You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

13 April 2022

Using Singular Value Decomposition and Chaotic Maps for Selective Encryption of Video Feeds in Smart Traffic Management

,
,
,
and
1
Faculty of Computer and Information Systems, Islamic University of Madinah, Madinah 42351, Saudi Arabia
2
Department of Computer Sciences, University of Kashmir, Srinagar 190006, India
*
Author to whom correspondence should be addressed.
This article belongs to the Topic Cyber Security and Critical Infrastructures

Abstract

Traffic management in a smart city mainly relies on video feeds from various sources such as street cameras, car dash cams, traffic signal cameras, and so on. Ensuring the confidentiality of these video feeds during transmission is necessary. However, due to these devices’ poor processing power and memory capacity, the applicability of traditional encryption algorithms is not feasible. Therefore, a selective encryption system based on singular value decomposition (SVD) and chaotic maps is presented in this study. The proposed cryptosystem can be used in smart traffic management. We apply SVD to identify the most significant parts of each frame of the video feed for encryption. Chaotic systems were deployed to achieve high diffusion and confusion properties in the resulted cipher. Our results suggest that the computational overhead is significantly less than that of the traditional approaches with no compromise on the strength of the encryption.

1. Introduction

Smart-traffic management systems make use of sensors, car dash cams, street and traffic light cameras, mobile networks, and many other technologies to monitor, regulate, and respond to traffic congestion and vehicular accidents [1]. It mainly relies on the video feeds received from these technologies, which are processed by servers. Any unauthorized access to these feeds during their transmission can result in a confidentiality breach of the system. Therefore, ensuring the confidentiality of such video feeds is of paramount importance in smart-traffic management. Unfortunately, due to the huge volumes of data generated by such sources [2] and their low computational power and memory capacity, applying classical encryption schemes [3] such as Advanced Encryption Standard (AES) [4] and Data Encryption Standard (DES) [5] is not feasible. In addition, certain properties in multimedia content, such as redundancies and high correlation, makes the use of such classical encryption schemes inefficient and expensive in terms of computational time and power required [6], especially in real-time applications such as smart-traffic management.
Fortunately, chaos-based cryptography presents a solution where certain properties of chaotic systems, such as the high sensitivity to initial condition (IC) and control parameter (CP) and random-alike appearance, can be used to yield strong encryption but with less computational and memory capacity required [7]. It is relatively easy to generate such chaotic system using differential or recursive equations. Over the last two decades, various chaotic-based image encryption schemes were proposed [8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24]. However, as the volume of data increases, the computational and memory capacity requirements also increase. To overcome this problem, selective encryption can be used to select and encrypt only the most significant parts of the data [25,26,27,28,29]. If the selection is done properly, encryption using chaotic maps of the selected parts of an image (or a video sequence) results in strong encryption with a significantly less requirement of computational and memory capacity for encrypting huge volumes of data in real time [30]. This selective encryption can be done in a spatial domain where only the four most significant bits (MSBs) of each pixel are selected and encrypted [31], or in a frequency domain where the image is decomposed using discrete cosine transform (DCT); then, only 25% of the frequencies are selected to be encrypted [30].
In this paper, a study on the singular value decomposition (SVD) [32] is conducted, and experiments were drawn to understand the properties of the decomposition and identify the coefficients that needs to be selected for encryption; this is done in order to reduce the amount of data that needs to encrypted given the huge size of the video feeds and the limitations in the computational power. Chaotic maps [8,30] were used in the design of the cryptosystem to increase the complexity and take advantage of the random-alike appearance. The proposed scheme is implemented and evaluated, and the results suggests that the scheme dramatically reduces the computational overhead.
The rest of the paper is organized as follows: Section 2 presents the background and related work, Section 3 discusses the proposed scheme, Section 4 describes the experiments and results, and finally, Section 5 presents the conclusion.

