You are currently viewing a new version of our website. To view the old version click .
Symmetry
  • Article
  • Open Access

1 March 2020

A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping

,
,
,
and
1
School of Computing, Edinburgh Napier University, Edinburgh EH10 5DT, UK
2
Department of Electrical Engineering, Institute of Space Technology, Islamabad 44000, Pakistan
3
School of Computing and Mathematics, Manchester Metropolitan University, Manchester M15 6BH, UK
4
Department of Mathematics, College of Science, King Khalid University, Abha 61413, Saudi Arabia

Abstract

Smart building control, managing queues for instant points of service, security systems, and customer support can benefit from the number of occupants information known as occupancy. Due to interrupted real-time continuous monitoring capabilities of state-of-the-art cameras, a vision-based system can be easily deployed for occupancy monitoring. However, processing of images or videos over insecure channels can raise several privacy concerns due to constant recording of an image or video footage. In this context, occupancy monitoring along with privacy protection is a challenging task. This paper presents a novel chaos-based lightweight privacy preserved occupancy monitoring scheme. Persons’ movements were detected using a Gaussian mixture model and Kalman filtering. A specific region of interest, i.e., persons’ faces and bodies, was encrypted using multi-chaos mapping. For pixel encryption, Intertwining and Chebyshev maps were employed in confusion and diffusion processes, respectively. The number of people was counted and the occupancy information was sent to the ThingSpeak cloud platform. The proposed chaos-based lightweight occupancy monitoring system is tested against numerous security metrics such as correlation, entropy, Number of Pixel Changing Rate (NPCR), Normalized Cross Correlation (NCC), Structural Content (SC), Mean Absolute Error (MAE), Mean Square Error (MSE), Peak to Signal Noise Ratio (PSNR), and Time Complexity (TC). All security metrics confirm the strength of the proposed scheme.

1. Introduction

The widespread use of visual surveillance indicates that it is not only indispensable as a security measure, but also valuable in providing an accessible solution for other applications such as smart buildings management, occupancy systems, and retail traffic analysis. Visual occupancy counting techniques have several advantages over other methods such as Radio Frequency (RF) and Passive Infrared (PIR)-based methods [1,2,3,4,5,6,7]. In comparison to other traditional technologies, including RF and PIR-based, the camera-based occupancy system is affordable due to decreasing prices of the camera and vision-based technologies [1,2,3,4,5,6,7]. Moreover, a video-based solution is considered as one of the most feasible solutions that can be easily deployment in indoor settings [4]. The aforementioned advantages have made camera-based people counting systems to become the most widely used technique. However, numerous privacy concerns can arise with the use of camera-based occupancy systems if measures are not taken to protect the person’s identity [8,9].
Progression in computer networks, computer storage devices, and imaging tools that are used these days, provides strong possibilities for leaking/disclosing individual privacy [10]. The digital images used for occupancy count are highly susceptible to a number of attacks including statistical, key space, and brute force attacks. Data privacy and authentication of multimedia data are two main concerns these days [11]. Security of multimedia data through encryption is one of the most significant techniques which received special attention from the research community over the last decades. In encryption, digital bit-streams of data are transformed in such away that an adversary could not reveal the original information. Decryption is the reverse process of encryption and only an authorized person can access the original content. A cryptosystem consists of a set of algorithms that convert plaintext data into encrypted and ciphetext data into decrypted format. Cryptosystems are categorized based upon the distribution of the keys: (i) symmetric key encryption and (ii) asymmetric key encryption [12].
Currently, protecting the privacy of the data is one of the most critical issues. It is imperative to provide safety to sensitive information against eavesdropping. Secure encryption scheme must prove that an unauthorized person could not get access to sensitive data. Sensitive information should be read-only by an authorized person and should resist cryptographic attacks [11]. Building occupancy count has numerous advantages including queue monitoring, capacity alerts, real-time count, and efficient building energy management. Furthermore, a monitoring system can be utilized in customer services, intelligent smart building. One of the accurate building occupancy monitoring systems is the vision/camera-based system. Occupancy via real-time video is more accurate as well as precise when compared to other traditional methods [8,9]. However, vision-based occupancy system must also be protected from attackers and illegal access and the privacy of the individual should not be compromised. Along with higher accuracy, privacy protection in real-time vision-based systems is a challenging task. To mitigate the privacy issues in vision-based occupancy system, we proposed a chaotic cryptosystem to provide security for digital images/videos which capture the images through an overhead camera. In the proposed system, the encryption process transforms the actual image contents for security purposes and data is converted to a secured form known as the ciphered image. The ciphered image is an unreadable form of the image, and the original contents and privacy of individuals are protected.
In the proposed work, each frame/image is protected via confusion followed by a diffusion step. Once the ROI (face) is properly detected, it is encrypted with the chaos-based system. The ROI (face) image pixels are scrambled through chaos-based pseudorandom numbers. One of the challenges in vision-based occupancy monitoring system is lightweight and secure privacy protection. Our proposed system is lightweight and secure against many attacks, which is proven in the security analysis section.

