Zulfiqar Nasreen, Ahmad Tauqir, Ghazal Taher M, Ikram Atif, Gazzawe Foziah, Albahar Marwan Ali, Hussein Abdelrahman H, Khan Ahmad Salman
Department of Computer Science, UET, Lahore, Pakistan.
Department of Networks and Cybersecurity, Hourani Center for Applied Scientific Research, Al-Ahliyya Amman University, Amman, Jordan.
PLoS One. 2025 Jun 25;20(6):e0326202. doi: 10.1371/journal.pone.0326202. eCollection 2025.
A wide range of mathematical constructs, theories, and algorithms have been leveraged by cryptographers to secure valuable and sensitive digital images. Among these, image encryption based on scrambling algorithms has been extensively utilized. These scrambling techniques operate on 1D, 2D, and 3D constructs, relying on pixel-level swapping to enhance security. This research introduces a novel scrambling algorithm that employs a row- and column-based scrambling approach. The encryption process begins with an input image, from which a 2D scrambled image is generated. The columns of pixels from the input image are randomly placed into the columns of the scrambled image. Once all columns are inserted, the process is repeated to intensify the scrambling effect. A similar procedure is then applied to the rows of the image. To further enhance security, a diffusion process is applied using an XOR operation between the scrambled image and a random number stream. These random numbers are generated using the 3D Rössler chaotic system, where two chaotic streams contribute to the scrambling effect, and a third stream is used for diffusion. Both machine simulations and exhaustive security analyses demonstrate that the proposed image cipher is highly resistant to various cryptanalytic attacks, including brute-force attacks, differential attacks, and noise and data cropping attacks. Given these promising results, we recommend the proposed method for real-world applications to fully utilize its security potential.
密码学家利用了广泛的数学结构、理论和算法来保护有价值和敏感的数字图像。其中,基于置乱算法的图像加密得到了广泛应用。这些置乱技术作用于一维、二维和三维结构,依靠像素级交换来增强安全性。本研究引入了一种新颖的置乱算法,该算法采用基于行和列的置乱方法。加密过程从输入图像开始,从中生成二维置乱图像。输入图像的像素列被随机放置到置乱图像的列中。插入所有列后,重复该过程以增强置乱效果。然后对图像的行应用类似的过程。为了进一步增强安全性,使用置乱图像与随机数流之间的异或运算来应用扩散过程。这些随机数使用三维罗斯勒混沌系统生成,其中两个混沌流有助于置乱效果,第三个流用于扩散。机器模拟和详尽的安全性分析均表明,所提出的图像密码对各种密码分析攻击具有高度抗性,包括暴力攻击、差分攻击以及噪声和数据裁剪攻击。鉴于这些有前景的结果,我们推荐将所提出的方法用于实际应用,以充分发挥其安全潜力。