INTRODUCTION
In today's data-driven world, where strict observance of digital image security and preservation is a concern, the need to provide satellite imagery with equivalent levels of protection becomes obvious. The increasing hazards arising from illegitimate use and access to satellite imagery highlight how important information security is to safeguard a nation's crucial infrastructure.1 The 2024 Crown Strike Global Threat report states that there has been a notable surge in cyber-attacks with cloud intrusions growing by 75% over the past year.2 Satellites, medical imaging systems, sensors and personal electronic gadgets are merely a few of the countless devices that constantly generate a massive quantity of images at an unprecedented rate. Networks all across the globe exchange these images for diagnostic, scientific, and analytical purposes.3 Owing to its widespread availability and affordability, the Internet is the primary means of sharing and transmitting images. Nonetheless, given the open nature of this network, it is imperative to recognize the importance of data security. To cope with this problem, encryption is the most widely used technique for securing satellite images from multiple risks during transmission, minimizing an invasion of information and security from unwanted access and illegal use. This indicates that the encryption methods support securing satellite imagery when it is being stored and transmitted.4
Lately, several encryption techniques have been designed to enhance the confidentiality of satellite imagery due to the extensive usage of these broadcasts. Among different methods, several algorithms have been developed especially for encoding images. One notable approach is the application of chaotic systems to enhance key space, robustness, and security. This is because traditional encryption techniques like DES (Data Encryption Standard), IDEA (International Data Encryption Algorithm), and RSA (Rivest Shamir Adleman) were initially designed to handle textual content but face challenges with images as a result of their fundamental characteristics of visual data, mainly elevated pixel correlation, and redundancies found in visual data.5–7 Therefore, these classical algorithms are ineffective when encrypting data including large images.8
The new encryption techniques can cope with all the information security requirements for satellite image transmission. Chaos theory is one of the most appreciated and efficient methods for resolving these problems. Chaos-based image encryption, in contrast to conventional methods that rely on mathematical algorithms, generates a key with dual encryption and decryption capabilities by considering the inherent uncertainty and chaotic systems' randomness.9 Shannon proposed two key elements, confusion, and diffusion that serve as the core of cryptographic techniques widely recognized for their effectiveness and diversity.10 These elements represent the fundamental building blocks of cryptography strongly entangle the encryption key with statistical features of encrypted data, limiting opponents' attempts to decipher the key from the data to be encrypted. Substitution is an integral part of confusion techniques. Diffusion, in contrast, aims to obscure any noticeable long-term statistical traits by spreading the statistical patterns present in the original message throughout the encrypted message. Diffusion is made possible by permutation techniques that linearly rearrange input bits or bytes, generating an entirely distinct layout. Statistical analysis, known plaintext, brute force, and other sorts of attacks have all been proven completely futile against chaotic ciphers.11 Chaos-based encryption schemes coupled with confusion and diffusion achieve the resilience and adaptability necessary for safeguarding multimedia and image data. Recent years have seen an extensive acceptance of chaotic systems, where they have grown to be vital in encrypting satellite images. Considering their initial values' sensitivity and pseudo randomness, these chaotic systems generated via deterministic equations have some exceptional cryptographic qualities.12
Pseudo-random number generations (PRNGs) plays substantial role in image encryption algorithm. They are used to create a series of arbitrary values with the goal of encoding visual information and are crucial because they can generate a large number of randomly distributed, unpredictable numbers. Encryption's principal goals of maintaining confidentiality and integrity are mainly achieved through the utilization of these number generators. The randomness and uniform distribution of the PRNG output contribute significantly for determining encryption's robustness and applicability. Therefore, choosing a reliable and secure PRNG is crucial for guaranteeing the safety and efficacy of image encoding methods.13
Numerous new chaos-based image encryption algorithms have been proposed. S.Behnia et al. presented a novel algorithm for image encryption based on several types of chaotic maps.14 This symmetric key cryptography methodology merges a 1D chaotic map with a typical coupled map to encrypt images with a degree of security at an acceptable speed. By merging chaotic maps, the proposed scheme leverages the advantages of a large key space and superior security ensuring a highly secure and reliable encryption solution. This method produces a cipher of the same size as the plaintext. On the other hand, Bensikaddour et al Bentoutou introduced a novel encryption method for satellite images that uses AES and discrete chaotic maps.15 These maps generate keys and create confusion to enhance security performance, particularly sensitivity to plain image. Kanwal et al. suggest an innovative encryption system-using sine and chaotic tent maps (CTMs) with Circulant matrices for image encoding and decoding.16 The three stages of this process involve a permutation phase that uses a sine map, and a diffusion phase that utilizes a CTM. The third phase includes a substitution technique, seamlessly integrating the prime Circulant matrix and Hill cipher to enhance security.