3. The Proposed Chaos-Based Secure Occupancy Scheme

Intertwining and Chebyshev chaotic maps exhibit desirable characteristics such as a positive Lyapunov exponent, zero correlation in the total field, and an equiprobable distribution, and therefore it can be used for video/image encryption. The proposed scheme utilizes both Intertwining and Chebyshev chaotic maps because they offer the aforementioned desirable properties and a larger keyspace which resist brute force attacks. Intertwining map can be written as [61]
A n + 1 = ( λ × α × B n × ( 1 A n ) + C n ) m o d ( 1 ) , B n + 1 = ( λ × β × B n + C n 1 + ( A n + 1 ) 2 ) m o d ( 1 ) , C n + 1 = ( λ × ( A n + 1 + B n + 1 + γ ) × s i n ( C n ) m o d ( 1 ) ,
where A n , B n and C n ( 0 , 1 ) , 0 λ 3.999 , | α | > 33.5 , | β | > 37.9 , | γ | > 35.7 . The Key space of Intertwining map is ( 10 60 2 200 ) which is greater than traditional Logistic map and tent maps. Compared to other maps, random number generated through Intertwining Logistic map is distributed more evenly [61]. Chebyshev map can be defined as [62,63]
T μ ( z ) = c o s ( μ × a r c   c o s ( z ) ) ,
where μ = 0, 1, 2, ..., and z [ 1 , 1 ] . Huang suggested μ = 4 for less computation and efficient use of Chebyshev map. In the proposed scheme, we utilize μ = 4 and such type of Chebyshev function can be written as
f ( z i ) = 8 z i 1 4 8 z i 1 2 + 1 , i = 1 , 2 ,
The main goal of the proposed scheme is the detection of an object in a video sequence, followed by encryption and then counting of the objects. Flow chart of the encryption process used in the scheme is shown in Figure 3. The pseudo-random key streams are generated using the scheme proposed in our previous research [10].
Figure 3. The systematic process of image encryption.
To obtain an image it is necessary to use background modeling. For moving object detection, there are a plethora of methods available in the literature each having its own advantages and disadvantages. In our case, we used Gaussian Mixture Model (GMM) technique due to its accuracy and real-time applicability. Mathematically, GMM is written as
P ( x t ) = j = 1 K w j , t η ( x t ; ϕ j , t , j , t ) ,
In Equation (6), x t is incoming pixel value at a time t, w j , t is weight of j t h distribution at time t, and η ( x t , ϕ j , t , j , t ) is probability Gaussian distribution function. Based on value of w / σ , K distribution is sorted and the background model can be written as follows,
B = a r g   m i n b j = 1 b w k > T ,
Each Gaussian which is greater than the threshold T is classified as background. More details about GMM can be found in [2]. For every Gaussian variable with a value larger than T, a background is classified.
The Kalman filter is widely popular and used extensively in signal estimation, navigation systems, and control systems. Essentially, the Kalman filter is used to provide optimal estimation in the form of mathematical equations. The results are optimal despite the presence of Additive White Gaussian Noise (AWGN). In the proposed method, the Kalman filter is used to forecast the position of moving object. This is followed by tracking of the person as the frames continue. In discrete-time, the Kalman filter with a state transition given by X ^ at k is written as
X ^ k = A X ^ ( k 1 ) + B u k + W k ,
where A is n × 1 system state transition vector; B represents the control parameter, which relates u k with state X ^ k ; and W k is a vector representing additive noise. Mathematically, measurement Z in terms of state X ^ k can be defined as
Z k = H k X ^ k + V k ,
where H relates the measured vector Z to the state vector X ^ k , whereas V k is measured noise. Therefore, in essence, the Kalman filter is responsible for estimating the next state given the current state and the noise values, which allows for prediction. Figure 2 highlights the process flow of the filter. One can see from Figure 2 that the Kalman filter is an iterative technique used for prediction and correction of state variables.
Detail Steps of the Proposed Occupancy Scheme:
Step 1: A series of frames are acquired with the use of the single overhead camera. For the sake of simplicity, the algorithm uses grayscale frames by converting RGB frames to grayscale.
Step 2: The background is denoted as B. It is challenging to obtain a fixed background due to changes in the environment’s illumination levels. To remedy this, GMM is used in the proposed system. In this case, GMM work as a foreground detector. There are two main parameters of GMM, i.e., the threshold α and the Gaussian number (K). Values for these parameters are set as 0.7 and 3, respectively.
Step 3: Generally, algorithms confuse shadows as objects, determining them to be the foreground. Therefore, for every frame, shadows must be removed. This is achieved by converting the frame’s color space to YCbCr. Then, apply morphological closing and opening operations. Mathematically, closing (PC) and opening (PO) are written as
P C = E r o d e ( D i l a t e ( P ) , K r ) ,
P O = D i l a t e ( E r o d e ( P ) , K r ) ,
here K r denotes the kernel.
Step 4: The threshold defines where the background ends and the foreground begins. Subtract the current frame P O from B, which identifies the objects in motion that exists in the foreground that is the ROI.
Step 5: The seed values for Intertwining and Chebyshev maps are selected as a secret key.
Step 6: Iterate the Intertwining and Chebyshev maps H × W times, which is the same size as the size of ROI bound obtained in step 4. Pixels in ROI is shuffled using random indices obtained through Intertwining maps.
Step 7: The shuffled data matrix is diffused using the random matrix obtained through Chebyshev map. XORed operation is applied on shuffled ROI and random chaos valued obtained from Chebyshev. Lastly, the Advanced Encryption Standard (AES) substitution is applied to get the encrypted ROI.
Step 8: The Kalman filter estimate, the position of moving objects, and the Hungarian cost matrix ψ are obtained, which assigns the costs between the track and detection D.
Step 9: Finally, the number of people in the encrypted domain is counted.

