| تعداد نشریات | 31 |
| تعداد شمارهها | 834 |
| تعداد مقالات | 8,015 |
| تعداد مشاهده مقاله | 14,851,820 |
| تعداد دریافت فایل اصل مقاله | 9,586,053 |
An Adaptive Image Encryption Scheme Guided by Fuzzy Models | ||
| Iranian Journal of Fuzzy Systems | ||
| دوره 21، شماره 1، فروردین و اردیبهشت 2024، صفحه 1-18 اصل مقاله (1.32 M) | ||
| نوع مقاله: Research Paper | ||
| شناسه دیجیتال (DOI): 10.22111/ijfs.2023.44875.7915 | ||
| نویسندگان | ||
| Mahdi Shariatzadeh1؛ Mohammad Javad Rostami* 1؛ Mahdi Eftekhari1؛ Saeed Saryazdi2 | ||
| 1Shahid Bahonar University of Kerman | ||
| 2Shahid Bahonar University | ||
| چکیده | ||
| A new image encryption scheme using the advanced encryption standard (AES), a chaotic map, a genetic operator, and a fuzzy inference system is proposed in this paper. In this work, plain images were used as input, and the required security level was achieved. Security criteria were computed after running a proposed encryption process. Then an adaptive fuzzy system decided whether to repeat the encryption process, terminate it, or run the next stage based on the achieved results and user demand. The SHA-512 hash function was employed to increase key sensitivity. Security analysis was conducted to evaluate the security of the proposed scheme, which showed it had high security and all the criteria necessary for a good and efficient encryption algorithm were met. Simulation results and the comparison of similar works showed the proposed encryptor had a pseudo-noise output and was strongly dependent upon the changing key and plain image. | ||
| کلیدواژهها | ||
| Image Encryption؛ Chaotic map؛ Genetic Algorithm؛ FIS؛ AES | ||
| مراجع | ||
|
[1] A. A. Abdulla, H. Sellahewa, S. A. Jassim, Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images, Multimedia Tools and Applications, 78(13) (2019), 17799-17823. [2] A. Arab, M. J. Rostami, B. Ghavami, An image encryption method based on chaos system and AES algorithm, The Journal of Supercomputing, 75(10) (2019), 6663-6682. [3] S. Bahrami, M. Naderi, Image encryption using a lightweight stream encryption algorithm, Advances in Multimedia, 2012 (2012). DOI: 10.1155/2012/767364. [4] P. V. de Campos Souza, E. Lughofer, A. J. Guimaraes, An interpretable evolving fuzzy neural network based on self-organized direction-aware data partitioning and fuzzy logic neurons, Applied Soft Computing, (2021), 107829. [5] Y. Ding, F. Tan, Z. Qin, M. Cao, K. K. Raymond Choo, Z. Qin, Deepkeygen: A deep learning-based stream cipher generator for medical image encryption and decryption, IEEE Transactions on Neural Networks and Learning Systems, 33(9) (2021), 4915-4929. [6] R. Enayatifar, A. Hanan Abdullah, I. Fauzi Isnin, Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence, Optics and Lasers in Engineering, 56 (2014), 83-93. [7] R. Enayatifar, A. Hanan Abdullah, I. Fauzi Isnin, A. Altameem, M. Lee, Image encryption using a synchronous permutation-diffusion technique, Optics and Lasers in Engineering, 90 (2017), 146-154. [8] S. Fatima Raza, V. Satpute, A novel bit permutation-based image encryption algorithm, Nonlinear Dynamics, 95(2) (2019), 859-873. [9] Y. Hashemi, Design a new image encryption using fuzzy integral permutation with coupled chaotic maps, International Journal of Research in Computer Science, 3(1) (2013), 27. [10] H. Hermassi, R. Rhouma, S. Belghith, Improvement of an image encryption algorithm based on hyper-chaos, Telecommunication Systems, 52(2) (2013), 539-549. [11] N. N. Hurrah, S. A. Parah, N. A. Loan, J. A. Sheikh, M. Elhoseny, K. Muhammad, Dual watermarking framework for privacy protection and content authentication of multimedia, Future Generation Computer Systems, 94 (2019), 654-673. [12] M. Kaur, V. Kumar, A comprehensive review on image encryption techniques, Archives of Computational Methods in Engineering, 27(1) (2020), 15-43. [13] A. Kumar, R. Rhouma, Y. Wang, N. Sklavos, M. K. Ghose, Comments