Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes

Faculty Computer Science Year: 2023
Type of Publication: ZU Hosted Pages: 85002 - 85030
Authors:
Journal: IEEE Access IEEE Volume:
Keywords : Image Encryption , Base-n PRNGs , Parallel Base-n    
Abstract:
The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in this research work. In this method, the authors hybridize the Chen and Chua chaotic functions with a Memristor circuit to benefit from the strengths of each. Such a hybridization of systems allows for the generation of pseudo-random numbers which are used to develop encryption keys and substitution boxes (S-boxes). For the application of the generated encryption keys towards carrying out data diffusion, instead of the most commonly used approach of bit-stream level XOR , this work utilizes different logical and arithmetic operations, which is made possible by performing this process over variable numerical bases. Moreover, multiple S-boxes of varying base- n are generated and utilized in a parallel fashion, carrying out data confusion. The computed numerical results reflect the superior capabilities of the proposed image encryption technique, signifying resilience and robustness against various attacks.
   
     
 
       

Author Related Publications

  • Khalied Mohamed Hosny, "SEMANTIC REPRESENTATION OF MUSIC DATABASE USING NEW ONTOLOGY-BASED SYSTEM", Journal of Theoretical and Applied Information Technology, 2020 More
  • Khalied Mohamed Hosny, "Building a New Semantic Social Network Using Semantic Web-Based Techniques", ِASPG, 2021 More
  • Khalied Mohamed Hosny, "New Graphical Ultimate Processor for Mapping Relational Database to Resource Description Framework", IEEE, 2022 More
  • Khalied Mohamed Hosny, "Fast computation of accurate Zernike moments", Springer, 2008 More
  • Khalied Mohamed Hosny, "Accurate Computation of QPCET for Color Images in Different Coordinate Systems", SPIE, 2017 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks", Institute for Systems and Technologies of Information, Control and Communication, 2015 More
  • Khalied Mohamed Hosny, "Robust Color Image Hashing Using Quaternion Polar Complex Exponential Transform for Image Authentication", Springer, 2018 More
  • Khalied Mohamed Hosny, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Ehab Roshdy Mohamed, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
  • Asmaa Mohamed Khalid Mohamed Abbas, "Efficient compression of volumetric medical images using Legendre moments and differential evolution", Springer, 2020 More
Tweet