Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance

This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this resea...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE access 2024, Vol.12, p.106720-106734
Hauptverfasser: Winarno, Edy, Hadikurniawati, Wiwien, Nugroho, Kristiawan, Lusiana, Veronica
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key's security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research's Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security.
ISSN:2169-3536
2169-3536
DOI:10.1109/ACCESS.2024.3436558