3. Proposed Approach

The proposed approach employs SVD to select that part of each frame of video feed that contains the most significant information. This selected part of the frame is encrypted using PRESENT block cipher [36] for which an 80-bit key is generated using a logistic map. The following are the steps of the proposed approach:
Given an image M with size 128 × 128 ,
  • The image M is split into non-overlapping blocks, each measuring 4 × 4 .
  • For each block, the singular value decomposition is applied, and the diagonal matrix S i is extracted, where i is the block number.
    B i ( M ) = U · S · V T = U · S 1 0 0 0 0 S 2 0 0 0 0 S 3 0 0 0 0 S 4 · V T
  • For each block, the first singular value is extracted and stored in matrix M s with size N / 4 × N / 4 . After processing all the blocks, matrix M s is constructed, and it represents the input to encryption procedure.
  • The singular values of the matrix M s are rounded and converted to binary. Then, the binary values are transformed to a vector, which is decomposed into blocks of size 64 bits that are encrypted.
  • Starting from an initial condition x 0 and a control parameter μ , 80 pseudo-random numbers are generated by iterating the logistic map. These numbers are quantified using a threshold T to construct the encryption key K.
  • The encrypted blocks are reshaped, and the encrypted singular matrices are constructed.
  • The inverse singular value decomposition is applied to each block to obtain the image with encrypted singular values.
  • The pixels of the resulted images are shuffled using the Arnold cat map. The number of iterations of the cat map t is considered one of the keys of the cryptosystem.
The secret keys of the scheme are: the initial condition and control parameter ( x 0 , μ ) of the logistic map, the threshold T used for the quantification step of the pseudo-random sequence, and the number of iteration t of the Arnold cat map. The following are the values used in our experiments:
  • x 0 = 987,654,326 and μ = 3.993787543 ;
  • The threshold T = 0.498754632 ;
  • The number of iterations of the Arnold cat map t = 66 .
Figure 7 shows the flowchart of the encryption method, whereas Figure 8 shows the encryption results.
Figure 7. Flowchart of the encryption procedure employed.
Figure 8. Result of encryption-procedure employed on standard images: (a) aerial; (b) lena; (c) cameraman; (d) jet; (e) lake; (f) tank.
The encrypted images can be decrypted at the receiver’s end using the following procedure:
  • To restore pixel coordinates, the cat map is iterated “P-t” times, where “P” is the period of the cat map and “t” is the number of iterations in the encryption process.
  • The encrypted image M e is split into non-overlapping blocks of size 4 × 4 .
  • Every block is decomposed using singular value decomposition, and the diagonal matrix is extracted.
  • For each block, the first singular value is extracted and stored in a matrix to construct the encrypted singular matrix.
  • The singular values of the encrypted matrix are rounded and converted to binary. The binary values are then transformed to a vector, which is is decomposed into blocks of size 64 bits that are decrypted.
  • The logistic map is used to generate 80 pseudo-random numbers, which are quantified using the threshold T to construct the decryption key K.
  • The blocks are injected along with the key K into the decryption procedure.
  • The decrypted values are reshaped and transformed to singular blocks.
  • Finally, the inverse singular value decomposition is applied to each block to obtain the decrypted image.
Figure 9 shows the flowchart of the decryption method, whereas Figure 10 shows the decryption results.
Figure 9. Flowchart of the decryption procedure employed.
Figure 10. Result of decryption-procedure employed on encrypted standard images: (a) aerial; (b) lena; (c) cameraman; (d) jet; (e) lake; (f) tank.

4. Experiments and Results

The experimental setup used to evaluate the performance of the proposed scheme is illustrated in this section.

4.1. Setup

We implemented the proposed scheme using Matlab (R2016a) and executed our experiments on a Windows 10 operating system running on an Intel core i7-6500 CPU clocked at 2.50 Ghz with 8 GB of memory. Figure 2 shows the standard images used in our experiments.

4.2. Evaluation Metrics

To test the performance of the proposed scheme, several tests need to be conducted [41,42]. We used the following evaluation metrics:
  • Tonal distribution of the encrypted images—It is used to see if the encrypted image is subject to any kind of statistical attack. To avoid a statistical attack, the tonal distribution of the encrypted images should be uniform.
  • Correlation of adjacent pixels—Plain images have a high degree of correlation between neighboring pixels, which should not be present in an encrypted image. In both plain and encrypted photos, we calculate the correlation of adjacent pixels in all directions.
  • Sensitivity to differential attacks—In this experiment, the difference between two cryptograms that resulted from the encryption of two slightly different images is measured to evaluate the cryptosystem’s strength against differential attacks.
  • Entropy—It measures the randomness in the data. An encrypted image should show a random alike appearance.
  • Computational complexity—We calculate the time required to encrypt the image using selective encryption and full encryption. This metric evaluates the time consumed by the encryption, and it should be less for selective encryption as compared to full encryption.
  • Key space—Key space could be defined as the theoretical set of all possible combinations. This number (key space) should be significantly large to make the brute-force attack impractical.
  • Key sensitivity—These are experiments drawn to assess the sensitivity of the secret keys; the slightest change in the one of the keys should be diffused through the cipher.
  • Comparison with recent encryption schemes—To validate our scheme, it needs to be compared with recent cryptosystems.

