Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm

Cluster Computing(2024)

引用 0|浏览0
暂无评分
摘要
Traditionally, keys are generated using the hash value of the given image in the image cryptography to boost the security effects. The keys have been sent to the concerned receiver for every new plain image. Sending hash keys is a very time-consuming and inefficient process. To overcome the issue, we have proposed novel image-swapping encryption based on the TetraVex game and publicly hash-sharing algorithm. The proposed scheme consists of two main parts: the first part tackles the key sharing issue, while the second part focuses on developing a unique image encryption method. The proposed approach converts the hash value into the pairs of elliptic curves by the Neal Koblits technique. These pairs are then encrypted using the Diffie Hellman (DH) method before being sent to the authorized party. Moreover, the TetraVex game has been constructed, and the image pixels are swapped using the game to realize the high confusion effects. Diffusion has been placed using the mask image composed of random integers. The generated random integer streams are derived from the intertwining logistic chaotic map. The suggested image cipher is evaluated comprehensively using different validation metrics. The empirical findings demonstrate that the encryption duration for the proposed algorithm, when applied to grayscale images with dimensions of 256 × 256 pixels, is approximately 0.0108 s. Moreover, the average entropy and PSNR values observed in this context are 7.9973 and 9.0327, respectively, while the correlation value is near 0. Notably, the algorithm’s keyspace exceeds the formidable magnitude of 10^105 . Additionally, usage of elliptic curve DH keys, further contributes to an overall keyspace that surpasses the recommended threshold. The reported approach exhibits the solution to the overwhelming hash-sharing issue, enhanced efficiency, the capability of the encryption algorithm to withstand the various attacks from the community of cryptanalysts, and the rosy chances of the practical application of the proposed image cipher.
更多
查看译文
关键词
Neal Koblits,Elliptic curve,TetraVex game,Intertwining logistic map,Hash-256
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要