4. Experimental Test and Security Analysis

The Logitech camera (2.0 megapixels) was installed in T10 office at Glasgow Caledonian University, United Kingdom. The frame size of the Logitec camera was set to a low value for efficient computation, i.e., 180 × 320 pixels. The camera was installed 1.7 meters above the ground. The video was processed for occupancy counting using the aforementioned steps in the proposed method. Each frame is encrypted for obtaining higher security. A plaintext image frame selected ROI encrypted complete image and encrypted ROI are shown in Figure 4, respectively. From Figure 4, one can see that the privacy of an individual is secure, and the desired region is encrypted; however, it is compulsory to prove the encryption strength through mathematical security parameters. Security measures are carried out and discussed in very detail.
Figure 4. Plain image, Encrypted region of interest (ROI) image, and Retrieved Encrypted image.

4.1. Histogram Analysis

Histogram analysis is one of the most significant security measures that represents the occurrence of the pixels in a defined range. The uniformity of pixels validates that the confidential information is encrypted; thus, the eavesdropper will have no clue of the original information. The histogram is applied to the plain text image. The peaks of the plain image pixels are compared to the uniform and equally distributed pixels of the encrypted image shown in Figure 5. The regular distribution of pixels that are shown in Figure 5 depicts that the proposed scheme is secure.
Figure 5. Plain ROI image histogram, encrypted ROI image histogram, and retrieved Encrypted image histogram.

