Optimized Color Image Encryption Using Arnold Transform, URUK Chaotic Map and GWO Algorithm

DOI:

https://doi.org/10.36371/port.2024.3.3

Authors

  • Qutaiba K. Abed Informatics Institute for Postgraduate Studies, Iraqi Commission for Computers and Informatics, Baghdad, Iraq.
  • Waleed A. Mahmoud Al-Jawher College of Engineering, Uruk University, Baghdad, Iraq

A new image encryption algorithm based on the Arnold transform and URUK chaotic maps is proposed to deal with the issues of inadequate security and low encryption efficiency. Colored images consist of three linked channels used in the scheme. This method uses different keys to break the correlations between adjacent pixels in each channel. First, the plain image is split into RGB channels to encrypt each channel separately. Second, the Arnold transform performs pixel permutation, resulting in scrambled channels. third, the URUK chaotic maps generate three key vectors to perform pixel diffusion, resulting in diffused channels used as input for the following step. Finally, the GWO shuffles each channel independently, to get the minimum correlation between image pixels, which are then merged to obtain a cipher image. This method generates the cipher image with great unpredictability and security. The security is evaluated using various measures. The results demonstrated a high level of security attained by successfully encrypting colored images. Recent encryption algorithms are compared in terms of entropy, correlation coefficients, and attack robustness. The proposed method provided outstanding security and outperformed existing image encryption algorithms.

Keywords:

Arnold transform, GWO, Fnet, URUK chaotic map

[1] Magdy, M., Hosny, K.M., Ghali, N.I., Ghoniemy, S.: Security of medical images for telemedicine: a systematic review. Multimedia Tools Appl. 81(18), 25101–25145 (2022)

[2] Hosny, K.M., Zaki, M.A., Lashin, N.A., Fouda, M.M., Hamza, H.M.: Multimedia security using encryption: a survey. IEEE Access 11, 63027–63056 (2023)

[3] Tahiri, M.A., et al.: New color image encryption using hybrid optimization algorithm and Krawtchouk fractional transformations. Vis. Comput. 39(12), 6395–6420 (2023)

[4] Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput. 39(3), 1027–1044 (2023)

[5] Kaur, S., Singh, S., Kaur, M., et al.: Systematic review of computational image steganography approaches. Arch. Comput. Methods Eng. 29, 4775–4797 (2022)

[6] Eid, W.M., Alotaibi, S.S., Alqahtani, H.M., Saleh, S.Q.: Digital image steganalysis: current methodologies and future challenges. IEEE Access 10, 92321–92336 (2022)

[7] Abdel-Aziz, M.M., Hosny, K.M., Lashin, N.A.: Improved data hiding method for securing color images. Multimedia Tools Appl. 80, 12641–12670 (2021)

[8] Hassan, F.S., Gutub, A.: Improving data hiding within colour images using hue component of HSV colour space. CAAI Trans. Intell. Technol. 7(1), 56–68 (2022)

[9] Hosny, K.M., Darwish, M.M.: Robust color image watermarking using multiple fractional-order moments and chaotic map. Multimedia Tools Appl. 81(17), 24347–24375 (2022)

[10] Magdy, M., Ghali, N.I., Ghoniemy, S., Hosny, K.M.: Multiple zero watermarking of medical images for Internet of medical things. IEEE Access 10, 38821–38831 (2022)

[11] Talhaoui, M.Z., Wang, X.: A new fractional one-dimensional chaotic map and its application in high-speed image encryption. Inf. Sci. 550, 13–26 (2021)

[12] Wen, H., et al.: Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci. Rep. 13(1), 14721 (2023)

[13] Wen, H., et al.: Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion. iScience 27(1), 108610 (2024)

[14] Ramakrishnan, B., et al.: Image encryption based on S-box generation constructed by using a chaotic autonomous snap system with only one equilibrium point. Multimedia Tools Appl. 83(8), 23509–23532 (2024)

[15] Wen, H., et al. Exploring the future application of UAVs: Face image privacy protection scheme based on chaos and DNA cryptography. Journal of King Saud University—Computer and Information Sciences, 36(1), 101871. (2024).