on,“a blind source separation-based method for multiple images encryption”, Communications in Nonlinear Science and Numerical Simulation, 16(3) (2011), 1675-1686. [14] P. Kumar Naskar, S. Bhattacharyya, D. Nandy, A. Chaudhuri, A robust image encryption scheme using chaotic tent map and cellular automata, Nonlinear Dynamics, 100(3) (2020), 2877-2898. [15] C. Li, G. Luo, K. Qin, C. Li, An image encryption scheme based on chaotic tent map, Nonlinear Dynamics, 87(1) (2017), 127-133. [16] Y. P. Li, C. Wang, H. Chen, A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation, Optics and Lasers in Engineering, 90 (2017), 238-246. [17] X. Li, L. Wang, Y. Yan, P. Liu, An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems, Optik, 127(5) (2016), 2558-2565. [18] W. Liu, K. Sun, C. Zhu, A fast image encryption algorithm based on chaotic map, Optics and Lasers in Engineering, 84 (2016), 26-36. [19] J. Liu, S. Tang, J. Lian, Y. Ma, X. Zhang, A novel fourth order chaotic system and its algorithm for medical image encryption, Multidimensional Systems and Signal Processing, 30(4) (2019), 1637-1657. [20] T. Manoj Kumar, P. Karthigaikumar, Fpga implementation of an optimized key expansion module of AES algorithm for secure transmission of personal ECG signals, Design Automation for Embedded Systems, 22(1) (2018), 13-24. [21] P. Mathivanan, A. Balaji Ganesh, Qr code based color image cryptography for the secured transmission of ECG signal, Multimedia Tools and Applications, 78(6) (2019), 6763-6786. [22] J. M. Mendel, Human-inspired-zadeh-sets and logic, In 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), (2020), 1-5. [23] K. Mirzaei Talarposhti, M. Khaki Jamei, A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map, Optics and Lasers in Engineering, 81 (2016), 21-34. [24] L. Na, W. Jing, A new defuzzification method for enhance performance of fuzzy logic control system, In Software Engineering and Knowledge Engineering: Theory and Practice, Springer, (2012), 403-409. [25] B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, M. R. Mosavi, A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process, Multimedia Tools and Applications, 71(3) (2014), 1469-1497. [26] C. Pak, L. Huang, A new color image encryption using combination of the 1d chaotic map, Signal Processing, 138 (2017), 129-137. [27] P. Ping, F. Xu, Z. J. Wang, Image encryption based on non-Affine and balanced cellular automata, Signal Processing, 105 (2014), 419-429. [28] G. R. S. Qaid, S. N. Talbar, Encrypting image by using fuzzy logic algorithm, International Journal of Image Processing and Vision Sciences (IJIPVS), 2(1) (2013), 25-29. [29] A. G. Radwan, S. H. Abd-El-Haleem, S. K. Abd-El-Hafiz, Symmetric encryption algorithms using chaotic and non-chaotic generators: A review, Journal of Advanced Research, 7(2) (2016), 193-208. [30] M. J. Rostami, S. Saryazdi, H. Nezamabadi-pour, A. Shahba, Chaos-based image encryption using sum operation modulo 4 and 256, IETE Journal of Research, 62(2) (2016), 179-188. [31] M. J. Rostami, A. Shahba, S. Saryazdi, H. Nezamabadi-pour, A novel parallel image encryption with chaotic windows based on logistic map, Computers and Electrical Engineering, 62 (2017), 384-400. [32] M. Roy, K. Mali, S. Chatterjee, S. Chakraborty, R. Debnath, S. Sen, A study on the applications of the biomedical image encryption methods for secured computer aided diagnostics, In 2019 Amity International Conference on Artificial Intelligence (AICAI), (2019), 881-886. [33] M. A. Salman, N. Ismat Seno, A comparison of Mamdani and Sugeno inference systems for a satellite image classification, Anbar Journal for Engineering Sciences, (2010). DOI: 10.1109/WAC.2006.376033. [34] N. Saravanan, A. Umamakeswari, Hap-cp-abe based encryption technique with hashed access policy based authentication scheme for privacy preserving of PHR, Microprocessors and Microsystems, 80 (2021), 103540.
