1. Trang chủ
  2. » Tất cả

Image encryption through lucas sequence, s box and chaos theory

7 6 0

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Image Encryption Through Lucas Sequence, S-Box and Chaos Theory
Tác giả Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha
Trường học The German University in Cairo
Chuyên ngành Information and Computer Science
Thể loại Conference Paper
Năm xuất bản 2021
Thành phố Cairo
Định dạng
Số trang 7
Dung lượng 2,23 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

A rather thorough numerical analysis was carried out by the authors of [23], who proposed an image encryption scheme based on an LA-semi group for confusion, while a chaotic continuous s

Trang 1

Image Encryption Through Lucas Sequence,

S-Box and Chaos Theory

Wassim Alexan, SMIEEE, and Mohamed ElBeltagy

Faculty of IET The German University in Cairo

Cairo, Egypt wassim.alexan@ieee.org mohamed.elbeltagy@ieee.org

Amr Aboshousha Physics Department The German University in Cairo

Cairo, Egypt amr.aboshousha@guc.edu.eg

Abstract—The need for image encryption schemes that are

of low computation complexity is ever increasing Meanwhile,

the use of chaotic functions and mathematical sequences to

administer security has been shown to provide very good

results in recent literature This paper proposes a lightweight

image encryption scheme that is based on 3 stages The first

stage incorporates the use of the Lucas sequence, the second

stage incorporates the use of an S-box, while the third stage

makes use of the Sin Logistic map Performance evaluation of

the proposed encryption scheme indicates great resistivity to

various forms of attacks, attained at a low computation cost

This renders the proposed image encryption ideal for

real-time applications Furthermore, a comparison of the proposed

scheme with the state-of-the-art indicates its superiority

Keywords–Cryptography, image encryption, Lucas

num-bers, chaotic maps, S-box

I INTRODUCTION

The rapid developments in communications and Internet

technology have lead to digital images being nowadays

one of the most widely transmitted types of multimedia

data However, users transmitting and receiving such

data are constantly concerned with regards to their

security Digital images utilized in various applications

can depict sensitive military data, medical data, or novel

engineering blueprints [1] Thus, this brings the problem

of securely storing and transmitting them to the forefront

of problems that engineers and scientists are interested

in Most prominently, cryptography, steganography and

watermarking as scientific fields that attempt at securing

sensitive data have been evolving in accordance with

the aforementioned developments in other technologies

This has lead to huge investments in their R&D in recent

decades [2]–[5], resulting in various forms of symmetric,

asymmetric encryption algorithms [6], [7], hash functions

[8], as well as steganography and watermarking schemes

for different forms of multimedia [9]–[13]

Nevertheless, since the inherent properties of digital

images render them having very large data capacities, as

well as a significant redundancy and correlation between

adjacent pixels, this makes their security rather different

than that of traditional text This translates into 3DES

and AES, for example, no longer being the best-suited

encryption algorithms to cater for the security of digital

images To that end, various approaches have been

proposed for the specific case of image encryption Those

include technologies that rely on chaos theory [14], neural

networks [15], DNA coding [16], image filtering [17],

quantum theory [18], cellular automata [19] and many others

Chaos theory in particular presents the field of security with multiple advantages from its utilization These are derived from the characteristics of chaotic function as a random phenomenon in nonlinear systems [14] Namely, their pseudo-randomness, ergodicity, periodicity, control parameters and sensitivity to initial conditions Such characteristics have been exploited in multiple research works In [20], the authors present an encryption algorithm for grayscale images, employing a 2D logistic sine map, along with an Arnold map and a linear congruential generator In [21], the authors present an image encryption scheme that makes use of multiple chaotic maps with a minimum number of rounds of encryption In [22], the authors present a lossless quantum chaos-based image encryption technique based on an S-box, a mutation operation, as well as an Arnold transform Furthermore,

in generating the keys, they make use of SHA-256 Their proposed technique offers a very high level of security,

as evidenced by the various performance metrics they calculate and provide Most notably of their research work

is the very large key space employed, in the order of 2256,

as well as their computation speed (11.920875 Mbit/s)

A rather thorough numerical analysis was carried out by the authors of [23], who proposed an image encryption scheme based on an LA-semi group for confusion, while a chaotic continuous system was adopted for diffusion Each

of the schemes in [20]–[23] are rather recent, utilizing chaotic systems and their computed evaluation metrics reflect excellent performance This makes them ideal counterpart schemes suitable for a comparative analysis with our proposed one

