Research Article
BibTex RIS Cite
Year 2022, Volume: 35 Issue: 2, 542 - 556, 01.06.2022
https://doi.org/10.35378/gujs.872818

Abstract

References

  • [1] Wang, W., Si, M., Pang, Y., Ran, P., Wang, H., Jiang, X., Liu, Y., Wu, J., Wu, W., Chilamkurti, N., and Jeon, G., “An encryption algorithm based on combined chaos in body area networks.” Computers and Electrical Engineering, 1(65): 282-291, (2018).
  • [2] Chang, W. D., Shih, S. P., and Chen, C. Y. “Chaotic secure communication systems with an adaptive state observer.” Journal of Control Science and Engineering, 1(15): 1-7, (2015).
  • [3] Oğraş, H., and Türk, M., “A secure chaos-based image cryptosystem with an improved sine key generator.” American Journal of Signal Processing, 1(6): 67-76, (2016).
  • [4] Zhou, X., Li, J., and Youjie, M., “Chaos phenomena in dc-dc converter and chaos control.” Procedia Engineering, (29): 470-473, (2012).
  • [5] Kanso, A., and Ghebleh, M., “A novel image encryption algorithm based on a 3D chaotic map.” Communications in Nonlinear Science and Numerical Simulation, 1(17): 2943-2959, (2012).
  • [6] Chai, X., Fu, X., Gan, Z., Lu, Y., and Chen, Y., “A color image cryptosystem based on dynamic DNA encryption and chaos.” Signal Processing, Arroyo 1(55): 44-62, (2016).
  • [7] Alvarez, D.G. and Fernandez, V., “On the inadequacy of the logistic map for cryptographic applications.” arXiv preprint arXiv, 8(5): 43-55, (2008).
  • [8] Lu, H., Wang, X., Fei, Z., and Qiu, M., “The effects of using chaotic map on improving the performance of multiobjective evolutionary algorithms.” Mathematical Problems in Engineering, (14): 1-16, (2014).
  • [9] Alzaidi, A. A, Ahmad, M., Doja, M. N., Solami, E. A., Sufyan Beg, M. M., “A new 1D chaotic map and -Hill climbing for generating substitution-boxes.” IEEE Access, 1(6): 55405-55418, (2018).
  • [10] Oğraş, H., and Türk, M., “A Robust chaos-based image cryptosystem with an improved key generator and plain image sensitivity mechanism.” Journal of Information Security, (8): 23-41, (2016).
  • [11] Li, Y., Wang, C., and Chen, H., “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation.” Optics and Lasers in Engineering, (90): 238-246, (2017).
  • [12] Hathal, H. M., Abdulhussein, R. A., and Ibrahim, S. K., “Lyapunov exponent testing for AWGN Generator system.” Communications and Network, (6): 201-208, (2014).
  • [13] Zhu, H., Zhao, C., Zhang, X., and Yang, L., “An image encryption scheme using generalized Arnold map and affine cipher.” Optik, (125): 6672-6677, (2014).
  • [14] Zhang, G., Ding, W., and Li, L., “Image Encryption Algorithm Based on Tent Delay-Sine Cascade with Logistic Map.” Symmetry, (12): 355-369, (2020).
  • [15] Tur, M.R., “Deployment of reserve requirements into the power systems considering the cost, lost, and reliability parameters based on sustainable energy” International Journal of Electrical Engineering and Education 2021, 58(2): 621–639
  • [16] Tur, M. R., “Reliability Assessment of Distribution Power System When Considering Energy Storage Configuration Technique.” IEEE Access, (8): 77962-77971, (2020).
  • [17] Fu, C., Zhang, G., Zhu, M., Chen, Z., and Lei, W., “A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy.” Security and Communication Networks, (2018): 1-13, (2018).
  • [18] Arpacı, B., Kurt, E. and Çelik, K., “A new algorithm for the colored image encryption via the modified Chua’s circuit.” Engineering Science and Technology, (23): 595-604, (2020).
  • [19] Arpacı, B., Kurt, E., Çelik, K., and Ciylan, B., “Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit.” Journal of Electrical Engineering & Technology, (15): 1413-1429, (2020).

An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map

Year 2022, Volume: 35 Issue: 2, 542 - 556, 01.06.2022
https://doi.org/10.35378/gujs.872818

Abstract

In this paper, a different approach to create a new chaotic model and an effective image encryption structure using Bit reversal permutation are proposed. Compared to most frequently used and well known chaotic maps, such as Logistic map, Sine map or Tent map, a new chaotic system based on Logistic map with Sine map is designed and used as an encryption key generator in the proposed algorithm. The new map has increased initial value sensitivity according to the results of Lyapunov analysis and shown better randomness output according to the chaotic trajectory analysis. In cryptography, a good key should be a stochastic and supposed to be sufficiently random and uniformly distributed with equal probability for an effective encryption. The designed chaotic map provides these properties very well. Before the basic encryption process, the Bit reversal method makes all pixel positions of input image rearranged in order to reduce the strong relation of adjacent pixels for higher encryption strength, which will enable strategic information sharing for production planning when this method analyzes a wind energy map in power plants. Other experimental results confirm that the proposed image encryption scheme has sufficient security, an effective encryption capability and can be transferred between power systems, keeping energy planning secret strategically. 

