A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers a...
Saved in:
| Main Author: | |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
University of Baghdad, College of Science for Women
2022-08-01
|
| Series: | مجلة بغداد للعلوم |
| Subjects: | |
| Online Access: | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850044965455921152 |
|---|---|
| author | Mustafa Dhiaa Al-Hassani |
| author_facet | Mustafa Dhiaa Al-Hassani |
| author_sort | Mustafa Dhiaa Al-Hassani |
| collection | DOAJ |
| description |
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
|
| format | Article |
| id | doaj-art-b5950f51866948059cdc8cce3d445a2e |
| institution | DOAJ |
| issn | 2078-8665 2411-7986 |
| language | English |
| publishDate | 2022-08-01 |
| publisher | University of Baghdad, College of Science for Women |
| record_format | Article |
| series | مجلة بغداد للعلوم |
| spelling | doaj-art-b5950f51866948059cdc8cce3d445a2e2025-08-20T02:54:49ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862022-08-0119410.21123/bsj.2022.19.4.0905A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image GenerationMustafa Dhiaa Al-Hassani0Computer Department, College of Science, Mustansiriyah University, Baghdad, Iraq. The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975). https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation |
| spellingShingle | Mustafa Dhiaa Al-Hassani A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation مجلة بغداد للعلوم Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation |
| title | A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation |
| title_full | A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation |
| title_fullStr | A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation |
| title_full_unstemmed | A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation |
| title_short | A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation |
| title_sort | novel technique for secure data cryptosystem based on chaotic key image generation |
| topic | Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation |
| url | https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382 |
| work_keys_str_mv | AT mustafadhiaaalhassani anoveltechniqueforsecuredatacryptosystembasedonchaotickeyimagegeneration AT mustafadhiaaalhassani noveltechniqueforsecuredatacryptosystembasedonchaotickeyimagegeneration |