An Efficient Image Encryption Method Based on Enhanced Josephus Problem and a Non-Invertible Economic Map

Authors

  • Ahmed Kareem Shibeeb
  • Mohammed Hussein Ahmed
  • Salah Albermany

DOI:

https://doi.org/10.47839/ijc.22.4.3357

Keywords:

Josephus problem, Image encryption, Two-dimensional chaotic map, Chaos-based cryptography

Abstract

As an increasing number of digital images are created and transmitted over the internet, there is growing concern over their unauthorized use, which has a big impact on both security and privacy concerns. In this research, we provide a fast and secure image encryption scheme by using an enhanced Josephus problem and two-dimensional non-invertible economic chaotic map (2D-ECM) to safely and covertly protect digital image information throughout public channel transmission. First, the initial values of the 2D-ECM map are generated based on Secure Hash Algorithm (SHA-256) and the input secret key. Then, the Josephus problem is enhanced by substituting the extract operation with location exchange and dynamic start location and step size is employed to scramble the image pixels. In order to integrate the confusion process and diffusion process, the enhanced Josephus problem is utilized indirectly to choose two random columns from the scrambled image and random image to XOR them with the current column. The evaluation results prove that the proposed image cryptosystem is more efficient compared to existing cryptosystems.

References

M. T. Elkandoz and W. Alexan, “Image encryption based on a combination of multiple chaotic maps,” Multimed. Tools Appl., pp. 1–22, 2022, https://doi.org/10.1007/s11042-022-12595-8.

Y. Xian and X. Wang, “Fractal sorting matrix and its application on chaotic image encryption,” Inf. Sci. (Ny)., vol. 547, pp. 1154–1169, https://doi.org/10.1016/j.ins.2020.09.055.

M. Shariatzadeh, M. J. Rostami, and M. Eftekhari, “Proposing a novel dynamic AES for image encryption using a chaotic map key management approach,” Optik (Stuttg)., vol. 246, no. August, p. 167779, 2021, https://doi.org/10.1016/j.ijleo.2021.167779.

G. Spasova and M. Karova, “A new secure image encryption model based on symmetric key,” Proceedings of the 2021 International Conference on Biomedical Innovations and Applications (BIA), 2022, vol. 1, pp. 107–110. https://doi.org/10.1109/BIA52594.2022.9831258.

Z. Chen and G. Ye, “An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing,” Optik (Stuttg)., vol. 267, p. 169676, 2022, https://doi.org/10.1016/j.ijleo.2022.169676.

T. S. Ali and R. Ali, “A new chaos based color image encryption algorithm using permutation substitution and Boolean operation,” Multimed. Tools Appl., vol. 79, no. 27, pp. 19853–19873, 2020, https://doi.org/10.1007/s11042-020-08850-5.

M. H. Ahmed, A. K. Shibeeb, and F. H. Abbood, “An efficient confusion-diffusion structure for image encryption using plain image related Henon map,” Int. J. Comput., vol. 19, issue 3, pp. 464–473, 2020, https://doi.org/10.47839/ijc.19.3.1895.

C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949, https://doi.org/10.1002/j.1538-7305.1949.tb00928.x.

B. Zolfaghari and T. Koshiba, “Chaotic image encryption: State-of-the-art, ecosystem, and future roadmap,” Appl. Syst. Innov., vol. 5, no. 3, p. 57, 2022, https://doi.org/10.3390/asi5030057.

J. Yu, W. Xie, Z. Zhong, and H. Wang, “Image encryption algorithm based on hyperchaotic system and a new DNA sequence operation,” Chaos, Solitons & Fractals, vol. 162, p. 112456, 2022, https://doi.org/10.1016/j.chaos.2022.112456.

J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” Int. J. Bifurc. Chaos, vol. 8, no. 6, pp. 1259–1284, 1998. https://doi.org/10.1142/S021812749800098X.

E. Solak, C. Çokal, O. T. Yildiz, and T. Biyikoğlu, “Cryptanalysis of Fridrich’s chaotic image encryption,” Int. J. Bifurc. Chaos, vol. 20, no. 5, pp. 1405–1413, 2010. https://doi.org/10.1142/S0218127410026563.

S. Amina and F. K. Mohamed, “An efficient and secure chaotic cipher algorithm for image content preservation,” Commun. Nonlinear Sci. Numer. Simul., vol. 60, pp. 12–32, 2018, https://doi.org/10.1016/j.cnsns.2017.12.017.

C. Pak and L. Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017, https://doi.org/10.1016/j.sigpro.2017.03.011.

J. Chen, F. Han, W. Qian, Y.-D. Yao, and Z.-L. Zhu, “Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map,” Nonlinear Dyn., vol. 93, no. 4, pp. 2399–2413, 2018, https://doi.org/10.1007/s11071-018-4332-9.

Y. Li, C. Wang, and H. Chen, “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation,” Opt. Lasers Eng., vol. 90, pp. 238–246, 2017, https://doi.org/10.1016/j.optlaseng.2016.10.020.

X. Wang, Q. Wang, and Y. Zhang, “A fast image algorithm based on rows and columns switch,” Nonlinear Dyn., vol. 79, no. 2, pp. 1141–1149, 2015, https://doi.org/10.1007/s11071-014-1729-y.

M. Z. Talhaoui, X. Wang, and A. Talhaoui, “A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme,” Vis. Comput., vol. 37, no. 7, pp. 1757–1768, 2021, https://doi.org/10.1007/s00371-020-01936-z.

