Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption
In modern air defense systems, safeguarding sensitive information is crucial to prevent unauthorized access and cyber-attacks. Here, we present an innovative image encryption approach, leveraging chaotic logistic maps and hyperchaotic Folded Towel Map sequence generation. The proposed image encrypti...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
AIMS Press
2024-11-01
|
| Series: | AIMS Mathematics |
| Subjects: | |
| Online Access: | https://www.aimspress.com/article/doi/10.3934/math.20241505?viewType=HTML |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850191812736581632 |
|---|---|
| author | Shamsa Kanwal Saba Inam Fahima Hajjej Ala Saleh Alluhaidan |
| author_facet | Shamsa Kanwal Saba Inam Fahima Hajjej Ala Saleh Alluhaidan |
| author_sort | Shamsa Kanwal |
| collection | DOAJ |
| description | In modern air defense systems, safeguarding sensitive information is crucial to prevent unauthorized access and cyber-attacks. Here, we present an innovative image encryption approach, leveraging chaotic logistic maps and hyperchaotic Folded Towel Map sequence generation. The proposed image encryption is a multi-layered procedure intended to secure image transmission. It initiates with permutation, where a chaotic logistic map generates pseudo-random sequences to scramble pixel positions. Next, key mixing creates complexity, randomness, and nonlinearity using an invertible key matrix. Finally, the diffusion phase employs hyperchaotic maps to produce a new sequence XORed with the pixels through a bitwise operation, further encrypting the image. This three-stage process efficiently protects images from unauthorized access, ensuring secure transmission. The proposed method enhances security by leveraging non-linearity, sensitivity, and robust mixing, properties making it highly resistant to cryptographic attacks. The experimental results showed robust encryption performance as established by metrics such as an entropy value of 7.9991, a UACI of 33.21%, and an NPCR of 99.61%. The proposed encryption approach outperformed existing methods in securing image transmission and storage, offering a reliable solution for protecting air defense communication strategic data. |
| format | Article |
| id | doaj-art-ce36608e4c214b2d956e80194e2e8445 |
| institution | OA Journals |
| issn | 2473-6988 |
| language | English |
| publishDate | 2024-11-01 |
| publisher | AIMS Press |
| record_format | Article |
| series | AIMS Mathematics |
| spelling | doaj-art-ce36608e4c214b2d956e80194e2e84452025-08-20T02:14:46ZengAIMS PressAIMS Mathematics2473-69882024-11-01911312173123810.3934/math.20241505Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryptionShamsa Kanwal 0Saba Inam 1Fahima Hajjej 2Ala Saleh Alluhaidan 31. Department of Mathematical Sciences, Fatima Jinnah Women University, the Mall, Rawalpindi, Pakistan1. Department of Mathematical Sciences, Fatima Jinnah Women University, the Mall, Rawalpindi, Pakistan2. Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia2. Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi ArabiaIn modern air defense systems, safeguarding sensitive information is crucial to prevent unauthorized access and cyber-attacks. Here, we present an innovative image encryption approach, leveraging chaotic logistic maps and hyperchaotic Folded Towel Map sequence generation. The proposed image encryption is a multi-layered procedure intended to secure image transmission. It initiates with permutation, where a chaotic logistic map generates pseudo-random sequences to scramble pixel positions. Next, key mixing creates complexity, randomness, and nonlinearity using an invertible key matrix. Finally, the diffusion phase employs hyperchaotic maps to produce a new sequence XORed with the pixels through a bitwise operation, further encrypting the image. This three-stage process efficiently protects images from unauthorized access, ensuring secure transmission. The proposed method enhances security by leveraging non-linearity, sensitivity, and robust mixing, properties making it highly resistant to cryptographic attacks. The experimental results showed robust encryption performance as established by metrics such as an entropy value of 7.9991, a UACI of 33.21%, and an NPCR of 99.61%. The proposed encryption approach outperformed existing methods in securing image transmission and storage, offering a reliable solution for protecting air defense communication strategic data.https://www.aimspress.com/article/doi/10.3934/math.20241505?viewType=HTMLimage encryptionchaotic logistic maphyperchaotic folded towel mapdata security |
| spellingShingle | Shamsa Kanwal Saba Inam Fahima Hajjej Ala Saleh Alluhaidan Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption AIMS Mathematics image encryption chaotic logistic map hyperchaotic folded towel map data security |
| title | Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption |
| title_full | Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption |
| title_fullStr | Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption |
| title_full_unstemmed | Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption |
| title_short | Securing air defense visual information with hyperchaotic Folded Towel Map-Based encryption |
| title_sort | securing air defense visual information with hyperchaotic folded towel map based encryption |
| topic | image encryption chaotic logistic map hyperchaotic folded towel map data security |
| url | https://www.aimspress.com/article/doi/10.3934/math.20241505?viewType=HTML |
| work_keys_str_mv | AT shamsakanwal securingairdefensevisualinformationwithhyperchaoticfoldedtowelmapbasedencryption AT sabainam securingairdefensevisualinformationwithhyperchaoticfoldedtowelmapbasedencryption AT fahimahajjej securingairdefensevisualinformationwithhyperchaoticfoldedtowelmapbasedencryption AT alasalehalluhaidan securingairdefensevisualinformationwithhyperchaoticfoldedtowelmapbasedencryption |