1. A New Composite Fractal Function and Its Application in Image Encryption
- Author
-
Shafali Agarwal
- Subjects
Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Chaotic ,02 engineering and technology ,Mandelbrot set ,lcsh:Computer applications to medicine. Medical informatics ,Encryption ,permutation ,lcsh:QA75.5-76.95 ,Article ,Scrambling ,henon map ,z-scan ,Fractal ,Robustness (computer science) ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Radiology, Nuclear Medicine and imaging ,lcsh:Photography ,Electrical and Electronic Engineering ,random fractal matrix ,Computer Science::Cryptography and Security ,composite fractal function ,Pixel ,business.industry ,diffusion ,020206 networking & telecommunications ,lcsh:TR1-1050 ,Computer Graphics and Computer-Aided Design ,Hénon map ,lcsh:R858-859.7 ,020201 artificial intelligence & image processing ,lcsh:Electronic computers. Computer science ,Computer Vision and Pattern Recognition ,business ,Algorithm - Abstract
Fractal&rsquo, s spatially nonuniform phenomena and chaotic nature highlight the function utilization in fractal cryptographic applications. This paper proposes a new composite fractal function (CFF) that combines two different Mandelbrot set (MS) functions with one control parameter. The CFF simulation results demonstrate that the given map has high initial value sensitivity, complex structure, wider chaotic region, and more complicated dynamical behavior. By considering the chaotic properties of a fractal, an image encryption algorithm using a fractal-based pixel permutation and substitution is proposed. The process starts by scrambling the plain image pixel positions using the Henon map so that an intruder fails to obtain the original image even after deducing the standard confusion-diffusion process. The permutation phase uses a Z-scanned random fractal matrix to shuffle the scrambled image pixel. Further, two different fractal sequences of complex numbers are generated using the same function i.e. CFF. The complex sequences are thus modified to a double datatype matrix and used to diffuse the scrambled pixels in a row-wise and column-wise manner, separately. Security and performance analysis results confirm the reliability, high-security level, and robustness of the proposed algorithm against various attacks, including brute-force attack, known/chosen-plaintext attack, differential attack, and occlusion attack.
- Published
- 2020
- Full Text
- View/download PDF