A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers a...

Full description

Saved in:
Bibliographic Details
Main Author: Mustafa Dhiaa Al-Hassani
Format: Article
Language:English
Published: University of Baghdad, College of Science for Women 2022-08-01
Series:مجلة بغداد للعلوم
Subjects:
Online Access:https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850044965455921152
author Mustafa Dhiaa Al-Hassani
author_facet Mustafa Dhiaa Al-Hassani
author_sort Mustafa Dhiaa Al-Hassani
collection DOAJ
description The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975).
format Article
id doaj-art-b5950f51866948059cdc8cce3d445a2e
institution DOAJ
issn 2078-8665
2411-7986
language English
publishDate 2022-08-01
publisher University of Baghdad, College of Science for Women
record_format Article
series مجلة بغداد للعلوم
spelling doaj-art-b5950f51866948059cdc8cce3d445a2e2025-08-20T02:54:49ZengUniversity of Baghdad, College of Science for Womenمجلة بغداد للعلوم2078-86652411-79862022-08-0119410.21123/bsj.2022.19.4.0905A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image GenerationMustafa Dhiaa Al-Hassani0Computer Department, College of Science, Mustansiriyah University, Baghdad, Iraq. The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given control parameters, which is then processed by converting the fractional parts of them through a function into a set of non-repeating numbers that leads to a vast number of unpredicted probabilities (the factorial of rows times columns). Double layers of rows and columns permutation are made to the values of numbers for a specified number of stages. Then, XOR is performed between the key matrix and the original image, which represent an active resolve for data encryption for any type of files (text, image, audio, video, … etc). The results proved that the proposed encryption technique is very promising when tested on more than 500 image samples according to security measurements where the histograms of cipher images are very flatten compared with that for original images, while the averages of Mean Square Error is very high (10115.4) and Peak Signal to Noise Ratio is very low (8.17), besides Correlation near zero and Entropy close to 8 (7.9975). https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation
spellingShingle Mustafa Dhiaa Al-Hassani
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
مجلة بغداد للعلوم
Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation
title A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
title_full A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
title_fullStr A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
title_full_unstemmed A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
title_short A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
title_sort novel technique for secure data cryptosystem based on chaotic key image generation
topic Chaotic Cryptosystem, Data Encryption, Double Layer Permutation, Key Image Generation
url https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/6382
work_keys_str_mv AT mustafadhiaaalhassani anoveltechniqueforsecuredatacryptosystembasedonchaotickeyimagegeneration
AT mustafadhiaaalhassani noveltechniqueforsecuredatacryptosystembasedonchaotickeyimagegeneration