IDEAS home Printed from https://ideas.repec.org/a/eee/apmaco/v462y2024ics009630032300509x.html
   My bibliography  Save this article

A robust bit-level image encryption based on Bessel map

Author

Listed:
  • Toktas, Abdurrahim
  • Erkan, Uğur
  • Gao, Suo
  • Pak, Chanil

Abstract

A chaotic map plays a critical role in image encryption (IME). The map used to generate chaotic sequences should perform high dynamic characteristics. In this study, a new chaotic system depending on the Bessel function, so-called Bessel map, and a novel Bessel map-based IME scheme are proposed for the IME. The Bessel map has three control parameters, which provide superior ergodicity and diversity. Bessel map has also order degree rather than Sine map, which is used as a control parameter boosting the security. The chaotic characteristic of the Bessel map is verified through different reliable measurements such as bifurcation diagram, trajectory phase, Lyapunov exponent (LE), sample entropy (SE), permutation entropy (PE), and 0-1 test. Then, the Bessel map is employed in a new bitwise IME (BIME) scheme based on bit-level permutation and diffusion processes. The Bessel map-based BIME is validated through various simulated cryptanalyses and cyberattacks as well as compared with the state-of-the-art schemes. The achieved results demonstrate that the BIME based on the Bessel map ensures the most secure ciphered images thanks to the excellent randomness and complexity performance.

Suggested Citation

  • Toktas, Abdurrahim & Erkan, Uğur & Gao, Suo & Pak, Chanil, 2024. "A robust bit-level image encryption based on Bessel map," Applied Mathematics and Computation, Elsevier, vol. 462(C).
  • Handle: RePEc:eee:apmaco:v:462:y:2024:i:c:s009630032300509x
    DOI: 10.1016/j.amc.2023.128340
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S009630032300509X
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.amc.2023.128340?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Erkan, Uğur & Toktas, Abdurrahim & Lai, Qiang, 2023. "Design of two dimensional hyperchaotic system through optimization benchmark function," Chaos, Solitons & Fractals, Elsevier, vol. 167(C).
    2. Wang, Xingyuan & Guan, Nana & Yang, Jingjing, 2021. "Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map," Chaos, Solitons & Fractals, Elsevier, vol. 150(C).
    3. Castro, Julio Cesar Hernandez & Sierra, José María & Seznec, Andre & Izquierdo, Antonio & Ribagorda, Arturo, 2005. "The strict avalanche criterion randomness test," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 68(1), pages 1-7.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Cao, Hongli & Wang, Yu & Banerjee, Santo & Cao, Yinghong & Mou, Jun, 2024. "A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application," Chaos, Solitons & Fractals, Elsevier, vol. 179(C).
    2. SaberiKamarposhti, Morteza & Ghorbani, Amirabbas & Yadollahi, Mehdi, 2024. "A comprehensive survey on image encryption: Taxonomy, challenges, and future directions," Chaos, Solitons & Fractals, Elsevier, vol. 178(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Liu, Xilin & Tong, Xiaojun & Wang, Zhu & Zhang, Miao, 2022. "A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its’ applications in image encryption," Chaos, Solitons & Fractals, Elsevier, vol. 154(C).
    2. Erkan, Uğur & Toktas, Abdurrahim & Lai, Qiang, 2023. "Design of two dimensional hyperchaotic system through optimization benchmark function," Chaos, Solitons & Fractals, Elsevier, vol. 167(C).
    3. Lin, Hairong & Wang, Chunhua & Sun, Jingru & Zhang, Xin & Sun, Yichuang & Iu, Herbert H.C., 2023. "Memristor-coupled asymmetric neural networks: Bionic modeling, chaotic dynamics analysis and encryption application," Chaos, Solitons & Fractals, Elsevier, vol. 166(C).
    4. Zhu, Hegui & Ge, Jiangxia & Qi, Wentao & Zhang, Xiangde & Lu, Xiaoxiong, 2022. "Dynamic analysis and image encryption application of a sinusoidal-polynomial composite chaotic system," Mathematics and Computers in Simulation (MATCOM), Elsevier, vol. 198(C), pages 188-210.
    5. Wang, Mingxu & Fu, Xianping & Teng, Lin & Yan, Xiaopeng & Xia, Zhiqiu & Liu, Pengbo, 2024. "A new 2D-HELS hyperchaotic map and its application on image encryption using RNA operation and dynamic confusion," Chaos, Solitons & Fractals, Elsevier, vol. 183(C).
    6. Lai, Qiang & Hu, Genwen & Erkan, Uǧur & Toktas, Abdurrahim, 2023. "High-efficiency medical image encryption method based on 2D Logistic-Gaussian hyperchaotic map," Applied Mathematics and Computation, Elsevier, vol. 442(C).
    7. Wang, Xingyuan & Du, Xiaohui, 2022. "Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices," Chaos, Solitons & Fractals, Elsevier, vol. 155(C).
    8. Li, Binglun & Sun, Kehui & Wang, Huihai & Liu, Wenhao, 2024. "A delay-disturbance method to counteract the dynamical degradation of digital chaotic systems and its application," Chaos, Solitons & Fractals, Elsevier, vol. 182(C).
    9. Cao, Hongli & Wang, Yu & Banerjee, Santo & Cao, Yinghong & Mou, Jun, 2024. "A discrete Chialvo–Rulkov neuron network coupled with a novel memristor model: Design, Dynamical analysis, DSP implementation and its application," Chaos, Solitons & Fractals, Elsevier, vol. 179(C).

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:apmaco:v:462:y:2024:i:c:s009630032300509x. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/applied-mathematics-and-computation .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.