TY - JOUR
T1 - Z-Crypt
T2 - Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network
AU - Alaklabi, Abdullah
AU - Munir, Arslan
AU - Asfand Hafeez, Muhammad
AU - Khan Khattak, Muazzam A.
N1 - Publisher Copyright:
© 2024 The Authors.
PY - 2024
Y1 - 2024
N2 - In the current era of digital communication, image security is a top priority as sending images, which often contain personal or confidential information, over the Internet poses security risks. Many encryption algorithms have been proposed in the literature to address this issue. However, these algorithms have limitations, such as low-key space, high computational overhead, and susceptibility to differential attacks. To address these limitations, this paper proposes Z-Crypt, a novel image encryption approach that combines a substitution-permutation network (SPN) and a chaotic logistic map (CLM) with the Chirp Z-Transform (CZT) to enhance security and resist attacks. The CLM-generated matrices introduce confusion and diffusion, while SPN creates a dissociation of the cipher from the plaintext. Finally, the CZT strengthens the encryption by transforming the image into the frequency domain, creating multiple layers of confusion and diffusion to produce a robust encryption algorithm. We have evaluated the proposed Z-Crypt's security using various metrics, including correlation coefficient, entropy, peak signal-to-noise ratio (PSNR), and key sensitivity analysis. Experimental results verify that the proposed algorithm outperforms existing methods, achieving high security while maintaining computational efficiency.
AB - In the current era of digital communication, image security is a top priority as sending images, which often contain personal or confidential information, over the Internet poses security risks. Many encryption algorithms have been proposed in the literature to address this issue. However, these algorithms have limitations, such as low-key space, high computational overhead, and susceptibility to differential attacks. To address these limitations, this paper proposes Z-Crypt, a novel image encryption approach that combines a substitution-permutation network (SPN) and a chaotic logistic map (CLM) with the Chirp Z-Transform (CZT) to enhance security and resist attacks. The CLM-generated matrices introduce confusion and diffusion, while SPN creates a dissociation of the cipher from the plaintext. Finally, the CZT strengthens the encryption by transforming the image into the frequency domain, creating multiple layers of confusion and diffusion to produce a robust encryption algorithm. We have evaluated the proposed Z-Crypt's security using various metrics, including correlation coefficient, entropy, peak signal-to-noise ratio (PSNR), and key sensitivity analysis. Experimental results verify that the proposed algorithm outperforms existing methods, achieving high security while maintaining computational efficiency.
KW - Chaotic logistic map
KW - chirp Z-transform
KW - efficiency
KW - image decryption
KW - image encryption
KW - robustness
KW - security
KW - substitution-permutation network
UR - http://www.scopus.com/inward/record.url?scp=85203636670&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85203636670&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2024.3453171
DO - 10.1109/ACCESS.2024.3453171
M3 - Article
AN - SCOPUS:85203636670
SN - 2169-3536
VL - 12
SP - 123401
EP - 123422
JO - IEEE Access
JF - IEEE Access
ER -