@uomustansiriyah.edu.iq
Mustansiriyah University
Cryptography, Data mining, Machine Learning, Image processing
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Amal Abdulbaqi Maryoosh, Zahraa Salah Dhaif, and Raniah Ali Mustafa
Institute of Advanced Engineering and Science
In this paper, a new image encryption algorithm based on chaotic cryptography was proposed. The proposed scheme was based on multiple stages of confusion and diffusion. The diffusion process was implemented twice, first, by permuting the pixels of the plain image by using an Arnold cat map and, the second time by permuting the plain image pixels via the proposed permutation algorithm. The confusion process was performed many times, by performing the XOR operation between the two resulted from permuted images, subtracted a random value from all pixels of the image, as well as by implementing the mix column on the resulted image, and by used the Lorenz key to obtain the encrypted image. The security analysis tests that used to exam the results of this encryption method were information entropy, key space analysis, correlation, histogram analysis UACI, and NPCR have shown that the suggested algorithm has been resistant against different types of attacks.
Donia Fadhil Chalob, Amal Abdulbaqi Maryoosh, Zainab Mohammed Esa, and Elaf Nassir Abbud
Universitas Ahmad Dahlan
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses.
Ekhlas Abbas Albahrani, Amal Abdulbaqi Maryoosh, and Sadeq H. Lafta
Elsevier BV
Abstract A new image encryption was done through using chaotic theory in the diffusion and confusion processes. Diffusion process was performed by using the chaotic cross map to permutate the matrix of each image color channel. Confusion process was implemented by a modified Playfair algorithm to generalize the classical one. Playfair algorithm divides the original text of characters into blocks, where each block usually contains two-character. The main limitations of Playfair cipher are that: it encrypts only 25 characters and one cannot use special characters and numbers. In addition, keyword can only take 25 letters alone without duplicates. The new method uses two cross chaotic maps to generate 16×16 playfair matrix as a key. The image is partitioned into a definite number of blocks such that each block has 16×16 bytes. Then, each block will be encrypted by different playfair matrix. All input data such as capital letter, small letter, digits and special characters, etc. can be encrypted by this new method. Experimental results showed that the proposed playfair cipher is more secure than the classical one and very sensitive to a slight change in the secret keys. The actual results of the encryption process showed that the proposed algorithm can defend against different attacks.
Raniah Ali Mustafa, Amal Abdulbaqi Maryoosh, Dena Nadir George, and Waleed Rasheed Humood
Universitas Ahmad Dahlan
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.