skip to main content
10.1145/3647750.3647779acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmlscConference Proceedingsconference-collections
research-article

A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code

Authors Info & Claims
Published:12 April 2024Publication History

ABSTRACT

Encryption is a valid means to safeguard the safety of images, and for color images, encryption should be performed considering the intrinsic correlation between R, G, and B components. In this paper, we propose an image encryption algorithm based on a complementary map and an iterative convolutional code. Firstly, the plain image is input into the convolutional encoders for iteration to generate the correctional secret key. Secondly, we design a new complementary map. From the test data, the new chaotic map has passed the NIST testing, exhibits a good chaotic characteristic, and has a wider range of chaotic parameters. Thirdly, global scrambling is performed on the color image to disrupt the distribution between R, G, and B. Then, a row-layer and a column-layer are randomly selected to form a set of elements to be encrypted. Finally, performing global diffusion on the image further increases the safety of our scheme. Experimental results show that our algorithm has a preferable encryption effect and elevated safety.

References

  1. Zezong Zhang, Jianeng Tang, Hui Ni, and Tingting Huang. 2023. Image adaptive encryption algorithm using a novel 2d chaotic system. Nonlinear Dynamics, 111(11):10629–10652.https://doi.org/10.1007/s11071-023-08397-8.Google ScholarGoogle ScholarCross RefCross Ref
  2. Suo Gao, Rui Wu, Xingyuan Wang, Jin Wang, Qi Li, Chunpeng Wang, Xianglong Tang. 2023. A 3D model encryption scheme based on a cascaded chaotic system. Signal Processing,202:108745. https://doi.org/10.1016/j.sigpro.2022.108745.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Zhida Guo and Peng Sun. 2022. Improved reverse zigzag transform and dna diffusion chaotic image encryption method. Multimedia Tools and Applications, 81(8):11301– 11323. https://doi.org/10.1007/s11042-022-12269-5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Meng Tang, Guofeng Zeng, Yanru Yang, and Jianhua Chen. 2022. A hyperchaotic image encryption scheme based on the triple dislocation of the liu and lorenz system. Optik, 261:169133. https://doi.org/10.1016/j.ijleo.2022.169133.Google ScholarGoogle ScholarCross RefCross Ref
  5. Noura Khalil, Amany Sarhan, and Mahmoud AM Alshewimy. 2021. An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Optics & Laser Technology, 143:107326. https://doi.org/10.1016/j.optlastec.2021.107326.Google ScholarGoogle ScholarCross RefCross Ref
  6. Lin Teng, Xingyuan Wang, Feifei Yang, and Yongjin Xian. 2021. Color image encryption based on cross 2d hyperchaotic map using combined cycle shift scrambling and selecting diffusion. Nonlinear Dynamics, 105:1859–1876. https://doi.org/10.1007/s11071-021-06663-1.Google ScholarGoogle ScholarCross RefCross Ref
  7. Andrew Viterbi. 1971. Convolutional codes and their performance in communication systems. IEEE Transactions on Communication Technology, 19(5):751–772. https://doi.org/10.1109/TCOM.1971.1090700.Google ScholarGoogle ScholarCross RefCross Ref
  8. Marius-F Danca. 2022. Fractional order logistic map: Numerical approach. Chaos, Solitons & Fractals, 157:111851. https://doi.org/10.1016/j.chaos.2022.111851.Google ScholarGoogle ScholarCross RefCross Ref
  9. Mohamed Amin, Osama S Faragallah, and Ahmed A Abd El-Latif. 2010. A chaotic block cipher algorithm for image cryptosystems. Communications in Nonlinear Science and Numerical Simulation, 15(11):3484–3497. https://doi.org/10.1016/j.cnsns.2009.12.025.Google ScholarGoogle ScholarCross RefCross Ref
  10. Aakash Paul and Shyamalendu Kandar. 2022. Simultaneous encryption of multiple images using pseudo-random sequences generated by modified newton-raphson technique. Multimedia Tools and Applications, 81(10):14355–14378. https://doi.org/10.1007/s11042-022-12210-w.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Shihua Zhou. 2021. A real-time one-time pad dna-chaos image encryption algorithm based on multiple keys. Optics & Laser Technology, 143:107359. https://doi.org/10.1016/j.optlastec.2021.107359.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yang Zhou, Chunlai Li, Wen Li, Hongmin Li, Wei Feng, and Kun Qian. 2021. Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear dynamics, 103:2043–2061. https://doi.org/10.1007/s11071-021-06206-8.Google ScholarGoogle ScholarCross RefCross Ref
  13. Yue Wu, Joseph P Noonan, Sos Agaian, 2011. Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2):31–38.Google ScholarGoogle Scholar
  14. Xilin Liu, Xiaojun Tong, Zhu Wang, and Miao Zhang. 2022. A novel hyperchaotic encryption algorithm for color image utilizing dna dynamic encoding and self-adapting permutation. Multimedia Tools and Applications, 81(15):21779–21810. https://doi.org/10.1007/s11042-022-12472-4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Zhongyun Hua, Zhihua Zhu, Yongyong Chen, and Yuanman Li. 2021. Color image encryption using orthogonal latin squares and a new 2d chaotic system. Nonlinear Dynamics, 104:4505–4522. https://doi.org/10.1007/s11071-021-06472-6.Google ScholarGoogle ScholarCross RefCross Ref
  16. Xingyuan Wang, Shengnan Chen, and Yingqian Zhang. 2021. A chaotic image encryption algorithm based on random dynamic mixing. Optics & Laser Technology, 138:106837. https://doi.org/10.1016/j.optlastec.2020.106837.Google ScholarGoogle ScholarCross RefCross Ref
  17. Ijaz Ahmad and Seokjoo Shin. 2021. A novel hybrid image encryption–compression scheme by combining chaos theory and number theory. Signal Processing: Image Communication, 98:116418. https://doi.org/10.1016/j.image.2021.116418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Minjun Zhou and Chunhua Wang. 2020. A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Processing, 171:107484. https://doi.org/10.1016/j.sigpro.2020.107484.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Xingyuan Wang and Maochang Zhao. 2021. An image encryption algorithm based on hyperchaotic system and dna coding. Optics & Laser Technology, 143:107316. https://doi.org/10.1016/j.optlastec.2021.107316.Google ScholarGoogle ScholarCross RefCross Ref
  20. Kandala Sree Rama Murthy and V. M. Manikandan. 2022. A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling,Journal of Advances in Information Technology, 13(5):433-440. https://doi.org/10.12720/jait.13.5.433-440.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICMLSC '24: Proceedings of the 2024 8th International Conference on Machine Learning and Soft Computing
        January 2024
        210 pages
        ISBN:9798400716546
        DOI:10.1145/3647750

        Copyright © 2024 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 April 2024

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format