Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach
Abstract In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security and real-time applications. While a few of them outperform in terms of robust security, others perform well for real-time applications where...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Nature Portfolio
2024-05-01
|
| Series: | Scientific Reports |
| Online Access: | https://doi.org/10.1038/s41598-024-62260-3 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1846101319834664960 |
|---|---|
| author | Mohammad Mazyad Hazzazi Mujeeb Ur Rehman Arslan Shafique Amer Aljaedi Zaid Bassfar Aminu Bello Usman |
| author_facet | Mohammad Mazyad Hazzazi Mujeeb Ur Rehman Arslan Shafique Amer Aljaedi Zaid Bassfar Aminu Bello Usman |
| author_sort | Mohammad Mazyad Hazzazi |
| collection | DOAJ |
| description | Abstract In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security and real-time applications. While a few of them outperform in terms of robust security, others perform well for real-time applications where less processing time is required. Balancing these two aspects poses a challenge, aiming to achieve efficient encryption without compromising security. To address this challenge, the proposed research presents a robust data security approach for encrypting grayscale images, comprising five key phases. The first and second phases of the proposed encryption framework are dedicated to the generation of secret keys and the confusion stage, respectively. While the level-1, level-2, and level-2 diffusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image, followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shuffling. To enhance security, Tribonacci Transformation (TT) creates level-1 diffusion in the permuted image. Level-2 diffusion is introduced to further strengthen the diffusion within the plaintext image, which is achieved by decomposing the diffused image into eight-bit planes and implementing XOR operations with corresponding bit planes that are extracted from the key image. After that, the discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency sub-band (high-frequency sub-band) is substituted using the substitution box process. This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. Several statistical tests, including mean square error analysis, histogram variance analysis, entropy assessment, peak signal-to-noise ratio evaluation, correlation analysis, key space evaluation, and key sensitivity analysis, demonstrate the effectiveness of the proposed work. The proposed encryption framework achieves significant statistical values, with entropy, correlation, energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively. These results contribute to its robustness against cyberattacks. Moreover, the processing time of the proposed encryption framework is less than one second, which makes it more suitable for real-world applications. A detailed comparative analysis with the existing methods based on chaos, DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed encryption scheme outperforms the existing ones. |
| format | Article |
| id | doaj-art-292930b56a2f48e3b8fa9aa2a47f4528 |
| institution | Kabale University |
| issn | 2045-2322 |
| language | English |
| publishDate | 2024-05-01 |
| publisher | Nature Portfolio |
| record_format | Article |
| series | Scientific Reports |
| spelling | doaj-art-292930b56a2f48e3b8fa9aa2a47f45282024-12-29T12:16:08ZengNature PortfolioScientific Reports2045-23222024-05-0114112310.1038/s41598-024-62260-3Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approachMohammad Mazyad Hazzazi0Mujeeb Ur Rehman1Arslan Shafique2Amer Aljaedi3Zaid Bassfar4Aminu Bello Usman5Department of Mathematics, College of Science, King Khalid UniversityCyber Technology Institute, School of Computer Science and Informatics, De Montfort UniversitySchool of Electronic and Nanoscale Engineering, University of GlasgowCollege of Computing and Information Technology, University of TabukCollege of Computing and Information Technology, University of TabukSchool of Computer Science, University of SunderlandAbstract In recent years, numerous image encryption schemes have been developed that demonstrate different levels of effectiveness in terms of robust security and real-time applications. While a few of them outperform in terms of robust security, others perform well for real-time applications where less processing time is required. Balancing these two aspects poses a challenge, aiming to achieve efficient encryption without compromising security. To address this challenge, the proposed research presents a robust data security approach for encrypting grayscale images, comprising five key phases. The first and second phases of the proposed encryption framework are dedicated to the generation of secret keys and the confusion stage, respectively. While the level-1, level-2, and level-2 diffusions are performed in phases 3, 4, and 5, respectively, The proposed approach begins with secret key generation using chaotic maps for the initial pixel scrambling in the plaintext image, followed by employing the Fibonacci Transformation (FT) for an additional layer of pixel shuffling. To enhance security, Tribonacci Transformation (TT) creates level-1 diffusion in the permuted image. Level-2 diffusion is introduced to further strengthen the diffusion within the plaintext image, which is achieved by decomposing the diffused image into eight-bit planes and implementing XOR operations with corresponding bit planes that are extracted from the key image. After that, the discrete wavelet transform (DWT) is employed to develop secondary keys. The DWT frequency sub-band (high-frequency sub-band) is substituted using the substitution box process. This creates further diffusion (level 3 diffusion) to make it difficult for an attacker to recover the plaintext image from an encrypted image. Several statistical tests, including mean square error analysis, histogram variance analysis, entropy assessment, peak signal-to-noise ratio evaluation, correlation analysis, key space evaluation, and key sensitivity analysis, demonstrate the effectiveness of the proposed work. The proposed encryption framework achieves significant statistical values, with entropy, correlation, energy, and histogram variance values standing at 7.999, 0.0001, 0.0156, and 6458, respectively. These results contribute to its robustness against cyberattacks. Moreover, the processing time of the proposed encryption framework is less than one second, which makes it more suitable for real-world applications. A detailed comparative analysis with the existing methods based on chaos, DWT, Tribonacci transformation (TT), and Fibonacci transformation (FT) reveals that the proposed encryption scheme outperforms the existing ones.https://doi.org/10.1038/s41598-024-62260-3 |
| spellingShingle | Mohammad Mazyad Hazzazi Mujeeb Ur Rehman Arslan Shafique Amer Aljaedi Zaid Bassfar Aminu Bello Usman Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach Scientific Reports |
| title | Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach |
| title_full | Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach |
| title_fullStr | Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach |
| title_full_unstemmed | Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach |
| title_short | Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach |
| title_sort | enhancing image security via chaotic maps fibonacci tribonacci transformations and dwt diffusion a robust data encryption approach |
| url | https://doi.org/10.1038/s41598-024-62260-3 |
| work_keys_str_mv | AT mohammadmazyadhazzazi enhancingimagesecurityviachaoticmapsfibonaccitribonaccitransformationsanddwtdiffusionarobustdataencryptionapproach AT mujeeburrehman enhancingimagesecurityviachaoticmapsfibonaccitribonaccitransformationsanddwtdiffusionarobustdataencryptionapproach AT arslanshafique enhancingimagesecurityviachaoticmapsfibonaccitribonaccitransformationsanddwtdiffusionarobustdataencryptionapproach AT ameraljaedi enhancingimagesecurityviachaoticmapsfibonaccitribonaccitransformationsanddwtdiffusionarobustdataencryptionapproach AT zaidbassfar enhancingimagesecurityviachaoticmapsfibonaccitribonaccitransformationsanddwtdiffusionarobustdataencryptionapproach AT aminubellousman enhancingimagesecurityviachaoticmapsfibonaccitribonaccitransformationsanddwtdiffusionarobustdataencryptionapproach |