Research Article
BibTex RIS Cite

A New Data Coding Algorithm for Secure Communication of Image

Year 2024, Volume: 6 Issue: 4, 284 - 293, 30.11.2024
https://doi.org/10.51537/chaos.1517688

Abstract

This paper proposes a new entropy-sensitive based data coding algorithm for the secure communication of image information between transceiver systems. The proposed algorithm utilizes chaos theory and the image information content of the reference image to create sensitivity on the decoding side for a high level of secrecy. It successfully recovers secret images at the receiver’s side using secret code series derived from both the secret and reference images, instead of direct transmission of secret image. The image information can be retrieved only through the same reference image, the same system parameters and identical code series using the proper decoding technique at the receiver. Quantitative results indicate that the average coding time for 128x128 images is approximately 0.27 seconds, while the extraction time averages 0.19 seconds, yielding impressive rates of 0.487 Mbps and 0.677 Mbps, respectively. Moreover, according to qualitative results, even a single-bit change in the reference image leads to a complete inability to decode the secret image, highlighting the robustness and security of the algorithm. Experimental results on various images show that the proposed algorithm is reliable, fast and effective in securing confidential image information.

References

  • Abba, A., J. S. Teh, and M. Alawida, 2024 Towards accurate keyspace analysis of chaos-based image ciphers. Multimedia Tools and Applications pp. 1–20.
  • Ahmad, I. and S. Shin, 2021 A novel hybrid image encryption– compression scheme by combining chaos theory and number theory. Signal Processing: Image Communication 98: 116418.
  • Alawida, M., 2023 A novel chaos-based permutation for image encryption. Journal of King Saud University-Computer and Information Sciences 35: 101595.
  • Bai, D., X. Chen, and M. Tian, 2017 A satellite communication zero steganography algorithm. Multimedia Tools and Applications 76: 26447–26462.
  • Bhardwaj, R. and D. Bhagat, 2018 two level encryption of grey scale image through 2d cellular automata. Procedia Computer Science 125: 855–861.
  • Bilal, M., S. Imtiaz, W. Abdul, and S. Ghouzali, 2013 Zerosteganography using dct and spatial domain. In 2013 ACS international conference on computer systems and applications (AICCSA), pp. 1–7, IEEE.
  • Bonny, T. andW. Al Nassan, 2024 Optimizing security and cost efficiency in n-level cascaded chaotic-based secure communication system. Applied System Innovation 7: 107.
  • Effah-Poku, S., W. Obeng-Denteh, and I. Dontwi, 2018 A study of chaos in dynamical systems. Journal of Mathematics 2018: 1808953.
  • Elshoush, H. T., I. A. Ali, M. M. Mahmoud, and A. Altigani, 2021 A novel approach to information hiding technique using ascii mapping based image steganography. J. Inf. Hiding Multim. Signal Process. 12: 65–82.
  • Gafsi, M., N. Abbassi, M. A. Hajjaji, J. Malek, and A. Mtibaa, 2020 Improved chaos-based cryptosystem for medical image encryption and decryption. Scientific Programming 2020: 6612390.
  • Gurunathan, K. and S. Rajagopalan, 2020 A stegano-visual cryptography technique for multimedia security. Multimedia Tools and Applications 79: 3893–3911.
  • Haridas, T., S. Upasana, G. Vyshnavi, M. S. Krishnan, and S. S. Muni, 2024 Chaos-based audio encryption: Efficacy of 2d and 3d hyperchaotic systems. Franklin Open 8: 100158.
  • Hosam, O. and N. Ben Halima, 2016 Adaptive block-based pixel value differencing steganography. Security and Communication Networks 9: 5036–5050.
  • Huang, D. and J. Wang, 2020 High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Processing: Image Communication 80: 115632.
  • Hussain, M. and M. Hussain, 2013 A survey of image steganography techniques. International Journal of Advanced Science and Technology 54: 113–124.
