TY - JOUR
T1 - A fractal-based image encryption system
AU - Abd-El-Hafiz, S. K.
AU - Radwan, Ahmed Gomaa
AU - Abdel Haleem, Sherif H.
AU - Barakat, Mohamed L.
N1 - KAUST Repository Item: Exported on 2020-10-01
Acknowledgements: This research was supported financially by the Science and Technology Development Fund (STDF), Egypt, Grant no. 4276.
PY - 2014/12/1
Y1 - 2014/12/1
N2 - This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.
AB - This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.
UR - http://hdl.handle.net/10754/563907
UR - http://www.crossref.org/iPage?doi=10.1049%2Fiet-ipr.2013.0570
UR - http://www.scopus.com/inward/record.url?scp=84915753264&partnerID=8YFLogxK
U2 - 10.1049/iet-ipr.2013.0570
DO - 10.1049/iet-ipr.2013.0570
M3 - Article
SN - 1751-9659
VL - 8
SP - 742
EP - 752
JO - IET Image Processing
JF - IET Image Processing
IS - 12
ER -