IEEE Access (Jan 2024)

Novel Dual-Domain Chaotic Image Cryptosystem for Cybersecurity Applications

  • Mahmoud Y. M. Yassin,
  • Ali A. Nasir,
  • Mostafa Taha

DOI
https://doi.org/10.1109/ACCESS.2024.3454562
Journal volume & issue
Vol. 12
pp. 123694 – 123715

Abstract

Read online

The secrecy of various forms of multimedia data constitutes a significant aspect of the cybersecurity field. In this case, chaos-based image ciphers can be adapted. Chaotic image encryption has been investigated in the literature using different transformation domains, such as spatial, discrete Fourier transform, wavelet transform, etc. Although some frequency-based cryptosystems exhibit favorable confusion properties, they may suffer in terms of diffusion properties and fail in terms of some statistical characteristics, which make them vulnerable to various statistical, analytical, and differential attacks. In this regard, we adopt a dual-domain (wavelet and spatial domains) image cryptosystem and propose a novel diffusion process in the wavelet domain to address the problem of weak resilience against the aforementioned attacks. The proposed diffusion process in the wavelet domain is applied only on 1/16 of the pixels of the plain image, which makes it computationally more efficient compared to the existing wavelet domain-based works. In addition, the proposed cryptosystem solves the bell shape histogram problem associated with some frequency-based cryptosystems, which has been verified using different performance metrics in our simulation results. We also introduce a novel key-dependent chaotic variable generator to generate the required initial conditions and control parameters for the adopted enhanced chaotic map. The superiority of the proposed algorithm compared to some of the existing state-of-the-art has been verified through various performance metrics. These include different types of correlation coefficients, histogram visualization, histogram deviation, irregular deviation, mean square error, chi-square test, entropy test, and differential analysis.

Keywords