In cryptography, a substitution box (S-box) is considered

to be a basic component of symmetric key algorithms which perform substitution In block ciphers, they are usually used to obscure the relationship between the key and the ciphertext, thus ensuring Shannon’s property

of confusion One of the employments of S-box was used by the authors of [24], where they presented a Gray S-box for AES A more recent work for secure image encryption algorithm design uses a chaos based S-box [25], where a novel S-box design algorithm was introduced to create the chaos based S-box to be used

Trang 2

in the encryption scheme and performance evaluation

examinations were carried out The authors of [26]

propose an image encryption scheme that is based on

elliptic curve cryptography In their scheme, the authors

utilize a dynamic S-box which is based on the Henon map

Mathematical sequences are also commonly used in

cryptography There are mainly 4 types of sequences:

Arithmetic, Geometric, Harmonic and the Fibonacci

sequences Each of those 4 types is different and has

unique relations among their terms The Lucas sequence

has the same recursive relationship as the Fibonacci

sequence, where each term is the sum of the two previous

terms, but with different starting values This produces a

sequence where the ratios of successive terms approach

the golden ratio, and in fact, the terms themselves

are roundings of integer powers of the golden ratio

This sequence also has a variety of relationships with

the Fibonacci numbers, like the fact that adding any

2 Fibonacci numbers 2 terms apart in the Fibonacci

sequence results in the Lucas number in between [27],

as in Fig 1 Since many cryptographic algorithms

are based on random number generators (RNGs), the

Lucas sequence is a great fit, as it can be utilized as a

pseudo-RNG (PRNG) One of the earliest employments

of the Lucas sequence in cryptography was proposed in

[28] Soon enough, scientists and engineers adopted the

idea of utilizing it for encryption purposes Achieved

numerical results clearly showcase that the use of Lucas

sequence provides good defense against various attacks

[29] Furthermore, the authors of [30] proposed encryption

of images by employing the Lucas sequence at different

iterations of scrambled images of the Arnold transform

A more recent work for digital image confidentiality

scheme based on pseudo-quantum chaos and the Lucas

sequence is presented in [29], where the authors showcase

that their encryption technique possesses an excellent

key space and attains significant confidentiality Their

paper indicates that employing a chaotic system, along

with an S-box, exhibits additional complicated dynamical

behavior, sufficient arbitrariness, and uncertainty over

other research works that focus solely on chaotic functions

In this paper, we propose an image encryption scheme

that is based on 3 stages The first stage incorporates

the use of the Lucas sequence, while the second stage

incorporates the use of an S-box and the third stage

incorporates the use of Chaos Theory in the form of the

Sine Logistic map This paper is organized as follows

Section II briefly presents the Lucas sequence, followed

by the adopted S-box and the chaotic map used for the

proposed image encryption scheme Section III outlines

the numerical results of the computations and testing and

provides appropriate commentary on them Section IV

finally draws the conclusions of the paper and suggests a

future work

II THEPROPOSEDIMAGEENCRYPTIONSCHEME

The proposed image encryption scheme is composed

of three stages The first stage makes use of the Lucas

Fig 1: A comparison between Fibonacci and Lucas se-quences

Fig 2: Lucas numbers’ graphical representation

sequence, while second stages makes use of an S-box and

in the third stage chaotic map was used The next few sections introduce each of those three concepts

A The Lucas Sequence The Lucas numbers form an integer sequence named after the mathematician Franc¸ois ´Edouard Anatole Lu-cas (1842–91), who studied both that sequence and the closely related Fibonacci numbers Lucas numbers and Fibonacci numbers form complementary instances of Lucas sequences Fig 2 shows the pattern for the Lucas sequence, calculated using the iterative expression:

X

n=1

For n ∈ Z and n ≥ 3, the attained values are {1, 3, 4, 7, 11, 18, 29, 47, 76, 123, } as in Fig 2 Note that here, we use L1= 1 and L2= 3 in (1) as the initial values

