A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox
- URL: http://arxiv.org/abs/2312.15280v1
- Date: Sat, 23 Dec 2023 15:26:15 GMT
- Title: A Hybrid Image Encryption Scheme based on Chaos and a DPA-Resistant Sbox
- Authors: Mohammad Gholamzadeh, Behrooz Khadem,
- Abstract summary: Recently, Khalid M. Hosny presented an image encryption scheme based on 6D hyper chaotic mapping and Q-Fibonacci matrix.
In this paper, based on Khaled Hosny's design, a new effective design is presented that has improved encryption security and efficiency.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Image encryption is one of the most common and effective methods to secure digital images. Recently, Khalid M. Hosny presented an image encryption scheme based on 6D hyper chaotic mapping and Q-Fibonacci matrix, which, despite its remarkable theoretical and practical properties, has several weaknesses, including inaccuracy of black image encryption, inappropriate white image encryption (improper entropy parameters, correlation, chi-square test, histogram, UACI, and NPCR), weak keys, inappropriate key usage. In this paper, based on Khaled Hosny's design, a new effective design is presented that has improved encryption security and efficiency. In addition, in the proposed design, a secure key and a substitution box with a high degree of transparency order, which is resistant to DPA attacks, have been added. Also, a method to improve transferring chaos parameters is also proposed. The test results show the improvement of the resistance of the proposed design against the common attacks of image encryption schemes and improvement in bandwidth consumption. Also it has been shown that the proposed scheme has produced better results in terms of both security and efficiency compared to other similar new schemes.
Related papers
- Enabling Practical and Privacy-Preserving Image Processing [5.526464269029825]
Homomorphic Encryption (FHE) enables computations on encrypted data, preserving confidentiality without the need for decryption.
Traditional FHE methods often encrypt images by monolithic data blocks, instead of pixels.
We propose and implement a pixel-level homomorphic encryption approach, iCHEETAH, based on the CKKS scheme.
arXiv Detail & Related papers (2024-09-05T14:22:02Z) - Multi-Layered Security System: Integrating Quantum Key Distribution with Classical Cryptography to Enhance Steganographic Security [0.0]
We present a novel cryptographic system that integrates Quantum Key Distribution (QKD) with classical encryption techniques.
Our approach leverages the E91 QKD protocol to generate a shared secret key between communicating parties.
This key is then hashed using the Secure Hash Algorithm (SHA) to provide a fixedlength, high-entropy key.
arXiv Detail & Related papers (2024-08-13T15:20:29Z) - Deep Learning and Chaos: A combined Approach To Image Encryption and Decryption [1.8749305679160366]
We introduce a novel image encryption and decryption algorithm using hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional Neural Network (CNN)
The robustness of the encryption algorithm is shown by key sensitivity analysis, i.e., the average sensitivity of the algorithm to key elements.
arXiv Detail & Related papers (2024-06-24T16:56:22Z) - Enhancing the security of image transmission in Quantum era: A
Chaos-Assisted QKD Approach using entanglement [0.0]
Quantum computing has introduced unprecedented security challenges to conventional cryptographic systems.
This research addresses these challenges by innovatively combining quantum key distribution (QKD) with logistic chaotic maps to establish a secure image transmission scheme.
arXiv Detail & Related papers (2023-11-30T11:26:38Z) - PRO-Face S: Privacy-preserving Reversible Obfuscation of Face Images via
Secure Flow [69.78820726573935]
We name it PRO-Face S, short for Privacy-preserving Reversible Obfuscation of Face images via Secure flow-based model.
In the framework, an Invertible Neural Network (INN) is utilized to process the input image along with its pre-obfuscated form, and generate the privacy protected image that visually approximates to the pre-obfuscated one.
arXiv Detail & Related papers (2023-07-18T10:55:54Z) - Human-imperceptible, Machine-recognizable Images [76.01951148048603]
A major conflict is exposed relating to software engineers between better developing AI systems and distancing from the sensitive training data.
This paper proposes an efficient privacy-preserving learning paradigm, where images are encrypted to become human-imperceptible, machine-recognizable''
We show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information.
arXiv Detail & Related papers (2023-06-06T13:41:37Z) - DiffProtect: Generate Adversarial Examples with Diffusion Models for
Facial Privacy Protection [64.77548539959501]
DiffProtect produces more natural-looking encrypted images than state-of-the-art methods.
It achieves significantly higher attack success rates, e.g., 24.5% and 25.1% absolute improvements on the CelebA-HQ and FFHQ datasets.
arXiv Detail & Related papers (2023-05-23T02:45:49Z) - Attribute-Guided Encryption with Facial Texture Masking [64.77548539959501]
We propose Attribute Guided Encryption with Facial Texture Masking to protect users from unauthorized facial recognition systems.
Our proposed method produces more natural-looking encrypted images than state-of-the-art methods.
arXiv Detail & Related papers (2023-05-22T23:50:43Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity [2.7985570786346745]
We propose an efficient implementation scheme for a quantum image encryption algorithm combining the generalized affine transform and logistic map.
We achieve a remarkable 50% reduction in cost while maintaining security and efficiency.
arXiv Detail & Related papers (2022-04-14T10:15:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.