Duple Color Image Encryption System Based on 3-D Nonequilateral Arnold Transform for IIoT
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, which contains sensitive information. Therefore, how to protect data security is an important challenge in the development of IIoT. To this end, we propose a duple color image encryption method for IIoT. Differen...
Saved in:
| Published in: | IEEE transactions on industrial informatics Vol. 19; no. 7; pp. 8285 - 8294 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Piscataway
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
01.07.2023
|
| Subjects: | |
| ISSN: | 1551-3203, 1941-0050 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, which contains sensitive information. Therefore, how to protect data security is an important challenge in the development of IIoT. To this end, we propose a duple color image encryption method for IIoT. Different from the traditional algorithm that encrypts one plain image into one ciphertext image, our algorithm encrypts two color images into one color ciphertext image which can cause great confusion to the attacker who illegally breaks the ciphertext image. First, the proposed algorithm converts two color images with [Formula Omitted] into a 3-D bit-level matrix with [Formula Omitted]. Next, 3-D nonequilateral Arnold transform (3D-NEAT) is applied to permutate the positions of the elements of the resulted 3-D bit-level matrix. Then, the permutated 3-D bit-level matrix is transformed into three 2-D pixel-level images and then diffused by the random diffusion sequences that 3-D Lorenz system (3D-LS) generates. Finally, the scrambling matrices generated by 3D-LS are used to scramble three diffused 2-D pixel-level images, and the output is considered as three color components of the encrypted image. The numerical experiments and security analyses show that the proposed image encryption scheme has strong resistance to several known attacks, and yields near-zero correlation and near-eight entropy for the RGB cipher image, and its performance is better than some of the recently proposed image encryption algorithms. |
|---|---|
| AbstractList | In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, which contains sensitive information. Therefore, how to protect data security is an important challenge in the development of IIoT. To this end, we propose a duple color image encryption method for IIoT. Different from the traditional algorithm that encrypts one plain image into one ciphertext image, our algorithm encrypts two color images into one color ciphertext image which can cause great confusion to the attacker who illegally breaks the ciphertext image. First, the proposed algorithm converts two color images with [Formula Omitted] into a 3-D bit-level matrix with [Formula Omitted]. Next, 3-D nonequilateral Arnold transform (3D-NEAT) is applied to permutate the positions of the elements of the resulted 3-D bit-level matrix. Then, the permutated 3-D bit-level matrix is transformed into three 2-D pixel-level images and then diffused by the random diffusion sequences that 3-D Lorenz system (3D-LS) generates. Finally, the scrambling matrices generated by 3D-LS are used to scramble three diffused 2-D pixel-level images, and the output is considered as three color components of the encrypted image. The numerical experiments and security analyses show that the proposed image encryption scheme has strong resistance to several known attacks, and yields near-zero correlation and near-eight entropy for the RGB cipher image, and its performance is better than some of the recently proposed image encryption algorithms. |