It was suggested in [19] that a Lucas sequence can be considered as a PRNG, since the Lucas numbers binary equivalence satisfies the characteristics of a randomly gen-erated bit stream For example, examining the first 200 numbers in the sequence reveals that the resulting bit stream is {1, 1, 1, 1, 0, 0, 1, 1, 1, 1, 0, } After examining this sample which has a total of 14054 1s and 0s, the number of 1s is equal to 7075 and the number of 0s is equal to 6979 This satisfies that the Lucas sequence can give almost equally distributed stream of bits (50% are 1s and 50% are 0s) Furthermore, in Section III, we test the generated Lucas sequence with a NIST analysis and the result is that all the items of the NIST analysis are successfully passed

B S-Box

An S-box is a main part of modern-day block ciphers that helps in the generation of a disordered ciphertext for a specific plaintext Through the addition of an S-box, a nonlinear mapping among the input and output data is resolved to create confusion [31] The more

Trang 3

confusion an S-box can form in the output data, the more

secure a block cipher is As an outcome, the provision

of security by a block cipher employing one or more

S-boxes directly depends on the solidity of the S-box

Block ciphers consist of many components in addition to

one or more S-boxes Contrary to other components, an

S-box is the sole nonlinear component of block ciphers

that supports the improvement of data protection [32], [33]

The latest symmetric ciphers designed recently usually

use S-boxes that create more confusion for the attackers

S-boxes help in the provision of data security by creating

jumbled ciphertext An S-box design establishes a

nonlinear relation between the input and output data

in such a way that an invader is unable to deduce

input data from the output data through any analysis

Scientists have broadly explored such nonlinear mappings

to create stronger S-boxes The process of constructing

an S-box should be simple and efficient The construction

process of most of the S-boxes presented in the literature

consumes vast amount of time and are complex As an

example, S-boxes generated with the help of a linear

fractional transformation (LFT) depend heavily on the

use of the Galois field LFT, also known as the Mobius

transformation, is one of the many mappings that have

been extensively used for the creation of S-boxes [34], [35]

A straightforward and efficient method for S-box

construction using the idea of novel transformation,

modular inverse and permutation was inherited from the

authors of [36], where An example S-box was tested

and analyzed to verify its cryptographic strength using

standard criteria This was carried out by comparing it

with other recently projected S-boxes The investigation

outcomes seem to be in synchronization with the current

benchmarks that validate a technique and the performance

of their proposed S-box depicted good results when

compared to other S-boxes Table IV shows their S-box

C The Sine Logistic Map

The 2D Logistic Sine Map (LSM) is a 2 dimensional

chaotic map that exhibits a good chaotic performance as

it is derived from both the Logistic map and the Sine

map Fig 3 is the 2D graphical representation for the first

250 iterations which were used in our proposed encryption

scheme to generate a key of randoms bits It is defined as:

xn+1= sin(πa(yn+ 3)xn(1 − xn)), (2)

and

yn+1= sin(πa(xn+ 1 + 3)yn(1 − yn)) (3)

The output are the two sequences xn and yn while a

is the control parameter and a ∈ [0, 1] The following

parameters were used to generate the chaotic sequence:

x(1) = 0.3, y(1) = 0.3, and a = 0.9 as in [37]

D Image Encryption and Decryption Processes

The proposed image encryption scheme is implemented

as follows First, an image of appropriate dimensions is

Fig 3: The 2D shape of our proposed usage of the Sin Logistic map

chosen and its pixels are converted into a 1D stream of bytes Next, these bytes are converted into a bit stream

d Second, the mean intensity of the image pixels is calculated The resulting value is a rather small number, which we multiply by a magnifying factor fM Let us denote the resulting value by µ Next, we cyclically shift

d to the right by µ places and the resulting bit stream, now denoted dµ, is then XORed with kCA kCA is the first key, a bit stream of the same length as d and dµ, that

is made up of a repetition of the first NCA bits resulting from the binary representation of the first 256 elements of the Lucas sequence generated bit stream Let us denote the resulting bit stream as C1 This concludes the first step

of encryption Next, the S-box is used for substituting the decimal representation for each 8 bits from the bit stream acquired after the first step, as in Table IV Next, we change those decimal representations to a bit stream C2 At this point, we take the x and y coordinates of each of the points

of the resulting Sine logistic map equations and flatten them into a single 1D array Next, we list plot those values into 2D, as shown in Fig 3 Examining the plot in Fig 3, it

is clear that there are more positive values than there are negative ones So, we choose a threshold value λ, such that

