Image encryption algorithm based on digital filters controlled by 2D robust chaotic map

This paper introduces a new cryptosystem algorithm based on digital filters; as an encryption operation, second-order and third-order IIR digital filters are used, and as a decryption operation, second-order and third-order FIR digital filters are used: Chaos in digital filters is caused by the over...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Optik (Stuttgart) Jg. 264; S. 169382
Hauptverfasser: Madouri, Z.B., Hadj Said, N., Ali Pacha, A.
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Elsevier GmbH 01.08.2022
Schlagworte:
ISSN:0030-4026, 1618-1336
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper introduces a new cryptosystem algorithm based on digital filters; as an encryption operation, second-order and third-order IIR digital filters are used, and as a decryption operation, second-order and third-order FIR digital filters are used: Chaos in digital filters is caused by the overflow non-linearity function. Both IIR and FIR digital filters are controlled by the first random sequence of zeros and ones produced by the 2D robust chaotic map, while the filters coefficients are generated by the second sequence, so that each pixel is encrypted and decrypted with different coefficients. Fisher-Yates shuffle has been used to obtain a random permutation of the position of the pixels of the original image, so that, the rows are shuffled first, then the columns, based on random numbers obtained by a hyperchaotic map 2D-LICM and 2D-SLIM respectively. Another algorithm based only on a single digital IIR/FIR filter is also presented in this work to allow us to demonstrate the development and high security of the proposed approach. Simulation and experimental results with performance analysis are carried out to demonstrate that our algorithm has high security and can resist various attacks such as differential attacks and statistical attacks.
ISSN:0030-4026
1618-1336
DOI:10.1016/j.ijleo.2022.169382