EconPapers    
Economics at your fingertips  
 

A Proposal of a New Chaotic Map for Application in the Image Encryption Domain

Fadi Abu-Amara and Jawad Ahmad ()
Additional contact information
Fadi Abu-Amara: Cybersecurity Program, Shenandoah University, 1460 University Dr, Winchester, VA 22601, USA
Jawad Ahmad: ��School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom

Journal of Information & Knowledge Management (JIKM), 2023, vol. 22, issue 02, 1-25

Abstract: Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption scheme has pros and cons regarding its speed, complexity, and security. This paper proposes a new chaotic map called Power-Chaotic Map (PCM). Characteristics of the proposed PCM, such as chaotic behaviour, randomness, sensitivity, and s-unimodality, are investigated. As an application of the proposed chaotic map, an image encryption scheme is proposed to encrypt greyscale and text images. The proposed three-phase image encryption scheme performs a series of substitution and permutation operations. The Pixel-Level phase utilises the PCM’s generated keystreams to perform the substitution operation of image pixels. The Row-Level phase permutates, via a proposed pseudorandom number generator, pixel locations of each row and then shuffles row locations. Finally, the Column-Level phase performs a substitution operation on pixels of each column. Performance of the proposed PCM-based image encryption scheme is investigated through histogram analysis, statistical correlation analysis, key sensitivity, encryption performance of text images, and permutation and substitution properties. Experimental results indicate that the PCM has a wider range of chaotic behaviour than well-known one-dimensional maps, meets the s-unimodality property, has high sensitivity, and generates keystreams with random-like behaviour. Furthermore, results indicate that the PCM-based image encryption scheme provides high encryption security for text images, high key sensitivity, immunity against brute-force attacks, strong statistical correlation results, strong encryption performance, and low computational complexity.

Keywords: Chaotic map; image encryption; s-unimodality; permutation; substitution (search for similar items in EconPapers)
Date: 2023
References: Add references at CitEc
Citations:

Downloads: (external link)
http://www.worldscientific.com/doi/abs/10.1142/S0219649222500885
Access to full text is restricted to subscribers

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:wsi:jikmxx:v:22:y:2023:i:02:n:s0219649222500885

Ordering information: This journal article can be ordered from

DOI: 10.1142/S0219649222500885

Access Statistics for this article

Journal of Information & Knowledge Management (JIKM) is currently edited by Professor Suliman Hawamdeh

More articles in Journal of Information & Knowledge Management (JIKM) from World Scientific Publishing Co. Pte. Ltd.
Bibliographic data for series maintained by Tai Tone Lim ().

 
Page updated 2025-03-20
Handle: RePEc:wsi:jikmxx:v:22:y:2023:i:02:n:s0219649222500885