if any of the values are above this threshold, they would be accounted as 1s, otherwise, they would be accounted as 0s This newly obtained bit stream of length NL would make

up the seed of our Sine Logistic Map based key We repeat those NL bits until it is of the same length as d and C1, thus forming the second key Let us denote it kL Next, we XOR kL with C2 obtaining C3 This concludes the third step of encryption Finally, C3 is reshaped back into an image of the same dimensions as those of the plain image, obtaining the encrypted image Fig 4 provides a graphical illustration of the proposed image encryption scheme The decryption process is implemented in a reverse manner as

to that of the encryption process

III NUMERICALRESULTS ANDPERFORMANCE

EVALUATION

This section outlines the numerical results and analysis of the proposed lightweight image encryption scheme Performance is evaluated and compared to counterpart algorithms found in the literature The metrics employed for evaluation are presented and well expressed mathematically in [38], [39] The proposed scheme is implemented using the computer algebra system

Trang 4

Fig 4: Simplified flowchart of the proposed image

encryp-tion scheme

Wolfram Mathematica® on a machine running Windows

10 Enterprise, equipped with a 2.3 GHz 8-Core Intel®

CoreTM i7 processor and 32 GB of 2400 MHz DDR4

of memory The utilized keys are assigned the following

values: NCA = 100, NL = 50, fM = 106 and λ = 0.68

Four images that are commonly used in image processing

are utilized in this section These are Lena, Mandrill,

Peppers and House, all of dimensions 256 × 256

Examining Table II indicates that no information could

be discerned from any of the encrypted images Moreover,

decrypting any of the encrypted images results back in

the plain images Table II also shows the corresponding

histograms for each of the images A histogram of an

image shows the characteristics of its pixel distribution

One can clearly see that the histograms for each of

the plain and decrypted images have varying pixel

characteristics This is not the case for the histograms of

the encrypted images, which are of uniform nature The

more uniform the histogram distribution of an encrypted

image, the better its performance in resisting attacks of

statistical nature

Fig 6 shows the correlation coefficient diagrams of the

plain and encrypted Lena image It is clearly seen that the

horizontal, vertical and diagonal correlation coefficients of

the adjacent pixels for the plain image are linear While on

inspecting the plots generated from the encrypted image,

it is clear that the plots are uniform and have a scatter-like

distribution This signifies a resistance of the proposed

scheme to statistical analyses or attacks

To test the suitability of the proposed scheme to

real time applications, we measure the encryption

and decryption time for a range of image dimensions

{128, 256, 512, 1024, 2048} Fig 5 and Table I provide the

time taken for encryption, decryption and their total For

an image of dimensions 128 × 128, both the encryption

TABLE I: Processing time for various dimensions of the Lena image

Image Dimensions Time [s]

Encryption Decryption Total

128 × 128 0.660872 0.462961 1.123833

256 × 256 2.333844 1.727118 4.060962

512 × 512 9.062353 6.875539 15.937892

1024 × 1024 35.129869 26.615498 61.745367

2048 × 2048 142.455636 113.529309 255.984945

and decryption times are close to half a second This means that the proposed scheme is suitable for real-time applications

Table III lists the computed values of MSE and PSNR

of our proposed scheme, as well as those of 2 of its counterparts from the literature, specifically [21] and [23]

A larger value of the MSE signifies an improved level

of security Our proposed schemes seems to outperform the MSE values of [23], while it is achieving a lower performance than that achieved in [21] Since the PSNR

as a metric is inversely proportional to the MSE, the comparison among those 3 schemes in terms of PSNR still holds the same significance as aforementioned

An encryption scheme should maximize the randomness

of an encrypted image One metric employed to evaluate the randomness in a encrypted image is the entropy Table

V shows the computed entropy values of the proposed scheme as well as 3 of its counterparts, namely [21]–[23] Our proposed scheme exhibits very comparable values to its counterparts

The NIST analysis is a statistical computational suite that is used for testing random numbers and PRNGs used for cryptographic modelling and simulation It tests the di-vergence of randomness in a bit stream This test is applied

on the binary sequence data stream of the encrypted image Values resulting from the NIST suite must be greater than 0.01, to render an encryption scheme successful By successful here, we mean that a scheme is resistant against any cryptographic attacks Table VI shows the computed values and the success of our proposed scheme at passing all the tests

