IJWMT Vol. 15, No. 1, 8 Feb. 2025
Cover page and Table of Contents: PDF (size: 1933KB)
PDF (1933KB), PP.1-17
Views: 0 Downloads: 0
Image encryption, Charlier moments, Orthogonal Moments, Chaotic Mapping, Security Analysis
The integration of chaos theory and orthogonal moments has gained significant traction in contemporary image analysis. This paper presents a novel approach to image encryption and decryption, leveraging a modified logistic chaotic map and discrete orthogonal moments. The coefficients derived from Charlier polynomials and the image function are utilized to obfuscate the plaintext image. Furthermore, to bolster security measures, the pixel values of the obfuscated image are shuffled employing a modified logistic chaotic map. The encryption key is constructed from the parameters of both the chaotic map and Charlier polynomials, enhancing the robustness of the encryption scheme. Extensive experimental validation is conducted to assess the security of the proposed image encryption algorithm. Results demonstrate a considerable deviation in pixel values following diffusion via Charlier moments’ coefficients. Statistical tests and comprehensive security analyses affirm the resilience of the proposed algorithm against data loss attacks. The experimental result with Pearson correlation coefficient is almost 0, key space is greater than 2^210, and information entropy can reach 7.8404, which establish its superior security posture relative to existing algorithms within the domain of image encryption. The findings underscore the efficacy and reliability of the proposed scheme, positioning it as a viable solution for safeguarding sensitive image data in various applications.
Shimaa A. Elanany, Abdelrahman A. Karawia, Yasser M. Fouda, "Enhanced Image Encryption Scheme Utilizing Charlier Moments and Modified Chaotic Mapping", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.15, No.1, pp. 1-17, 2025. DOI:10.5815/ijwmt.2025.01.01
[1]M. Saikia, and B. Bikash, “Chaotic map based image encryption in spatial domain: A brief survey,” Proceedings of the First International Conference on Intelligent Computing and Communication Springer, pp. 569 – 579, Nov. 2017.
[2]M. Kumari, S. Gupta, and P. Sardana, “A survey of image encryption algorithms,” 3D Res, vol. 8, 37, 2017.
[3]P. Fang, H. Liu, C. Wu, and M. Liu, “A survey of image encryption algorithms based on chaotic system,” The Visual Computer, vol. 39, 04, 2022.
[4]K. U. Shahna and A. Mohamed, “A novel image encryption scheme using both pixel level and bit level permutation with chaotic map,” Applied Soft Computing, vol. 90(4): 106162, 2020.
[5]X. Wang, S. Lin, and Y. Li, “Bit-level image encryption algorithm based on BP neural network and gray code,” Multimedia Tools and Applications, vol. 80, pp. 11655–11670, 2021.
[6]Y. Hui, H. Liu, and P. Fang, “A DNA image encryption based on a new hyperchaotic system,” Multimedia Tools and Applications, 82(21), pp. 1-25, 2021.
[7]A. Shafique and F. Ahmed, “Image encryption using dynamic s-box substitution in the wavelet domain,” Wireless Personal Communications volume, vol. 115, pp. 2243–2268, 2020.
[8]A. Mansouri and X. Wang, “A novel block-based image encryption scheme using a new sine powered chaotic map generator,” Multimedia Tools and Applications, vol. 80, p. 21955–21978, 2021.
[9]Y. Xian and X. Wang, “Fractal sorting matrix and its application on chaotic image encryption,” Information Sciences, vol. 547, pp. 1154–1169, 2021.
[10]M. Guan, X. Yang, and W. Hu, “Chaotic image encryption algorithm using frequency-domain DNA encoding,” IET Image Process, vol. 13,pp. 11535–1539, 2019.
[11]S. Tedmori and N. Al-Najdawi, “Image cryptographic algorithm based on the HAAR wavelet transform,” Information Sciences, vol. 269, pp. 21–34, 2014.
[12]W. Jianhua, G. Fangfang, Z. Pingping, and Z. Nanrun, “Image encryption based on a reality-preserving fractional discrete cosine transform and a chaos-based generating sequence,” Journal of Modern Optics, vol. 60, pp. 1760–1771, 2013.
[13]Y. Luo, M. Du, and J. Liu, “A symmetrical image encryption scheme in wavelet and time domain,”commun Nonlinear Sci Numer Simul, vol. 20, pp. 447–460, 2015.