Xishun et al. suggest a novel image encryption technique that utilizes DNA computing alongside the Kronecker product.17 Their findings present their approach as a visible method for encrypting images, demonstrating that it can achieve exceptional levels of efficiency and confidentiality. Wang Xing Yuan et al. combine several encryption keys with the Kronecker product to offer an additional layer of security.18 Wu et al. present an effective image encryption approach that utilizes DNA computing and a trio of unique 1D chaotic maps, such as logistic sine map, logistic tent map, and sine tent map.19 Samsul Arifin et al. proposed a novel digital image encryption algorithm combining a logistic map, a unimodular matrix, and several Hill ciphers.20 The image's pixels are shuffled using a unimodular matrix and encryption keys are computed using the logistic map. By implementing various encryption layers, the suggested algorithm may boost the safety of the image's encrypting procedure.
Research work that successfully integrates the kronecker XOR product, chaotic map, and Hill cipher for image encryption is rare. By utilizing the distinct advantages of each method, this blend of methods promises to deliver formidable security for images. Moreover, this combination is designed to fend off plaintext attacks using several secret keys. The Hill cipher is preferred for image encryption over more conventional techniques like DES, IDEA, and RSA because of its capacity to manage the high pixel correlation and redundancy that are the characteristics of an image. Because the Hill cipher applies algebraically to pixel blocks, it is more effective at upsetting the predictable patterns found in image data. Processing a group of pixels at once, this block-based method efficiently lowers redundancy and improves security, resulting in more reliable encryption for multimedia content.21 Symmetric key encryption – converges with a chaotic map, a form of mathematical operation that enables the creation of complex nonlinear transformations and the Kronecker product. The latter is recognized for producing randomness.22–24
Satellite images frequently include vital details about a country's assets, infrastructures, and key landmarks. Illicit access to sensitive information could result in hazards to national security, spying, or even financial harm. Thus, the necessity to shield this private data from attackers is the driving force behind the encryption of satellite images. Since they are widely used in industries including disaster relief, crops, and defense, encryption is crucial in protecting the data because it reduces the possibility of eavesdropping during transmission.25 Large-scale, multispectral data and incorporated geospatial information are characteristics of satellite images. They are sophisticated and data-rich because they cover large geographic regions at different wavelengths. For situations like catastrophe recovery and military planning where data integrity and prevention against misuse and manipulation are essential, strong encryption is necessary due to the complex and vibrant nature of geographical information.26
Our proposed technique introduces novelty by integrating our new chaotic-based encryption systems into the core components of satellite image encryption. The infusion of the Hill cipher enhances the robustness while maintaining the simplicity and compactness inherent in our scheme. Leveraging chaotic maps, we strengthen resistance against advanced cryptographic attacks, particularly in the area of noise and differential cryptanalysis.
Storing or transmitting satellite images poses risks of eavesdropping, data breaches, and unauthorized access. Before uploading such data to the decentralized network, encryption is required to prevent it from unauthorized access. This study aims to integrate technologies to ensure transactions are conducted safely and securely.27 Regarding the transmission of satellite images to wireless environments, there is vulnerability to significant security threats. Hence, it is highly advisable to securely transfer satellite image data to a base station using an enhanced and secure guided approach, free from modifications by unauthorized parties. This study aims to manage real-time data gathering and promptly respond to events. This approach prioritizes the enhancement of the security framework ensuring comprehensive data protection and improved utilization for the relevant authorities.28
Contribution of the proposed study
We highlight the following significant contributions in this paper:
- An innovative satellite image encryption algorithm is laid out. Our methodology integrates the Hill cipher, hyperbolic tangent tent map, and Kronecker bitwise exclusive XOR product matrix techniques. Precisely, we altered the hyperbolic tangent tent map to create intricate pseudo-numbers critical to encrypted images. This modification enabled our approach to generate intricate robust pseudo-random sequences that support strong image encryption. Robust image security is achieved various strengths including the Hill Cipher, hyperbolic tangent tent map, and Kronecker xor product matrix. It is anticipated that this work will significantly advance the field of image encryption.