IV CONCLUSIONS ANDFUTUREWORKS

In this paper, we proposed an image encryption scheme that is based on 3 stages The first stage incorporated the use of the Lucas sequence, while the second stage incorpo-rated the use of an S-box and the final stage incorpoincorpo-rated the use of the Sine Logistic Map Performance evaluation

of the proposed scheme was carried out utilizing a number

of appropriate metrics and analyses Those included visual inspection of both plain and encrypted images, a histogram analysis, a cross correlation analysis, entropy values, com-putation of the MSE and the PSNR values A comparison with counterpart schemes from the literature was carried out and the proposed scheme exhibited comparable security

Trang 5

TABLE II: Numerical results of the achieved values for various metrics.

Image data Plain image/histogram Encrypted image/histogram Decrypted image/histogram Lena

d = 256 × 256

Mandrill

d = 256 × 256

Peppers

d = 256 × 256

House

d = 256 × 256

Trang 6

TABLE III: A comparison of MSE and PSNR values among the proposed scheme and its counterparts from the literature.

Image Proposed Scheme [21] [23]

MSE PSNR [dB] MSE PSNR [dB] MSE PSNR [dB] Lena 8926.96 8.6237 10869.73 7.7677 4859.03 11.3 Mandrill 8290.84 8.9448 10930.33 7.7447 7274.44 9.55 Peppers 10045.1 8.11128 N/A N/A 6399.05 10.10 House 8351.64 8.91309 N/A N/A N/A N/A

TABLE IV: S-box values from [40]

203 153 138 245 187 130 186 167 144 40 131 250 202 47 244 136

141 166 91 116 121 13 210 55 7 126 217 113 90 71 127 70

12 119 104 54 190 88 184 32 42 248 112 158 89 11 209 154

229 30 207 220 195 23 216 128 118 102 109 255 249 4 53 1

211 74 197 206 235 198 18 193 81 149 19 117 115 31 5 147

231 25 182 242 163 14 177 180 254 24 208 123 111 84 224 178

161 201 157 133 175 236 218 241 106 165 137 213 36 162 38 230

10 205 107 69 97 251 159 222 191 65 57 93 179 212 17 72

76 20 214 194 61 125 114 101 34 152 171 122 228 68 85 199

170 83 0 174 87 58 172 189 29 135 86 105 223 156 143 132

196 63 43 237 181 185 240 45 78 164 200 192 66 35 98 6

160 188 150 52 247 27 219 95 221 44 120 92 151 16 39 21

82 124 100 56 96 79 33 173 146 134 49 233 3 77 80 243

94 15 75 232 26 110 252 226 142 140 238 108 176 64 239 59

22 51 60 183 46 67 204 253 8 2 148 155 139 129 41 234

62 37 50 227 28 103 48 246 168 99 145 9 215 225 73 169

Fig 5: Processing time for encryption and decryption,

depicted for a range of image dimensions Dashed red

depicting encryption and solid blue depicting decryption

TABLE V: Entropy values for encrypted images

Image Proposed [21] [22] [23]

Lena 7.9990 7.9990 7.9978 7.9968

Mandrill 7.9990 7.9991 7.9993 N/A

Peppers 7.9990 N/A N/A N/A

House 7.9989 N/A N/A N/A

performance Finally, the processing time was computed

and shown to be rather low, signifying the suitability of its

use in real-time applications A future work that is expected

to result in even better performance could include the use

of different S-boxes or chaos-based functions

REFERENCES [1] W El-Shafai, I M Almomani, and A Alkhayer, “Optical

bit-plane-based 3d-jst cryptography algorithm with cascaded 2d-frft

(a) Horizontal

(b) Vertical

(c) Diagonal

Fig 6: Adjacent pixels correlation for the Lena image, in

3 directions In each of the subfigures, the left one is for the plain image, while the right one is for the encrypted image

Trang 7

TABLE VI: NIST analysis on Lena encrypted image.

Test name Value Remarks

Frequency 0.386490 Success

Block Frequency 0.718621 Success

Run (m = 500274) 0.583177 Success

Long runs of ones 0.275706 Success

Rank 0.375982 Success

Spectral FFT 0.538664 Success

No overlapping 0.679505 Success

Overlapping 0.912158 Success

Universal 0.704065 Success

Linear complexity 0.449033 Success

Serial 0.923869 Success

Approx Entropy 0.874764 Success

Cumulative sum forward 0.633802 Success

Cumulative sum reverse 0.389063 Success

encryption for efficient and secure hevc communication,” IEEE

Access, vol 9, pp 35 004–35 026, 2021.

