scispace - formally typeset
Search or ask a question
Author

Sabah Fadhel

Bio: Sabah Fadhel is an academic researcher from Universiti Teknologi Malaysia. The author has contributed to research in topics: On-the-fly encryption & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 11 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications, and various chaos encryption techniques are discussed, which are acceptable form of encryption for image data.
Abstract: With increasing dependence on communications over internet and networks, secure data transmission is coming under threat. One of the best solutions to ensure secure data transmissions is encryption. Multiple forms of data, such as text, audio, image, and video can be digitally transmitted, nowadays images being the most popular and old encryption techniques such as: AES,DES,RSA etc., show low security level when used for image encryption. This problem was resolved by using of chaos encryption which is an acceptable form of encryption for image data. The sensitivity to initial conditions and control parameters make chaos encryption suitable for image applications. This study discusses various chaos encryption techniques.

21 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This article first construct a discrete mHR neuron model and then acquire different hidden chaotic bursting sequences under four typical sets of parameters and further encode these hidden chaotic sequences using their ISIs and shows that the ISI-encoded chaotic sequences have much more complex chaos properties than the original sequences.
Abstract: Bursting is a diverse and common phenomenon in neuronal activation patterns and it indicates that fast action voltage spiking periods are followed by resting periods. The interspike interval (ISI) is the time between successive action voltage spikes of neuron and it is a key indicator used to characterize the bursting. Recently, a three-dimensional memristive Hindmarsh-Rose (mHR) neuron model was constructed to generate hidden chaotic bursting. However, the properties of the discrete mHR neuron model have not been investigated, yet. In this article, we first construct a discrete mHR neuron model and then acquire different hidden chaotic bursting sequences under four typical sets of parameters. To make these sequences more suitable for the application, we further encode these hidden chaotic sequences using their ISIs and the performance comparative results show that the ISI-encoded chaotic sequences have much more complex chaos properties than the original sequences. In addition, we apply these ISI-encoded chaotic sequences to the application of image encryption. The image encryption scheme has a symmetric key structure and contains plain-text permutation and bidirectional diffusion processes. Experimental results and security analyses prove that it has excellent robustness against various possible attacks.

38 citations

Journal ArticleDOI
TL;DR: The experimental results and several security analyses show that the proposed modified method provides an efficient scheme for image encryption and good robustness against frequent statistical and security attacks.
Abstract: The security of digital data has been attending more than past, spatially image data security In this study, a hybrid image encryption method has been proposed based on genetic algorithm and chaos Encryption process consists of three main steps: confusion phase, diffusion phase, and improvement phase using a genetic algorithm At first, Chen’s chaotic map is used in the confusion phase to generate a scrambled image by shuffling plain-image pixels, and in the diffusion step, Logistic-Sine map alters those pixels gray-level values It produces some of encrypted images which were considered as the initial population for the genetic algorithm Then, by using the genetic algorithm, the encrypted images are optimized as much as possible Finally, the best encrypted image is the final cipher image The experimental results and several security analyses show that the proposed modified method provides an efficient scheme for image encryption and good robustness against frequent statistical and security attacks

37 citations

Journal ArticleDOI
TL;DR: The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography.
Abstract: Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.

18 citations

Journal ArticleDOI
TL;DR: This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images using chaos-based encryption with confusion and diffusion techniques.
Abstract: Article history: Received: 20 November, 2020 Accepted: 28 December, 2020 Online: 22 January, 2021 This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images. The encryption and decryption process of this system is done on the client side using chaos-based encryption with confusion and diffusion techniques. Arnold’s cat map is the chaotic map model used for confusion, while the Henon map is used for diffusion. The initial values of both chaotic maps are obtained from a 30-digit secret key that is generated using Diffie–Hellman key exchange. During Arnold’s cat map generation, different p and q values are used for every iteration. On the other side, the precision of the Henon map’s x and y values is 10–14. From the tests that have been done, histograms of the encrypted images are relatively flat and distributed through all the gray values. Moreover, the encrypted images have average correlation coefficients of 0.003877 (horizontal), -0.00026 (vertical) and -0.00049 (diagonal) and an average entropy of 7.950304. According to the key sensitivity test, a difference of just one number in the secret key causes big differences, as both results have a similarity index of 0.005337 (0.5%). Meanwhile, in the decryption process, that small key difference cannot be used to restore the encrypted image to its original form and generate another chaotic image with average entropies of 7.964909333 (secret key difference) and 7.994861667 (private key difference).

13 citations

Journal ArticleDOI
TL;DR: This research proposes an image encryption technique that consists of three encryption layers, i.e. bit-shift encryption, chaos-based encryption, and stream encryption, that aims to secure images against various attacks, especially attacks on statistics and differentials.
Abstract: One popular image security technique is image encryption. This research proposes an image encryption technique that consists of three encryption layers, i.e. bit-shift encryption, chaos-based encryption, and stream encryption. The chaos algorithm used is Arnold's chaotic map, while the stream cipher algorithm used is RC4. Each layer has different cryptology characteristics in order to obtain safer image encryption. The characteristics of cryptology are permutation, confusion, diffusion, and substitution. The combination of the proposed encryption method aims to secure images against various attacks, especially attacks on statistics and differentials. The encryption method testing is done by various measuring instruments such as statistical analysis, i.e. entropy information, avalanche effect, and histogram, differential analysis, i.e. UACI and NPCR, visual analysis using PSNR and SSIM, and bit error ratio. Based on the results of experiments that the encryption method that we propose can work excellently based on various measurement instruments. The decryption process can also work perfectly this is evidenced by the ∞ value based on PSNR, and zero value based on SSIM and BER.

10 citations