- The well-known Kronecker product technique is frequently utilized in digital watermarking, encoding and compression processes. In the context of the current research, we revised the Kronecker product method utilizing XOR operator rather than the product operator. This replacement makes it considerably feasible to have complicated and large keys. The byproduct of this process is that the complex keys will be merged using XOR operation with the keys produced by the hyperbolic tangent tent map. This work represents a new use of the xor operator and Kronecker product for image encryption.
- This paper also contributes by thoroughly testing and evaluating the encrypted image, which was done and compared to previous studies of a similar nature. Based on test outcomes, the suggested image encryption technique meets every requirement for successful encryption. The proposed method's effectiveness was demonstrated by contrasting it against various approaches, giving rise to secure images from any potential hazards.
The structure of this article is as follows. Section 2 gives the workflow of the proposed methodology. Section 3 contains the fundamental concepts and contextual information to comprehend this suggested image encryption. Section 4 presents the proposed framework and Section 5 is about the performance evaluation and numerical assessment. The research paper is summarized in section 6, which further provides a few suggestions for future research areas.
The encryption and decryption processes are addressed in the next section, which offers a thorough rundown of the methods used and their operating flow.
WORKFLOW OF ENCRYPTION AND DECRYPTION PROCESS
The suggested encryption method includes multiple major phases to safeguard images. Initially, a plain image is altered according to a calculated shift value. Following these alterations, paired rows undergo XOR operations with the rows' fixed left pixels playing a part in the process. Simultaneously, an intermediate cipher text is produced by generating a circulant matrix, which functions as the secret key for the Hill cipher substitution. To improve security, a hyperbolic tangent tent map also uses secret keys. After undergoing several XOR processes, the intermediate cipher text is expanded using the Kronecker XOR method. The rigorous procedure produces an image encrypted with a strong defense against unwanted access. Our suggested encryption schemes' workflow is shown in Figure 1. The decryption procedure of our suggested encryption strategy is shown in Figure 2, which outlines the process to reverse the encryption to recover the original satellite image.
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
The subsequent section will provide and discuss the foundational mathematical ideas necessary to comprehend the core principles of our encryption and decryption techniques.
PRELIMINARY MATHEMATICAL CONCEPTS
The suggested image encryption framework makes use of several mathematical concepts. This section comprises an overview of them.
Chaotic tent map
The chaotic tent map is a discrete-time dynamical phenomenon29 that exhibits chaotic behavior. The equation that describes the chaotic tent map is formulated as follows in Equation 1.
While the control parameter lies between [0, 2], the initial condition of the chaotic tent map is represented by . As the system traverses via this specific range, the parameter ρ strongly impacts the system behavior, indicating how quickly it will transition from an ordered to a chaotic state. Figure 3 illustrates the chaotic tent property's bifurcation analysis.
[IMAGE OMITTED. SEE PDF]
The following three secret keys and related control parameters can be selected for encrypting an image of 256 × 256 pixels. The first key K = () is utilized in the substitution process by randomly choosing integers from the interval [0–255] where a prime circulant matrix is generated by using k1, k2. By preserving this constant value inside the defined interval [0, 1], we ensure that the outcomes are robust and consistent throughout various algorithm runs. The uniformity and accuracy of the generated keys depend on this static beginning value.
Analyzing the chaotic tent map dynamic behavior, as illustrated in Figure 3A, shows that the structure covers a significant range that exhibits chaotic dynamics when it experiences the bifurcation phenomenon. Owing to its built-in randomness, sensitivity to initial values, and favorable range of chaotic parameters, the chaotic tent map serves a purpose in developing chaotic encryption algorithms. Figure 3B shows the Lyapunov exponent of CTM.
Hyperbolic tangent function
The hyperbolic tangent function, denoted as tanh(y), is a mathematical function that transforms input values within a range between −1 and 1.30 It can be expressed mathematically as Equation 2.