4.3. Results

4.3.1. Tonal Distribution

An image histogram is a graphical representation of a digital image’s tonal distribution [43]. Figure 11 shows histograms for plain photos, whereas Figure 12 shows histograms for encrypted images. The encrypted images’ histograms demonstrate uniformity, implying that any statistical attack on the suggested system will have difficulty succeeding.
Figure 11. Tonal distribution: histograms of plain standard images: (a) aerial; (b) lena; (c) cameraman; (d) jet; (e) lake; (f) tank.
Figure 12. Tonal distribution: histograms of encrypted standard images that are encrypted using the proposed approach: (a) aerial; (b) lena; (c) cameraman; (d) jet; (e) lake; (f) tank.

4.3.2. Correlation of Adjacent Pixels

The amount of redundant information in digital photographs is extremely large, resulting in a strong correlation between adjacent pixels within the image [44]. This correlation of adjacent pixels is expected to be reduced by encryption. We used the formula in Equation (7) to compute the correlation coefficients of both plain and encrypted standard photos.
r = c o v ( p , q ) D ( p ) D ( q )
where
D ( p ) = 1 S i = 1 S ( p i p ¯ ) 2
c o v ( p , q ) = 1 S i = 1 S ( p i p ¯ ) ( q i q ¯ ) 2
  • p i and q i : two neighboring pixels. (horizontal or vertical).
  • S is the number of ( p i , q i ) couples.
  • p ¯ and q ¯ are the mean values of p i and q i .
The correlation coefficients of both plain and encrypted standard images are shown in Table 3. The results suggest that the pixels of encrypted images show low correlation in every direction (horizontal, vertical, and diagonal), which is graphically illustrated in Figure 13.
Table 3. Correlation of adjacent pixels in plain and encrypted images.
Figure 13. Correlation of neighboring pixels in plain and encrypted images: (a) aerial; (b) horizontal; (c) vertical; (d) diagonal; (e) encrypted aerial; (f) horizontal; (g) vertical; (h) diagonal; (i) lena; (j) horizontal; (k) vertical; (l) diagonal; (m) encrypted lena; (n) horizontal; (o) vertical; (p) diagonal.

4.3.3. Sensitivity to Differential Attack

Differential cryptanalysis aims to locate the “differences” in the cryptograms of two closely related plain-texts in order to find similarities that could lead to the break of the cryptosystem. To prevent that, a cryptosystem should show high plain-text sensitivity. In our cryptosystem, six plain images were used to assess the plain image sensitivity; the images were slightly altered (only some LSBs were shifted) and encrypted to compare the their corresponding ciphers. In this context, two metrics must be used: NPCR and UACI.
NPCR and UACI are two metrics used to assess the similarities between two images in pixel-level comparison and in terms of average intensity change [45]. The NPCR is used to calculate the number of pixels that differ between the two images, which is specified by Equation (8).
N P C R = i , j R ( i , j ) M × 100 %
where M represents the total number of pixels and R ( i , j ) is defined by:
D ( i , j ) = 0 i f I ( i , j ) = I ( i , j ) 1 i f I ( i , j ) I ( i , j )
where I and I are the two images in comparison and i , j are the pixel coordinates. NPCR measured between two random images should be around 99.609375%.
The average intensity difference between the two images I and I is measured using UACI. UACI is defined by Equation (9).
U A C I = 1 M | I ( i , j ) I ( i , j ) | 2 C 1
where C is the number of bits used to encode the pixels. Between two random images, the expected value of UACI should be around 33.46354%.
Table 4 shows the N P C R and U A C I values between two cryptograms of slightly different images. One of the experiments is shown in Figure 14. The findings show that the cryptosystem is resistant to differential attacks.
Table 4. Sensitivity to differential attacks— N P C R and U A C I .
Figure 14. Plain image sensitivity: (a) lake; (b) encrypted lake; (c) lake SSIM = 0.9989; (d) encrypted lake.

4.3.4. Entropy

The entropy is a statistical measure of data randomness [46]. In random data, the information entropy should be around 8. The entropy of the encrypted standard images was calculated and displayed in Table 5. According to the findings, the encrypted photos contain the required entropy.
Table 5. Entropy results for encrypted images.

