Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map

Asani, E. Oluwatobi and Biety-Nwanju, Godsfavour and Adeniyi, A. E. and Bharany, Salil and Ibrahim, Ashraf Osman and Abulfaraj, Anas W. and Nagmeldin, Wamda (2023) Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map. International Journal of Advanced Computer Science and Applications, 14 (9). pp. 869-877. ISSN 2156-5570

[img] Text (https://thesai.org/Downloads/Volume14No9/Paper_91-Development_of_an_Image_Encryption_Algorithm.pdf)
Paper_91-Development_of_an_Image_Encryption_Algorithm.pdf - Published Version

Download (1MB)
[img] Text (Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map)
Paper_91-Development_of_an_Image_Encryption_Algorithm.pdf - Published Version

Download (1MB)
Official URL: https://thesai.org/Publications/IJACSA

Abstract

—The goal of this study was to develop a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map, capable of effectively securing sensitive data. Logistics mapping is a comparatively strong chaos system which enciphers with an unpredictability that significantly reduces the chance of deciphering. Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. The consequent integration of these algorithms in this study was therefore grounded in the scientific rationale of establishing a strong and resilient cypher technique. The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. The average encryption time of 184(μs) on seven (7) images showed that it could to be deployed for real-time systems. The proposed method obtained an average entropy of 7.9398 with key space of 1.17x1077 and an average avalanche effect (%) of 49.9823 confirming the security and resilience of the developed method

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Engineering, Science and Mathematics > School of Electronics and Computer Science
Depositing User: EMMANUEL ASANI
Date Deposited: 15 Jan 2024 07:52
Last Modified: 15 Jan 2024 07:52
URI: https://eprints.lmu.edu.ng/id/eprint/4499

Actions (login required)

View Item View Item