[16] Wang, X., Liu, P.: A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans. Circuits Syst. I: Regul. Pap. 69(3), 1291–1301 (2021)

[17] Hosny, K.M., Kamal, S.T., Darwish, M.M.: Color image encryption technique using block scrambling and chaos. Multimedia Tools Appl. 81, 505–525 (2022)

[18] Liu, X., et al.: Memcapacitor-coupled Chebyshev hyperchaotic map. Int. J. Bifurcation Chaos 32(12), 2250180 (2022)

[19] Xu, J., & Zhang, H. The image compression–encryption algorithm based on the compression sensing and fractional-order chaotic system. Visual Computing, 45(1), 123-134 (2022).

[20] Gao, X., et al.: An effective multiple-image encryption algorithm based on 3D cube and hyperchaotic map. J. King Saud Univ.—Comput. Inf. Sci. 34(4), 1535–1551 (2022)

[21] Han, X., et al.: A new set of hyperchaotic maps based on modulation and coupling. Eur. Phys. J. Plus 137(4), 523 (2022)

[22] Ren, L., et al.: A hyperchaotic map with a new discrete memristor model: design, dynamical analysis, implementation, and application. Chaos, Solitons Fractals 167, 113024 (2023)

[23] Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)

[24] Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 08(06), 1259–1284 (1998)

[25] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher ”Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos” , Journal of Electronic Imaging, Volume 32, Issue 4, Pages 043038-043038, 2023.

[26] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, ”URUK 4D DISCRETE CHAOTIC MAP FOR SECURE COMMUNICATION APPLICATIONS” Journal Port Science Research, Vol. 5, Issue 3, PP. 131-141, 2023.

[27] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, “Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain” International Journal of Computers and Applications, Volume 45, Issue 4, Pages 306-322, 2023.

[28] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, “WAM 3D discrete chaotic map for secure communication applications” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 45-54, 2022.

[29] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher” Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos” Journal of Electronic Imaging, Volume 32, Issue 4, Pages 043038-043038, 2023.

[30] Zahraa A Hasan, Suha M Hadi, Waleed A Mahmoud, “Speech scrambler with multiwavelet, Arnold Transform and particle swarm optimization” Journal Pollack Periodica, Volume 18, Issue 3, Pages 125-131, 2023.

[31] W. A. Mahmoud Al-Jawher Zahraa A Hasan, Suha M. Hadi “Speech scrambling based on multiwavelet and Arnold transformations” Indonesian Journal of Electrical Engineering and Computer Science, Volume 30, Issue 2, Pages 927-935, 2023.

[32] W. A. Mahmoud Al-Jawher, Zahraa A Hasan, Suha M. Hadi,” Time Domain Speech Scrambler Based on Particle Swarm Optimization” International Journal for Engineering and Information Sciences, Vol. 18, Issue 1, PP. 161-166, 2023.

[33] Liu, Q., et al. A novel image encryption algorithm based on chaos maps with Markov properties. Commun. Nonlinear Sci. Numer. Simul. 20(2), 506–515 (2015)

[34] Wang, L., Song, H., Liu, P.: A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Lasers Eng. 77, 118–125 (2016)

[35] Ali, D.S., Alwan, N.A., Al-Saidi, N.M.G.: Image encryption based on highly sensitive chaotic system. AIP Conf. Proc. 2183(1), 080007 (2019)

[36] Sun, J., et al.: A memristive chaotic system with hyper multistability and its application in image encryption. IEEE Access 8, 139289–139298 (2020)

[37] Ali, T.S., Ali, R.: A new chaos-based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools Appl. 79(27-28), 19853–19873 (2020)

