CFP last date
22 July 2024
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024

Submit your paper
Know more
Reseach Article

Enhancing Image Encryption using Histogram Analysis, Adjacent Pixel Autocorrelation Test in Chaos-based Framework

by O.E. Taylor, C.G. Igiri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 22
Year of Publication: 2024
Authors: O.E. Taylor, C.G. Igiri
10.5120/ijca2024923653

O.E. Taylor, C.G. Igiri . Enhancing Image Encryption using Histogram Analysis, Adjacent Pixel Autocorrelation Test in Chaos-based Framework. International Journal of Computer Applications. 186, 22 ( May 2024), 9-18. DOI=10.5120/ijca2024923653

@article{ 10.5120/ijca2024923653,
author = { O.E. Taylor, C.G. Igiri },
title = { Enhancing Image Encryption using Histogram Analysis, Adjacent Pixel Autocorrelation Test in Chaos-based Framework },
journal = { International Journal of Computer Applications },
issue_date = { May 2024 },
volume = { 186 },
number = { 22 },
month = { May },
year = { 2024 },
issn = { 0975-8887 },
pages = { 9-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number22/enhancing-image-encryption-using-histogram-analysis-adjacent-pixel-autocorrelation-test-in-chaos-based-framework/ },
doi = { 10.5120/ijca2024923653 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-05-31T22:31:56.820488+05:30
%A O.E. Taylor
%A C.G. Igiri
%T Enhancing Image Encryption using Histogram Analysis, Adjacent Pixel Autocorrelation Test in Chaos-based Framework
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 22
%P 9-18
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper investigates the effectiveness and durability of encryption algorithms by utilising Histogram Analysis, Adjacent Pixel Autocorrelation Test (APAT), and Key Sensitivity Tests. The work displayed promising outcomes by combining chaos theory, Deoxyribonucleic Acid (DNA) sequence operations, and a redefined hash function. This approach effectively modified the spatial relationships between pixels, minimised information duplication, and ensured responsiveness to substantial changes. Chaos-based systems are vulnerable to predictability because they contain deterministic patterns. The utilising histogram analysis, adjacent pixel autocorrelation test, inside a chaos-based framework is to strengthen image encryption by addressing flaws and assuring strong protection against prospective attacks. The results indicate that the proposed approach effectively achieves strong encryption. Statistical measures show a significant reduction in correlation coefficients (0.85 to 0.05) and entropy values (7.2 to 6.1). Despite these changes, the visual quality remains high, and the encryption is resistant to different attacks. This ensures secure transmission of images in sensitive applications. Moreover, the research supports the idea of integrating image-specific attributes into hash functions in order to improve encryption methods.

References
  1. M. Mehrtak, S. SeyedAlinaghi, M. MohsseniPour, T. Noori, A. Shamsabadi, M. Heydariet al., "Security challenges and solutions using healthcare cloud computing", Journal of Medicine and Life, vol. 14, no. 4, p. 448-461, 2021. https://doi.org/10.25122/jml-2021-0100
  2. H. Mrabet, S. Belguith, A. Alhomoud, & A. Jemai, "A survey of iot security based on a layered architecture of sensing and data analysis", Sensors, vol. 20, no. 13, p. 3625, 2020. https://doi.org/10.3390/s20133625
  3. M. Eichelberg, K. Kleber, & M. Kämmerer, "Cybersecurity in pacs and medical imaging: an overview", Journal of Digital Imaging, vol. 33, no. 6, p. 1527-1542, 2020. https://doi.org/10.1007/s10278-020-00393-3
  4. R. Hylock and X. Zeng, "A blockchain framework for patient-centered health records and exchange (healthchain): evaluation and proof-of-concept study", Journal of Medical Internet Research, vol. 21, no. 8, p. e13592, 2019. https://doi.org/10.2196/13592
  5. S. Liu, X. Liu, J. Yuan, & J. Bao, "Multidimensional information encryption and storage: when the input is light", Research, vol. 2021, 2021. https://doi.org/10.34133/2021/7897849
  6. W. Hong, Z. Yuan, & X. Chen, "Structural color materials for optical anticounterfeiting", Small, vol. 16, no. 16, 2020. https://doi.org/10.1002/smll.201907626
  7. X. Sun, F. Yu, P. Zhang, W. Xie, & X. Peng, "A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks", Sensors, vol. 20, no. 15, p. 4253, 2020. https://doi.org/10.3390/s20154253
  8. M. Bozdal, M. Samie, S. Aslam, & I. Jennions, "Evaluation of can bus security challenges", Sensors, vol. 20, no. 8, p. 2364, 2020. https://doi.org/10.3390/s20082364.
  9. G. Sun, M. Li, J. Zhang, W. Zhang, X. Pei, & Z. Jin, "Transmission dynamics of brucellosis: mathematical modelling and applications in china", Computational and Structural Biotechnology Journal, vol. 18, p. 3843-3860, 2020. https://doi.org/10.1016/j.csbj.2020.11.014
  10. S. Liu, X. Liu, J. Yuan, & J. Bao, "Multidimensional information encryption and storage: when the input is light", Research, vol. 2021, 2021. https://doi.org/10.34133/2021/7897849.
  11. M. Alawida, A. Samsudin, N. Alajarmeh, J. S. Teh, and M. Ahmad, "A novel hash function based on a chaotic sponge and DNA sequence," IEEE Access, vol. 9, pp. 17882-17897, 2021.
  12. I. Aouissaoui, T. Bakir, and A. Sakly, "Robustly correlated key‐medical image for DNA‐chaos based encryption," IET Image Processing, vol. 15, no. 12, pp. 2770-2786, 2021.
  13. A. A. Bhadke, S. Kannaiyan, and V. Kamble, "Symmetric chaos-based image encryption technique on image bit-planes using SHA-256," in 2018 Twenty Fourth National Conference on Communications (NCC), pp. 1-6, IEEE, February 2018.
  14. X. Chai, Y. Chen, and L. Broyde, "A novel chaos-based image encryption algorithm using DNA sequence operations," Optics and Lasers in Engineering, vol. 88, pp. 197-213, 2017.
  15. M. B. Farah, R. Guesmi, A. Kachouri, and M. Samet, "A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation," Optics & Laser Technology, vol. 121, p. 105777, 2020.
  16. R. Guesmi, M. A. B. Farah, A. Kachouri, and M. Samet, "A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2," Nonlinear Dynamics, vol. 83, pp. 1123-1136, 2016.
  17. Z. Li, C. Peng, W. Tan, and L. Li, "A novel chaos-based color image encryption scheme using bit-level permutation," Symmetry, vol. 12, no. 9, p. 1497, 2020.
  18. H. Liu, A. Kadir, X. Sun, and Y. Li, "Chaos based adaptive double-image encryption scheme using hash function and S-boxes," Multimedia Tools and Applications, vol. 77, pp. 1391-1407, 2018.
  19. G. K. Shraida and H. A. Younis, "An Efficient Diffusion Approach for Chaos-Based Image Encryption and DNA Sequences," Iraqi Journal for Electrical and Electronic Engineering, vol. 18, no. 2, 2022.
  20. X. Zhang, L. Wang, Z. Zhou, and Y. Niu, "A chaos-based image encryption technique utilising Hilbert curves and H-fractals," IEEE Access, vol. 7, pp. 74734-74746, 2019.
Index Terms

Computer Science
Information Sciences
Image encryption system
Security
Image Decryption

Keywords

Image encryption Chaos theory Histogram Analysis Adjacent Pixel Autocorrelation Test