Open Access
ARTICLE
Image Encryption Algorithm Based on New Fractional Beta Chaotic Maps
1
Institute of Electrical and Electronics Engineers, Kuala Lumpur, 59200, Malaysia
2
Information Technology College, Imam Ja’afar Al-Sadiq University, Baghdad, 10001, Iraq
3 Department of Computer Technical Engineering, College of Technical Engineering, Islamic University, Najaf, 192122, Iraq
4 Department of Computer Sciences, University of Technology, Baghdad, 10066, Iraq
5 Department of Applied Sciences, University of Technology, Baghdad, 10066, Iraq
6 Department of Mathematics, Cankaya University, Balgat, Ankara, 06530, Turkey
7
Institute of Space Sciences, Magurele-Bucharest, R76900, Romania
8 Department of Medical Research, China Medical University, Taichung, 40402, Taiwan
* Corresponding Author: Rabha W. Ibrahim. Email:
(This article belongs to the Special Issue: Trend Topics in Special Functions and Polynomials: Theory, Methods, Applications and Modeling)
Computer Modeling in Engineering & Sciences 2022, 132(1), 119-131. https://doi.org/10.32604/cmes.2022.018343
Received 17 July 2021; Accepted 07 December 2021; Issue published 02 June 2022
Abstract
In this study, a new algorithm of fractional beta chaotic maps is proposed to generate chaotic sequences for image encryption. The proposed technique generates multi random sequences by shuffling the image pixel position. This technique is used to blur the pixels connecting the input and encrypted images and to increase the attack resistance. The proposed algorithm makes the encryption process sophisticated by using fractional chaotic maps, which hold the properties of pseudo-randomness. The fractional beta sequences are utilized to alter the image pixels to decryption attacks. The experimental results proved that the proposed image encryption algorithm successfully encrypted and decrypted the images with the same keys. The output findings indicate that our proposed algorithm has good entropy and low correlation coefficients. This translates to enhanced security against different attacks. A MATLAB programming tool was used to implement and assess the image quality measures. A comparison with other image encryption techniques regarding the visual inspection and signal-to-noise ratio is provided.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.