[38] Xiang, H., Liu, L.: An improved digital logistic map and its application in image encryption. Multimedia Tools Appl. 79, 30329–30355 (2020)

[39] Mondal, B., Mandal, T.: A secure image encryption scheme based on genetic operations and a new hybrid pseudorandom number generator. Multimedia Tools Appl. 79(25-26), 17497–17520 (2020)

[40] Bouteghrine, B., Tanougast, C., Sadoudi, S.: Novel image encryption algorithm based on new 3-D chaos map. Multimedia Tools Appl. 80, 25583–25605 (2021)

[41] Mou, J., et al.: Image compression and encryption algorithm based on hyper-chaotic map. Mob. Netw. Appl. 26, 1849–1861 (2021)

[42] Qian, X., et al.: A novel color image encryption algorithm based on three dimensional chaotic maps and reconstruction techniques. IEEE Access 9, 61334–61345 (2021)

[43] Wen, H., & Lin, Y. Cryptanalyzing an image cipher using multiple chaos and DNA operations. Journal of King Saud University—Computer and Information Sciences, 35(7), 101612 (2023).

[44] Q. K. Abed and W. A. M. Al-Jawher, "A Robust Image Encryption Scheme Based on Block Compressive Sensing and Wavelet Transform," Int. J. Innov. Comput., vol. 13, no. 1-2, pp. 7-13, 2022.

[45] Q. K. Abed and W. A. M. Al-Jawher, "A New Architecture of Key Generation Using DWT for Image Encryption with Three Levels Arnold Transform Permutation," J. Port Sci. Res., vol. 5, no. 3, pp. 166-177, 2022..‏

[46] Q. K. Abed and W. A. M. Al-Jawher, "An Image Encryption Method Based on Lorenz Chaotic Map and Hunter-Prey Optimization," J. Port Sci. Res., vol. 6, no. 4, pp. 332-343, 2023.

[47] Wen, H., Lin, Y., Feng, Z.: Cryptanalyzing a bit-level image encryption algorithm based on chaotic maps. Eng. Sci. Technol. Int J. 51, 101634 (2024)

[48] Wen, H., Lin, Y.: Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Expert Syst. Appl. 237, 121514 (2024)

[49] A. A. Abdul-Kareem and W. A. M. Al-Jawher, "A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet-Fourier Transforms," J. Cyber Secur. Mobility, pp. 435-464, 2023.

[50] WA Mahmoud, AS Hadi, TM Jawad “Development of a 2-D Wavelet Transform based on Kronecker Product” - Al-Nahrain Journal of Science, Vol. 15, Issue 4, PP. 208-213, 2012.

[51] H. Al-Taai, Waleed A. Mahmoud & M. Abdulwahab “New fast method for computing multiwavelet coefficients from 1D up to 3D” , Proc. 1st Int. Conference on Digital Comm. & Comp. App., Jordan, PP. 412-422, 2007.

[52] Waleed A. Mahmoud Al-Jawher, T Abbas – “Feature combination and mapping using multiwavelet transform” IASJ, AL-Rafidain, Issue 19, Pages 13-34, 2006

[53] WA Mahmoud, MS Abdulwahab, HN Al-Taai: “The Determination of 3D Multiwavelet Transform” IJCCCE, vol. 2, issue 4, 2005.

[54] WA Mahmoud, ALM Rasheed “3D Image Denoising by Using 3D Multiwavelet” AL-Mustansiriya J. Sci 21 (7), 108-136, 2010.

[55] [WA Mahmoud “Computation of Wavelet and Multiwavelet Transforms Using Fast Fourier Transform” Journal Port Science Research 4 (2), 111-117, 2021.

[56] Walid A Mahmoud, Majed E Alneby, Wael H Zayer “2D-multiwavelet transform 2D-two activation function wavelet network-based face recognition” J. Appl. Sci. Res, vol. 6, issue 8, 1019-1028, 2010.