[IMAGE OMITTED. SEE PDF]
Prime circulant matrices
A circulant matrix is a unique kind of matrix in which every row experiences a cyclic shift to the right with respect to the row vector that precedes it prior, resulting in Circulant pattern within the matrix.31 Therefore, a Circulant matrix can be expressed as Matrix 3,
Denoted by cir . Figure 5 illustrates a random matrix and a Circulant matrix.
[IMAGE OMITTED. SEE PDF]
When the row vector's GCD equals 1, the resulting m × n circulant matrix is prime circulant. The prime circulant of a 4 × 4 circulant matrix with row vectors (a, b, c, d) is determined by gcd (a, b, c, d) = 1.
Kronecker product
The Kronecker product,17 additionally referred to as direct or tensor product, is a binary matrix operator that combines two matrices of arbitrary dimensions, an n × m matrix (referred to as ) and a p × q matrix (referred to as ) to generate a larger matrix with a distinctive block structure is expressed as Matrix 4. After the matrices have been altered, a new matrix having dimensions of (np) × (mq) with specific block patterns is produced. It is denoted by the symbol ⊕.
Their Kronecker product,
The kronecker product has wide applications in many disciplines particularly computer science, signal processing, quantum mechanics, and linear algebra. Originating in the 19th century, the Kronecker product concept has been thoroughly examined and utilized in various fields for a considerable time. This paper presents an innovative approach named the kronecker xor product that can be executed to enlarge an image's dimension from n × n to n2 × n2.
The suggested algorithm's formulation and execution will be covered in full in the next section, along with the algorithm's concept and implementation.
DEVELOPMENT AND EXECUTION OF THE PROPOSED ALGORITHM
To encode and decode messages, a cryptosystem system specifically to facilitate secure communication- uses a collection of algorithms and protocols. This study presents an enhanced encryption satellite image method that uses multiple encryption techniques. Our suggested approach commences with the confusion and diffusion techniques. The steps taken in this study are outlined in the following order.
The encryption process
- A plain RGB image with dimensions is chosen.
- Encryption Stage 1: Permutation Phase
The initial step in preserving the global spatial characteristics of the original image is to calculate the row sums. A normalized factor is used to secure uniform scaling of perturbations throughout the image. The formula outlined in Figure 6 determines the magnitude of perturbation for each with the cumulative values of all the pixels along each row given by the row sum. For making appropriate modifications, the pre-determined shift amount functions as a guide.
[IMAGE OMITTED. SEE PDF]
- Encryption stage 2: Diffusion of Image Pixels
Every row retains its value at the leftmost pixel, the bitwise exclusive OR operations are performed for odd rows, omitting the leftmost value, between the preceding value of the current row and the corresponding pixel values in the even row. In the same way, the bitwise exclusive OR operations are performed for even rows, not including the leftmost value, between the current row's left value and corresponding pixel values in the odd row to obtain diffused image . The technique of executing the exclusive bitwise OR operation upon a matrix of bits is illustrated in Figure 7.
[IMAGE OMITTED. SEE PDF]
- Encryption stage 3: Substitution Phase using Hill Cipher and Circulant Matrices
Hill cipher24 is a polygraphic substitution cipher with a foundation in linear algebra formulated by mathematician Lester S. Hill. An invertible key matrix is required to decrypt data. Archaya et al. suggested implementing a self-invertible matrix to this decryption constraint to meet this need.32 The encryption key utilized in this method is generated using circulant matrices and Algorithm 1 demonstrates the manner in which it is obtained.
Algorithm
Generation of Key
Input: k, k1 and k2 are randomly chosen integers from the interval [0, 255]; S = (). Validate that gcd (, 256) =1 and gcd () =1.
Output: Circulant Matrix
-
Formulate the matrix by setting up and in a arrangement as
-
Compute other matrices as follows
mod 256
mod 256
Mod 256,
where is the identity matrix.
- Generating a self-invertible matrix as
The key generated in Algorithm 1 is employed throughout the substituting phase for the Hill cipher. The diffused image array, is split into sub matrices, each sized denoted by where is the matrix. These sub matrices are multiplied by one at a time. Hill cipher is employed by means of the following formula in Equation 5.
Combing and so forth up to form a one- dimensional array indicated as cipher text that features all of the matrices.
