| Literature DB >> 36090155 |
Ayşegül Ihsan1, Nurettin Doğan2.
Abstract
In this study, a novel Improved Affine Algorithm (IAA) for color image encryption is proposed. Affine Algorithm (AA) is generally known as an algorithm used for plain text encryption. In the proposed IAA algorithm, Linear Feedback Shift Register (LFSR), XOR encryption, and the AA are combined for color images encryption. The plane image is firstly split into three channels: R, G, and B. The RGB channel image is encrypted using AA encryption with ten keys based on pixel locations and pixel values. The rows and columns of the image are encrypted with LFSR keys and XOR encryption procedures. Finally, the proposed algorithm is tested in Matlab environment to obtain the Histogram, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Unified Average Changing Intensity (UACI), Number of Pixel Change Rate (NPCR), and Entropy analyses. The values are compared with other algorithms. The results show that the proposed image encryption algorithm is secure and powerful, outperforming other algorithms.Entities:
Keywords: Affine algorithm; Image encryption; Linear feedback shift register; XOR encryption
Year: 2022 PMID: 36090155 PMCID: PMC9440316 DOI: 10.1007/s11042-022-13727-w
Source DB: PubMed Journal: Multimed Tools Appl ISSN: 1380-7501 Impact factor: 2.577
Fig. 1An example of the LFSR in a numerical procedure
Fig. 2Combination of XOR encryption with LFSR
Fig. 3AA encryption for the color Lena image’s pixel locations
Fig. 4AA pixel values encryption for RGB channels
Fig. 5Block diagram of the encryption of the IAA
Fig. 6Block diagram of the decryption of the IAA
Fig. 7The image encryption procedures of the IAA
Fig. 8The image decryption procedures of the IAA
Keys determined for IAA
| The Key’s Name | Key | The Key’s Name | Key |
|---|---|---|---|
| The Initial Value of the LFSR | 11,011,001 | b3 | 97 |
| a1 | 19 | a4 | 133 |
| b1 | 133 | b4 | 19 |
| a2 | 29 | a5 | 256 |
| b2 | 100 | b5 | 100 |
| a3 | 39 |
The original image, the encrypted image, and the decrypted image with IAA
Histogram analysis of the images
MSE, PSNR, NPCR and UACI results of the proposed algorithm
| Image Name | RGB Channels | PSNR | MSE | NPCR | UACI |
|---|---|---|---|---|---|
| Lena | R | 19.1185 | 8.3816E5 | 99.6965 | 33.5588 |
| G | 20.5472 | 5.3211E5 | 99.6574 | 33.5774 | |
| B | 19.8751 | 5.3357E5 | 99.6588 | 32.6485 | |
| Baboon | R | 20.1994 | 1.277E3 | 99.6972 | 33.6589 |
| G | 19.2476 | 5.5812E4 | 99.6675 | 33.5812 | |
| B | 18.8123 | 2.2271E4 | 99.6479 | 33.6127 | |
| Airplane | R | 20.2581 | 6.1771E4 | 99.6972 | 33.4779 |
| G | 20.1347 | 6.1213E5 | 99.6477 | 33.5538 | |
| B | 20.1023 | 8.8741E5 | 99.6371 | 33.6271 | |
| Pepper | R | 18.3412 | 8.5741E4 | 99.6986 | 33.4599 |
| G | 19.8522 | 6.4251E5 | 99.6915 | 33.5471 | |
| B | 20.0178 | 6.7732E5 | 99.6278 | 33.6367 |
MSE results of the proposed algorithm and other encryption algorithms
| Algorithm | RGB Channels | Lena | Baboon | Airplane | Pepper |
|---|---|---|---|---|---|
| Proposed Algorithm | R | 8.3816E5 | 1.277E3 | 6.1771E4 | 8.5741E4 |
| G | 5.3211E5 | 5.5812E4 | 6.1213E5 | 6.4251E5 | |
| B | 5.3357E5 | 2.2271E4 | 8.8741E5 | 6.7732E5 | |
| Li et al. [ | R | 1.062E4 | 8.618E3 | 9.978E3 | 7.962E3 |
| G | 9.046E3 | 7.749E3 | 1.066E4 | 1.123E4 | |
| B | 7.111E3 | 9.531E3 | 1.043E4 | 1.115E4 | |
| Etemadi Borujeni et al. [ | R | 1.032E4 | 8.518E3 | 9.651E3 | 7.828E3 |
| G | 9.115E3 | 7.625E3 | 1.040E4 | 1.107E4 | |
| B | 7.056E3 | 9.439E3 | 1.009E4 | 1.124E4 |
NPCR and UACI results of the proposed algorithm and other encryption algorithms
| Algorithm | NPCR | UACI | ||||
|---|---|---|---|---|---|---|
| R | G | B | R | G | B | |
| Proposed Algorithm | 99.6965 | 99.6574 | 99.6588 | 33.5588 | 33.5774 | 32.6485 |
| Murillo et al. [ | 99.6300 | 99.6000 | 99.6100 | 33.3100 | 33.3400 | 33.4300 |
| Kumar et al. [ | 99.5659 | 99.5658 | 99.5959 | 33.2829 | 33.3459 | 33.3270 |
| Teng et al. [ | 99.6429 | 99.6140 | 99.6277 | 33.3935 | 33.5637 | 33.4814 |
| Chidambaram et al. [ | 99.6124 | 99.6140 | 99.6201 | 33.4235 | 33.4838 | 33.5983 |
Entropy of the proposed algorithm
| Image Name | RGB Channels | Original Image | Encrypted Image |
|---|---|---|---|
| Lena | R | 7.228639 | 7.999488 |
| G | 7.549785 | 7.999514 | |
| B | 6.967501 | 7.999428 | |
| Baboon | R | 7.647045 | 7.999425 |
| G | 7.361939 | 7.999561 | |
| B | 7.682947 | 7.999358 | |
| Airplane | R | 6.773730 | 7.999412 |
| G | 6.861568 | 7.999389 | |
| B | 6.331334 | 7.999457 | |
| Pepper | R | 7.328042 | 7.999375 |
| G | 7.603665 | 7.999563 | |
| B | 7.144957 | 7.999544 |
The Entropy of the encrypted images
| Algorithm | Image Name | RGB Channels | ||
|---|---|---|---|---|
| R | G | B | ||
| Proposed Algorithm | Lena | 7.999488 | 7.999514 | 7.999428 |
| Proposed Algorithm | Baboon | 7.999425 | 7.999561 | 7.999358 |
| Proposed Algorithm | Airplane | 7.999412 | 7.999389 | 7.999457 |
| Proposed Algorithm | Pepper | 7.999375 | 7.999563 | 7.999544 |
| Liu et al. [ | Lena | 7.989825 | 7.989120 | 7.990007 |
| Liu et al. [ | Pepper | 7.988899 | 7.989486 | 7.989519 |
| Liu et al. [ | Airplane | 7.989357 | 7.989472 | 7.990092 |
| Liu et al. [ | Lena | 7.989567 | 7.988533 | 7.989931 |
| Liu et al. [ | Pepper | 7.988881 | 7.988873 | 7.988577 |
| Zhang et al. [ | Lena | 7.997300 | 7.997000 | 7.997200 |
| Zhang et al. [ | Pepper | 7.997200 | 7.997000 | 7.997200 |
| Zhang et al. [ | Baboon | 7.999300 | 7.999300 | 7.999300 |