Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes
The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmet...
Gespeichert in:
Veröffentlicht in: | IEEE access 2023-01, Vol.11, p.1-1 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE access |
container_volume | 11 |
creator | Gabr, Mohamed Elias, Rimon Hosny, Khalid Papakostas, George A. Alexan, Wassim |
description | The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in this research work. In this method, the authors hybridize the Chen and Chua chaotic functions with a Memristor circuit to benefit from the strengths of each. Such a hybridization of systems allows for the generation of pseudo-random numbers which are used to develop encryption keys and substitution boxes (S-boxes). For the application of the generated encryption keys towards carrying out data diffusion, instead of the most commonly used approach of bit-stream level XOR , this work utilizes different logical and arithmetic operations, which is made possible by performing this process over variable numerical bases. Moreover, multiple S-boxes of varying base- n are generated and utilized in a parallel fashion, carrying out data confusion. The computed numerical results reflect the superior capabilities of the proposed image encryption technique, signifying resilience and robustness against various attacks. |
doi_str_mv | 10.1109/ACCESS.2023.3301460 |
format | Article |
fullrecord | <record><control><sourceid>proquest_ieee_</sourceid><recordid>TN_cdi_ieee_primary_10201875</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10201875</ieee_id><doaj_id>oai_doaj_org_article_3d359786736249d6b4ac234b69fd79af</doaj_id><sourcerecordid>2851355191</sourcerecordid><originalsourceid>FETCH-LOGICAL-c409t-7d167fb23c9ef2fa93010c48ca56945a635e067e89ce96afca4f9b1fdf656b8c3</originalsourceid><addsrcrecordid>eNpNUE1PwkAQbYwmEuQX6KGJ5-J-t3vwgA0iCVEiet5Mt7ukpHRxtxj59xaLxrnM5M28Ny8viq4xGmOM5N0kz6er1ZggQseUIswEOosGBAuZUE7F-b_5MhqFsEFdZR3E00F0P9_C2sTTRvvDrq1cE39WED9AMEkTL1-fZyGGpoyX4KGuTf27WSWF-zLhKrqwUAczOvVh9P44fcufksXLbJ5PFolmSLZJWmKR2oJQLY0lFmTnEmmWaeBCMg6CcoNEajKpjRRgNTArC2xLK7goMk2H0bzXLR1s1M5XW_AH5aBSP4DzawW-rXRtFC0pl2kmUioIk6UoGGhCWSGkLVMJttO67bV23n3sTWjVxu1909lXJOOYco4l7q5of6W9C8Eb-_cVI3WMXfWxq2Ps6hR7x7rpWZUx5h-DIJylnH4DnfN7gA</addsrcrecordid><sourcetype>Open Website</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2851355191</pqid></control><display><type>article</type><title>Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes</title><source>IEEE Open Access Journals</source><source>DOAJ Directory of Open Access Journals</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Gabr, Mohamed ; Elias, Rimon ; Hosny, Khalid ; Papakostas, George A. ; Alexan, Wassim</creator><creatorcontrib>Gabr, Mohamed ; Elias, Rimon ; Hosny, Khalid ; Papakostas, George A. ; Alexan, Wassim</creatorcontrib><description>The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in this research work. In this method, the authors hybridize the Chen and Chua chaotic functions with a Memristor circuit to benefit from the strengths of each. Such a hybridization of systems allows for the generation of pseudo-random numbers which are used to develop encryption keys and substitution boxes (S-boxes). For the application of the generated encryption keys towards carrying out data diffusion, instead of the most commonly used approach of bit-stream level XOR , this work utilizes different logical and arithmetic operations, which is made possible by performing this process over variable numerical bases. Moreover, multiple S-boxes of varying base- n are generated and utilized in a parallel fashion, carrying out data confusion. The computed numerical results reflect the superior capabilities of the proposed image encryption technique, signifying resilience and robustness against various attacks.</description><identifier>ISSN: 2169-3536</identifier><identifier>EISSN: 2169-3536</identifier><identifier>DOI: 10.1109/ACCESS.2023.3301460</identifier><identifier>CODEN: IAECCG</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Aerospace electronics ; Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n key ; Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n S-box ; Base-n key ; base-n S-box ; Boxes ; Chaos theory ; Chen ; Chua ; Circuits ; Cryptography ; Encryption ; Fractional-order ; Heuristic algorithms ; Hyperchaotic map ; Image cryptosystem ; Image encryption ; Mathematical analysis ; Memristor ; Memristors ; Multimedia ; Parallel S-boxes ; Pseudorandom ; Random numbers ; Robustness (mathematics) ; Security ; Streaming