Cargando…
Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System
Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors pr...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7824367/ https://www.ncbi.nlm.nih.gov/pubmed/33396342 http://dx.doi.org/10.3390/e23010057 |
_version_ | 1783640059934670848 |
---|---|
author | Karawia, Abdelrahman |
author_facet | Karawia, Abdelrahman |
author_sort | Karawia, Abdelrahman |
collection | PubMed |
description | Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors proposed permutation using non-chaotic methods and have displayed good results in comparison to chaos-based methods. In the current article, a new image encryption algorithm is designed using combination of Newton-Raphson’s method (non-chaotic) and general Bischi-Naimzadah duopoly system as a hyperchaotic two-dimensional map. The plain image is first shuffled by using Newton-Raphson’s method. Next, a secret matrix with the same size of the plain image is created using general Bischi-Naimzadah duopoly system. Finally, the XOR between the secret matrix and the shuffled image is calculated and then the cipher image is obtained. Several security experiments are executed to measure the efficiency of the proposed algorithm, such as key space analysis, correlation coefficients analysis, histogram analysis, entropy analysis, differential attacks analysis, key sensitivity analysis, robustness analysis, chosen plaintext attack analysis, computational analysis, and NIST statistical Tests. Compared to many recent algorithms, the proposed algorithm has good security efficiency. |
format | Online Article Text |
id | pubmed-7824367 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-78243672021-02-24 Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System Karawia, Abdelrahman Entropy (Basel) Article Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors proposed permutation using non-chaotic methods and have displayed good results in comparison to chaos-based methods. In the current article, a new image encryption algorithm is designed using combination of Newton-Raphson’s method (non-chaotic) and general Bischi-Naimzadah duopoly system as a hyperchaotic two-dimensional map. The plain image is first shuffled by using Newton-Raphson’s method. Next, a secret matrix with the same size of the plain image is created using general Bischi-Naimzadah duopoly system. Finally, the XOR between the secret matrix and the shuffled image is calculated and then the cipher image is obtained. Several security experiments are executed to measure the efficiency of the proposed algorithm, such as key space analysis, correlation coefficients analysis, histogram analysis, entropy analysis, differential attacks analysis, key sensitivity analysis, robustness analysis, chosen plaintext attack analysis, computational analysis, and NIST statistical Tests. Compared to many recent algorithms, the proposed algorithm has good security efficiency. MDPI 2020-12-31 /pmc/articles/PMC7824367/ /pubmed/33396342 http://dx.doi.org/10.3390/e23010057 Text en © 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Karawia, Abdelrahman Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System |
title | Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System |
title_full | Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System |
title_fullStr | Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System |
title_full_unstemmed | Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System |
title_short | Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System |
title_sort | cryptographic algorithm using newton-raphson method and general bischi-naimzadah duopoly system |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7824367/ https://www.ncbi.nlm.nih.gov/pubmed/33396342 http://dx.doi.org/10.3390/e23010057 |
work_keys_str_mv | AT karawiaabdelrahman cryptographicalgorithmusingnewtonraphsonmethodandgeneralbischinaimzadahduopolysystem |