Utilizing a pseudo-random Linear Congruential Generator (LCG) S-Box for encoding color images through genetic crossover
Abstract
This article introduces a novel algorithm crafted for encrypting color images. The algorithm leverages chaotic principles and harnesses fresh substitution tables derived from independent linear congruence generators. These generators are dynamically sized based on pseudo-random vectors used in this technology. The proposed method initiates with the original image, vectorization, employing selected chaotic maps. The primary goal revolves around implementing a genetic operator tailored for image encryption, who integrates an enhanced Vigenère technique, incorporating novel confusion and diffusion functions derived from the previously established substitution tables. To gauge the effectiveness of this approach, numerous color images of varying dimensions and formats underwent testing using our algorithm. The yielded outcomes are both promising and gratifying, furnishing heightened security against recognized attacks.
References
[2] U Zia, » Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains » international Journal of information security, 2022 - Springer
[3] Y Qobbi « New image encryption scheme based on dynamic substitution and hill cipher » WITS 2020: Proceedings of the …, 2022 - Springer
[4] M Jarjar « New technology of color image encryption based on chaos and two improved Vigenère steps » Multimedia Tools and …, 2022 - Springer
[5] A JarJar « Vigenere and genetic cross-over acting at the restricted ASCII code level for color image encryption » Medical & Biological Engineering & Computing, 2022 - Springer
[6] Hraoui.S.; Gmira.F.; Jarar, A.O.; Satori.; Saaidi.A: Benchmarking AES and chaos based logistic map
for image encryption. Computer Systems and Applications (AICCSA), 2013 ACS International Conference
[7] A Abid, « Two Enhanced Feistel Steps for Medical Image Encryption » 2022 IEEE 3rd …, 2022 - ieeexplore.ieee.org
[8] L Guo, « A quantum image encryption algorithm based on the Feistel structure » Quantum Information Processing, 2022 - Springer
[9] A Abdellah, « Vigenère Implemented in Two Chaotic Feistel Laps for Medical Images Encryption Followed by Genetic Mutation » Conference on Artificial …, 2022 - Springer
[10] Machkour, M., Saaidi, A., Benmaati, M.L.: A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher. 3D Res. 6, 1–18 (2015). https://doi.org/10.1007/s13319-015-0068-1
[11] Gao, X.: Image encryption algorithm based on 2D hyperchaotic map. Opt. Laser Technol. 142, 107252 (2021). https://doi.org/10.1016/j.optlastec.2021.107252
[12] S Hraoui, M Gouiouez, F Gmira, M Berrada, A Jarjar « A novel cryptosystem for color images based on chaotic maps using a random controller » WITS 2020, 2022
[13] A JarJar “New chaotic map development and its application in encrypted color image”
Journal of Multimedia Information System, 2021 - jmis.org
[14] Teng, L., Wang, X., Xian, Y.: Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf. Sci. (Ny). 605, 71–85 (2022). https://doi.org/10.1016/j.ins.2022.05.032
[15] Huang, L., Cai, S., Xiao, M., Xiong, X.: A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy. 20, 1–20 (2018). https://doi.org/10.3390/e20070535
[17] Y Mao, » A novel fast image encryption scheme based on 3D chaotic baker maps » Journal of Bifurcation and chaos, 2004 - World Scientific
[18] Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. (Ny). 450, 361–377 (2018). https://doi.org/10.1016/j.ins.2018.03.055
[19] Qobbi, Y., Jarjar, A., Essaid, M., Benazzi, A.: Image encryption algorithm using dynamic permutation and large chaotic S-box. Multimedia. Tools Appl. (2022). https://doi.org/10.1007/s11042-022-14175-2
[20] Hraoui, S., Gmira, F., Abbou, M.F., Oulidi, A.J., Jarjar, A.: A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm. Procedia Computer. Sci. 148, 399–408 (2019). https://doi.org/10.1016/j.procs.2019.01.048
Authors
This work is licensed under a Creative Commons Attribution 4.0 International License.