media</subject><ispartof>IEEE access, 2023-01, Vol.11, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c409t-7d167fb23c9ef2fa93010c48ca56945a635e067e89ce96afca4f9b1fdf656b8c3</citedby><cites>FETCH-LOGICAL-c409t-7d167fb23c9ef2fa93010c48ca56945a635e067e89ce96afca4f9b1fdf656b8c3</cites><orcidid>0000-0001-6159-4971 ; 0000-0001-5545-1499 ; 0000-0001-8065-8977 ; 0000-0001-6321-096X ; 0000-0003-3690-9585</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10201875$$EHTML$$P50$$Gieee$$Hfree_for_read</linktohtml><link.rule.ids>314,777,781,861,2096,27614,27905,27906,54914</link.rule.ids></links><search><creatorcontrib>Gabr, Mohamed</creatorcontrib><creatorcontrib>Elias, Rimon</creatorcontrib><creatorcontrib>Hosny, Khalid</creatorcontrib><creatorcontrib>Papakostas, George A.</creatorcontrib><creatorcontrib>Alexan, Wassim</creatorcontrib><title>Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes</title><title>IEEE access</title><addtitle>Access</addtitle><description>The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in this research work. In this method, the authors hybridize the Chen and Chua chaotic functions with a Memristor circuit to benefit from the strengths of each. Such a hybridization of systems allows for the generation of pseudo-random numbers which are used to develop encryption keys and substitution boxes (S-boxes). For the application of the generated encryption keys towards carrying out data diffusion, instead of the most commonly used approach of bit-stream level XOR , this work utilizes different logical and arithmetic operations, which is made possible by performing this process over variable numerical bases. Moreover, multiple S-boxes of varying base- n are generated and utilized in a parallel fashion, carrying out data confusion. The computed numerical results reflect the superior capabilities of the proposed image encryption technique, signifying resilience and robustness against various attacks.</description><subject>Aerospace electronics</subject><subject>Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n key</subject><subject>Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n S-box</subject><subject>Base-n key</subject><subject>base-n S-box</subject><subject>Boxes</subject><subject>Chaos theory</subject><subject>Chen</subject><subject>Chua</subject><subject>Circuits</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Fractional-order</subject><subject>Heuristic algorithms</subject><subject>Hyperchaotic map</subject><subject>Image cryptosystem</subject><subject>Image encryption</subject><subject>Mathematical analysis</subject><subject>Memristor</subject><subject>Memristors</subject><subject>Multimedia</subject><subject>Parallel S-boxes</subject><subject>Pseudorandom</subject><subject>Random numbers</subject><subject>Robustness (mathematics)</subject><subject>Security</subject><subject>Streaming media</subject><issn>2169-3536</issn><issn>2169-3536</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>ESBDL</sourceid><sourceid>RIE</sourceid><sourceid>DOA</sourceid><recordid>eNpNUE1PwkAQbYwmEuQX6KGJ5-J-t3vwgA0iCVEiet5Mt7ukpHRxtxj59xaLxrnM5M28Ny8viq4xGmOM5N0kz6er1ZggQseUIswEOosGBAuZUE7F-b_5MhqFsEFdZR3E00F0P9_C2sTTRvvDrq1cE39WED9AMEkTL1-fZyGGpoyX4KGuTf27WSWF-zLhKrqwUAczOvVh9P44fcufksXLbJ5PFolmSLZJWmKR2oJQLY0lFmTnEmmWaeBCMg6CcoNEajKpjRRgNTArC2xLK7goMk2H0bzXLR1s1M5XW_AH5aBSP4DzawW-rXRtFC0pl2kmUioIk6UoGGhCWSGkLVMJttO67bV23n3sTWjVxu1909lXJOOYco4l7q5of6W9C8Eb-_cVI3WMXfWxq2Ps6hR7x7rpWZUx5h-DIJylnH4DnfN7gA</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Gabr, Mohamed</creator><creator>Elias, Rimon</creator><creator>Hosny, Khalid</creator><creator>Papakostas, George A.</creator><creator>Alexan, Wassim</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>ESBDL</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7SR</scope><scope>8BQ</scope><scope>8FD</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>DOA</scope><orcidid>https://orcid.org/0000-0001-6159-4971</orcidid><orcidid>https://orcid.org/0000-0001-5545-1499</orcidid><orcidid>https://orcid.org/0000-0001-8065-8977</orcidid><orcidid>https://orcid.org/0000-0001-6321-096X</orcidid><orcidid>https://orcid.org/0000-0003-3690-9585</orcidid></search><sort><creationdate>20230101</creationdate><title>Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes</title><author>Gabr, Mohamed ; Elias, Rimon ; Hosny, Khalid ; Papakostas, George A. ; Alexan, Wassim</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c409t-7d167fb23c9ef2fa93010c48ca56945a635e067e89ce96afca4f9b1fdf656b8c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Aerospace