4.2. Correlation Coefficient Analysis

The correlation coefficient defines the distribution of the pixels in a plain and encrypted digital image. Pixels that are similar to each other show that they are highly correlated with each other. Such pixels that are not similar to each other show that the pixels have a lower correlation. Such tests highlight lower correlation in encrypted image. Mathematically, the correlation coefficient is written as
γ X Y = δ X Y δ X 2 δ Y 2 ,
where as δ X Y in the aforementioned Equation (10) is covariance of the random variables X and Y, δ X 2 and δ Y 2 are the variance that in the random variable X and Y. Each term is defined as follows,
δ X Y = j = 1 N X j μ j Y j μ Y N ,
δ X 2 = j = 1 N X j E ( X ) 2 N ,
δ Y 2 = j = 1 N Y j E ( Y ) 2 N ,
where μ X and μ Y are the expected values of the random variables X and Y. The correlation coefficient values are between −1 and 1. The value 1 indicates the maximum value of correlation and shows that a digital plain and the encrypted image is similar. In contrast, a value “−1” shows that the encrypted image is negative of the original image. Ideally, the correlation value should be near 0. A value near to zero depicts that the suggested scheme is highly secure.
Plain digital image values for the horizontal, diagonal, and vertical directions are 0.9086, 0.8313, and 0.9053, respectively, with a mean value for all three directions is 0.8817. For encrypted image values for, horizontal, diagonal, and vertical directions are 0.0005, −0.0047, and 0.1313, respectively, with the calculated mean value is 0.042, which is close to 0 as shown in the Table 1. The evaluated values are also compared to several existing algorithms and it can be seen the proposed system perform better. Furthermore, image pixels are examined for a plain and encrypted images that are shown in Figure 6 and Figure 7 in horizontal, diagonal, and vertical directions, respectively. It is clear from correlation plots that encrypted image is highly scattered and therefore reveals that encrypted pixels are not similar.
Table 1. Correlation coefficient values for each direction: H-D = Horizontal direction, D-D = Diagonal direction, V-D = Vertical direction, A-V = Cumulative average value.
Figure 6. Plain image horizontal direction pixels, plain image diagonal direction pixels, and plain image vertical direction pixels.
Figure 7. Encrypted image horizontal direction pixels, encrypted image diagonal direction pixels, and encrypted image vertical direction pixels.

4.3. Peak to Signal Noise Ratio

The quality of an encrypted image can be evaluated through the peak to signal noise ratio (PSNR) test. PSNR can be written as
PSNR = 10 log 2 I 2 max M S E ,
where I m a x in the above Equation (14) is the highest value of the pixel in the test image. For a good cryptosystem, a low value of PSNR is required, which depicts a significant difference between plain and encrypted images. The effectiveness of the proposed technique is evaluated using PSNR in decibel. The average value should be equal to 9.50 (dB), while for the proposed scheme is 9.26 (dB), which is less than 9.50 (dB), indicating a higher quality of encryption.

4.4. Mean Square Error

To assess the proposed scheme further, Mean Square Error (MSE) test is performed. MSE can be written as
MSE = 1 M × N i 1 M j 1 N P ( i , j ) C ( i , j ) ,
In the preceding Equation (15), M × N is the cumulative size of the image consisting of total pixels equal to 180 × 320 . P i , j and C i , j are plain and cipher digital image at i t h row and j t h column. In the condition of mean square error (MSE), it is necessary to attain higher value. We studied the mean square error (MSE) test on the proposed scheme and computed its value which is equal to 7775.0 . Moreover, the proposed system is also compared to the standards of AES, AES-CBC, AES-Counter, AES-Feedback and AES-Stream. The MSE test values are equal to 4600, 4637, 4938, 4577, and 4911 for AES, AES-CBC, AES-Counter, AES-Feedback, and AES-Stream, respectively, as shown in Table 2. These values are smaller than the proposed scheme values and therefore through MSE test a higher security of the proposed scheme is validated.
Table 2. MSE value and comparison with existing cryptosystems.

4.5. Entropy Analysis

The output encrypted image should be highly random which can be evaluated through entropy test. Mathematically, entropy is written as
H = J = 0 N 1 p x j log b p x j ,
where p ( x j ) is the probability mass function for the event x j . The b in the above Equation (16) indicates the logarithmic base. X is the random variable which takes n outcomes. For an ideal encryption scheme, value of entropy should be close to 8. The proposed scheme, entropy value is 7.99 8 . The value of 7.99 highlights that the proposed system is highly robust against differential attack. Moreover, the proposed system has higher entropy values than other traditional schemes (Table 3).
Table 3. Comparison of entropy values.

4.6. Mean Absolute Error

Mean absolute error (MAE) is the other security parameter that is used to investigate the probability of the differential attack. In other words, it determines the maximum difference between a plain image and the encrypted image. MAE is written as
MAE = 1 M × N i = 0 M 1 j = 0 N 1 C ( i , j ) P ( i , j ) ,
whereas M × N is the total size of an image. The C i , j in the Equation (17) depicts the secure cipher image at i t h row and j t h column, whereas P i , j is the plain image at i t h row and j t h column. The greater the value of mean absolute error (MAE), the less chance of occurrence of a successful attack. A value of 114 is accomplished after the test parameter, which shows that the proposed scheme has sufficient strength of opposing attack. The computed values is compared to several existing algorithms which is shown in Table 4. One can see from Table 4 that proposed system has lower MAE that highlight the security of the proposed scheme.
Table 4. Mean absolute error (MAE) comparison.