X. Wang and L. Liu, “Application of chaotic Josephus scrambling and RNA computing in image encryption,” Multimed. Tools Appl., vol. 80, no. 15, 2021, https://doi.org/10.1007/s11042-020-10209-9.

G. Yang, H. Jin, and N. Bai, “Image encryption using the chaotic Josephus matrix,” Math. Probl. Eng., vol. 2014, pp. 1–13, 2014, https://doi.org/10.1155/2014/632060.

A. K. Singh and A. Mohan, Handbook of Multimedia Information Security: Techniques and Applications, 1st ed. Switzerland: Springer, 2019. https://doi.org/10.1007/978-3-030-15887-3.

W. Feng, J. Zhang, Q. Zhentao, and H. Yigang, “Cryptanalysis of image encryption algorithm based on variable step length Josephus traversing and DNA dynamic encoding,” Journal of Electronics and Information Technology, vol. 44, pp. 1–8, 2022, https://doi.org/10.11999/JEIT210791.

Y. Niu and X. Zhang, “A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation,” IEEE Access, vol. 8, pp. 22082–22093, 2020, https://doi.org/10.1109/ACCESS.2020.2970103.

X. Wang and H. Sun, “A chaotic image encryption algorithm based on improved Joseph traversal and cyclic shift function,” Opt. Laser Technol., vol. 122, p. 105854, 2020, https://doi.org/10.1016/j.optlastec.2019.105854.

M. Naim, A. Ali Pacha, and C. Serief, “A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem,” Adv. Sp. Res., vol. 67, no. 7, pp. 2077–2103, 2021, https://doi.org/10.1016/j.asr.2021.01.018.

D. R. I. M. Setiadi, E. H. Rachmawanto, and R. Zulfiningrum, “Medical image cryptosystem using dynamic Josephus sequence and chaotic-hash scrambling,” J. King Saud Univ. – Comput. Inf. Sci., vol. 34, issue 9, pp. 6818-6828, 2022, https://doi.org/10.1016/j.jksuci.2022.04.002.

A. Alkhayyat, M. Ahmad, N. Tsafack, M. Tanveer, D. Jiang, and A. A. Abd El-Latif, “A novel 4D hyperchaotic system assisted Josephus permutation for secure substitution-box generation,” J. Signal Process. Syst., vol. 94, no. 3, pp. 315-328, 2022, https://doi.org/10.1007/s11265-022-01744-9.

S. S. Askar and A. A. Elsadany, “Nonlinear dynamics of Cournot duopoly game: When one firm considers social welfare,” Discret. Dyn. Nat. Soc., vol. 2021, pp. 1–11, 2021, https://doi.org/10.1155/2021/6697341.

W. Stallings, Cryptography and Network Security: Principles and Practice, 4th ed. India: Pearson Upper Saddle River, 2006.

W. Feng, Y.-G. He, H.-M. Li, and C.-L. Li, “Cryptanalysis of the integrated chaotic systems based image encryption algorithm,” Optik (Stuttg)., vol. 186, pp. 449–457, 2019. https://doi.org/10.1016/j.ijleo.2018.12.103

B. Arpacı, E. Kurt, K. Çelik, and B. Ciylan, “Colored image encryption and decryption with a new algorithm and a hyperchaotic electrical circuit,” J. Electr. Eng. Technol., pp. 1–17, 2020, https://doi.org/10.1007/s42835-020-00393-x.

Y. Wu, Y. Zhou, G. Saveriades, S. Agaian, J. P. Noonan, and P. Natarajan, “Local Shannon entropy measure with statistical tests for image randomness,” Inf. Sci. (Ny)., vol. 222, pp. 323–342, 2013, https://doi.org/10.1016/j.ins.2012.07.049.

S. Dhall, S. K. Pal, and K. Sharma, “A chaos-based probabilistic block cipher for image encryption,” J. King Saud Univ. – Comput. Inf. Sci., vol. 34, no. 1, pp. 1533–1543, 2022, https://doi.org/10.1016/j.jksuci.2018.09.015.

Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals Multidiscip. Journals Sci. Technol. J. Sel. Areas Telecommun., vol. 1, no. 2, pp. 31–38, 2011.

Q. Xu, K. Sun, C. Cao, and C. Zhu, “A fast image encryption algorithm based on compressive sensing and hyperchaotic map,” vol. 121, pp. 203–214, 2019, https://doi.org/10.1016/j.optlaseng.2019.04.011.

S. A. Jassim and A. K. Farhan, “Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things,” Int. J. Electr. Comput. Eng., vol. 12, no. 3, pp. 3287–3297, 2022, https://doi.org/10.11591/ijece.v12i3.pp3287-3297.

A. K. Shibeeb, M. H. Ahmed, and A. H. Mohammed, “A new chaotic image cryptosystem based on plaintext-associated mechanism and integrated confusion-diffusion operation,” Karbala Int. J. Mod. Sci., vol. 7, no. 3, 2021, https://doi.org/10.33640/2405-609X.3117.

Z. Qiao, S. El Assad, and I. Taralova, “Design of secure cryptosystem based on chaotic components and AES S-Box,” AEU – Int. J. Electron. Commun., vol. 121, p. 153205, 2020, https://doi.org/10.1016/j.aeue.2020.153205.

Downloads

Published

2023-12-31

How to Cite

Shibeeb, A. K., Ahmed, M. H., & Albermany, S. (2023). An Efficient Image Encryption Method Based on Enhanced Josephus Problem and a Non-Invertible Economic Map. International Journal of Computing, 22(4), 493-501. https://doi.org/10.47839/ijc.22.4.3357

Issue

Section

Articles