[14]G. Xin, L. Fen-lin, L. Bin, W. Wei, and C. Juan, “An image encryption algorithm based on spatiotemporal chaos in DCT domain,” international conference on information management and engineering, pp. 267–270, 2010.
[15]L. Yao, C. Yuan, J. Qiang, S. Feng, and S. Nie,‘‘An asymmetric color image encryption method by using deduced gyrator transform,” Optics and Lasers in Engineering, vol. 89, pp. 72–79, 2017.
[16]S. Kumar, B. Panna, and R. K. Jha, “Medical image encryption using fractional discrete cosine transform with chaotic function,” Medical and Biological Engineering and Computing , vol. 57, pp. 2517–2533, 2019.
[17]G. dong Li and L. le Wang, “Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform,” The Visual Computer, vol. 35, pp. 1267–1277, 2019.
[18]H. ying Yang, S. ren Qi, P. pan Niu, and X. yang Wang, “Color image zero-watermarking based on fast quaternion generic polar complex exponential transform,” Signal Processing: Image Communication, vol. 82, 2020.
[19]M. Annaby, H. Ayad, J. Prestin, and M. A. Rushdi, “Multi-parameter discrete transforms based on discrete orthogonal polynomials and their application to image watermarking,” Signal Processing: Image Communication, vol. 99,2021.
[20]K. M. Hosny and M. M. Darwish, “Multiparameter discrete transforms based on discrete orthogonal polynomials and their application to image watermarking,” Biomedical Signal Processing and Control, vol. 70, 2021.
[21]J. Flusser and T. Suk, “Multi-parameter discrete transforms based on discrete orthogonal polynomials and their application to image watermarking,” Pattern Recognition, vol. 26, pp. 167–174, 1993.
[22]T. Suk and J. Flusser, “Combined blur and affine moment invariants and their use in pattern recognition,” Pattern Recognition, vol. 36, pp. 2895–2907, 2003.
[23]A. Kamrani, K. Zenkouar, and S. Najah, “A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory, ”Multimedia Tools and Applications, vol. 79,pp. 20263–20279, 2020.
[24]B. Xiao, J. Luo, X. Bi,W. Li, and B. Chen, “Fractional discrete Tchebyshev moments and their applications in image encryption and watermarking,” Information Sciences, vol. 516, pp. 545–559, 2020.
[25]O. E. ogri, H. Karmouni, M. Sayyouri, and H. Qjidaa, “A novel image encryption method based on fractional discrete meixner moments,” Optics and Lasers in Engineering, vol. 137, 2021.
[26]K. M. Hosny, S. T. Kamal, and M. M. Darwish, “A novel color image encryption based on fractional shifted Gegenbauer moments and 2d logistic-sine map,” The Visual Computer volume, vol. 39, p. 1027–1044, 2023.
[27]May and R. M, “Simple mathematical models with very complicated dynamics,” Nature, vol. 261, pp. 459 – 467, June 1976.
[28]A. Kumar, J. Alzabut, S. Kumari, M. Rani, and R. Chugh, “Dynamical properties of a novel one dimensional chaotic map,” Mathematical Biosciences and Engineering, vol. 19, pp. 2489–2505, 2022.
[29]H. Zhu, M. Liu, and Y. Li, “Image descriptions with non-separable two-dimensional Charlier and Meixner moments,” IJPRAI, vol. 25, pp. 37–35, 2011.
[30]S. S. Askar , A. A. Karawia , A. Al-Khedhairi and F. S. Al-Ammar “An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps” Entropy, vol.21, 2019.
[31]Tao Wang, Ming-hui Wang, “Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding” Optics&LaserTechnology,Vol132, 2020,106355.
[32]X. Wang, X. Zhu and Y. Zhang, "An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map," in IEEE Access, vol. 6, pp. 23733-23746, 2018.
[33]Zhou NR, Pan SM, Cheng S, Zhou ZH, “Image compression encryption scheme based on hyperchaotic system and 2D compressive sensing” Opt Laser Technol 82(3):121–133, 2018.
[34]Liu X, Cao Y, Lu P, Lu X, Li Y, “Optical image encryption technique based on compressed sensing and Arnold transformation. Optik 124(24):6590–6593, 2013.
[35]https://sipi.usc.edu/database/