Abstract
This work represents a new contribution in the field of encryption of RGB images, using Clifford attractors, which are the basic constituents of chaos theory, considering the dynamic behavior and random appearance, we generated three substitution boxes \(K^{(1)}, K^{(2)},\) \(K^{(3)}\) are enerated, each of them helps us to successively encrypt the channels of the original RGB image (red, green, blue). This random permutation is done by digram (sequence of two digits), which means that each pixel of the image to be encrypted with the red color will be replaced by the cell of position (i, j). In fact, the value of i is extracted from the channel \(K^{(1)}\) with an increasing step and j is obtained from the channel \(K^{(2)}\) of decreasing step. While the modification of the green matrix is done by the choice of the channels \(K^{(2)}\) and \(K^{(3)}\), on the other side, the blue color uses the channels \(K^{(3)}\) and \(K^{(1)}\) while following the same principle. On the purpose of making the present approach more efficient in the unreadable and fuzzy image while increasing the decryption time, we resort to the application of an XOR mask between each substituted matrix and each examined matrix with a bilinear transformation of different steps. Based on several criteria such as histogram, differential attacks, entropy, and correlation analysis, this approach has yielded experimental results that justify its performance and reliability in protecting data against any malicious attack. In addition, it marks its competence in front of other existing methods in the literature.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arrowsmith, D., Place, C.: Dynamical Systems: Differential Equations, Maps, and Chaotic Behavior. Chapman and Hall, New York (1992)
Kocarev, L., Lian, S.: Chaos-Based Cryptography: Theory, Algorithms and Applications. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20542-2
Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptology 8, 29–41 (1989)
Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991). https://doi.org/10.1007/3-540-46416-6_11
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)
Fridrich, J.: Image encryption based on chaotic maps. In: Proceedings of IEEE Conference on Systems, Man, and Cybernetics, pp. 1105–1110 (1997)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8(6), 1259–1284 (1998)
Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Int. J. Chaos Solitons Fractals 21, 749–761 (2004)
Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int J Bifurcat. Chaos 14(10), 3613–3624 (2004)
Giesl, J., Vlcek, K.: Image encryption based on strange attractors. ICGST-GVIP J. 9(2), 19–26 (2009)
Lian, S., Sun, J., Wang, Z.: A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26(1), 117–129 (2005)
Elazzaby, F., El Akkad, N., Kabbaj, S.: A new encryption approach based on four-square and zigzag encryption (C4CZ). In: Bhateja, V., Satapathy, S.C., Satori, H. (eds.) Embedded Systems and Artificial Intelligence. AISC, vol. 1076, pp. 589–597. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0947-6_56
Elazzaby, F., EL akkad, N., Kabbaj, S.: Advanced encryption of image based on S-box and chaos 2D (LSMCL). In: 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET) (2020)
Tong, X.J., Wang, Z., Zhang, M., Liu, Y., Xu, H., Ma, J.: An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn. 80(3), 1493–1508 (2015). https://doi.org/10.1007/s11071-015-1957-9
Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on hash function with only two-round diffusion process. Multimedia Syst. 20(1), 45–64 (2013). https://doi.org/10.1007/s00530-013-0314-4
Hua, Z.Y., Zhou, Y.C., Pun, C.M., Chen, C.L.: 2D Sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)
Fathi-Vajargah, B., Kanafchian, M., Alexandrov, V.: Image encryption based on permutation and substitution using Clifford Chaotic System and logistic map. J. Comput. 13(3), 309–326 (2018). https://doi.org/10.17706/jcp.13.3.3
Zhu, H., Zhao, Y., Song, Y.: 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7, 14081–14098 (2019). https://doi.org/10.1109/ACCESS.2019.2893538
El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Camera self-calibration with varying parameters from two views. WSEAS Trans. Inf. Sci. Appl. 10(11), 356–367 (2013)
El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Robust method for self-calibration of cameras having the varying intrinsic parameters. J. Theor. Appl. Inf. Technol. 50(1), 57–67 (2013)
El Akkad, N., El Hazzat, S., Saaidi, A., Satori, K.: Reconstruction of 3D scenes by camera self-calibration and using genetic algorithms. 3D Res. 7(1), 1–17 (2016)
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A novel text encryption algorithm based on the two-square cipher and caesar cipher. In: Tabii, Y., Lazaar, M., Al Achhab, M., Enneya, N. (eds.) BDCA 2018. CCIS, vol. 872, pp. 78–88. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-96292-4_7
Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new color image encryption algorithm using random number generation and linear functions. In: Bhateja, V., Satapathy, S.C., Satori, H. (eds.) Embedded Systems and Artificial Intelligence. AISC, vol. 1076, pp. 581–588. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0947-6_55
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: Grayscale image encryption using shift bits operations. In: International Conference on Intelligent Systems and Computer Vision, pp. 1–7 (2018)
Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.: A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput. 24(5), 3829–3848 (2019). https://doi.org/10.1007/s00500-019-04151-8
Essaid, M., Akharraz, I., Saaidi, A., Mouhib, A., Mohamed, E., Ismail, A., Abderrahim, S., Ali, M.: A new color image encryption algorithm based on iterative mixing of color channels and chaos. Adv. Sci. Technol. Eng. Syst. J. 2, 94–99 (2017)
Touil, H., El Akkad, N., Satori, K.: Text encryption: hybrid cryptographic method using vigenere and hill ciphers. In: 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), Fez, Morocco, pp. 1–6 (2020)
Touil, H., El Akkad, N., Satori, K.: H-rotation: secure storage and retrieval of passphrases on the authentication process. Int. J. Saf. Secur. Eng. 10(6), 785–796 (2020)
El Akkad, N., Merras, M., Baataoui, A., Saaidi, A., Satori, K.: Camera self-calibration having the varying parameters and based on homography of the plane at infinity. Multimedia Tools Appl. 77(11), 14055–14075 (2017). https://doi.org/10.1007/s11042-017-5012-3
El Akkad, N., Saaidi, A., Satori, K.: Self-calibration based on a circle of the cameras having the varying intrinsic parameters. In: Proceedings of 2012 International Conference on Multimedia Computing and Systems, ICMCS, pp. 161–166 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Azzaby, F.E., Akkad, N.E., Sabour, K., Kabbaj, S. (2022). An RGB Image Encryption Algorithm Based on Clifford Attractors with a Bilinear Transformation. In: Lazaar, M., Duvallet, C., Touhafi, A., Al Achhab, M. (eds) Proceedings of the 5th International Conference on Big Data and Internet of Things. BDIoT 2021. Lecture Notes in Networks and Systems, vol 489. Springer, Cham. https://doi.org/10.1007/978-3-031-07969-6_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-07969-6_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-07968-9
Online ISBN: 978-3-031-07969-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)