An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization

DOI:

https://doi.org/10.36371/port.2023.4.3

Authors

  • Qutaiba K. Abed Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad, Iraq
  • Waleed A. Mahmoud Al-Jawher College Engineering, Uruk University, Baghdad, Iraq.

Through the development of communication technology, fast and efficient tools are required to practically secure the process of data exchange in securing images. This paper presents a new method of encryption for protecting images against many attacks from unsafe public networks. Lorenz chaos map is used to generate a sequence of random numbers for each stage depending on the initial parameters. The Hunter Prey optimization algorithm is applied in order to obtain these parameters to use them based on the original image. Therefore, the random sequence number generated by the Lorenz chaotic map will be different from one image to another. That will make it unpredictable and very difficult to discover the process of encryption. The results of simulation experiments demonstrate that the encryption algorithm have passed the plaintext sensitivity test with the NPCR of 0.99785 and the UACI of 0.33623. As well as the correlation coefficient test values in the three directions gave the values of (v = -0.0007, h = -0.0000, d = 0.0005). Also, the calculated information entropy test value was 7.9983. These results demonstrate that this algorithm is very strong enough to withstand the various types of attacks that images can be exposed during transmission on the Internet or any public network. The security analysis's comparison of the proposed changes to similar ones revealed that the proposed encryption system is more efficient.

Keywords:

Hunter pray algorithm, , Image encryption, Lorenz chaotic map, Parameter adjustment

[1] S. Thakur, A. K. Singh, S. P. Ghrera, and M. Elhoseny, “Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications,” Multimed Tools Appl, vol. 78, pp. 3457–3470, 2019.

[2] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, “Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain”, International Journal of Computers and Applications, Vol. 45, Issue 4, pp. 306-322, 2023.

[3] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher ”Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos” , Journal of Electronic Imaging, Volume 32, Issue 4, Pages 043038-043038, 2023.

[4] K. M. Hosny, M. M. Darwish, K. Li, and A. Salah, “Parallel multi-core CPU and GPU for fast and robust medical image watermarking,” IEEE Access, vol. 6, pp. 77212–77225, 2018.

[5] T. Xiang, J. Hu, and J. Sun, “Outsourcing chaotic selective image encryption to the cloud with steganography,” Digit Signal Process, vol. 43, pp. 28–37, 2015.

[6] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher,”URUK 4D DISCRETE CHAOTIC MAP FOR SECURE COMMUNICATION APPLICATIONS” Journal Port Science Research, Vol. 5, Issue 3, PP. 131-141, 2023.

[7] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, “Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain” International Journal of Computers and Applications, Volume 45, Issue 4, Pages 306-322, 2023.

[8] T. Xiang, J. Hu, and J. Sun, “Outsourcing chaotic selective image encryption to the cloud with steganography,” Digit Signal Process, vol. 43, pp. 28–37, 2015.

[9] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, “WAM 3D discrete chaotic map for secure communication applications” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 45-54, 2022.

[10] H. Ghanbari-Ghalehjoughi, M. Eslami, S. Ahmadi-Kandjani, M. Ghanbari-Ghalehjoughi, and Z. Yu, “Multiple layer encryption and steganography via multi-channel ghost imaging,” Opt Lasers Eng, vol. 134, p. 106227, 2020.

[11] S. E. El-Khamy, N. O. Korany, and A. G. Mohamed, “A new fuzzy-DNA image encryption and steganography technique,” IEEE Access, vol. 8, pp. 148935–148951, 2020.

[12] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher” Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos” Journal of Electronic Imaging, Volume 32, Issue 4, Pages 043038-043038, 2023.

[13] K. Y. Hu, J. Wang, and Y. Wang, “Image encryption based on block compression sensing and the improved magic square transformation,” Laser Technology, vol. 43, no. 4, pp. 96–102, 2019.

