{"title":"基于Henon Map的像素置乱中流和块图像加密算法的结合","authors":"Araz Rajab Ibrahim","doi":"10.1109/ICOASE56293.2022.10075611","DOIUrl":null,"url":null,"abstract":"In recent years, sending digital photos over open networks has become a serious privacy concern. Sadly, there are a lot of privacy and security risks present despite the environment's suitability and great benefits. The novel image encryption technique proposed in this paper is based on the two-dimensional Hénon map, which is used twice to produce the random sequences required for confusion and diffusion. The 2-D Hénon map initial random sequence key is used to stream-scramble the pixels in each and every block of the image during the confusion stage. At the diffusion stage, the second random sequence key is used in a triple XOR structure to change the pixel positions and create an encrypted image. The experiments' findings show that the suggested approach fixes the problems with traditional encryption methods. The proposed method costs less to compute and performs better on many security tests. Because of its size, the key space cannot be protected from brute-force attacks. The histogram of the encrypted image differs from the original image and is evenly spaced. The results of the correlation test reveal no correlation between the adjacent pixels. The suggested algorithm is sensitive to the key value, and even small changes result in a different image. Therefore, real-time image encryption applications over open networks are appropriate for the novel approach.","PeriodicalId":297211,"journal":{"name":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Combination of Stream and Block Image Encryption Algorithms in Pixel Scrambling Using Henon Map\",\"authors\":\"Araz Rajab Ibrahim\",\"doi\":\"10.1109/ICOASE56293.2022.10075611\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, sending digital photos over open networks has become a serious privacy concern. Sadly, there are a lot of privacy and security risks present despite the environment's suitability and great benefits. The novel image encryption technique proposed in this paper is based on the two-dimensional Hénon map, which is used twice to produce the random sequences required for confusion and diffusion. The 2-D Hénon map initial random sequence key is used to stream-scramble the pixels in each and every block of the image during the confusion stage. At the diffusion stage, the second random sequence key is used in a triple XOR structure to change the pixel positions and create an encrypted image. The experiments' findings show that the suggested approach fixes the problems with traditional encryption methods. The proposed method costs less to compute and performs better on many security tests. Because of its size, the key space cannot be protected from brute-force attacks. The histogram of the encrypted image differs from the original image and is evenly spaced. The results of the correlation test reveal no correlation between the adjacent pixels. The suggested algorithm is sensitive to the key value, and even small changes result in a different image. Therefore, real-time image encryption applications over open networks are appropriate for the novel approach.\",\"PeriodicalId\":297211,\"journal\":{\"name\":\"2022 4th International Conference on Advanced Science and Engineering (ICOASE)\",\"volume\":\"7 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 4th International Conference on Advanced Science and Engineering (ICOASE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOASE56293.2022.10075611\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 4th International Conference on Advanced Science and Engineering (ICOASE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOASE56293.2022.10075611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Combination of Stream and Block Image Encryption Algorithms in Pixel Scrambling Using Henon Map
In recent years, sending digital photos over open networks has become a serious privacy concern. Sadly, there are a lot of privacy and security risks present despite the environment's suitability and great benefits. The novel image encryption technique proposed in this paper is based on the two-dimensional Hénon map, which is used twice to produce the random sequences required for confusion and diffusion. The 2-D Hénon map initial random sequence key is used to stream-scramble the pixels in each and every block of the image during the confusion stage. At the diffusion stage, the second random sequence key is used in a triple XOR structure to change the pixel positions and create an encrypted image. The experiments' findings show that the suggested approach fixes the problems with traditional encryption methods. The proposed method costs less to compute and performs better on many security tests. Because of its size, the key space cannot be protected from brute-force attacks. The histogram of the encrypted image differs from the original image and is evenly spaced. The results of the correlation test reveal no correlation between the adjacent pixels. The suggested algorithm is sensitive to the key value, and even small changes result in a different image. Therefore, real-time image encryption applications over open networks are appropriate for the novel approach.