Engineering Reports (Dec 2024)

A robust approach to satellite image encryption using chaotic map and circulant matrices

  • Shamsa Kanwal,
  • Saba Inam,
  • Asghar Ali Shah,
  • Halima Iqbal,
  • Anas Bilal,
  • Muhammad Usman Hashmi,
  • Raheem Sarwar

DOI
https://doi.org/10.1002/eng2.13010
Journal volume & issue
Vol. 6, no. 12
pp. n/a – n/a

Abstract

Read online

Abstract In the modern era, where satellite imagery is vital for applications like ecological monitoring and national security, ensuring the safety and integrity of these data repositories is crucial. This study presents an improved satellite image encryption technique that combines the cryptographic strength of the circulant matrix in the Hill cipher with the dynamic characteristics of the hyperbolic tangent tent map, further enhanced by the Kronecker XOR product. The algorithm initiates with computing alterations by a shift amount. After preserving the leftmost pixel in each row, it executes XOR operations between alternating rows, combining the value of the current even or odd row with corresponding pixels in the adjacent rows followed by encryption using the Hill cipher. The resulting image undergoes a diffusion process utilizing a hyperbolic tangent tent map. The Kronecker XOR product operation is then applied to individual pixels to produce a secure image followed by additional diffusion with keys from the hyperbolic tangent tent map to achieve the final encrypted image. We conducted simulations using MATLAB to assess the efficiency of the proposed satellite image encryption from theoretical and statistical perspectives. The results exhibit robust encryption performance as demonstrated by metrics such as an entropy value of 7.9982, a UACI of 33.5333%, and an NPCR of 99.6038%. The experiment results demonstrate the proposed image encryption scheme's reliability, practicability, and efficiency in securing satellite images during data storage and transmission. Comprehensive testing against various attacks including correlation, histogram, chi‐square, NPCR, PSNR, UACI, SSIM, key space and key sensitivity analysis confirms the scheme's robustness, efficiency and speed. These findings verify the scheme's ability to come across the most stringent encryption and decryption standards, making it an effective solution for securing sensitive satellite image data.

Keywords