| Author | Huang, Huiqing Cai, Zhanchuan |
| Author_xml | – sequence: 1 givenname: Huiqing surname: Huang fullname: Huang, Huiqing organization: School of Mathematics, Jiaying University, Meizhou, China – sequence: 2 givenname: Zhanchuan orcidid: 0000-0002-6954-7691 surname: Cai fullname: Cai, Zhanchuan organization: School of Computer Science and Engineering, Macau University of Science and Technology, Macau, China |
| BookMark | eNp1UDtPwzAYtFCRaAs7oyXmFD_iOBlLHxCpgoEwMFm246BUSZzaydB_j6N2QmL67pPuobsFmHW2MwA8YrTCGGXPRZ6vCCJkRQnmcUpuwBxnMY4QYmgWMGM4ogTRO7Dw_ogQ5Yhmc_C9HfvGwI1trIN5K38M3HXanfuhth38PPvBtPBFelPC8NNoC99D7mmsGzkYJxu4dp1tSlg42fnKuhZWk1Fui3twW8nGm4frXYKv_a7YvEWHj9d8sz5EmnA8RDzlScKRoqVUVRkHrLSuUk1iqWSmSZLEjDLFVYq54iljEnOsUVJmlVYmIXQJni6-vbOn0fhBHO3ouhApSErS0D9jOLCSC0s7670zldD1IKeSg5N1IzAS04wizCimGcV1xiBEf4S9q1vpzv9LfgFIxnVs |
| CitedBy_id | crossref_primary_10_1080_09540091_2025_2491340 crossref_primary_10_1007_s10586_024_04919_0 crossref_primary_10_1016_j_optcom_2025_132240 crossref_primary_10_1109_TCSVT_2024_3394951 crossref_primary_10_3390_math12091283 crossref_primary_10_1038_s41598_024_59277_z crossref_primary_10_1007_s11431_024_2678_7 crossref_primary_10_1016_j_dsp_2025_105495 crossref_primary_10_1016_j_jisa_2024_103921 crossref_primary_10_1088_1402_4896_ad54ff crossref_primary_10_1109_JIOT_2025_3587815 crossref_primary_10_1007_s11071_024_09905_0 crossref_primary_10_1080_09540091_2024_2312108 crossref_primary_10_1016_j_matcom_2024_10_031 crossref_primary_10_1007_s11071_024_09769_4 crossref_primary_10_1109_ACCESS_2024_3462547 crossref_primary_10_1109_JIOT_2024_3435136 crossref_primary_10_1088_1402_4896_ad99a0 crossref_primary_10_1088_1402_4896_acde1e crossref_primary_10_1016_j_compeleceng_2025_110482 crossref_primary_10_1109_MMUL_2024_3484414 crossref_primary_10_1109_ACCESS_2024_3446733 crossref_primary_10_1109_TCE_2025_3569829 crossref_primary_10_1109_ACCESS_2025_3547891 crossref_primary_10_1007_s00521_024_10599_z crossref_primary_10_1016_j_chaos_2024_115987 crossref_primary_10_1016_j_chaos_2025_116757 crossref_primary_10_1088_1402_4896_ad9fad crossref_primary_10_3390_math12040517 crossref_primary_10_1016_j_eswa_2024_123583 crossref_primary_10_1109_TII_2024_3476516 |
| Cites_doi | 10.1007/s11128-019-2386-3 10.1016/j.sigpro.2018.09.029 10.1007/s11042-020-09828-z 10.1007/s11042-021-11796-x 10.1016/j.sigpro.2011.11.004 10.1109/TMM.2016.2569497 10.36909/jer.v9i3A.10111 10.1016/j.optcom.2012.07.033 10.1016/j.jksuci.2020.07.008 10.1080/0161-118991863745 10.1016/j.sigpro.2017.10.004 10.1016/j.optlaseng.2020.106139 10.1109/TMM.2020.3011315 10.1016/j.ins.2012.07.049 10.1109/TII.2019.2913217 10.1049/iet-ipr.2018.5654 10.1007/s11042-022-12062-4 10.1007/s11071-018-4390-z 10.1007/s11042-021-11051-3 10.1007/s13369-021-05529-3 10.1049/iet-ipr.2016.0552 10.1016/j.sigpro.2019.107286 10.1007/s13369-020-04413-w 10.1016/j.chaos.2021.111334 10.1049/iet-ipr.2019.0551 10.1109/TII.2018.2852491 10.1109/TII.2018.2791944 10.1007/s11128-018-2104-6 10.1109/TII.2020.3014158 10.1109/ACCESS.2019.2958319 10.1049/iet-ipr.2019.0168 10.1007/s11042-022-13015-7 10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2 10.1142/S0218127410026563 10.1016/j.chaos.2021.111402 10.1007/s11042-020-09513-1 10.1117/1.jei.31.1.013031 10.1049/cit2.12053 10.1109/TII.2018.2832853 10.1142/S021812749800098X |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023 |
| DBID | AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1109/TII.2022.3217482 |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1941-0050 |
| EndPage | 8294 |
| ExternalDocumentID | 10_1109_TII_2022_3217482 |