[35] S. M. Seyedzadeh, B. Norouzi, S. Mirzakuchaki, RGB color image encryption based on choquet fuzzy integral, Journal of Systems and Software, 97 (2014), 128-139. [36] K. U. Shahna, A. Mohamed, A novel image encryption scheme using both pixel level and bit level permutation with chaotic map, Applied Soft Computing, 90 (2020), 106162. [37] M. Shariatzadeh, M. J. Rostami, M. Eftekhari, Proposing a novel dynamic aes for image encryption using a chaotic map key management approach, Optik, 246 (2021), 167779. [38] S. J. Sheela, K. V. Suresh, D. Tandur, Image encryption based on modified henon map using hybrid chaotic shift transform, Multimedia Tools and Applications, 77(19) (2018), 25223-25251. [39] C. Y. Song, Y. L. Qiao, X. Z. Zhang, An image encryption scheme based on new spatiotemporal chaos, Optik- International Journal for Light and Electron Optics, 124(18) (2013), 3329-3334. [40] J. Tang, Z. Yu, L. F. Liu, A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption, Multimedia Tools and Applications, 78(17) (2019), 24765-24788. [41] D. Torres-Mu˜noz, H. V´azquez-Leal, C. Hern´andez-Mej´ıa, Exploring a novel fusion-scheme based on mathematical equation system for encryption-image algorithm, Multimedia Tools and Applications, 79(33) (2020), 24873-24888. [42] X. Y.Wang, Q.Wang, Y. Q. Zhang, A fast image algorithm based on rows and columns switch, Nonlinear Dynamics, 79(2) (2015), 1141-1149. [43] X. J. Wu, H. Kan, J. Kurths, A new color image encryption scheme based on DNA sequences and multiple improved 1d chaotic maps, Applied Soft Computing, 37 (2015), 24-39. [44] J. Wu, X. F. Liao, B. Yang, Image encryption using 2d h´enon-sine map and dna approach, Signal Processing, 153 (2018), 11-23. [45] H. Xiang, L. F. Liu, An improved digital logistic map and its application in image encryption, Multimedia Tools and Applications, 79(41) (2020), 30329-30355. [46] H. Xu, K. Thakur, A. S. Kamruzzaman, Md. Liakat Ali, Applications of cryptography in database: A review, In 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), (2021), 1-6. [47] A. Yaghouti Niyat, M. H. Moattar, M. Niazi Torshiz, Color image encryption based on hybrid hyper-chaotic system and cellular automata, Optics and Lasers in Engineering, 90 (2017), 225-237. [48] G. Ye, K. W. Wong, An efficient chaotic image encryption algorithm based on a generalized Arnold map, Nonlinear Dynamics, 69(4) (2012), 2079-2087. [49] B. Yosefnezhad Irani, P. Ayubi, F. Amani Jabalkandi, M. Yousefi Valandar, M. Jafari Barani, Digital image scrambling based on a new one-dimensional coupled sine map, Nonlinear Dynamics, 97(4) (2019), 2693-2721. [50] M. Zakariya Talhaoui, X. Y. Wang, M. Amine Midoun, Fast image encryption algorithm with high security level using the b¨ulban chaotic map, Journal of Real-Time Image Processing, 18(1) (2021), 85-98. [51] Y. Zhang, Test and verification of AES used for image encryption, 3D Research, 9(1) (2018), 1-27.
[52] Y. Zhang, X. Q. Li, W. Hou, A fast image encryption scheme based on AES, In 2017 2nd International Conference on Image, Vision and Computing (ICIVC), (2017), 624-628. [53] Y. Zhang, Y. J. Tang, A plaintext-related image encryption algorithm based on chaos, Multimedia Tools and Applications, 77(6) (2018), 6647-6669. | ||
|
آمار تعداد مشاهده مقاله: 770 تعداد دریافت فایل اصل مقاله: 1,002 |
||