[14] G. Cheng, C. Wang, and C. Xu, “A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing,” Multimed Tools Appl, vol. 79, no. 39–40, pp. 29243–29263, 2020.

[15] Zahraa A Hasan, Suha M Hadi, Waleed A Mahmoud, “Speech scrambler with multiwavelet, Arnold Transform and particle swarm optimization” Journal Pollack Periodica, Volume 18, Issue 3, Pages 125-131, 2023.

[16] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher “A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet–Fourier Transforms” Journal of Cyber Security and Mobility, Pages 435–464-435–464, 2023.

[17] M. Z. Talhaoui, X. Wang, and M. A. Midoun, “Fast image encryption algorithm with high security level using the Bülban chaotic map,” J Real Time Image Process, vol. 18, pp. 85–98, 2021.

[18] J. Deng, M. Zhou, C. Wang, S. Wang, and C. Xu, “Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops,” Multimed Tools Appl, vol. 80, pp. 13821–13840, 2021.

[19] W. A. Mahmoud Al-Jawher Zahraa A Hasan, Suha M. Hadi “Speech scrambling based on multiwavelet and Arnold transformations” Indonesian Journal of Electrical Engineering and Computer Science, Volume 30, Issue 2, Pages 927-935, 2023.

[20] W. A. Mahmoud Al-Jawher, Zahraa A Hasan, Suha M. Hadi ”Time Domain Speech Scrambler Based on Particle Swarm Optimization” International Journal for Engineering and Information Sciences, Vol. 18, Issue 1, PP. 161-166, 2023.

[21] M. Zhou and C. Wang, “A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks,” Signal Processing, vol. 171, p. 107484, 2020.

[22] Qutaiba K Abed, Waleed A Mahmoud Al-Jawher “ANEW ARCHITECTURE OF KEY GENERATION USING DWT FOR IMAGE ENCRYPTION WITH THREE LEVELS ARNOLD TRANSFORM PERMUTATION” Journal Port Science Research, Volume 5, Issue 3, Pages 166–177, 2022.

[23] Qutaiba K Abed, Waleed A Mahmoud Al-Jawher “A Robust Image Encryption Scheme Based on Block Compressive Sensing and Wavelet Transform” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 7-13, 2022.

[24] Y. Zhou, W. Cao, and C. L. P. Chen, “Image encryption using binary bitplane,” Signal Processing, vol. 100, pp. 197–207, 2014.

[25] A. Elghandour, A. Salah, and A. Karawia, “A new cryptographic algorithm via a two-dimensional chaotic map,” Ain Shams Engineering Journal, vol. 13, no. 1, p. 101489, 2022.

[26] Z. Hua, S. Yi, and Y. Zhou, “Medical image encryption using high-speed scrambling and pixel adaptive diffusion,” Signal Processing, vol. 144, pp. 134–144, 2018.

[27] H. Liu and A. Kadir, “Asymmetric color image encryption scheme using 2D discrete-time map,” Signal Processing, vol. 113, pp. 104–112, 2015.

[28] H. Shen, F. Yu, C. Wang, J. Sun, and S. Cai, “Firing mechanism based on single memristive neuron and double memristive coupled neurons,” Nonlinear Dyn, vol. 110, no. 4, pp. 3807–3822, 2022.

[29] F. Yu, X. Kong, A. A. M. Mokbel, W. Yao, and S. Cai, “Complex dynamics, hardware implementation and image encryption application of multiscroll memeristive Hopfield neural network with a novel local active memeristor,” IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 70, no. 1, pp. 326–330, 2022.

[30] F. Yu et al., “Dynamic analysis and application in medical digital image watermarking of a new multi-scroll neural network with quartic nonlinear memristor,” The European Physical Journal Plus, vol. 137, no. 4, p. 434, 2022.

[31] F. Yu et al., “Dynamic analysis and audio encryption application in IoT of a multi-scroll fractional-order memristive Hopfield neural network,” Fractal and Fractional, vol. 6, no. 7, p. 370, 2022.

