IoT 23(2): e3

Research Article

Fast selective encryption algorithms based on moments and chaos theory

Download223 downloads
  • @ARTICLE{10.4108/eetiot.v9i2.2193,
        author={Abdelhalim Kamrani and Khalid Zenkouar and Said Najah},
        title={Fast selective encryption algorithms based on moments and chaos theory},
        journal={EAI Endorsed Transactions on Internet of Things},
        volume={9},
        number={2},
        publisher={EAI},
        journal_a={IOT},
        year={2023},
        month={7},
        keywords={Image encryption, Tchebichef moments, Hahn moments, Selective encryption, Chaos encryption},
        doi={10.4108/eetiot.v9i2.2193}
    }
    
  • Abdelhalim Kamrani
    Khalid Zenkouar
    Said Najah
    Year: 2023
    Fast selective encryption algorithms based on moments and chaos theory
    IOT
    EAI
    DOI: 10.4108/eetiot.v9i2.2193
Abdelhalim Kamrani1,*, Khalid Zenkouar1, Said Najah1
  • 1: Sidi Mohamed Ben Abdellah University
*Contact email: abdelhalim.kamrani@usmba.ac.ma

Abstract

In this work, we introduce a novel selective encryption scheme based on chaos theory and moments transforms, two moments families were considered namely Tchebichef and Hahn. The goal is to propose a fast and secure encryption scheme that can be deployed in real world scenarios. The proposed algorithms operate in the transform domains of Tchebichef and Hahn moments. We encrypt only the most significant coefficients of the moments transforms. First, we down sample the computed moments’ matrices coefficients, then we use two logistic maps for confusion and diffusion of the down-sampled Tchebichef’s and Hahn’s coefficients, the resulting matrix is the encrypted image. This approach improves drastically the time performance of the encryption algorithm while keeping a “good” security level. In order to prove the performance of our algorithms, we run different experiments and test the algorithms on different criteria: MSE, correlation coefficient, differential analysis, entropy and time performance. The presented results prove that the encryption algorithms proposed are secure and outperform state-of-the-art algorithms.