A new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling
This paper proposes a new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling. To reduce the encryption time and increase the security level in the proposed algorithm, the original image is divided into several blocks, and each block is encrypted using the sa...
Uloženo v:
| Vydáno v: | The Journal of supercomputing Ročník 79; číslo 15; s. 17585 - 17618 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.10.2023
Springer Nature B.V |
| Témata: | |
| ISSN: | 0920-8542, 1573-0484 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | This paper proposes a new chaotic satellite image encryption algorithm based on a 2D filter and Fisher–Yates shuffling. To reduce the encryption time and increase the security level in the proposed algorithm, the original image is divided into several blocks, and each block is encrypted using the same steps. Firstly, the vector transformation is applied to the original image to obtain a vector that is divided into several vectors where each one consists of 256 pixels. The obtained vector is transformed into a matrix using a matrix transformation. Afterward, the filtering operation generated by the 1D chaotic map is applied to the transformed matrix, where each pixel is filtered using a different mask filter. Then, the rows and the columns of the filtered matrix are scrambled, where the rows are scrambled by the modern Fisher–Yates shuffling and the columns are scrambled by the classical Fisher–Yates shuffling. The two Fisher–Yates shuffling methods are generated by different two 2D hyperchaotic systems. After that, the obtained scrambled matrix is transformed into a vector. Finally, if the storage vector is less than the original vector, the previous steps are repeated until encrypting the remaining next blocks. If not, the storage vector is transformed into a matrix which is considered the final cipher image. The advantages of the proposed algorithm are: Filtering technique has been used in the cryptography field and a different independent filter is used for every single pixel to improve the efficiency of the algorithm. Moreover, the use of Fisher's principle as a permutation technique in the proposed encryption algorithm is an effective manner. The experimental and analysis results show that the proposed algorithm has good performance in terms of a high level of security, large enough key space, tolerance to single event upsets, and low time complexity. |
|---|---|
| Bibliografie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 0920-8542 1573-0484 |
| DOI: | 10.1007/s11227-023-05346-5 |