A self-reversible image encryption algorithm utilizing a novel chaotic map
This paper introduces an innovative self-reversible image encryption algorithm designed to optimize resource utilization and enhance the efficiency of managing encryption and decryption processes in time-division multiplexing communication systems. By ingeniously integrating dual functionalities, th...
Saved in:
| Published in: | Nonlinear dynamics Vol. 113; no. 7; pp. 7351 - 7383 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
Dordrecht
Springer Netherlands
01.04.2025
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0924-090X, 1573-269X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | This paper introduces an innovative self-reversible image encryption algorithm designed to optimize resource utilization and enhance the efficiency of managing encryption and decryption processes in time-division multiplexing communication systems. By ingeniously integrating dual functionalities, the algorithm significantly reduces the requirement for hardware and software resources. The proposed algorithm combines self-reversible shifting, self-reversible permutation, and two complementary reversible diffusion processes to ensure overall self-reversibility while enhancing security. A novel enhanced cosine-sine-logistic chaotic map is introduced to generate the pseudo-random sequences essential for encryption. Comprehensive performance evaluations, including analyses of chaotic trajectories, bifurcation diagrams, Lyapunov exponents, sample entropy, the 0–1 test, and NIST assessments, confirm the superior dynamic characteristics of the chaotic model. The image encryption algorithm also exhibits excellent performance in key metrics such as key sensitivity, histogram uniformity, correlation of adjacent pixels, local Shannon entropy, resistance to differential attacks, key space size, and robustness against various attacks. Comparisons with existing algorithms underscore its significant advantages in both encryption performance and efficiency. This study offers new insights and a robust solution for securing image data in real-world network environments. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 0924-090X 1573-269X |
| DOI: | 10.1007/s11071-024-10726-4 |