4.7. Number of Pixel Changing Rate

The test is used to find the sensitivity of pixel change rate when plain image or key is slightly changed. For analyzing Number of Pixel Change Rate (NPCR), consider C 1 ( i , j ) and C 2 ( i , j ) , which are encrypted and the plaintext was only a pixel different. NPCR can be computed as
NPCR = i , j V i , j M × N × 100 ,
where as: V i , j = 0 C 1 ( i , j ) = C 2 ( i , j ) 1 C 1 ( i , j ) C 2 ( i , j )
The NPCR in the proposed scheme was more than 99% that indicates higher security of the proposed system.

4.8. Normalized Cross Correlation

The Normalized Cross-Correlation (NCC) is one of the essential security measures which is used for testing the security of an encryption algorithm. This test is mainly dependent on two parameters: (i) mean and (ii) variance. NCC is calculated as
NCC = 1 N × s u m [ x n m e a n x ] × [ y n m e a n y ] v a r x × v a r y
whereas in the above Equation (19), the var is a variance between x and y, m e a n x and m e a n y are the average values between x and y, respectively. The output range of NCC is between [1, −1]. The value of 1 indicates that the pixels are highly correlated to each other. In contrast, a value less than 1 shows that the pixels are dissimilar, and the proposed system is secure. The achieved value for the proposed system is ( 0.6883 < 1 ) depicts sufficient security and resistance against differential attacks.

4.9. Time Complexity of the Proposed System

It is crucial to have a good cryptosystem and must use the least resources and should be computationally efficient. Such a cryptographic algorithm which are computationally inefficient and requires much time for encryption/decryption, cannot be used as a real-time security solution. We have carried out the time complexity test of the proposed cryptosystem and the processing time was only 8.6 msec. The examination is carried out on MATLAB 2019(a) with a system having 8GB RAM. The calculated computational time for the proposed system is compared to several existing systems as shown in the in Table 5 that highlight the real-time applicability of the proposed system.
Table 5. Time complexity values and its comparison.

4.10. Structural Content

Similarity between plain image and cipher image is calculated via Structural Content (SC) test. It determine the similarity between the plain and encrypted image. Mathematically, SC is written as
SC = i = 1 M j = 1 N O i , j 2 i = 1 M j = 1 N E ( i , j ) 2 ,
whereas O i , j and E i , j in Equation (20) are original and encrypted images at ith row and jth column, respectively. The value of SC is between (1, −1). A value less than 1 indicates that the proposed system is secure while a value close to 1 highlights that the scheme is insecure for digital images. In the proposed scheme, SC is 0.6257 which is less than 1 and therefore it indicates higher security of the proposed scheme.

5. Conclusions

This paper presents a novel privacy preserved occupancy monitoring system. The number of people can be counted along with the Region of Interest (ROI) based encryption. Such ROI-based encryption offers improved computation speed. Intertwining and Chebyshev maps are used to encrypt moving objects in the foreground which drastically improve the performance. The results show that the chaotic maps used in this paper are highly sensitive to the initial seed parameters. Such properties of chaos maps protect an attacker from numerous attacks. The proposed scheme is tested in a real-time office environment and the security is proved via a number of security parameters is reported in this research. These parameters include entropy, correlation, mean square error, mean absolute error, peak to signal noise ratio, number of pixel change rate, normalized cross correlation, and structural content. Results from these tests confirm the usefulness of the proposed technique in real-time environment and verify a higher level of security. Our future goal is to test the proposed method with other chaotic maps, and furthermore compare it with a number of other conventional encryption schemes.