-
Encryption stage 4: Fusion of Non-linear transformation with Chaotic Dynamics for Key Generation
The hyperbolic tangent tent map will be employed to generate secret keys and in the subsequent phase. Following that is exclusively xored with cipher text forming an intermediate cipher text which is illustrated in the following Equation 6.
The mathematical formula that yields the secret keys and is specified in Equation 7 which contributes to rendering the secret keys more reliable and distinct.
-
Encryption stage 5: Kronecker XOR Matrix Expansion
C1 Undergoes conversion via Kronecker xor product leading to the image size expansion from to . Bitwise exclusive OR is applied to all elements in preserving the other elements in at their original position. The image that arises as a result of this process is referred as . A part of is a block matrix on which Kronecker xor product operates. This process is intended to strengthen the process's defenses against potential breaches while strengthening its confidentiality. Figure 8 depicts the expansion of a matrix into a matrix.
[IMAGE OMITTED. SEE PDF]
-
Encryption stage 6: Final Encrypted Image
The conclusive stage results in the final encrypted image through the execution of an exclusive OR operation between the secret key and as illustrated in Equation 8 below.
The decryption process
To retrieve the original image, we implement a reverse encryption technique. Our encryption scheme strikes an appropriate safety alongside usage, enabling a reliable decoding technique while upholding essential safety precautions. The steps involved in the decryption process are as follows
- Start with the by encrypted image .
- Decryption stage 6: Utilizing the secret key , derived from the hyperbolic tangent tent map, execute a bitwise exclusive OR operation between and encrypted image to obtain an intermediate image as followed in Equation 9.
- Decryption stage 5: emerges after the intermediate image compresses by the kronecker xor operation.
- Decryption stage 4: The image and secret key generated by the hyperbolic tangent tent map need to be bitwise exclusively xored to produce a further new image as followed in Equation 10.
- Decryption stage 3: Decrypt the newly derived image utilizing inverse hill cipher along with key to retrieve the undiffused image by the following formula in Equation 11.
Indicate all in the form of 1D array .
- Decryption stage 2: Execute an exclusive bitwise OR operation on between the leftmost pixel values of an odd row and corresponding pixel values in even rows. Likewise, execute an exclusive bitwise OR operation between the leftmost pixel value of the even row and corresponding pixel values in an odd row, preserving the leftmost value of each row in .
- Decryption stage 1: Compute the perturbation magnitude for each row using the cumulative pixel values along the row as a base. The pre-determined shift amount calculated as the difference between row sums and the minimum row sum divided by the normalization factor, directs the appropriate modifications to retrieve the original spatial characteristics of a plain image.
In the next section, using a variety of performance metrics and tests, we will evaluate the efficacy and efficiency of the suggested satellite image encryption technique.
PERFORMANCE ASSESSMENT OF THE PROPOSED SATELLITE IMAGE ENCRYPTION
This section focuses on thoroughly examining the suggested image cryptosystem's performance evaluation. The results of different tests will be examined to verify the security of the proposed image cryptosystem against various types of attacks. The satellite images used in this study were sourced from Digital Globe Product Samples.33 For testing purposes, the key values are set as K = (5, 7, 11) and the value of ‘ρ’ is set to 1.985 with a precise initial value of CTM as 0.479.34,35 Many widely used performance evaluation metrics are utilized in this work from the existing research.13,36,37 The Table 1a displays the mathematical expressions for these metrics.
TABLE 1a Metrics for performance evaluation and their mathematical representations.
Metric | Mathematical Formulae |
MSE |
Where represents the plain image's pixel value and represents the encrypted image's pixel value. |
PSNR |
|
Entropy |
Where represents the probability of whether pixel exists. |
CC |
Where and |
NPCR |
Where |
UACI |
|
SSIM |
Where is mean of plain and encrypted images, is their variance, is covariance, , ; L is dynamic range of pixel values. & by default. |
Since the primary focus of our proposed system is satellite imagery, we expanded our testing to include common benchmark images like Lena and Mandrill to ensure the stability and adaptability of the suggested encryption technique. In image processing and cryptography, these images are commonly used as benchmarks. Figure 9 illustrates the performance of our algorithm on these traditional images to demonstrate that it is not only successful for satellite images but also applicable to other prevalent kinds of images used in research.