[2] I Verbauwhede, “The cost of cryptography: Is low budget possible?”

in 2011 IEEE 17th International On-Line Testing Symposium, 2011,

pp 133–133.

[3] M Bogdanoski and D Petreski, “Cyber terrorism–global security

threat,” Contemporary Macedonian Defense-International Scientific

Defense, Security and Peace Journal, vol 13, no 24, pp 59–73,

2013.

[4] G De Meulenaer, F Gosset, F.-X Standaert, and O Pereira, “On the

energy cost of communication and cryptography in wireless sensor

networks,” in 2008 IEEE International Conference on Wireless and

Mobile Computing, Networking and Communications IEEE, 2008,

pp 580–585.

[5] P Cao, X He, X Zhao, and J Zhang, “Approaches to

obtain-ing fobtain-ingerprints of steganography tools which embed message in

fixed positions,” Forensic Science International: Reports, vol 1, p.

100019, 2019.

[6] S Yasser, A Hesham, M Hassan, and W Alexan, “Aes-secured

bit-cycling steganography in sliced 3d images,” in 2020 International

Conference on Innovative Trends in Communication and Computer

Engineering (ITCE) IEEE, 2020, pp 227–231.

[7] R Abid, C Iwendi, A R Javed, M Rizwan, Z Jalil, J H.

Anajemba, and C Biamba, “An optimised homomorphic crt-rsa

algorithm for secure and efficient communication,” Personal and

Ubiquitous Computing, pp 1–14, 2021.

[8] K Shankar et al., “Improving the security and authentication of

the cloud with iot using hybrid optimization based quantum hash

function,” Journal of Intelligent Systems and Internet of Things,

vol 1, no 2, pp 61–1, 2021.

[9] S Farrag and W Alexan, “Secure 3d data hiding technique based

on a mesh traversal algorithm,” Multimedia Tools and Applications,

vol 79, no 39, pp 29 289–29 303, 2020.

[10] P Yang, Y Lao, and P Li, “Robust watermarking for deep neural

networks via bi-level optimization,” in Proceedings of the IEEE/CVF

International Conference on Computer Vision, 2021, pp 14 841–

14 850.

[11] F Hemeida, W Alexan, and S Mamdouh, “Blowfish–secured audio

steganography,” in 2019 Novel Intelligent and Leading Emerging

Sciences Conference (NILES), vol 1 IEEE, 2019, pp 17–20.

[12] M T Elkandoz and W Alexan, “Logistic tan map based audio

steganography,” in 2019 international conference on electrical and

computing technologies and applications (ICECTA) IEEE, 2019,

pp 1–5.

[13] M K ElBeltagy, “Stegocrypt3d: 3d object and blowfish,” 2019.

[14] K M Hosny, Multimedia security using chaotic maps: principles

and methodologies Springer Nature, 2020, vol 884.

[15] P Mani, R Rajan, L Shanmugam, and Y H Joo, “Adaptive control

for fractional order induced chaotic fuzzy cellular neural networks

and its application to image encryption,” Information Sciences, vol.

491, pp 74–89, 2019.

[16] J Wu, X Liao, and B Yang, “Image encryption using 2d

h´enon-sine map and dna approach,” Signal Processing, vol 153, pp 11–23,

2018.

[17] R Wang, G.-Q Deng, and X.-F Duan, “An image encryption

scheme based on double chaotic cyclic shift and josephus

prob-lem,” Journal of Information Security and Applications, vol 58, p.

102699, 2021.

[18] Y Zhang, H.-P Lo, A Mink, T Ikuta, T Honjo, H Takesue, and

W J Munro, “A simple low-latency real-time certifiable quantum random number generator,” Nature communications, vol 12, no 1,

pp 1–8, 2021.

[19] S Wolfram, A new kind of science Wolfram media Champaign,

IL, 2002, vol 5.

[20] M T Elkandoz, W Alexan, and H H Hussein, “Logistic sine map based image encryption,” in 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), 2019, pp 290–295.

