A modified image encryption algorithm based on the  chaotic Tent map

Main Article Content

Dmitro V. Dmitrishin
Vitaly M. Khamitov
Svitlana G. Antoshchuk
Viktor O. Boltenkov

Abstract

In a number of professional image exchange industries over open communication channels, ensuring the confidentiality and security of images is a key requirement. Furthermore, image exchange must be carried out quickly. These industries include telemedicine, forensic and forensic examinations, high-resolution satellite imagery transmission, and the Internet of Things. In this context, developing image encryption algorithms that meet these requirements is highly relevant. Encryption systems based on chaotic maps offer promising solutions for such problems. Chaotic map-based encryption is a data security algorithm (most often, images) that exploits the properties of deterministic chaos to generate pseudorandom sequences. The key advantages of these algorithms are sensitivity to initial conditions; speed—the algorithms are mathematically simple and faster than many classical ciphers; and security—they provide protection against statistical attacks and brute-force attacks thanks to a huge key space. These algorithms are used to encrypt multimedia (particularly images) in industries where high-speed processing of large volumes of data while maintaining a high level of confidentiality is essential. A modified image encryption algorithm based on the Tent chaotic map has been developed. This algorithm generates a long pseudorandom sequence based on a short key (seed). This sequence is then applied to image encryption using the Vernam algorithm. The sequence can be long enough to encrypt a large image. An integrated encryption quality criterion has been developed for comparative evaluation of encryption quality. The integral criterion combines encryption quality metrics (correlation, entropy, and resistance metrics) into a convolution constructed using the ideal point method. To evaluate the quality of the developed encryption algorithm, a preliminary computer experiment was conducted. In the experiment, the developed algorithm was compared with well-known stream and block encryption standards. The experiment revealed that, by most individual criteria and by the integral quality criterion, the developed algorithm is virtually equal to the standards, but operates significantly faster. This allows us to recommend the developed algorithm for real-time image encryption. A limitation of the developed algorithm is its inability to work with compressed images.

Downloads

Download data is not yet available.

Article Details

Topics

Section

Theoretical aspects of computer science, programming and data analysis

Authors

Author Biographies

Dmitro V. Dmitrishin, Odesa Polytechnic National University, 1, Shevchenko Ave. Odesa, 65044, Ukraine

Doctor of Engineering Sciences, Professor, Department of Applied Mathematics and Information Technologies

Scopus Author ID: 55756757000

Vitaly M. Khamitov , Odesa Polytechnic National University, 1, Shevchenkа Ave, Odesa, 65044, Ukraine

PhD student, Department of Information Systems

Scopus Author ID: 58309128700

Svitlana G. Antoshchuk, Odesa Polytechnic National University, 1, Shevchenko Ave. Odesa, 65044, Ukraine

Doctor of Engineering Sciences, Professor, Head of Computer Systems Institute

Scopus Author ID: 8393582500

Viktor O. Boltenkov, Odesa Polytechnic National University, 1, Shevchenko Ave. Odesa, 65044, Ukraine

PhD, Associate Professor, Information System Department

Scopus Author ID: 57203623617

Most read articles by the same author(s)

1 2 > >>