| GroupedDBID | 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AASAJ AAWTH AAYXX ABQJQ ABVLG ACGFS ACIWK AENEX AETIX AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CITATION CS3 DU5 EBS EJD HZ~ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P RIA RIE RNS 7SC 7SP 8FD ABAZT JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c271t-7876670b3dabfd4667bccf8c24aba9c2664535b7b817b7855a171c06d9fcbe623 |
| ISICitedReferencesCount | 33 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001020261500041&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1551-3203 |
| IngestDate | Tue Sep 23 13:40:47 EDT 2025 Sat Nov 29 04:17:05 EST 2025 Tue Nov 18 22:35:35 EST 2025 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 7 |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c271t-7876670b3dabfd4667bccf8c24aba9c2664535b7b817b7855a171c06d9fcbe623 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6954-7691 |
| PQID | 2828005951 |
| PQPubID | 85507 |
| PageCount | 10 |
| ParticipantIDs | proquest_journals_2828005951 crossref_citationtrail_10_1109_TII_2022_3217482 crossref_primary_10_1109_TII_2022_3217482 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-07-01 |
| PublicationDateYYYYMMDD | 2023-07-01 |
| PublicationDate_xml | – month: 07 year: 2023 text: 2023-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE transactions on industrial informatics |
| PublicationYear | 2023 |
| Publisher | The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref35 ref12 ref15 ref37 ref14 ref36 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref39 ref16 Ma (ref21) 2003; 24 ref38 ref19 ref18 Zhang (ref22) 2007; 22 Li (ref30) 2009; 30 ref24 ref46 ref23 ref45 ref26 ref25 ref47 ref42 Shao (ref29) 2007; 35 ref41 Wu (ref31) 2010; 22 ref44 Arnold (ref20) 1967 ref43 (ref34) 2022 ref28 ref27 ref8 ref7 ref9 ref4 ref3 ref6 ref5 ref40 |
| References_xml | – ident: ref36 doi: 10.1007/s11128-019-2386-3 – ident: ref47 doi: 10.1016/j.sigpro.2018.09.029 – ident: ref23 doi: 10.1007/s11042-020-09828-z – ident: ref16 doi: 10.1007/s11042-021-11796-x – ident: ref45 doi: 10.1016/j.sigpro.2011.11.004 – ident: ref4 doi: 10.1109/TMM.2016.2569497 – ident: ref15 doi: 10.36909/jer.v9i3A.10111 – ident: ref26 doi: 10.1016/j.optcom.2012.07.033 – ident: ref9 doi: 10.1016/j.jksuci.2020.07.008 – volume: 22 start-page: 1831 issue: 10 year: 2010 ident: ref31 article-title: 3-Dimensional nonequilateral arnold transformation and its application in image scrambling publication-title: J. Comput.-Aided Des. Comput. Graph. – ident: ref17 doi: 10.1080/0161-118991863745 – ident: ref19 doi: 10.1016/j.sigpro.2017.10.004 – ident: ref28 doi: 10.1016/j.optlaseng.2020.106139 – ident: ref7 doi: 10.1109/TMM.2020.3011315 – ident: ref43 doi: 10.1016/j.ins.2012.07.049 – ident: ref3 doi: 10.1109/TII.2019.2913217 – ident: ref40 doi: 10.1049/iet-ipr.2018.5654 – ident: ref10 doi: 10.1007/s11042-022-12062-4 – ident: ref39 doi: 10.1007/s11071-018-4390-z – ident: ref14 doi: 10.1007/s11042-021-11051-3 – ident: ref6 doi: 10.1007/s13369-021-05529-3 – ident: ref35 doi: 10.1049/iet-ipr.2016.0552 – ident: ref25 doi: 10.1016/j.sigpro.2019.107286 – ident: ref5 doi: 10.1007/s13369-020-04413-w – ident: ref41 doi: 10.1016/j.chaos.2021.111334 – ident: ref44 doi: 10.1049/iet-ipr.2019.0551 – ident: ref1 doi: 10.1109/TII.2018.2852491 – ident: ref13 doi: 10.1109/TII.2018.2791944 – ident: ref27 doi: 10.1007/s11128-018-2104-6 – ident: ref33 doi: 10.1109/TII.2020.3014158 – ident: ref38 doi: 10.1109/ACCESS.2019.2958319 – ident: ref46 doi: 10.1049/iet-ipr.2019.0168 – ident: ref12 doi: 10.1007/s11042-022-13015-7 – ident: ref32 doi: 