electronics</topic><topic>Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n key</topic><topic>Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n S-box</topic><topic>Base-n key</topic><topic>base-n S-box</topic><topic>Boxes</topic><topic>Chaos theory</topic><topic>Chen</topic><topic>Chua</topic><topic>Circuits</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Fractional-order</topic><topic>Heuristic algorithms</topic><topic>Hyperchaotic map</topic><topic>Image cryptosystem</topic><topic>Image encryption</topic><topic>Mathematical analysis</topic><topic>Memristor</topic><topic>Memristors</topic><topic>Multimedia</topic><topic>Parallel S-boxes</topic><topic>Pseudorandom</topic><topic>Random numbers</topic><topic>Robustness (mathematics)</topic><topic>Security</topic><topic>Streaming media</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gabr, Mohamed</creatorcontrib><creatorcontrib>Elias, Rimon</creatorcontrib><creatorcontrib>Hosny, Khalid</creatorcontrib><creatorcontrib>Papakostas, George A.</creatorcontrib><creatorcontrib>Alexan, Wassim</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE Open Access Journals</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>DOAJ Directory of Open Access Journals</collection><jtitle>IEEE access</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gabr, Mohamed</au><au>Elias, Rimon</au><au>Hosny, Khalid</au><au>Papakostas, George A.</au><au>Alexan, Wassim</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes</atitle><jtitle>IEEE access</jtitle><stitle>Access</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>11</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>2169-3536</issn><eissn>2169-3536</eissn><coden>IAECCG</coden><abstract>The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in this research work. In this method, the authors hybridize the Chen and Chua chaotic functions with a Memristor circuit to benefit from the strengths of each. Such a hybridization of systems allows for the generation of pseudo-random numbers which are used to develop encryption keys and substitution boxes (S-boxes). For the application of the generated encryption keys towards carrying out data diffusion, instead of the most commonly used approach of bit-stream level XOR , this work utilizes different logical and arithmetic operations, which is made possible by performing this process over variable numerical bases. Moreover, multiple S-boxes of varying base- n are generated and utilized in a parallel fashion, carrying out data confusion. The computed numerical results reflect the superior capabilities of the proposed image encryption technique, signifying resilience and robustness against various attacks.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/ACCESS.2023.3301460</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0001-6159-4971</orcidid><orcidid>https://orcid.org/0000-0001-5545-1499</orcidid><orcidid>https://orcid.org/0000-0001-8065-8977</orcidid><orcidid>https://orcid.org/0000-0001-6321-096X</orcidid><orcidid>https://orcid.org/0000-0003-3690-9585</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2169-3536 |
ispartof | IEEE access, 2023-01, Vol.11, p.1-1 |
issn | 2169-3536 2169-3536 |
language | eng |
recordid | cdi_ieee_primary_10201875 |
source | IEEE Open Access Journals; DOAJ Directory of Open Access Journals; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Aerospace electronics Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n key Base-<italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">n S-box Base-n key base-n S-box Boxes Chaos theory Chen Chua Circuits Cryptography Encryption Fractional-order Heuristic algorithms Hyperchaotic map Image cryptosystem Image encryption Mathematical analysis Memristor Memristors Multimedia Parallel S-boxes Pseudorandom Random numbers Robustness (mathematics) Security Streaming media |
title | Image Encryption via Base-n PRNGs and Parallel Base-n S-boxes |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T01%3A36%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Image%20Encryption%20via%20Base-n%20PRNGs%20and%20Parallel%20Base-n%20S-boxes&rft.jtitle=IEEE%20access&rft.au=Gabr,%20Mohamed&rft.date=2023-01-01&rft.volume=11&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=2169-3536&rft.eissn=2169-3536&rft.coden=IAECCG&rft_id=info:doi/10.1109/ACCESS.2023.3301460&rft_dat=%3Cproquest_ieee_%3E2851355191%3C/proquest_ieee_%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2851355191&rft_id=info:pmid/&rft_ieee_id=10201875&rft_doaj_id=oai_doaj_org_article_3d359786736249d6b4ac234b69fd79af&rfr_iscdi=true |