[57] Hamid M Hasan, Waleed A. Mahmoud Al- Jawher, Majid A Alwan “3-d face recognition using improved 3d mixed transform” Journal International Journal of Biometrics and Bioinformatics (IJBB), Volume 6, Issue 1, Pages 278-290, 2012.

[58] Waleed A Mahmoud, MR Shaker “3D Ear Print Authentication using 3D Radon Transform” proceeding of 2nd International Conference on Information & Communication Technologies, Pages 1052-1056, 2006.

[59] AHM Al-Heladi, WA Mahmoud, HA Hali, AF Fadhel “Multispectral Image Fusion using Walidlet Transform” Advances in Modelling and Analysis B, Volume 52, Iss. 1-2, pp. 1-20, 2009.

[60] Waleed Ameen Mahmoud “A Smart Single Matrix Realization of Fast Walidlet Transform” Journal of Research and Reviews in Computer Science, Volume 2, Issue, 1, PP 144-151, 2011.

[61] W. A. Mahmoud, J J. Stephan and A. A. Razzak “Facial Expression Recognition Using Fast Walidlet Hybrid Transform” Journal port Science Researchو Volume3, No:1, Pages 59-69 2020.

[62] Maryam I Mousa Al-Khuzaay, Waleed A Mahmoud Al-Jawher, “New Proposed Mixed Transforms: CAW and FAW and Their Application in Medical Image Classification” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 15-21, 2022.

[63] Waleed A Mahmoud, Dheyaa J Kadhim “A Proposal Algorithm to Solve Delay Constraint Least Cost Optimization Problem” Journal of Engineering, Vol. 19, Iss 1, PP 155-160, 2013.

[64] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher, “Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain”, International Journal of Computers and Applications, Vol. 45, Issue 4, pp. 306-322, 2023.

[65] WAM Al-Jawher, SH Awad “A proposed brain tumor detection algorithm using Multi wavelet Transform (MWT)” Materials Today: Proceedings 65, 2731-2737, 2022.

[66] W. A. Mahmoud & I.K. Ibraheem "Image Denoising Using Stationary Wavelet Transform” Signals, Inf. Patt. Proc. & Class. Vol. 46, Issue 4, Pages 1-18, 2003.

[67] Saleem MR Taha, Walid A Mahmood "New techniques for Daubechies wavelets and multiwavelets implementation using quantum computing " 2013, Journal Facta universitatis-series: Electronics and Energetics, Volume 26, Issue 2, Pages 145-156, 2013.

[68] [Maryam I Mousa Al-Khuzaay, Waleed A Mahmoud Al-Jawher “New Proposed Mixed Transforms: CAW and FAW and Their Application in Medical Image Classification” International Journal of Innovative Computing, Vol. 13, Issue 1-2, PP. 15-21, 2022.

[69] WA Mahmoud, A. I. Abbas, NAS Alwan “Face Identification Using Back-Propagation Adaptive Multiwavelet” Journal of Engineering 18 (3), 2012.

[70] WA Mahmoud, ZJM Saleh, NK Wafi “The Determination of Critical-Sampling Scheme of Preprocessing for Multiwavelets Decomposition as 1st and 2nd Orders of Approximations.” Journal of Al-Khwarizmi Engineering Journal, Volume 1, Issue 1, Pages 26-37, 2005.

[71] W. A. Mahmoud Z Jalal & N. K. Wafi “A New Method of Computing Multi-wavelets Transform using Repeated Row Preprocessing.” Al-Rafidain Engineering Journal, Vol. 12, Issue 2, PP. 21-31., 2004.

[72] W. A. Mahmoud & I. A Al-Akialy “A Tabulated Method of Computation Multiwavelet Transform” Al-Rafidain University College, Vol. 15, PP. 161-170, Iraq, 2004.

[73] W. A. Mahmoud & Z. J. M. Saleh “ An Algorithm for Computing Multiwavelets &Inverse Transform Using an Over-Sampled Scheme of Pre& Post processing respectively” Engineering Journal, Vol. 10, Issue 2, PP. 270-288, 2004.

