Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance
This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this resea...
Gespeichert in:
Veröffentlicht in: | IEEE access 2024, Vol.12, p.106720-106734 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 106734 |
---|---|
container_issue | |
container_start_page | 106720 |
container_title | IEEE access |
container_volume | 12 |
creator | Winarno, Edy Hadikurniawati, Wiwien Nugroho, Kristiawan Lusiana, Veronica |
description | This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key's security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research's Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security. |
doi_str_mv | 10.1109/ACCESS.2024.3436558 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1109_ACCESS_2024_3436558</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10620022</ieee_id><doaj_id>oai_doaj_org_article_24c86068bdb14fe78605ac1f59c12881</doaj_id><sourcerecordid>3090986516</sourcerecordid><originalsourceid>FETCH-LOGICAL-c289t-5c7de7c6bca087a75a99798cab4a9451fc03f8108ee6c18e4320af5bc25cbe173</originalsourceid><addsrcrecordid>eNpNUU1P4zAQjRArgYBfwB4scU7xR-zYR4gKWwlYVl3O1sSZlJQkLk66Vf897gYh5jIzb-Y9e_SS5JLRGWPUXN8UxXy5nHHKs5nIhJJSHyWnnCmTCinU8bf6JLkYhjWNoSMk89Nkt-hHXAUYm35F_myhOpSOPPt23_uugZZAX5Hlvit9G_HiFfxh_gib9BYGrMgdNsOILXnCcefDGxk9WXSb4P9hzLBCMu9d2G_GxvfkGUPtQwe9w_PkRw3tgBef-Sx5uZv_LX6lD7_vF8XNQ-q4NmMqXV5h7lTpgOoccgnG5EY7KDMwmWS1o6LWjGpE5ZjGTHAKtSwdl65ElouzZDHpVh7WdhOaDsLeemjsf8CHlYUQL2rR8sxpRZUuq5JlNeaxkeBYLY1jXGsWta4mrXje-xaH0a79NvTx-1ZQQ41Wkqm4JaYtF_wwBKy_XmXUHgyzk2H2YJj9NCyyfk6sBhG_MRSnlHPxATkWksQ</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3090986516</pqid></control><display><type>article</type><title>Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Winarno, Edy ; Hadikurniawati, Wiwien ; Nugroho, Kristiawan ; Lusiana, Veronica</creator><creatorcontrib>Winarno, Edy ; Hadikurniawati, Wiwien ; Nugroho, Kristiawan ; Lusiana, Veronica</creatorcontrib><description>This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key's security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research's Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2024.3436558</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Bifurcation ; Chaos ; Chaos theory ; chaotic encryption ; Chi-square test ; Cryptography ; Digital imaging ; Encryption ; Feistel network ; Hash functions ; image cryptosystem ; Image encryption ; Image enhancement ; Mathematical models ; Performance evaluation ; Permutations ; Polynomials ; Resistance ; Security ; Sensitivity analysis ; Statistical methods</subject><ispartof>IEEE access, 2024, Vol.12, p.106720-106734</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2024</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c289t-5c7de7c6bca087a75a99798cab4a9451fc03f8108ee6c18e4320af5bc25cbe173</cites><orcidid>0000-0002-7488-5660 ; 0000-0002-9980-2593</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10620022$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>315,781,785,865,2103,4025,27635,27925,27926,27927,54935</link.rule.ids></links><search><creatorcontrib>Winarno, Edy</creatorcontrib><creatorcontrib>Hadikurniawati, Wiwien</creatorcontrib><creatorcontrib>Nugroho, Kristiawan</creatorcontrib><creatorcontrib>Lusiana, Veronica</creatorcontrib><title>Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance</title><title>IEEE access</title><addtitle>Access</addtitle><description>This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key's security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research's Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security.</description><subject>Bifurcation</subject><subject>Chaos</subject><subject>Chaos theory</subject><subject>chaotic encryption</subject><subject>Chi-square test</subject><subject>Cryptography</subject><subject>Digital imaging</subject><subject>Encryption</subject><subject>Feistel network</subject><subject>Hash functions</subject><subject>image cryptosystem</subject><subject>Image encryption</subject><subject>Image enhancement</subject><subject>Mathematical models</subject><subject>Performance evaluation</subject><subject>Permutations</subject><subject>Polynomials</subject><subject>Resistance</subject><subject>Security</subject><subject>Sensitivity analysis</subject><subject>Statistical methods</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUU1P4zAQjRArgYBfwB4scU7xR-zYR4gKWwlYVl3O1sSZlJQkLk66Vf897gYh5jIzb-Y9e_SS5JLRGWPUXN8UxXy5nHHKs5nIhJJSHyWnnCmTCinU8bf6JLkYhjWNoSMk89Nkt-hHXAUYm35F_myhOpSOPPt23_uugZZAX5Hlvit9G_HiFfxh_gib9BYGrMgdNsOILXnCcefDGxk9WXSb4P9hzLBCMu9d2G_GxvfkGUPtQwe9w_PkRw3tgBef-Sx5uZv_LX6lD7_vF8XNQ-q4NmMqXV5h7lTpgOoccgnG5EY7KDMwmWS1o6LWjGpE5ZjGTHAKtSwdl65ElouzZDHpVh7WdhOaDsLeemjsf8CHlYUQL2rR8sxpRZUuq5JlNeaxkeBYLY1jXGsWta4mrXje-xaH0a79NvTx-1ZQQ41Wkqm4JaYtF_wwBKy_XmXUHgyzk2H2YJj9NCyyfk6sBhG_MRSnlHPxATkWksQ</recordid><startdate>2024</startdate><enddate>2024</enddate><creator>Winarno, Edy</creator><creator>Hadikurniawati, Wiwien</creator><creator>Nugroho, Kristiawan</creator><creator>Lusiana, Veronica</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0002-7488-5660</orcidid><orcidid>https://orcid.org/0000-0002-9980-2593</orcidid></search><sort><creationdate>2024</creationdate><title>Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance</title><author>Winarno, Edy ; Hadikurniawati, Wiwien ; Nugroho, Kristiawan ; Lusiana, Veronica</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c289t-5c7de7c6bca087a75a99798cab4a9451fc03f8108ee6c18e4320af5bc25cbe173</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Bifurcation</topic><topic>Chaos</topic><topic>Chaos theory</topic><topic>chaotic encryption</topic><topic>Chi-square test</topic><topic>Cryptography</topic><topic>Digital imaging</topic><topic>Encryption</topic><topic>Feistel network</topic><topic>Hash functions</topic><topic>image cryptosystem</topic><topic>Image encryption</topic><topic>Image enhancement</topic><topic>Mathematical models</topic><topic>Performance evaluation</topic><topic>Permutations</topic><topic>Polynomials</topic><topic>Resistance</topic><topic>Security</topic><topic>Sensitivity analysis</topic><topic>Statistical methods</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Winarno, Edy</creatorcontrib><creatorcontrib>Hadikurniawati, Wiwien</creatorcontrib><creatorcontrib>Nugroho, Kristiawan</creatorcontrib><creatorcontrib>Lusiana, Veronica</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Winarno, Edy</au><au>Hadikurniawati, Wiwien</au><au>Nugroho, Kristiawan</au><au>Lusiana, Veronica</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2024</date><risdate>2024</risdate><volume>12</volume><spage>106720</spage><epage>106734</epage><pages>106720-106734</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>This research introduces an innovative image encryption method that amalgamates two secure and efficient chaotic maps, namely a 2D Simplified Quadratic Polynomial Map (2D-SQPM) and a 2D Symbolic Chaotic Map (2D-SCM), within an enhanced Feistel network structure. The primary motivation for this research is to address the limitations of current image encryption methods that are vulnerable to statistical and differential attacks. A hash function is also integrated to elevate the key's security and sensitivity. Unlike standard Feistel networks, which split the plaintext into two parts and employ only XOR operations at the bit level, this research's Feistel Network modification involves dividing the plaintext into four sections and introducing a diverse set of operations, including substitution and permutation at both the bit and byte levels across different parts, thereby optimizing confusion and diffusion effects. The empirical evaluation demonstrates that this method significantly reduces pixel correlation and strengthens encryption against statistical and differential attacks. Supported by various analytical tools like entropy analysis, NPCR, UACI, chi-square, key space and sensitivity analysis, robustness testing, and NIST suite evaluations, the proposed method significantly enhances image encryption performance. In conclusion, the proposed method effectively secures image data and sets a new benchmark in image encryption. The significance of this research lies in its integration of complex, chaotic dynamics and advanced encryption mechanisms, providing a substantial contribution to digital information security.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2024.3436558</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0002-7488-5660</orcidid><orcidid>https://orcid.org/0000-0002-9980-2593</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2024, Vol.12, p.106720-106734 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_crossref_primary_10_1109_ACCESS_2024_3436558 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Bifurcation Chaos Chaos theory chaotic encryption Chi-square test Cryptography Digital imaging Encryption Feistel network Hash functions image cryptosystem Image encryption Image enhancement Mathematical models Performance evaluation Permutations Polynomials Resistance Security Sensitivity analysis Statistical methods |
title | Integrating Quadratic Polynomial and Symbolic Chaotic Map-Based Feistel Network to Improve Image Encryption Performance |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-18T07%3A39%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Integrating%20Quadratic%20Polynomial%20and%20Symbolic%20Chaotic%20Map-Based%20Feistel%20Network%20to%20Improve%20Image%20Encryption%20Performance&rft.jtitle=IEEE%20access&rft.au=Winarno,%20Edy&rft.date=2024&rft.volume=12&rft.spage=106720&rft.epage=106734&rft.pages=106720-106734&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2024.3436558&rft_dat=%3Cproquest_cross%3E3090986516%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3090986516&rft_id=info:pmid/&rft_ieee_id=10620022&rft_doaj_id=oai_doaj_org_article_24c86068bdb14fe78605ac1f59c12881&rfr_iscdi=true |