4.3.5. Computational Complexity

We evaluated the time consumed to encrypt an image using the proposed scheme and compare it with full encryption. In full encryption, the image is divided into non-overlapping blocks to which SVD decomposition is applied. All singular values are then rearranged in a matrix to be encrypted. In contrast, in the proposed method, only the first SV of each block is encrypted. The results of our experiments are shown in Table 6.
Table 6. Computational complexity of selective encryption against full encryption.

4.3.6. Key Space Analysis

As mentioned in Section 3, the secret keys of our scheme are:
  • The initial condition x 0 and the control parameter μ of the logistic map.
  • The threshold T used for quantification of the generated pseudo-random sequence.
  • The number of iterations t of the Arnold cat map.
The precision of the cat map initial condition x 0 and control parameter μ reach 10 15 . This means for these two first secret parameters, the key space reaches 10 30 ( 10 15 for x 0 and 10 15 for μ ). This number is almost 2 100 , which is a huge number that makes the key space large enough to resist exhaustive attacks. Add to that the number of iterations of the Arnold cat map, which has a size of 2 7 and the threshold T, whose precision is set to 10 12 2 40 . This make the key space reach 2 147 . We can say with confidence that brute-force attack is not an option to attack this cryptosystem.

4.3.7. Key Sensitivity

To assess the sensitivity of the keys, an experiment was drawn: we are encrypting the same image using the two slightly different keys. In the experiment, we are assessing the sensitivity of the initial condition x 0 and the control parameter μ of the logistic map. The difference is set to Δ = 10 15 . Figure 15 shows the results of the experiments. A structural similarity metric is used for comparison of the two resulted ciphers.
Figure 15. Keys sensitivity: (a) lena; (b) encrypted lena ( x 0 , μ ) ; (c) encrypted lena ( x 0 + Δ , μ ) SSIM = 0.0081; (d) tank; (e) encrypted tank ( x 0 , μ ) ; (f) encrypted tank ( x 0 , μ + Δ ) SSIM = 0.0122.
As shown in the experiment, the slightest change in the key results in a huge change in the cipher.

4.3.8. Comparison with Related Work

Table 7 shows a comparison between our scheme and a recently proposed image encryption scheme; our schemes showed better performance in terms of NPCR and correlation values. This proves that the selection of the singular values to be encrypted is successful, and the encryption of those singular values resulted in high confusion and diffusion in the cipher.
Table 7. Comparison with related work.

5. Conclusions

In this study, we proposed a selective encryption scheme using singular value decomposition and chaotic systems. The proposed approach aims to ensure the confidentiality of video streams originating from resource-limited devices used in a smart-traffic management system. The proposed scheme uses singular value decomposition to identify the most important parts of video frames to substantially decrease the quantity of data that needs to be encrypted. Chaotic maps were deployed, which increase the diffusion and confusion properties of the encrypted images to achieve strong encryption. Our experimental results suggest that using the proposed selective encryption results in uniform tonal distribution, low correlation between adjacent pixels, immunity to differential attack, high entropy, and low computational complexity of the encrypted images. As a result, the proposed method is appropriate for devices with minimal resources, as it provides computational efficiency due to a significantly lower amount of data processed as compared to full encryption while not compromising the strength of encryption promised by full encryption.

Author Contributions

Testing, O.B.; Writing original draft, O.B. and W.A.B.; methodology, A.A. and A.N.; funding and analysis, A.B.A.; Administration and revision, O.B. All authors have read and agreed to the published version of the manuscript.

Funding

The Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia.

