1,480
Views
1
CrossRef citations to date
0
Altmetric
ELECTRICAL & ELECTRONIC ENGINEERING

An efficient color image encryption scheme based on a matrix scrambling method and a new hybrid chaotic map

| (Reviewing editor)
Article: 1940638 | Received 16 Mar 2021, Accepted 03 Jun 2021, Published online: 21 Jun 2021

Figures & data

Figure 1. Chaotic trajectory of (a) Cubic map (b) Sine map (c) SINCU map

Figure 1. Chaotic trajectory of (a) Cubic map (b) Sine map (c) SINCU map

Figure 2. Lyapunov analysis of (a) Cubic map (b) Sine map (c) SINCU map

Figure 2. Lyapunov analysis of (a) Cubic map (b) Sine map (c) SINCU map

Table 1. Results of the uncertainty analysis

Table 2. Results of the NIST

Figure 3. The architecture of the proposed image encryption scheme

Figure 3. The architecture of the proposed image encryption scheme

Figure 4. Matrix permutation result for color Lena image

Figure 4. Matrix permutation result for color Lena image

Figure 5. Permutated Lena image

Figure 5. Permutated Lena image

Table 3. Correlation coefficients between original “Lena” image and permutated “Lena” image

Table 4. Correlation results of adjacent pixels

Table 5. Correlation results of different encryption key generated with a very small difference in all system parameters

Figure 6. Results of the proposed encryption algorithm (a) Plain Baboon image (b) Encrypted Baboon image (c) Decrypted Baboon image

Figure 6. Results of the proposed encryption algorithm (a) Plain Baboon image (b) Encrypted Baboon image (c) Decrypted Baboon image

Figure 7. Results of the encryption (a) “Peppers” image (b) “Landscape” image (c) “Airplane” image (d) Cipher “Peppers” image (e) Cipher “Landscape” image (f) Cipher “Airplane” image

Figure 7. Results of the encryption (a) “Peppers” image (b) “Landscape” image (c) “Airplane” image (d) Cipher “Peppers” image (e) Cipher “Landscape” image (f) Cipher “Airplane” image

Table 6. Results for key sensitivity analysis-I

Figure 8. Results for key sensitivity analysis-II (a) Encrypted Baboon image with Key-1 (b) Wrong decrypted image with a slightly difference of x0 (c) Wrong decrypted image with a slightly difference of K (d) Wrong decrypted image with a slightly difference of a (e) Wrong decrypted image with a slightly difference of r(f) Correct decrypted image with Key-1.

Figure 8. Results for key sensitivity analysis-II (a) Encrypted Baboon image with Key-1 (b) Wrong decrypted image with a slightly difference of x0 (c) Wrong decrypted image with a slightly difference of K (d) Wrong decrypted image with a slightly difference of a (e) Wrong decrypted image with a slightly difference of r(f) Correct decrypted image with Key-1.

Figure 9. Histogram analysis of RGB components for Tiger image

Figure 9. Histogram analysis of RGB components for Tiger image

Figure 10. Histogram analysis of RGB components for cipher Tiger image

Figure 10. Histogram analysis of RGB components for cipher Tiger image

Table 7. Results for MSE and PSNR analyses

Table 8. Results for entropy analysis

Table 9. Entropy comparison between AES and the proposed algorithm

Table 10. Entropy comparison between Reference-C and the proposed algorithm

Table 11. Correlation coefficients analysis

Table 12. Correlation coefficients of adjacent pixels in cipher image

Figure 11. Correlation distribution of each component for plain Lena and cipher Lena

Figure 11. Correlation distribution of each component for plain Lena and cipher Lena

Table 13. NPCR and UACI results for the proposed algorithm

Table 14. NPCR and UACI results for the proposed algorithm

Table 15. NPCR and UACI results for Reference-C

Table 16. NPCR and UACI results for the proposed scheme

Table 17. Speed performance analysis of the proposed scheme