10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2 – volume: 24 start-page: 51 issue: 2 year: 2003 ident: ref21 article-title: An image cryptosystem based on general cat map publication-title: J. Commun. – volume: 35 start-page: 1290 issue: 7 year: 2007 ident: ref29 article-title: 2-dimension non equilateral image scrambling transformation publication-title: Acta Electronica Sinica – volume: 30 start-page: 3133 issue: 13 year: 2009 ident: ref30 article-title: 2-D arnold transformation and nonequilateral image scrambling transformation publication-title: Comput. Eng. Des. – volume: 22 start-page: 292 issue: 3 year: 2007 ident: ref22 article-title: 3-D chaotic cat map based digital image encryption method publication-title: J. Data Acquisition Process. – volume-title: Problems Ergodiques De La Meanique Classique year: 1967 ident: ref20 – ident: ref24 doi: 10.1142/S0218127410026563 – ident: ref42 doi: 10.1016/j.chaos.2021.111402 – ident: ref8 doi: 10.1007/s11042-020-09513-1 – year: 2022 ident: ref34 article-title: Industrial image database – ident: ref37 doi: 10.1117/1.jei.31.1.013031 – ident: ref11 doi: 10.1049/cit2.12053 – ident: ref2 doi: 10.1109/TII.2018.2832853 – ident: ref18 doi: 10.1142/S021812749800098X |
| SSID | ssj0037039 |
| Score | 2.511374 |
| Snippet | In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, which contains sensitive information. Therefore, how to protect data... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Enrichment Source Index Database |
| StartPage | 8285 |
| SubjectTerms | Algorithms Color imagery Cybersecurity Encryption Industrial applications Industrial Internet of Things Lorenz system Pixels Sequences |
| Title | Duple Color Image Encryption System Based on 3-D Nonequilateral Arnold Transform for IIoT |
| URI | https://www.proquest.com/docview/2828005951 |
| Volume | 19 |
| WOSCitedRecordID | wos001020261500041&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE/IET Electronic Library customDbUrl: eissn: 1941-0050 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0037039 issn: 1551-3203 databaseCode: RIE dateStart: 20050101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Jb9QwFLaGwgEOFasotMgHLqgyTbzE8bEbmlxGHAapnKLYccRIQ6adTqpy54fz7DiZpAhED1yixEqenLwvb7HfgtB7zm1ZMsOINAknnMuEaIAFUYVRlYlKq2zpm03I2Sy9uFCfJ5OfXS7MzVLWdXp7qy7_K6thDJjtUmfvwe6eKAzAOTAdjsB2OP4T488aFx94unKtM7LvLiTnvDbrH0E0-MLNhyegu0q3T8DI2eFsVdurZrEsXDIyMGxdr1x8TWfR-kDELFvNh3as8xFde4mu17jfdFgM2oDUwRjextJPm7A0PW0WV53C9LsfPqDArVybb00Aa1iHoKyPWe1Fp4gJo1Errmw7pnhMXImZkbxVA1zJgfB0xfSGipi27Y9_F_K-Ruo8y8C9p_Qjc15V28FoXE_7jp7row-93xOpHCjkjkIeKDxAD6kUKm2zADt9zkAmKl91N7xft9kdqaO7cxgbN2Pd7g2W-VO0GzwNfNwi5Bma2Po5ejKoP_kCffVYwR4r2GMFb7GCW6xgjxUM14AVPMYKbrGCe6zgyhECrLxEXz6dz0-nJPTaIIbKeENAbieJjDQrC12VHM61MVVqKC90oQyYcVwwoaVOY6llKkQRy9hESQl_tLZgQ79COzVM4TXCzIAPQLmlFthfCVlQHYGZy2xScWEo20NH3UfKTShE7_qhLPM_MWYPfeifuGyLsPzl3v3uu-fhr7zO3bqCS7MW8Zt7kHqLHm-Bvo92NuvGHqBH5mazuF6_8yD5BZO_hEs |
| linkProvider | IEEE |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Duple+Color+Image+Encryption+System+Based+on+3-D+Nonequilateral+Arnold+Transform+for+IIoT&rft.jtitle=IEEE+transactions+on+industrial+informatics&rft.au=Huang%2C+Huiqing&rft.au=Cai%2C+Zhanchuan&rft.date=2023-07-01&rft.issn=1551-3203&rft.eissn=1941-0050&rft.volume=19&rft.issue=7&rft.spage=8285&rft.epage=8294&rft_id=info:doi/10.1109%2FTII.2022.3217482&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TII_2022_3217482 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1551-3203&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1551-3203&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1551-3203&client=summon |