[74] J. Lee-Thorp, J. Ainslie, I. Eckstein, and S. Ontanon, "FNet: Mixing Tokens with Fourier Transforms," arXiv preprint arXiv:2105.03824, 2021.

[75] Q. Kadhim and W. A. M. Al-Jawher, "A New Multiple-Chaos Image Encryption Algorithm Based on Block Compressive Sensing, Swin Transformer, and Wild Horse Optimization," Multidiscip. Sci. J., vol. 7, no. 1, pp. 2025012, 2024.

[76] AH Salman, WAM Al-Jawher “A Hybrid Multiwavelet Transform with Grey Wolf Optimization Used for an Efficient Classification of Documents” International Journal of Innovative Computing 13 (1-2), 55-60, 2022.

[77] Waleed A Mahmoud Al-Jawher, Shaimaa A Shaaban “K-Mean Based Hyper-Metaheuristic Grey Wolf and Cuckoo Search Optimizers for Automatic MRI Medical Image Clustering” Journal Port Science Research, Volume 7, Issue 3, Pages 109-120, 2024.

[78] Waleed A. Mahmud Al-Jawher, Dr. Talib M. Jawad Abbas Al-Talib, R. Hamudi A. Salman “Fingerprint Image Recognition Using Walidlet Transform” Australian Journal of Basic and Applied Sciences, Australia, 2012.

[79] Sarah H Awad Waleed A Mahmoud Al-Jawher “Precise Classification of Brain Magnetic Resonance Imaging (MRIs) using Gray Wolf Optimization (GWO)” HSOA Journal of Brain & Neuroscience Research, Volume 6, Issue 1, Pages 100021, 2022.

[80] Ibraheem Al-Jadir, Waleed A Mahmoud “A grey wolf optimizer feature selection method and its effect on the performance of document classification problem” journal port science research, Vol. 4, Issue 2, Pages 125-131, 2021.

[81] Afrah U Mosaa, Waleed A Mahmoud Al-Jawher “A proposed Hyper-Heuristic optimizer Nesting Grey Wolf Optimizer and COOT Algorithm pages for Multilevel Task” Journal Port Science Research, Vol. 6, Issue 4, Pages 310-317, 2023.

[82] Afrah U Mosa, Waleed A Mahmoud Al-Jawher “Image Fusion Algorithm using Grey Wolf optimization with Shuffled Frog Leaping Algorithm” International Journal of Innovative Computing, Vol. 13, Issue 1-2, PP. 1-5. 2022.

[83] Singh, S.P.; Bhatnagar, G. A Novel Biometric Inspired Robust Security Framework for Medical Images. IEEE Trans. Knowl. Data Eng. 2021, 33, 810–823.

[84] ElKamchouchi, D.H.; Mohamed, H.G.; Moussa, K.H. A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy 2020, 22, 180.

[85] Wang, X.; Chen, S.; Zhang, Y. A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Technol. 2021, 138, 106837.

[86] Gao, X.: A color image encryption algorithm based on an improved Hénon map. Phys. Scr. 96(6), 065203 (2021)

[87] Hosny, K.M., Kamal, S.T., Darwish, M.M.: Novel encryption for color images using fractional-order hyperchaotic system. J. Ambient Intell. Hum. Comput. 13, 973–988 (2022)

[88] Alexan, W., et al. Color image encryption through chaos and KAA map. IEEE Access 11, 11541–11554 (2023)

Abed, Q. K. ., & Al-Jawher, W. A. M. . (2024). Optimized Color Image Encryption Using Arnold Transform, URUK Chaotic Map and GWO Algorithm . Journal Port Science Research, 7(3), .219–236. https://doi.org/10.36371/port.2024.3.3

Downloads

Download data is not yet available.

Most read articles by the same author(s)