[IMAGE OMITTED. SEE PDF]
Visual and histogram analysis
Using the human visual system (HVS) to compare an encrypted image with its plain counterpart is a fundamental technique for assessing the performance of an image cryptosystem. A variety of plain images along with their corresponding encoded forms created with the proposed image cryptosystem are shown in Figures 10–13 along with their corresponding histograms. The encrypted images' histograms exhibit nearly identical uniform distributions with the plain images' histograms each showing distinct statistical characteristics that make it challenging to identify which plain image they belong to. These findings demonstrate how well the proposed encryption algorithm protects against statistical attacks.
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
The chi-square test is used to assess the uniformity of the histogram. Table 1b shows the result of test for different encrypted images.38 It appears that the proposed algorithm accepts the null hypothesis with p-values greater than 0.05 (5% significance) for the encrypted images showing the uniformity of the histogram.39 Therefore, the redundancy of the original image is completely hidden confirming the resistance against the statistical attack.40 The can be computed using Equation 19.
TABLE 1b -test results for the assessment of histogram uniformity.
Metrics | Waterloo image | Flood in Pakistan image | Gornoural'skii image | Satellite Image |
Chi-Square Value | 262.9102 | 242.0332 | 270.7578 | 232.2969 |
p-value | 0.5465 | 0.4369 | 0.1254 | 0.2465 |
Decision (H = 0 or 1) | 0 | 0 | 0 | 0 |
Accepted | Accepted | Accepted | Accepted |
In this case, Pi denotes the predicted frequency (the theoretical probability distribution for that value) and Oi is the observation frequency (the count of pixels with a certain value in the encrypted image). Note that the chi-square value for RGB images is derived from the average of the R, G, and B channels of the images.
Lossless and perceived encryption analysis
To initiate the statistical analysis, the mean squared error (MSE) and the peak signal-to-noise ratio (PSNR) are computed to access the encrypted image quality to ensure that the original image matches it precisely after an encryption algorithm has been implemented.41 MSE analyzes the variance of the original and encrypted images from one another; a higher MSE value signifies that the two images are substantially distinct from their predecessors while a relatively low MSE score means that both images are identical. MSE is inversely correlated with PSNR and forms the basis for PSNR. A low PSNR value indicates a notable distinction between the plain and the encoded images. The efficiency of the suggested image encryption scheme is demonstrated in Table 2 showcasing high MSE and low PSNR values than the methods in Refs. [42, 43]. Images with a resolution of 256 pixels by 256 pixels have been utilized for this evaluation. These results indicate that the proposed approach successfully preserves image confidentiality, emphasizing that it has the potential to advance in the field of image encryption. Beyond pixel-by-pixel variations in images, as traditional metrics like MSE and PSNR concentrate on, one such metric is the Structural Similarity Index Measure (SSIM), which assesses the degree to which two images appear in terms of structure and texture, and pixel intensity. Less image distortion is indicated by higher values obtained from the SSIM, which ranges from 0 to 1. An ideal encryption outcome should produce an SSIM value near zero, signifying that the encrypted image is completely unlike the original image. The equation provides the formula for calculating the SSIM. Its numerical values compared to other encryption schemes are demonstrated in Table 3. It should be noted that the average of the R, G, and B channels in the calculations of the PSNR, MSE, and SSIM values for the image of Lena is considered.
TABLE 2 Comparison of MSE and PSNR of Lena's image.
Image Encryption Scheme | MSE | PSNR |
Ref. [42] | 7747.30 | 9.23929 |
Ref. [43] | 6147.51 | 10.3167 |
Proposed Scheme | 8701.35 | 8.76267 |
TABLE 3 Comparison of SSIM of Lena's image.
Image Encryption Scheme | SSIM |
Ref. [44] | 0.000106 |
Ref. [45] | 0.000021 |
Proposed Scheme | 0.0075615 |
Information entropy analysis
Referring to the extent of disorder or randomness in the distribution of pixel concentrations within an image cipher, the concept of entropy is utilized. Higher security is indicated by greater entropy values when analyzing image encryption. An entropy value that approaches the optimum value of 8 resistant to brute force attacks. A comparison of entropy values for different encryption schemes can be observed in Table 4. The entropy calculation shows that our encryption algorithm's entropy is comparable to the standard entropy factor. This validates that the proposed cryptosystem keeps every bit of information intact. The average of the R, G, and B channels in the calculation of entropy values for the image of Lena is considered.
