Illustration of encryption and decryption with AES for pepper image.
Figure 3Illustration of encryption and decryption with Arnold cat map for pepper image.
Figure 4Illustration of encryption and decryption with hybrid chaotic method for pepper image.
The brief description of sample images used in this work.
| Image Name | Dimension | Database |
|---|---|---|
| Baboon. jpg |
| SIPI |
| peppers.bmp |
| SIPI |
| cameramen.gif |
| SIPI |
| D2.jpg |
| DICOM |
| Nkc.jpg |
| User-captured |
| Baby.bmp |
| User-captured |
| X2.bmp |
| Chest X-ray image |
PSNR measures of seven sample images using three encryption methods.
| Sample Images | AES | Arnold Cat Map | Hybrid Chaotic Map |
|---|---|---|---|
| Baboon.jpg | 11.93 | 12.50 | 13.08 |
| peppers.bmp | 10.82 | 11.09 | 11.89 |
| Cameraman.gif | 9.52 | 10.00 | 10.56 |
| D2.jpg | 7.21 | 12.28 | 12.49 |
| Nkc.jpg | 11.32 | 12.53 | 12.75 |
| Baby.bmp | 7.89 | 9.71 | 9.99 |
| X2.bmp | 7.53 | 10.80 | 11.08 |
NPCR and UACI measures of seven sample images using three encryption methods.
| Samplle Images | AES | Arnold Cat Map | Hybrid Chaotic Map | |||
|---|---|---|---|---|---|---|
| NPCR | UACI | NPCR | UACI | NPCR | UACI | |
| Baboon.jpg | 86.68 | 64.14 | 96.99 | 22.98 | 99.98 | 26.67 |
| peppers.bmp | 0.0030 | 0.0020 | 84.80 | 25.96 | 99.98 | 34.35 |
| Cameraman.gif | 0.0063 | 0.0021 | 0.0089 | 0.0030 | 0.67 | 0.334 |
| D2.jpg | 93.32 | 0.067 | 98.95 | 0.234 | 99.99 | 0.343 |
| Nkc.jpg | 83.23 | 20.76 | 90.00 | 30.32 | 99.95 | 32.85 |
| Baby.jpg | 80.21 | 21.34 | 92.14 | 29.83 | 99.34 | 32.44 |
| X2.bmp |
|
|
|
|
|
|
Encryption and Decryption time measures of seven sample images using three encryption methods. Note that Encrypt. and Decrypt. denotes the encryption and decryption time (in milliseconds) taken by each algorithm, respectively.
| Samplle Images | AES | Arnold Cat Map | Hybrid Chaotic Map | |||
|---|---|---|---|---|---|---|
| Encrypt. | Decrypt. | Encrypt. | Decrypt. | Encrypt. | Decrypt. | |
| Baboon.jpg | 2485 | 2037 | 2235 | 1580 | 2456 | 1860 |
| peppers.bmp | 1789 | 1560 | 1570 | 1324 | 1756 | 1532 |
| Cameraman.gif | 1434 | 1221 | 1257 | 908 | 1321 | 1009 |
| D2.jpg | 8829 | 5229 | 4853 | 3595 | 5334 | 4563 |
| Nkc.jpg | 6436 | 5720 | 3754 | 3066 | 3953 | 3609 |
| Baby.bmp | 69,007 | 12,990 | 10,230 | 5907 | 34,390 | 8439 |
| X2.bmp | 7248 | 4843 | 6385 | 3980 | 6951 | 5745 |
Figure 5Histogram visualization of samples image using three encryption methods.