Acknowledgments

The authors extend their appreciation to the Deputyship for Research & Innovation, Ministry of Education in Saudi Arabia for funding this research work through the project number (20\14).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Alsaawy, Y.; Alkhodre, A.; Abi Sen, A.; Alshanqiti, A.; Bhat, W.A.; Bahbouh, N.M. A Comprehensive and Effective Framework for Traffic Congestion Problem Based on the Integration of IoT and Data Analytics. Appl. Sci. 2022, 12, 2043. [Google Scholar] [CrossRef]
  2. Bhat, W.A. Is a data-capacity gap inevitable in big data storage? Computer 2018, 51, 54–62. [Google Scholar] [CrossRef]
  3. Bhat, W.; Quadri, S. Restfs: Secure data deletion using reliable & efficient stackable file system. In Proceedings of the 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), Herl’any, Slovakia, 26–28 January 2012; pp. 457–462. [Google Scholar]
  4. FIPS, N. 197: Announcing the Advanced Encryption Standard (AES); Information Technology Laboratory, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2001. [Google Scholar]
  5. Matsui, M. The first experimental cryptanalysis of the Data Encryption Standard. In Advances in Cryptology—Crypto’94, Proceedings of the 14th Annual International Cryptology Conference, Santa Barbara, CA, USA, 21–25 August 1994; Springer: Berlin/Heidelberg, Germany, 1994; pp. 1–11. [Google Scholar]
  6. Lian, S. Multimedia Content Encryption: Techniques and Applications; CRC Press: Boca Raton, FL, USA, 2008. [Google Scholar]
  7. Kocarev, L.; Lian, S. Chaos-Based Cryptography: Theory, Algorithms and Applications; Studies in Computational Intelligence; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  8. Mao, Y.; Chen, G.; Lian, S. A novel fast image encryption scheme based on 3d chaotic baker maps. Int. J. Bifurc. Chaos 2004, 14, 3613–3624. [Google Scholar] [CrossRef]
  9. Liu, H.; Wang, X. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 2012, 12, 1457–1466. [Google Scholar] [CrossRef]
  10. Liu, H.; Wang, X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903. [Google Scholar] [CrossRef]
  11. Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef] [Green Version]
  12. Liu, H.; Kadir, A.; Gong, P. A fast color image encryption scheme using one-time s-boxes based on complex chaotic system and random noise. Opt. Commun. 2015, 338, 340–347. [Google Scholar] [CrossRef]
  13. Khan, J.S.; ur Rehman, A.; Ahmad, J.; Habib, Z. A new chaos-based secure image encryption scheme using multiple substitution boxes. In Proceedings of the 2015 Conference on Information Assurance and Cyber Security (CIACS), Rawalpindi, Pakistan, 18 December 2015; pp. 16–21. [Google Scholar]
  14. Khan, J.S.; Ahmad, J.; Khan, M.A. Td-ercs map-based confusion and diffusion of autocorrelated data. Nonlinear Dyn. 2017, 87, 93–107. [Google Scholar] [CrossRef]
  15. Khan, J.; Ahmad, J.; Hwang, S.O. An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In Proceedings of the 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey, 27–29 May 2015; pp. 1–6. [Google Scholar]
  16. Gao, T.; Chen, Z. A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 2008, 372, 394–400. [Google Scholar] [CrossRef]
  17. Chen, G.; Mao, Y.; Chui, C.K. A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 2004, 21, 749–761. [Google Scholar] [CrossRef]
  18. Anees, A.; Siddiqui, A.M.; Ahmed, F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 3106–3118. [Google Scholar] [CrossRef]
  19. Som, S.; Mitra, A.; Palit, S.; Chaudhuri, B.B. A selective bitplane image encryption scheme using chaotic maps. Multimed. Tools Appl. 2019, 78, 10373–10400. [Google Scholar] [CrossRef]
  20. Kaur, A.; Singh, G. A Random Selective Block Encryption Technique for Secure Image Cryptography Using Blowfish Algorithm. In Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018, Coimbatore, India, 20–21 April 2018; pp. 1290–1293. [Google Scholar]
  21. Khan, J.S.; Ahmad, J. Chaos based efficient selective image encryption. Multidimens. Syst. Signal Process. Int. J. 2019, 30, 943. [Google Scholar] [CrossRef]
  22. Niu, Y.; Zhou, Z.; Zhang, X. An image encryption approach based on chaotic maps and genetic operations. Multimed. Tools Appl. 2020, 79, 25613–25633. [Google Scholar] [CrossRef]
  23. Premkumar, R.; Anand, S. Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed. Tools Appl. 2019, 78, 9577–9593. [Google Scholar] [CrossRef]
  24. Murali, P.; Niranjana, G.; Paul, A.J.; Muthu, J.S. Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis. Comput. 2022. [Google Scholar] [CrossRef]