Author Contributions

Conceptualization, J.A., F.M. and S.A.S.; methodology, J.A. and S.S.J.; software, J.A. and S.A.S.; validation, J.A., S.A.S. and S.S.J.; formal analysis, J.A.; investigation, J.A. and I.H.; resources, writing, review and editing, J.A., F.M. and S.A.S., S.S.J. and I.H., funding acquisition, S.S.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The author Sajjad Shaukat Jamal extend his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under grant number R.G.P. 2/58/40.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lei, M.; Lefloch, D.; Gouton, P.; Madani, K. A video-based real-time vehicle counting system using adaptive background method. In Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, Bali, Indonesia, 30 November–3 December 2008; pp. 523–528. [Google Scholar]
  2. Lin, C.Y.; Muchtar, K.; Lin, J.Y.; Sung, Y.H.; Yeh, C.H. Moving object detection in the encrypted domain. Multimed. Tools Appl. 2017, 76, 9759–9783. [Google Scholar] [CrossRef]
  3. Grodi, R.; Rawat, D.B.; Rios-Gutierrez, F. Smart parking: Parking occupancy monitoring and visualization system for smart cities. In Proceedings of the IEEE SoutheastCon 2016, Norfolk, VA, USA, 30 March–3 April 2016; pp. 1–5. [Google Scholar]
  4. Ahmad, J.; Larijani, H.; Emmanuel, R.; Mannion, M. Secure occupancy monitoring system for iot using lightweight intertwining logistic map. In Proceedings of the 2018 10th IEEE Computer Science and Electronic Engineering (CEEC), Colchester, UK, 19–21 September 2018; pp. 208–213. [Google Scholar]
  5. Pereira, P.F.; Ramos, N.M.; Almeida, R.M.; Simões, M.L. Methodology for detection of occupant actions in residential buildings using indoor environment monitoring systems. Build. Environ. 2018, 146, 107–118. [Google Scholar] [CrossRef]
  6. Oliveira-Lima, J.A.; Morais, R.; Martins, J.; Florea, A.; Lima, C. Load forecast on intelligent buildings based on temporary occupancy monitoring. Energy Build. 2016, 116, 512–521. [Google Scholar] [CrossRef]
  7. Sadeghi, A.R.; Schneider, T.; Wehrenberg, I. Efficient privacy-preserving face recognition. In International Conference on Information Security and Cryptology; Springer: Berlin/Heidelberg, Germany, 2009; pp. 229–244. [Google Scholar]
  8. Sanchez, A.; Suarez, P.D.; Conci, A.; Nunes, E. Video-based distance traffic analysis: Application to vehicle tracking and counting. Comput. Sci. Eng. 2010, 13, 38–45. [Google Scholar] [CrossRef]
  9. Rudin, A.; Audah, L.; Jamil, A.; Abdullah, J. Occupancy monitoring system for campus sports facilities using the Internet of Things (IoT). In Proceedings of the 2016 IEEE Conference on Wireless Sensors (ICWiSE), Langkawi, Malaysia, 10–12 October 2016; pp. 100–105. [Google Scholar]
  10. Ahmad, H. A secure image encryption scheme based on chaotic maps and affine transformation. Multimed. Tools Appl. 2016, 75, 13951–13976. [Google Scholar] [CrossRef]
  11. Khan, M.; Masood, F. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed. Tools Appl. 2019, 78, 26203–26222. [Google Scholar] [CrossRef]
  12. Kaur, M.; Kumar, V. A comprehensive review on image encryption techniques. Arch. Comput. Methods Eng. 2020, 27, 15–43. [Google Scholar] [CrossRef]
  13. Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process. 2019, 30, 943–961. [Google Scholar] [CrossRef]
  14. Khan, J.; Ahmad, J.; Hwang, S.O. An efficient image encryption scheme based on: Henon map, skew tent map and S-Box. In Proceedings of the IEEE 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey, 27–29 May 2015; pp. 1–6. [Google Scholar]
  15. Rehman, A.U.; Khan, J.S.; Ahmad, J.; Hwang, S.O. A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Res. 2016, 7, 7. [Google Scholar] [CrossRef]
  16. Ahmad, J.; Khan, M.A.; Hwang, S.O.; Khan, J.S. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput. Appl. 2017, 28, 953–967. [Google Scholar] [CrossRef]
  17. Khan, M.; Masood, F.; Alghafis, A.; Amin, M.; Naqvi, S.I.B. A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS ONE 2019, 14. [Google Scholar] [CrossRef] [PubMed]
  18. Ali, K.M.; Khan, M. Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int. J. Theor. Phys. 2019, 58, 3091–3117. [Google Scholar] [CrossRef]
