A novel symmetric image cryptosystem resistant to noise perturbation based on S 8 elliptic curve S-boxes and chaotic map
- PDF / 5,952,693 Bytes
- 31 Pages / 439.37 x 666.142 pts Page_size
- 43 Downloads / 128 Views
A novel symmetric image cryptosystem resistant to noise perturbation based on S8 elliptic curve S-boxes and chaotic maps Haris Aziz1,2 , Syed Mushhad Mustuzhar Gilani1,a Muhammad Azeem Abbas1
, Iqtadar Hussain3 ,
1 University Institute of Information Technology, Pir Mehr Ali Shah Arid Agriculture University, Rawalpindi,
Pakistan
2 U.S.-Pakistan Center for Advanced Studies in Energy (USPCAS-E), National University of Sciences and
Technology (NUST), H-12, Islamabad 44000, Pakistan
3 Department of Mathematics, Statistics and Physics, Qatar University, Doha 2713, Qatar
Received: 12 September 2020 / Accepted: 4 November 2020 © Società Italiana di Fisica and Springer-Verlag GmbH Germany, part of Springer Nature 2020
Abstract The recent decade has seen a tremendous escalation of multimedia and its applications. These modern applications demand diverse security requirements and innovative security platforms. In this manuscript, we proposed an algorithm for image encryption applications. The core structure of this algorithm relies on confusion and diffusion operations. The confusion is mainly done through the application of the elliptic curve and S8 symmetric group. The proposed work incorporates three distinct chaotic maps. A detailed investigation is presented to analyze the behavior of chaos for secure communication. The chaotic sequences are then accordingly applied to the proposed algorithm. The modular approach followed in the design framework and integration of chaotic maps into the system makes the algorithm viable for a variety of image encryption applications. The resiliency of the algorithm can further be enhanced by increasing the number of rounds and S-boxes deployed. The statistical findings and simulation results imply that the algorithm is resistant to various attacks. Moreover, the algorithm satisfies all major performance and quality metrics. The encryption scheme can also resist channel noise as well as noise-induced by a malicious user. The decryption is successfully done for noisy data with minor distortions. The overall results determine that the proposed algorithm contains good cryptographic properties and low computational complexity makes it viable to low profile applications.
1 Introduction The precipitous progression of information technology has contributed to an immense rise in digital systems. This perceives information security as a vital component of any digital system. Therefore, research and development in information security gather remarkable attention. Researchers around the globe have introduced substantial approaches along with new and novel assaults to secure digital systems. Recently data concealment techniques to encode and decode the data with the intention to stop any unauthorized access becomes
a e-mail: [email protected] (corresponding author)
0123456789().: V,-vol
123
907
Page 2 of 31
Eur. Phys. J. Plus
(2020) 135:907
front runner in information security [1, 2]. Cryptography relies on three core principals of authentication, integrity and privacy. Moreover,
Data Loading...