Title: Messed up(): a key generator-based image cryptosystem

Authors: Durgabati Podder; Keya Chowdhury; Subhrajyoti Deb; Nirmalya Kar

Addresses: Department of Computer Science and Engineering, ICFAI University Tripura, Kamalghat, Agartala, Tripura West, 799210, India ' Department of Computer Science and Engineering, ICFAI University Tripura, Kamalghat, Agartala, Tripura West, 799210, India ' Department of Computer Science and Engineering, ICFAI University Tripura, Kamalghat, Agartala, Tripura West, 799210, India ' Department of Computer Science and Engineering, National Institute of Technology Agartala, Jirania, Agartala, Tripura West, 799046, India

Abstract: With exponential growth in digital image communication, a cryptosystem with high confusion and diffusion is essential to ensure privacy and security throughout network transmission. A new chaotic-based image encryption scheme is introduced in this paper using a unique block scrambling function named Messed_up() and Diffie-Hellman key generator. The proposed approach achieves double confusion by scrambling and circular shift operation, and the diffusion process is carried out with the help of the Henon map. Based on the theory of the Diffie-Hellman key exchange algorithm, the secret key has been produced to apply the initial parameters in both the Henon map and circular shift operation. These adaptive techniques make the cryptosystem more challenging to penetrate. Simulation results and cryptographic attack analyses show that the proposed cryptosystem has high-security performance and low computing overhead, making it suitable for real-time multimedia applications.

Keywords: Henon map; security; image encryption; Diffie-Hellman; chaos; confusion; diffusion; number of pixel change rate; NPCR; unified average changing intensity; UACI.

DOI: 10.1504/IJAHUC.2023.133447

International Journal of Ad Hoc and Ubiquitous Computing, 2023 Vol.44 No.1, pp.1 - 12

Received: 26 Jul 2022
Accepted: 13 Oct 2022

Published online: 15 Sep 2023 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article