An efficient secure image encryption algorithm based on total shuffling, integer chaotic maps and median filter

Eihab Bashier
1,3+ and Taoufik Ben Jabeur2
 

1Sohar University, Sohar, Sultanate of Oman

ebashier@su.edu.om

 

2Dhofar University, Salalah, Sultanate of Oman

tjabeur@du.edu.om

 

3University of Khartoum, Khartoum, Sudan.

eihabbashier@gmail.com

 

Abstract

Developing a secure image encryption algorithm that can be implemented in devices with different hardware structures has remained a problematic issue, particularly for the real time applications. In this paper, we introduce two integer versions of chaotic maps, namely the quadratic chaotic map used to generate the parameters of the system and an integer version of Chebyshev chaotic maps used to generate permutations and chaotic sequences of integers. Then, we propose an image encryption algorithm that applies many rounds, each containing confusion and diffusion step in which a permutation is used to shuffle the pixels’ locations and the chaotic sequence is used to change the pixels’ densities. The proposed method is tested against many security measurements and some kinds of attacks for five standard images. It shows better performance over recent methods from the literature. The paper moreover discusses the performance of the decryption algorithm against the salt & pepper and crop attacks on the cipher image. It is found that the decipher image is seriously affected by high levels of noise or crop attacks. To overcome the limitations of the decryption algorithm at high levels of attacks, we proved first that the crop attack has same distribution as the salt & pepper noise attack. Then, an enhancement technique based on the use of median filter is proposed to reduce the effect of the attacks. It is shown from simulations that the enhancement decryption algorithm can double the image quality in terms of the PSNR.

Keywords: Chaotic maps, Crop attack, Image encryption, Key sensitivity, Median filter, Permutations,

Salt and pepper attack.

 

+: Corresponding author: Eihab Bashier
Faculty of Education and Arts, Sohar University, P.O. Box: 44, Postal Code: 311, Sohar, Oman, Tel: +968-9207-9850

 

Journal of Internet Services and Information Security (JISIS), 11(2): 46-77, May 2021

Received: February 21, 2021; Accepted: May 16, 2021; Published: May 31, 2021

DOI: 10.22667/JISIS.2021.05.31.046 [pdf]