  • Irsan, M. and S. C. Antoro, 2019 Text encryption algorithm based on chaotic map. In Journal of Physics: Conference Series, volume 1341, p. 062023, IOP Publishing.
  • Ismail, S. M., A. M. Ghidan, and P. W. Zaki, 2020 Novel chaotic random memory indexing steganography on fpga. AEUInternational Journal of Electronics and Communications 125: 153367.
  • Jaradat, A., E. Taqieddin, and M. Mowafi, 2021 A high-capacity image steganography method using chaotic particle swarm optimization. Security and Communication Networks 2021: 6679284.
  • Jin, B., L. Fan, B. Zhang, R. Lei, and L. Liu, 2024 Image encryption hiding algorithm based on digital time-varying delay chaos model and compression sensing technique. Iscience 27.
  • Khan, M. and H. M. Waseem, 2024 An efficient confidentiality scheme based on quadratic chaotic map and fibonacci sequence. AIMS Mathematics 9: 27220–27246.
  • Kumar, A. and N. Raghava, 2019 Chaos-based steganography technique to secure information and integrity preservation of smart grid readings using wavelet. International Journal of Computers and Applications 44: 57–63.
  • Liu, X., C. Li, S. S. Ge, and D. Li, 2022 Time-synchronized control of chaotic systems in secure communication. IEEE Transactions on Circuits and Systems I: Regular Papers 69: 3748–3761.
  • Louzzani, N., A. Boukabou, H. Bahi, and A. Boussayoud, 2021 A novel chaos based generating function of the chebyshev polynomials and its applications in image encryption. Chaos, Solitons & Fractals 151: 111315.
  • Mishra, R. and P. Bhanodiya, 2015 A review on steganography and cryptography. In 2015 International Conference on Advances in Computer Engineering and Applications, pp. 119–122, IEEE.
  • Ogras, H., 2019 An efficient steganography technique for images using chaotic bitstream. International Journal of Computer Network and Information Security 15: 21.
  • O˘gra¸s, H. and M. Türk, 2013 Utilizing simulink and matlab graphical user interface in modelling and simulation of chaos-based digital modulation techniques. International Journal of Electrical Engineering Education 50: 19–33.
  • Ozkaynak, F., 2020 A novel random number generator based on fractional order chaotic chua system. Elektronika ir Elektrotechnika 26: 52–57.
  • Pradhan, A., K. R. Sekhar, and G. Swain, 2018 Digital image steganography using lsb substitution, pvd, and emd. Mathematical Problems in Engineering 2018: 1804953.
  • Rana, S., F. K. Parast, B. Kelly, Y.Wang, and K. B. Kent, 2023 A comprehensive survey of cryptography key management systems. Journal of Information Security and Applications 78: 103607.
  • Roy, M., S. Chakraborty, and K. Mali, 2021 A chaotic framework and its application in image encryption. Multimedia Tools and Applications 80: 24069–24110.
  • Sharafi, J., Y. Khedmati, and M. Shabani, 2021 Image steganography based on a new hybrid chaos map and discrete transforms. Optik 226: 165492.
  • Sharma, D. K., N. C. Singh, D. A. Noola, A. N. Doss, and J. Sivakumar, 2022 A review on various cryptographic techniques & algorithms. Materials Today: Proceedings 51: 104–109.
  • Swain, G., 2018a Digital image steganography using eightdirectional pvd against rs analysis and pdh analysis. Advances in multimedia 2018: 4847098.
  • Swain, G., 2018b High capacity image steganography using modified lsb substitution and pvd against pixel difference histogram analysis. Security and communication networks 2018: 1505896.
  • Umoh, E. A. and T. Wudil, 2016 Engineering applications of chaos. In 12th International Conference and Exhibition on Power and Telecommunications (ICEPT 2016), pp. 39–49.
  • Zhang, B. and L. Liu, 2023 Chaos-based image encryption: Review, application, and challenges. Mathematics 11: 2585.
Year 2024, Volume: 6 Issue: 4, 284 - 293, 30.11.2024
https://doi.org/10.51537/chaos.1517688