[32] J. Liu, M. Zhang, X. Tong, and Z. Wang, “Image compression and encryption algorithm based on compressive sensing and nonlinear diffusion,” Multimed Tools Appl, vol. 80, pp. 25433–25452, 2021.

[33] X. Lv, X. Liao, and B. Yang, “A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems,” Multimed Tools Appl, vol. 77, pp. 28633–28663, 2018.

[34] M. K. Khairullah, A. A. Alkahtani, M. Z. Bin Baharuddin, and A. M. Al-Jubari, “Designing 1D chaotic maps for fast chaotic image encryption,” Electronics (Basel), vol. 10, no. 17, p. 2116, 2021.

[35] R. Lan, J. He, S. Wang, T. Gu, and X. Luo, “Integrated chaotic systems for image encryption,” Signal Processing, vol. 147, pp. 133–145, 2018.

[36] C. Li, G. Luo, K. Qin, and C. Li, “An image encryption scheme based on chaotic tent map,” Nonlinear Dyn, vol. 87, pp. 127–133, 2017.

[37] Y. Su, Y. Wo, and G. Han, “Reversible cellular automata image encryption for similarity search,” Signal Process Image Commun, vol. 72, pp. 134–147, 2019.

[38] Y.-G. Yang, J. Tian, H. Lei, Y.-H. Zhou, and W.-M. Shi, “Novel quantum image encryption using one-dimensional quantum cellular automata,” Inf Sci (N Y), vol. 345, pp. 257–270, 2016.

[39] Y. Wang, Y. Zhao, Q. Zhou, and Z. Lin, “Image encryption using partitioned cellular automata,” Neurocomputing, vol. 275, pp. 1318–1332, 2018.

[40] Y. Hui, H. Liu, and P. Fang, “A DNA image encryption based on a new hyperchaotic system,” Multimed Tools Appl, pp. 1–25, 2021.

[41] S. Zhou, P. He, and N. Kasabov, “A dynamic DNA color image encryption method based on SHA-512,” Entropy, vol. 22, no. 10, p. 1091, 2020.

[42] W. Xingyuan, G. Suo, Y. Xiaolin, Z. Shuang, and W. Mingxu, “A new image encryption algorithm with cantor diagonal scrambling based on the PUMCML system,” International Journal of Bifurcation and Chaos, vol. 31, no. 01, p. 2150003, 2021.

[43] H. Lin, C. Wang, L. Cui, Y. Sun, C. Xu, and F. Yu, “Brain-like initial-boosted hyperchaos and application in biomedical image encryption,” IEEE Trans Industr Inform, vol. 18, no. 12, pp. 8839–8850, 2022.

[44] P. Fang, H. Liu, and C. Wu, “A novel chaotic block image encryption algorithm based on deep convolutional generative adversarial networks,” IEEE Access, vol. 9, pp. 18497–18517, 2020.

[45] A. Yaghouti Niyat and M. H. Moattar, “Color image encryption based on hybrid chaotic system and DNA sequences,” Multimed Tools Appl, vol. 79, no. 1–2, pp. 1497–1518, 2020.

[46] X. Wang, Y. Su, C. Luo, and C. Wang, “A novel image encryption algorithm based on fractional order 5D cellular neural network and Fisher-Yates scrambling,” PLoS One, vol. 15, no. 7, p. e0236015, 2020.

[47] R. Matthews, “On the derivation of a ‘chaotic’ encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989.

[48] T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Phys Lett A, vol. 372, no. 4, pp. 394–400, 2008.

[49] R. Rhouma and S. Belghith, “Cryptanalysis of a new image encryption algorithm based on hyper-chaos,” Phys Lett A, vol. 372, no. 38, pp. 5973–5978, 2008.

[50] F.-G. Jeng, W.-L. Huang, and T.-H. Chen, “Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes,” Signal Process Image Commun, vol. 34, pp. 45–51, 2015.

