Cryptosystems with modified chaotic maps for digital images

Loading...
Thumbnail Image
Date
2024-11-28
Journal Title
Journal ISSN
Volume Title
Publisher
UMT Lahore
Abstract
A sophisticated strategy is required to address the challenging problem of how chaotic systems might improve the security of digital images during internet communication. Chaotic systems, first and foremost, are known for their pseudo-random behavior and sensitivity to initial conditions, which presents a possible way to strengthen encryption techniques. Nevertheless, a careful balancing act is needed to ensure that the computational efficiency necessary for real-time image transmission over the internet is not compromised in favor of more robust cryptography. Chaos's unpredictable nature provides a layer of complexity that can strengthen encryption against various cyber threats. However, taking full advantage of this potential requires a deep comprehension of the system's behavior and any potential weak points. When chaotic systems must interact with various digital image formats, resolutions, and platforms common in internet communication, compatibility problems occur, and defined protocols are required for uniformity. Furthermore, one must consider the susceptibility of chaotic systems to specific deterministic attacks while utilizing them for image protection. Image encryption and transmission operations must operate quickly and efficiently to keep communication channels responsive. This might be impacted by the processing overhead presented by chaotic algorithms. Furthermore, the ever-changing character of chaotic systems poses difficulties for key management and synchronization amongst communication entities, particularly when managing substantial amounts of image data. Chaotic systems must ultimately be successfully incorporated into the security framework of digital images in internet communication through a collaborative and multidisciplinary effort that recognizes the constantly changing needs of a secure and interconnected digital landscape and spans information technology, chaos theory, and cryptography. Encryption methods for one-dimensional chaotic systems are limited by their intrinsic simplicity, which might result in smaller key spaces and make them more vulnerable to exhaustive search attacks. These systems may be less effective at delivering strong encryption due to the predictable behavior associated with one-dimensional chaos, which makes them more susceptible to cryptanalysis. Despite their added complexity, multi-dimensional chaotic systems can present computational overhead problems. These problems could cause encryption procedures to execute more slowly and reduce effectiveness, particularly in real-time applications. In this study, our goal is to modify a chaotic map with the help of fuzzy numbers to mitigate the drawbacks of one-dimensional and multi-dimensional chaotic maps; further, utilize the modified chaotic system to design a cryptosystem for the secure transmission of digital images that is compatible with contemporary technology, as well as to present a technique for improving the key space of a cryptosystem developed with a 1-dimensional chaotic map, and our plan to construct cryptosystems using the DNA coding rule and reversing the order of pixel value at the binary level. Finally, the cryptosystem's performance is evaluated using both security and statistical assaults. To guarantee resilience against brute force attacks, key space analysis measures the size and complexity of the key space. Simultaneously, statistical attacks probe the properties of the encrypted output using histogram, entropy, correlation, and texture analysis, offering a thorough assessment of the cryptosystem's resistance to cryptographic and statistical flaws. An extensive analysis of the cryptosystem's efficacy in preserving security and confidentiality is ensured.
Description
Keywords
Citation
Collections