Exploiting Circular Shifts for Efficient Chaotic Image Encryption

  • Lazaros Moysis* (Corresponding Author)
  • , Marcin Lawnik* (Corresponding Author)
  • , Wassim Alexan
  • , Sotirios K. Goudos
  • , Murilo Baptista
  • , George F. Fragulis
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

14 Citations (Scopus)
1 Downloads (Pure)

Abstract

This work presents a chaotic image encryption algorithm that acts on the binary level of the image for effective permutation, and on the byte level for substitution. The permutation step combines actions of bit level rearranging, and bit shuffling. Circular shift operations are used for bit shuffling, to reduce the execution time. Circular shifts are also applied to shuffle the permutation and substitution rules, effectively increasing security at a very low execution cost. The encryption keys are plaintext dependent, and a key mixing step in included, so that each part of the key affects all the subsequent encryption operations. For the encryption, a new Soboleva hyperbolic tangent based map is first designed. The dynamical behavior of the map is studied and shows robust chaos, and an absence of equilibria, meaning that it can generate hidden attractors. This map is used as an entropy source, along with a chaotic pseudo random number generator (PRNG). The encryption process shows a good performance under a collection of tests, and has also a low execution time, 0.0134 sec for a 256×256 image, 0.0530 sec for a 512×512 image, and 0.2050 sec for a 1024×1024 image. So the proposed algorithm is a viable option for fast, efficient, and secure data encryption.
Original languageEnglish
Pages (from-to)92997 - 93016
Number of pages20
JournalIEEE Access
Volume13
Early online date22 May 2025
DOIs
Publication statusPublished - 2025

Keywords

  • pseudo random number generator
  • Soboleva
  • Bit level
  • bit plane
  • chaos
  • chaotification
  • encryption
  • hidden attractor

Fingerprint

Dive into the research topics of 'Exploiting Circular Shifts for Efficient Chaotic Image Encryption'. Together they form a unique fingerprint.

Cite this