Performance Evaluation of Chaotic Image Encryption
DOI:
https://doi.org/10.31987/ijict.8.3.304Keywords:
Chaotic, 3D logistic key, Scrambling, Encryption.Abstract
Nowadays, data is the most valuable content in the world. Millions of data are generated every day in the form of text, images, videos, etc. Among them, images are widely used in daily communication. Due to the vulnerabilities of many data, it is difficult to transmit such images in a secure way. For this reason, a chaos-based data encryption algorithm is proposed where the image pixels are encrypted to generate a blurry image. In this paper, it is explained how to encrypt images using a 3D logistic chaotic map by generating chaotic keys where the image undergoes pixel scrambling and then XOR operation with the previously generated chaotic keys. To enhance the security and privacy of data, the proposed scheme uses different image sets to evaluate performance metrics such as Number of Pixel Change Rate (NPCR), Average Variable Intensity (UACI), correlation coefficients, and entropy in different attack scenarios. The proposed method achieved superior performance results in entropy (7.9993), key space, encryption pixel correlations, histogram contrast, UACI (35.2041%), and NPCR (99.6333%). The achieved results show that the proposed method can be used for image encryption with a high level of confidentiality.
support@ijict.edu.iq
P.O.Box: 64046