TABLE 4 Comparison of entropy values of Lena's images.
Image encryption scheme | Entropy values |
Ref. [46] | 7.8879 |
Ref. [47] | 7.5301 |
Ref. [48] | 7.9973 |
Proposed Scheme | 7.9982 |
Correlation coefficient analysis
The correlation analysis is the method used to assess the magnitude and trajectory of two variables. With a range of to , the correlation coefficient shows the extent to which the two variables link together and the magnitude of the relationship between them. A weaker relationship between the variables becomes apparent as the correlation coefficient gets progressively closer to 0, indicates a positive correlation, and a perfect negative correlation is represented by a value of −1. To ensure the safe retention of the image, a strong image encryption scheme ought to produce a minimal correlation among neighboring randomly distributed pixels. We assess the pixel correlation values of the original and encrypted images in the diagonal, vertical, and horizontal directions. Figures 14–16 display the row, column, and diagonal correlation of the pixels in the original and encrypted Waterloo images.
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
[IMAGE OMITTED. SEE PDF]
Table 5 presents the correlation values between adjacent pixels in the original and encrypted versions of Waterloo determined for each color channel individually. Note that the average value of the R, G, and B channels for waterloo image is used to calculate the correlation value.
TABLE 5 Correlation coefficient values for original and encrypted Waterloo image.
Red | Green | Blue | ||||
Direction | Original | Encrypted | Original | Encrypted | Original | Encrypted |
Horizontal | 0.9188 | 0.1358 | 0.9119 | 0.1329 | 0.9347 | 0.1227 |
Vertical | 0.9142 | 0.1203 | 0.8951 | 0.1461 | 0.9218 | 0.1311 |
Diagonal | 0.8598 | 0.0757 | 0.8440 | 0.0708 | 0.8805 | 0.0703 |
Differential attack analysis
Differential attack analysis, a cryptanalytic strategy used to examine how particular modifications made to the input plaintext within the encryption algorithms impact the final resultant ciphertext.49,50 Consequently, altering a single pixel in the original image ought to result in an entirely unique encrypted image. The number of pixel change rate (NPCR) for comparing individual pixels and the unified average change intensity (UACI) to figure out the average difference are the two tests that the literature proposes to fulfill these requirements. Encryption with a larger value of UACI is considered more beneficial. A large valued NPCR is required for a good image encryption scheme.51 These critical values have been determined as the minimal necessary condition to ensure the safety and privacy of the encrypted image through examination and testing. Consequently, it is crucial to ensure each of the UACI and NPCR scores surpass specified threshold to be able to classify an image encryption technique as safe.52 A contrast between the NPCR and UACI scores gathered from the present study and the ones from related studies is presented in Table 6. The average of the R, G, and B channels in the calculations of NPCR and UACI values for the image of Lena is considered.
TABLE 6 Comparability of NPCR and UACI values of Lena's images.
Image Encryption Scheme | NPCR | UACI |
Ref. [53] | 99.5855 | 30.3873 |
Ref. [54] | 99.6200 | 33.6400 |
Proposed Scheme | 99.6038 | 33.5333 |
Noise and data loss attacks
The resilience of an encryption scheme to data loss and noise is vital when transmitting cipher images over open channels. The encryption method employed in this study significantly enhances its robustness. In the case of a pixel error in the cipher image, the affected portion will fail to decrypt, and the error may be transmitted to adjacent pixels due to the diffusion property. However, the error contained within the affected portion or pixel could be limited, ensuring that the remaining pixels in the cipher image can be correctly decrypted, thereby minimizing the impact of data loss or noise, even at 90% data loss.