[51] H. Liu and X. Wang, “Color image encryption based on one-time keys and robust chaotic maps,” Computers & Mathematics with Applications, vol. 59, no. 10, pp. 3320–3327, 2010.

[52] X. Wang and Y. Li, “Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence,” Opt Lasers Eng, vol. 137, p. 106393, 2021.

[53] Z. Hao, Z. Wang, D. Bai, B. Tao, X. Tong, and B. Chen, “Intelligent detection of steel defects based on improved split attention networks,” Front Bioeng Biotechnol, vol. 9, p. 810876, 2022.

[54] X.-Y. Wang, L. Yang, R. Liu, and A. Kadir, “A chaotic image encryption algorithm based on perceptron model,” Nonlinear Dyn, vol. 62, pp. 615–621, 2010.

[55] J. Wang, X. Song, and A. A. A. El-Latif, “Single-objective particle swarm optimization-based chaotic image encryption scheme,” Electronics (Basel), vol. 11, no. 16, p. 2628, 2022.

[56] J. A. Lazzús, M. Rivera, and C. H. López-Caraballo, “Parameter estimation of Lorenz chaotic system using a hybrid swarm intelligence algorithm,” Phys Lett A, vol. 380, no. 11–12, pp. 1164–1171, 2016.

[57] I. Naruei, F. Keynia, and A. Sabbagh Molahosseini, “Hunter–prey optimization: Algorithm and applications,” Soft comput, vol. 26, no. 3, pp. 1279–1314, 2022.

[58] Waleed Ameen Mahmoud “A Smart Single Matrix Realization of Fast Walidlet Transform” Journal International Journal of Research and Reviews in Computer Science, Volume 2, Issue, 1, Pages 144-151, 2011.

[59] Hamid M Hasan, Waleed A. Mahmoud Al- Jawher, Majid A Alwan “3-d face recognition using improved 3d mixed transform” Journal International Journal of Biometrics and Bioinformatics (IJBB), Volume 6, Issue 1, Pages 278-290, 2012.

[60] Abbas H Kattoush, Waleed A Mahmoud, Ali Shaheen, Ahed Ghodayyah “The performance of proposed one dimensional serial Radon based OFDM system under different channel conditions” The International Journal of Computers, Systems and Signals, Volume 9, Issue 2, Pages 412-422, 2008.

[61] Abbas Hasan Kattoush, Waleed Ameen Mahmoud Al-Jawher, Sulaiman M Abbas, Ali Tweij Shaheen “A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models” Journal of Wireless Personal Communications, Volume 58, Pages 695-711, 2011.

[62] Waleed A Mahmoud, Ali A Ali, & Saad N Abdul Majed “Wavelet Based Multi Carrier Code Division Multiple Access” proceeding of 5th International Multi-Conference on Systems, Signals and Devices, pages 1-6, 2008

[63] . Hadeel Al-Taai Walid Mahmoud, Mutaz Abdulwahab “New fast method for computing multiwavelet coefficients from 1D up to 3D” Proc. 1st Int. Conference on Digital Comm. & Comp. App., Jordan, Pages 412-422

[64] Waleed A. Mahmoud, MS Abdulwahab, HN Al-Taai “The Determination of 3D Multiwavelet Transform” IJCCCE, Volume 2, Issue 4, pages 28-46 2005.

[65] Waleed A Mahmoud, Majed E Alneby, Wael H Zayer “2D-multiwavelet transform 2D-two activation function wavelet network-based face recognition” J. Appl. Sci. Res, vol. 6, issue 8, 1019-1028, 2010.

Abed, Q. K. ., & Al-Jawher, W. A. M. . (2023). An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization. Journal Port Science Research, 6(4), 332–343. https://doi.org/10.36371/port.2023.4.3

Downloads

Download data is not yet available.

Most read articles by the same author(s)

1 2 > >>