  25. He, J.; Xu, Y.; Luo, W.; Tang, S.; Huang, J. A novel selective encryption scheme for H.264/AVC video with improved visual security. Signal Process. Image Commun. 2020, 89, 115994. [Google Scholar] [CrossRef]
  26. Shen, Y.; Tang, C.; Xu, M.; Lei, Z. Optical selective encryption based on the FRFCM algorithm and face biometric for the medical image. Opt. Laser Technol. 2021, 138, 106911. [Google Scholar] [CrossRef]
  27. Rim, Z.; Ridha, E.; Mourad, Z. An improved partial image encryption scheme based on lifting wavelet transform, wide range Beta chaotic map and Latin square. Multimed. Tools Appl. 2021. [Google Scholar] [CrossRef]
  28. Cheng, H.; Li, X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process. 2000, 48, 2439–2451. [Google Scholar] [CrossRef]
  29. Ayoup, A.M.; Hussein, A.H.; Attia, M.A. Efficient selective image encryption. Multimed. Tools Appl. 2016, 75, 17171–17186. [Google Scholar] [CrossRef]
  30. Akram, B.; Oussama, B.; Houcemeddine, H.; Safya, B. Selective Image Encryption Using DCT with AES Cipher. In Computer Science & Information Technology (CS & IT); Academy & Industry Research Collaboration Center (AIRCC): Tamil Nadu, India, 2014. [Google Scholar] [CrossRef]
  31. Xiang, T.; Wong, K.W.; Liao, X. Selective image encryption using a spatiotemporal chaotic system. Chaos Interdiscip. J. Nonlinear Sci. 2007, 17, 023115. [Google Scholar] [CrossRef] [PubMed]
  32. Golub, G.; Kahan, W. Calculating the singular values and pseudo-inverse of a matrix. SIAM J. Numer. Anal. 1965, 2, 205–224. [Google Scholar] [CrossRef]
  33. Benrhouma, O.; Hermassi, H.; El-Latif, A.A.A.; Belghith, S. Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain. Signal Image Video Process. 2015, 9, 1281–1286. [Google Scholar] [CrossRef]
  34. Wang, Z.; Bovik, A.; Sheikh, H.; Simoncelli, E. Image quality assessment: From error visibility to structural similarity. IEEE Trans. Image Process. 2004, 13, 600–612. [Google Scholar] [CrossRef] [Green Version]
  35. Bao, J.; Yang, Q. Period of the discrete Arnold cat map and general cat map. Nonlinear Dyn. 2012, 70, 1365–1375. [Google Scholar] [CrossRef]
  36. Bogdanov, A.; Knudsen, L.R.; Leander, G.; Paar, C.; Poschmann, A.; Robshaw, M.J.; Seurin, Y.; Vikkelsoe, C. PRESENT: An Ultra-Lightweight Block Cipher. In Proceedings of the Cryptographic Hardware and Embedded Systems—CHES 2007, 9th International Workshop on Cryptographic Hardware and Embedded Systems, Vienna, Austria, 10–13 September 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 450–466. [Google Scholar] [CrossRef] [Green Version]
  37. Menezes, A.; Van Oorschot, P.; Vanstone, S. Handbook of Applied Cryptography; CRC Press: Boca Raton, FL, USA, 1997. [Google Scholar]
  38. Christy Atika, S.; Eko Hari, R.; Edi Jaya, K. Good Performance Images Encryption Using Selective Bit T-des On Inverted Lsb Steganography. J. Ilmu Komput. Dan Inf. 2019, 12, 41–49. [Google Scholar]
  39. Benrhouma, O.; Mannai, O.; Hermassi, H. Digital images watermarking and partial encryption based on DWT transformation and chaotic maps. In Proceedings of the 2015 IEEE 12th International Multi-Conference on Systems, Signals Devices (SSD15), Mahdia, Tunisia, 16–19 March 2015; pp. 1–6. [Google Scholar] [CrossRef]
  40. Benrhouma, O.; Hermassi, H.; Belghith, S. Tamper detection and self-recovery scheme by DWT watermarking. Nonlinear Dyn. 2015, 79, 1817–1833. [Google Scholar] [CrossRef]
  41. Murillo-Escobar, M.A.; Meranza-Castillón, M.O.; López-Gutiérrez, R.M.; Cruz-Hernández, C. Suggested Integral Analysis for Chaos-Based Image Cryptosystems. Entropy 2019, 21, 815. [Google Scholar] [CrossRef] [Green Version]
  42. Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
  43. Marion, A. Introduction to Image Processing; Springer: Berlin/Heidelberg, Germany, 1991. [Google Scholar] [CrossRef]
  44. Kamali, S.H.; Shakerian, R.; Hedayati, M.; Rahmani, M. A new modified version of Advanced Encryption Standard based algorithm for image encryption. In Proceedings of the 2010 International Conference on Electronics and Information Engineering, Kyoto, Japan, 1–3 August 2010; Volume 1, pp. V1-141–V1-145. [Google Scholar] [CrossRef]
  45. Wu, Y. NPCR and UACI Randomness Tests for Image Encryption. Cyber J. J. Sel. Areas Telecommun. 2011, 1, 31–38. [Google Scholar]
  46. Huang, X.; Ye, G. An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 2014, 19, 4094–4104. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.