Journal of Computing Theories and Applications
Vol 1, No 2 (2023): (in Process)

Image Encryption using Half-Inverted Cascading Chaos Cipheration

De Rosal Ignatius Moses Setiadi (Dian Nuswantoro University)
Robet Robet (STMIK TIME, Medan)
Octara Pribadi (STMIK TIME, Medan)
Suyud Widiono (University of Technology Yogyakarta)
Md Kamruzzaman Sarker (Bowie State University)



Article Info

Publish Date
23 Oct 2023

Abstract

This research introduces an image encryption scheme combining several permutations and substitution-based chaotic techniques, such as Arnold Chaotic Map, 2D-SLMM, 2D-LICM, and 1D-MLM. The proposed method is called Half-Inverted Cascading Chaos Cipheration (HIC3), designed to increase digital image security and confidentiality. The main problem solved is the image's degree of confusion and diffusion. Extensive testing included chi-square analysis, information entropy, NCPCR, UACI, adjacent pixel correlation, key sensitivity and space analysis, NIST randomness testing, robustness testing, and visual analysis. The results show that HIC3 effectively protects digital images from various attacks and maintains their integrity. Thus, this method successfully achieves its goal of increasing security in digital image encryption

Copyrights © 2023






Journal Info

Abbrev

jcta

Publisher

Subject

Computer Science & IT Decision Sciences, Operations Research & Management

Description

Journal of Computing Theories and Applications (JCTA) is a refereed, international journal that covers all aspects of foundations, theories and the practical applications of computer science. FREE OF CHARGE for submission and publication. All accepted articles will be published online and accessed ...