A color image privacy scheme established on nonlinear system of coupled differential equations

  • PDF / 2,401,285 Bytes
  • 15 Pages / 439.37 x 666.142 pts Page_size
  • 90 Downloads / 219 Views

DOWNLOAD

REPORT


A color image privacy scheme established on nonlinear system of coupled differential equations Adnan Javeed 1 & Tariq Shah 1 & Atta Ullah 1 Received: 21 July 2019 / Revised: 2 July 2020 / Accepted: 11 August 2020 # Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract

In this manuscript, an encryption technique is developed using a coupled chaotic system of differential equations. The lengthy process of recurring rounds of encryption consumes more space and time on the computing systems demands simple but yet applicable scheme of image encryption, which opens the gateway of the utilization of complex and nonlinear chaotic systems. The proposed image encryption procedure is fast as implementation is concerned because of containing only one round, furthermore, it is found resistant against any type of differential and linear attacks due to the large keyspace and involvement of complex mathematical systems. The third order nonlinearity of Rabinovich-Fabrikant (RF) system of differential equations generates rich and complex chaotic dynamics. Initially, this system is used to generate three chaotic sequences of pseudorandom numbers from the numerical solution of RF system. Then, a color image being converted into three layers is passed from three mathematical operations i.e. XOR, permutation and substitution to create confusion and diffusion in them to generate enciphered image. Moreover, encrypted images successfully passed the NIST SP-800 test and encryption analyses like correlation, histogram and information entropy etc. Keywords Differential equations . Chaotic system . Image privacy . Encryption analysis

1 Introduction The importance of computers and the internet in communication is a well established fact of this contemporary world. The general public from different sections of civilization is trusting such a mode of communication either willingly or unwillingly. The most hassle-free and speedy communication via internet is indeed an ultimate necessity of manhood in this era. Extensive deployment of soft computing devices has closed the doors for old and traditional communicating mechanisms like

* Atta Ullah [email protected]

1

Department of Mathematics, National University of Technology, Islamabad, Pakistan

Multimedia Tools and Applications

post offices and mail bearing alche etc. Communication by means of trusted populaces was the secure mode of transmission of messages. Everyone is monitored on the internet by different mechanisms of artificial intelligence is a naked truth of this era. The security of data transferred on the internet is the core concern of the general public. The insecure channel is the chief crux of the matter of security apprehensions. Even though this is in the mind of the public that they are being watched but still they have no other option to rely on for secure communication. Data security is a broader field and each of its components demands deep and thorough investigation. Mainly, it includes the protection of data from alteration to illegitimate access