  19. Khan, M.; Waseem, H.M. A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int. J. Theor. Phys. 2019, 58, 2720–2743. [Google Scholar] [CrossRef]
  20. Khan, M.; Munir, N. A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel. Pers. Commun. 2019, 109, 849–867. [Google Scholar] [CrossRef]
  21. Waseem, H.M.; Khan, M. A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys. B 2019, 125, 27. [Google Scholar] [CrossRef]
  22. Ali, K.M.; Khan, M. A new construction of confusion component of block ciphers. Multimed. Tools Appl. 2019, 78, 32585–32604. [Google Scholar] [CrossRef]
  23. Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
  24. Shannon, C.E. A mathematical theory of communication. Bell Syst. Tech. J. 1948, 27, 379–423. [Google Scholar] [CrossRef]
  25. Khan, M.; Asghar, Z. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput. Appl. 2018, 29, 993–999. [Google Scholar] [CrossRef]
  26. Belazi, A.; Khan, M.; El-Latif, A.A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
  27. Khan, M.; Shah, T.; Batool, S.I. A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimed. Tools Appl. 2017, 76, 24027–24062. [Google Scholar] [CrossRef]
  28. Özkaynak, F.; Çelik, V.; Özer, A.B. A new S-box construction method based on the fractional-order chaotic Chen system. Signal Image Video Process. 2017, 11, 659–664. [Google Scholar] [CrossRef]
  29. Özkaynak, F. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn. 2018, 92, 305–313. [Google Scholar] [CrossRef]
  30. Özkaynak, F.; Muhamad, M.I. Alternative substitutional box structures for DES. In Proceedings of the IEEE 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; pp. 1–4. [Google Scholar]
  31. Özkaynak, F. Construction of robust substitution boxes based on chaotic systems. Neural Comput. Appl. 2019, 31, 3317–3326. [Google Scholar] [CrossRef]
  32. Al Solami, E.; Ahmad, M.; Volos, C.; Doja, M.N.; Beg, M.M.S. A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy 2018, 20, 525. [Google Scholar] [CrossRef]
  33. Ahmad, M.; Seeru, F.; Siddiqi, A.M.; Masood, S. Dynamic 9 × 9 Substitution-Boxes Using Chaos-Based Heuristic Search. In Soft Computing: Theories and Applications; Springer: Berlin/Heidelberg, Germany, 2018; pp. 839–851. [Google Scholar]
  34. Ahmed, H.A.; Zolkipli, M.F.; Ahmad, M. A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput. Appl. 2019, 31, 7201–7210. [Google Scholar] [CrossRef]
  35. Alzaidi, A.A.; Ahmad, M.; Ahmed, H.S.; Solami, E.A. Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map. Complexity 2018, 2018, 9389065. [Google Scholar] [CrossRef]
  36. Wang, X.; Akgul, A.; Cavusoglu, U.; Pham, V.T.; Vo Hoang, D.; Nguyen, X.Q. A chaotic system with infinite equilibria and its S-box constructing application. Appl. Sci. 2018, 8, 2132. [Google Scholar] [CrossRef]
  37. Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 2008, 35, 408–419. [Google Scholar] [CrossRef]
  38. Guanrong, C.; Yaobin, M.; Chui Charles, K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 2004, 21, 749–761. [Google Scholar]
  39. Lian, S.; Sun, J.; Wang, Z. A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 2005, 26, 117–129. [Google Scholar] [CrossRef]
  40. Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. Bifurc. Chaos 2004, 14, 3613–3624. [Google Scholar] [CrossRef]
  41. Mazloom, S.; Eftekhari-Moghadam, A.M. Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 2009, 42, 1745–1754. [Google Scholar] [CrossRef]
  42. Sun, F.; Liu, S.; Li, Z.; Lü, Z. A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 2008, 38, 631–640. [Google Scholar] [CrossRef]
  43. Wang, Y.; Wong, K.W.; Liao, X.; Chen, G. A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 2011, 11, 514–522. [Google Scholar] [CrossRef]
  44. Wong, K.W.; Kwok, B.S.H.; Law, W.S. A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 2008, 372, 2645–2652. [Google Scholar] [CrossRef]
  45. Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
  46. Ahmad, J.; Larijani, H.; Emmanuel, R.; Mannion, M.; Javed, A. Occupancy detection in non-residential buildings–A survey and novel privacy preserved occupancy monitoring solution. Appl. Comput. Informat. 2018, in press. [Google Scholar] [CrossRef]