References

  • [1] Wang, W., Si, M., Pang, Y., Ran, P., Wang, H., Jiang, X., Liu, Y., Wu, J., Wu, W., Chilamkurti, N., and Jeon, G., “An encryption algorithm based on combined chaos in body area networks.” Computers and Electrical Engineering, 1(65): 282-291, (2018).
  • [2] Chang, W. D., Shih, S. P., and Chen, C. Y. “Chaotic secure communication systems with an adaptive state observer.” Journal of Control Science and Engineering, 1(15): 1-7, (2015).
  • [3] Oğraş, H., and Türk, M., “A secure chaos-based image cryptosystem with an improved sine key generator.” American Journal of Signal Processing, 1(6): 67-76, (2016).
  • [4] Zhou, X., Li, J., and Youjie, M., “Chaos phenomena in dc-dc converter and chaos control.” Procedia Engineering, (29): 470-473, (2012).
  • [5] Kanso, A., and Ghebleh, M., “A novel image encryption algorithm based on a 3D chaotic map.” Communications in Nonlinear Science and Numerical Simulation, 1(17): 2943-2959, (2012).
  • [6] Chai, X., Fu, X., Gan, Z., Lu, Y., and Chen, Y., “A color image cryptosystem based on dynamic DNA encryption and chaos.” Signal Processing, Arroyo 1(55): 44-62, (2016).
  • [7] Alvarez, D.G. and Fernandez, V., “On the inadequacy of the logistic map for cryptographic applications.” arXiv preprint arXiv, 8(5): 43-55, (2008).
  • [8] Lu, H., Wang, X., Fei, Z., and Qiu, M., “The effects of using chaotic map on improving the performance of multiobjective evolutionary algorithms.” Mathematical Problems in Engineering, (14): 1-16, (2014).
  • [9] Alzaidi, A. A, Ahmad, M., Doja, M. N., Solami, E. A., Sufyan Beg, M. M., “A new 1D chaotic map and -Hill climbing for generating substitution-boxes.” IEEE Access, 1(6): 55405-55418, (2018).
  • [10] Oğraş, H., and Türk, M., “A Robust chaos-based image cryptosystem with an improved key generator and plain image sensitivity mechanism.” Journal of Information Security, (8): 23-41, (2016).
  • [11] Li, Y., Wang, C., and Chen, H., “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation.” Optics and Lasers in Engineering, (90): 238-246, (2017).
  • [12] Hathal, H. M., Abdulhussein, R. A., and Ibrahim, S. K., “Lyapunov exponent testing for AWGN Generator system.” Communications and Network, (6): 201-208, (2014).
  • [13] Zhu, H., Zhao, C., Zhang, X., and Yang, L., “An image encryption scheme using generalized Arnold map and affine cipher.” Optik, (125): 6672-6677, (2014).
  • [14] Zhang, G., Ding, W., and Li, L., “Image Encryption Algorithm Based on Tent Delay-Sine Cascade with Logistic Map.” Symmetry, (12): 355-369, (2020).
  • [15] Tur, M.R., “Deployment of reserve requirements into the power systems considering the cost, lost, and reliability parameters based on sustainable energy” International Journal of Electrical Engineering and Education 2021, 58(2): 621–639
  • [16] Tur, M. R., “Reliability Assessment of Distribution Power System When Considering Energy Storage Configuration Technique.” IEEE Access, (8): 77962-77971, (2020).
  • [17] Fu, C., Zhang, G., Zhu, M., Chen, Z., and Lei, W., “A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy.” Security and Communication Networks, (2018): 1-13, (2018).
  • [18] Arpacı, B., Kurt, E. and Çelik, K., “A new algorithm for the colored image encryption via the modified Chua’s circuit.” Engineering Science and Technology, (23): 595-604, (2020).
  • [19] Arpacı, B., Kurt, E., Çelik, K., and Ciylan, B., “Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit.” Journal of Electrical Engineering & Technology, (15): 1413-1429, (2020).
There are 19 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Electrical & Electronics Engineering
Authors

Hidayet Oğraş 0000-0001-9624-7400

Mehmet Rıda Tür 0000-0001-5688-4624

Publication Date June 1, 2022
Published in Issue Year 2022 Volume: 35 Issue: 2

Cite

APA Oğraş, H., & Tür, M. R. (2022). An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map. Gazi University Journal of Science, 35(2), 542-556. https://doi.org/10.35378/gujs.872818
AMA Oğraş H, Tür MR. An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map. Gazi University Journal of Science. June 2022;35(2):542-556. doi:10.35378/gujs.872818
Chicago Oğraş, Hidayet, and Mehmet Rıda Tür. “An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map”. Gazi University Journal of Science 35, no. 2 (June 2022): 542-56. https://doi.org/10.35378/gujs.872818.
EndNote Oğraş H, Tür MR (June 1, 2022) An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map. Gazi University Journal of Science 35 2 542–556.
IEEE H. Oğraş and M. R. Tür, “An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map”, Gazi University Journal of Science, vol. 35, no. 2, pp. 542–556, 2022, doi: 10.35378/gujs.872818.
ISNAD Oğraş, Hidayet - Tür, Mehmet Rıda. “An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map”. Gazi University Journal of Science 35/2 (June 2022), 542-556. https://doi.org/10.35378/gujs.872818.
JAMA Oğraş H, Tür MR. An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map. Gazi University Journal of Science. 2022;35:542–556.
MLA Oğraş, Hidayet and Mehmet Rıda Tür. “An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map”. Gazi University Journal of Science, vol. 35, no. 2, 2022, pp. 542-56, doi:10.35378/gujs.872818.
Vancouver Oğraş H, Tür MR. An Effective Image Encryption Algorithm Using Bit Reversal Permutation and a New Chaotic Map. Gazi University Journal of Science. 2022;35(2):542-56.