[21] M Khan and F Masood, “A novel chaotic image encryption technique based on multiple discrete dynamical maps,” Multimedia Tools and Applications, vol 78, no 18, pp 26 203–26 222, 2019 [22] H Liu, B Zhao, and L Huang, “Quantum image encryption scheme using arnold transform and s-box scrambling,” Entropy, vol 21,

no 4, p 343, 2019.

[23] I Younas and M Khan, “A new efficient digital image encryption based on inverse left almost semi group and lorenz chaotic system,” Entropy, vol 20, no 12, p 913, 2018.

[24] M T Tran, D K Bui, and A D Duong, “Gray s-box for advanced encryption standard,” in 2008 international conference on computational intelligence and security, vol 1 IEEE, 2008, pp 253–258.

[25] Q Lu, C Zhu, and X Deng, “An efficient image encryption scheme based on the lss chaotic map and single s-box,” IEEE Access, vol 8,

pp 25 664–25 678, 2020.

[26] S Ibrahim and A Alharbi, “Efficient image encryption scheme using henon map, dynamic s-boxes and elliptic curve cryptography,” IEEE Access, vol 8, pp 194 289–194 302, 2020.

[27] M Parker, Things to Make and Do in the Fourth Dimension: A Mathematician’s Journey Through Narcissistic Numbers, Optimal Dating Algorithms, at Least Two Kinds of Infinity, and More Macmillan, 2014.

[28] Z Jiang, Y Hao, and Y Wang, “A new public-key encryption scheme based on lucas sequence,” Journal of Electronics (China), vol 22, no 5, pp 490–497, 2005.

[29] K K Butt, G Li, F Masood, and S Khan, “A digital image confidentiality scheme based on pseudo-quantum chaos and lucas sequence,” Entropy, vol 22, no 11, p 1276, 2020.

[30] S I Batool and H M Waseem, “A novel image encryption scheme based on arnold scrambling and lucas series,” Multimedia tools and applications, vol 78, no 19, pp 27 611–27 637, 2019.

[31] M Ahmad, H Chugh, A Goel, and P Singla, “A chaos based method for efficient cryptographic s-box design,” in Interna-tional Symposium on Security in Computing and Communication Springer, 2013, pp 130–137.

[32] E Tanyildizi and F ¨ Ozkaynak, “A new chaotic s-box generation method using parameter optimization of one dimensional chaotic maps,” IEEE Access, vol 7, pp 117 829–117 838, 2019.

[33] M Ahmad, E Al-Solami, A M Alghamdi, and M A Yousaf, “Bi-jective s-boxes method using improved chaotic map-based heuristic search and algebraic group structures,” IEEE Access, vol 8, pp.

110 397–110 411, 2020.

[34] L C Nizam Chew and E S Ismail, “S-box construction based on linear fractional transformation and permutation function,” Symme-try, vol 12, no 5, p 826, 2020.

[35] S S Jamal, T Shah, A H AlKhaldi, M N Tufail et al., “Construc-tion of new substitu“Construc-tion boxes using linear frac“Construc-tional transforma“Construc-tion and enhanced chaos,” Chinese Journal of Physics, vol 60, pp 564–

572, 2019.

[36] A H Zahid, E Al-Solami, and M Ahmad, “A novel modular approach based substitution-box design for image encryption,” IEEE Access, vol 8, pp 150 326–150 340, 2020.

[37] Z Hua, Y Zhou, C.-M Pun, and C P Chen, “Image encryption using 2d logistic-sine chaotic map,” in 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC) IEEE, 2014,

pp 3229–3234.

[38] X Qian, Q Yang, Q Li, Q Liu, Y Wu, and W Wang, “A novel color image encryption algorithm based on three-dimensional chaotic maps and reconstruction techniques,” IEEE Access, vol 9,

pp 61 334–61 345, 2021.

[39] M T Elkandoz, W Alexan, and H H Hussein, “Logistic sine map based image encryption,” in 2019 Signal Processing: Algorithms, Architectures, Arrangements, and Applications (SPA), 2019, pp 290–295.

[40] A H Zahid, E Al-Solami, and M Ahmad, “A novel modular approach based substitution-box design for image encryption,” IEEE Access, vol 8, pp 150 326–150 340, 2020.

Ngày đăng: 18/02/2023, 08:02