  47. Khan, F.A.; Ahmed, J.; Khan, J.S.; Ahmad, J.; Khan, M.A.; Hwang, S.O. A new technique for designing 8 × 8 substitution box for image encryption applications. In Proceedings of the 2017 IEEE 9th Computer Science and Electronic Engineering (CEEC), Colchester, UK, 27–29 September 2017; pp. 7–12. [Google Scholar]
  48. Ahmad, J.; Larijani, H.; Emmanuel, R.; Mannion, M.; Javed, A.; Ahmadinia, A. An intelligent real-time occupancy monitoring system with enhanced encryption and privacy. In Proceedings of the 2018 IEEE 17th International Conference on Cognitive Informatics & Cognitive Computing (ICCI* CC), Berkeley, CA, USA, 16–18 July 2018; pp. 524–529. [Google Scholar]
  49. Ahmad, J.; Larijani, H.; Emmanuel, R.; Mannion, M.; Javed, A.; Phillipson, M. Energy demand prediction through novel random neural network predictor for large non-domestic buildings. In Proceedings of the 2017 Annual IEEE International Systems Conference (SysCon), Montreal, QC, Canada, 24–27 April 2017; pp. 1–6. [Google Scholar]
  50. Xiang, T.; Wong, K.w.; Liao, X. Selective image encryption using a spatiotemporal chaotic system. Chaos Interdiscip. J. Nonlinear Sci. 2007, 17, 023115. [Google Scholar] [CrossRef]
  51. Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
  52. Khan, M.; Waseem, H.M. A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE 2018, 13, e0206460. [Google Scholar] [CrossRef] [PubMed]
  53. Wang, X.; Sun, H. A chaotic image encryption algorithm based on zigzag-like transform and DNA-like coding. Multimed. Tools Appl. 2019, 78, 34981–34997. [Google Scholar] [CrossRef]
  54. Gao, T.; Chen, Z. A new image encryption algorithm based on hyperchaos. Phys. Lett. A 2008, 372, 394–400. [Google Scholar] [CrossRef]
  55. Ahmad, J.; Hwang, S.O.; Ali, A. An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel. Pers. Commun. 2015, 84, 901–918. [Google Scholar] [CrossRef]
  56. Ahmad, J.; Tahir, A.; Khan, J.S.; Khan, M.A.; Khan, F.A.; Habib, Z. A Partial Ligt-weight Image Encryption Scheme. In Proceedings of the IEEE 2019 UK/China Emerging Technologies (UCET), Glasgow, UK, 21–22 August 2019; pp. 1–3. [Google Scholar]
  57. Zhang, Y.Q.; Wang, X.Y. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf. Sci. 2014, 273, 329–351. [Google Scholar] [CrossRef]
  58. Mirzaei, O.; Yaghoobi, M.; Irani, H. A new image encryption method: Parallel sub-image encryption with hyper chaos. Nonlinear Dyn. 2012, 67, 557–566. [Google Scholar] [CrossRef]
  59. Belazi, A.; El-Latif, A.A.A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
  60. Khan, M.; Masood, F.; Alghafis, A. Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput. Appl. 2019, 1–24. [Google Scholar] [CrossRef]
  61. Wang, X.; Xu, D. Image encryption using genetic operators and intertwining logistic map. Nonlinear Dyn. 2014, 78, 2975–2984. [Google Scholar] [CrossRef]
  62. Huang, X. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 2012, 67, 2411–2417. [Google Scholar] [CrossRef]
  63. Wang, X.; Luan, D.; Bao, X. Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit. Signal Process. 2014, 25, 244–247. [Google Scholar] [CrossRef]
  64. Rhouma, R.; Meherzi, S.; Belghith, S. OCML-based colour image encryption. Chaos Solitons Fractals 2009, 40, 309–318. [Google Scholar] [CrossRef]
  65. Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef]
  66. Huang, C.K.; Nien, H.H. Multi chaotic systems based pixel shuffle for image encryption. Opt. Commun. 2009, 282, 2123–2127. [Google Scholar] [CrossRef]
  67. Zhang, G.; Liu, Q. A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284, 2775–2780. [Google Scholar] [CrossRef]
  68. Norouzi, B.; Mirzakuchaki, S.; Seyedzadeh, S.M.; Mosavi, M.R. A simple, sensitive and secure image encryption algorithm based on hyperchaotic system with only one round diffusion process. Multimed. Tools Appl. 2014, 71, 1469–1497. [Google Scholar] [CrossRef]
  69. Ahmed, F.; Anees, A.; Abbas, V.U.; Siyal, M.Y. A noisy channel tolerant image encryption scheme. Wirel. Pers. Commun. 2014, 77, 2771–2791. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.