Abstract

References

  • Abba, A., J. S. Teh, and M. Alawida, 2024 Towards accurate keyspace analysis of chaos-based image ciphers. Multimedia Tools and Applications pp. 1–20.
  • Ahmad, I. and S. Shin, 2021 A novel hybrid image encryption– compression scheme by combining chaos theory and number theory. Signal Processing: Image Communication 98: 116418.
  • Alawida, M., 2023 A novel chaos-based permutation for image encryption. Journal of King Saud University-Computer and Information Sciences 35: 101595.
  • Bai, D., X. Chen, and M. Tian, 2017 A satellite communication zero steganography algorithm. Multimedia Tools and Applications 76: 26447–26462.
  • Bhardwaj, R. and D. Bhagat, 2018 two level encryption of grey scale image through 2d cellular automata. Procedia Computer Science 125: 855–861.
  • Bilal, M., S. Imtiaz, W. Abdul, and S. Ghouzali, 2013 Zerosteganography using dct and spatial domain. In 2013 ACS international conference on computer systems and applications (AICCSA), pp. 1–7, IEEE.
  • Bonny, T. andW. Al Nassan, 2024 Optimizing security and cost efficiency in n-level cascaded chaotic-based secure communication system. Applied System Innovation 7: 107.
  • Effah-Poku, S., W. Obeng-Denteh, and I. Dontwi, 2018 A study of chaos in dynamical systems. Journal of Mathematics 2018: 1808953.
  • Elshoush, H. T., I. A. Ali, M. M. Mahmoud, and A. Altigani, 2021 A novel approach to information hiding technique using ascii mapping based image steganography. J. Inf. Hiding Multim. Signal Process. 12: 65–82.
  • Gafsi, M., N. Abbassi, M. A. Hajjaji, J. Malek, and A. Mtibaa, 2020 Improved chaos-based cryptosystem for medical image encryption and decryption. Scientific Programming 2020: 6612390.
  • Gurunathan, K. and S. Rajagopalan, 2020 A stegano-visual cryptography technique for multimedia security. Multimedia Tools and Applications 79: 3893–3911.
  • Haridas, T., S. Upasana, G. Vyshnavi, M. S. Krishnan, and S. S. Muni, 2024 Chaos-based audio encryption: Efficacy of 2d and 3d hyperchaotic systems. Franklin Open 8: 100158.
  • Hosam, O. and N. Ben Halima, 2016 Adaptive block-based pixel value differencing steganography. Security and Communication Networks 9: 5036–5050.
  • Huang, D. and J. Wang, 2020 High-capacity reversible data hiding in encrypted image based on specific encryption process. Signal Processing: Image Communication 80: 115632.
  • Hussain, M. and M. Hussain, 2013 A survey of image steganography techniques. International Journal of Advanced Science and Technology 54: 113–124.
  • Irsan, M. and S. C. Antoro, 2019 Text encryption algorithm based on chaotic map. In Journal of Physics: Conference Series, volume 1341, p. 062023, IOP Publishing.
  • Ismail, S. M., A. M. Ghidan, and P. W. Zaki, 2020 Novel chaotic random memory indexing steganography on fpga. AEUInternational Journal of Electronics and Communications 125: 153367.
  • Jaradat, A., E. Taqieddin, and M. Mowafi, 2021 A high-capacity image steganography method using chaotic particle swarm optimization. Security and Communication Networks 2021: 6679284.
  • Jin, B., L. Fan, B. Zhang, R. Lei, and L. Liu, 2024 Image encryption hiding algorithm based on digital time-varying delay chaos model and compression sensing technique. Iscience 27.
  • Khan, M. and H. M. Waseem, 2024 An efficient confidentiality scheme based on quadratic chaotic map and fibonacci sequence. AIMS Mathematics 9: 27220–27246.
  • Kumar, A. and N. Raghava, 2019 Chaos-based steganography technique to secure information and integrity preservation of smart grid readings using wavelet. International Journal of Computers and Applications 44: 57–63.
  • Liu, X., C. Li, S. S. Ge, and D. Li, 2022 Time-synchronized control of chaotic systems in secure communication. IEEE Transactions on Circuits and Systems I: Regular Papers 69: 3748–3761.
  • Louzzani, N., A. Boukabou, H. Bahi, and A. Boussayoud, 2021 A novel chaos based generating function of the chebyshev polynomials and its applications in image encryption. Chaos, Solitons & Fractals 151: 111315.
  • Mishra, R. and P. Bhanodiya, 2015 A review on steganography and cryptography. In 2015 International Conference on Advances in Computer Engineering and Applications, pp. 119–122, IEEE.
  • Ogras, H., 2019 An efficient steganography technique for images using chaotic bitstream. International Journal of Computer Network and Information Security 15: 21.
  • O˘gra¸s, H. and M. Türk, 2013 Utilizing simulink and matlab graphical user interface in modelling and simulation of chaos-based digital modulation techniques. International Journal of Electrical Engineering Education 50: 19–33.
  • Ozkaynak, F., 2020 A novel random number generator based on fractional order chaotic chua system. Elektronika ir Elektrotechnika 26: 52–57.
  • Pradhan, A., K. R. Sekhar, and G. Swain, 2018 Digital image steganography using lsb substitution, pvd, and emd. Mathematical Problems in Engineering 2018: 1804953.
  • Rana, S., F. K. Parast, B. Kelly, Y.Wang, and K. B. Kent, 2023 A comprehensive survey of cryptography key management systems. Journal of Information Security and Applications 78: 103607.
  • Roy, M., S. Chakraborty, and K. Mali, 2021 A chaotic framework and its application in image encryption. Multimedia Tools and Applications 80: 24069–24110.
  • Sharafi, J., Y. Khedmati, and M. Shabani, 2021 Image steganography based on a new hybrid chaos map and discrete transforms. Optik 226: 165492.
  • Sharma, D. K., N. C. Singh, D. A. Noola, A. N. Doss, and J. Sivakumar, 2022 A review on various cryptographic techniques & algorithms. Materials Today: Proceedings 51: 104–109.
  • Swain, G., 2018a Digital image steganography using eightdirectional pvd against rs analysis and pdh analysis. Advances in multimedia 2018: 4847098.
  • Swain, G., 2018b High capacity image steganography using modified lsb substitution and pvd against pixel difference histogram analysis. Security and communication networks 2018: 1505896.
  • Umoh, E. A. and T. Wudil, 2016 Engineering applications of chaos. In 12th International Conference and Exhibition on Power and Telecommunications (ICEPT 2016), pp. 39–49.
  • Zhang, B. and L. Liu, 2023 Chaos-based image encryption: Review, application, and challenges. Mathematics 11: 2585.
There are 36 citations in total.

Details

Primary Language English
Subjects Information Security and Cryptology
Journal Section Research Articles
Authors

Hidayet Oğraş 0000-0001-9624-7400

Publication Date November 30, 2024
Submission Date July 17, 2024
Acceptance Date November 21, 2024
Published in Issue Year 2024 Volume: 6 Issue: 4

Cite

APA Oğraş, H. (2024). A New Data Coding Algorithm for Secure Communication of Image. Chaos Theory and Applications, 6(4), 284-293. https://doi.org/10.51537/chaos.1517688

Chaos Theory and Applications in Applied Sciences and Engineering: An interdisciplinary journal of nonlinear science 23830 28903   

The published articles in CHTA are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License Cc_by-nc_icon.svg