Within the web-based information exchange, it is important to note the risk of data loss or obscuration due to irrelevant and unrelated data which can also be known as noise. Inadequate handling of satellite imagery may diminish a satellite's ability to transmit and extract important data for further analysis or interpretation. In real-world interactions, the most important aspect of an encryption technique is its noise resistance. The suggested algorithm can withstand noise. The effectiveness of any algorithm is illustrated with both salt-and-pepper noise and Gaussian noise.55 The NPCR and UACI methods identify the differences between the original and decrypted images. The NPCR and UACI values decrease with increasing noise resistance. The effect of introducing salt-and-pepper noise to the encrypted image generated by the proposed cryptosystem is depicted as a noise attack in Figure 17. Table 7 compares the findings of the noise attack evaluations conducted by salt and pepper. Based on NPCR and UACI values, Table 7 shows that the suggested method performs better than the method outlined in.56 As a result, the proposed approach resists the salt and pepper noise attack better than the techniques in.56 The findings of the Gaussian noise attack analysis with mean = 0 and variance with various degrees are shown in Figure 18. Table 8 compares the findings of the noise attack evaluations conducted by Gaussian noise based on NPCR and UACI values.
[IMAGE OMITTED. SEE PDF]
TABLE 7 Comparison of Salt-and-Pepper noise attack for the average of Lena and Mandrill Images.
Noise 10% | Noise 25% | Noise 5% | ||||
Algorithms | NPCR | UACI | NPCR | UACI | NPCR | UACI |
Ref. [55] | 9.7549% | 5.3951% | 24.2918% | 12.5001% | 4.8592% | 2.5034% |
Proposed Scheme | 9.9675% | 5.0117% | 24.7706% | 12.4957% | 54.9952% | 2.4999% |
[IMAGE OMITTED. SEE PDF]
TABLE 8 Comparison of Gaussian noise attack for the average of Lena and Mandrill Images.
Variance 0.00019 | Variance 0.0003 | Variance 0.0005 | ||||
Algorithms | NPCR | UACI | NPCR | UACI | NPCR | UACI |
Ref. [57] | 82.0104% | 0.7685% | 88.3885% | 1.3320% | 90.3325% | 1.7234% |
Proposed Scheme | 99.5422% | 0.0031% | 99.5255% | 0.0053% | 99.5463% | 0.0068% |
Similarly, to retrieve the original image, we tested our proposed encryption scheme on an encrypted satellite image with data loss. This test was carried out to evaluate variations in data loss rates: 90%, 59%, and 20%. We assessed the decryption results of encrypted images with different degrees of data loss, as illustrated in Figure 19.
[IMAGE OMITTED. SEE PDF]
Key sensitivity analysis
An essential feature of cryptographic system evaluations, concentrating on how sensitive encrypted data is to changes in encryption. This is because even a minor alteration in the key can impact on the outcome. The encrypted image reveals no hints or clues regarding the original image.58 With an initial value , we assessed our proposed algorithm during the encryption phase. Later on in the decryption phase, we made a few slight adjustments, setting within the range of as demonstrated in Figure 20. Our findings demonstrate our encryption algorithm's increased sensitivity to key modifications, highlighting its efficacy and dependability in protecting confidential information.
[IMAGE OMITTED. SEE PDF]
Key space analysis
By using three distinct keys, the suggested encryption algorithm greatly expands the key space and increases the difficulty for unauthorized parties to decrypt the encrypted data. In addition to meeting the requirements, the suggested algorithm's use of three keys exceeds IEEE standards,59 making it a perfect and safe choice for encryption. These keys are T1 and T2 produced from the hyperbolic tangent tent map, and C, which serves as a confidential key for the hill cipher. The IEEE's guidelines60 state that strong encryption requires a key space of at least 2100. A 4 × 4 circulant matrix serves as the source for the Hill cipher key. Values ranging from 0 to 255 can be assigned to each element in the key matrix. Since there are 16 elements in the 4 × 4 matrix, the number of possible keys for the Hill cipher is 25616.52 In the case of a hyperbolic tangent tent map (T1 & T2), the values of 0 or 1 can be assigned to each position in the key matrix. Consequently, there would be 216 combinations for each key matrix. So the total key space would be 2128 × 216 × 216 = 2160. Table 9 demonstrates the proposed algorithm comparison with other studies.
TABLE 9 Key space comparison.
Proposed | Ref. [32] | Ref. [61] | |
Key space size | 2160 | 2149 | 2136 |
The study's major conclusions are summed up in the conclusion, along with a discussion of the consequences of the suggested encryption technique and possible directions for further research in the next section.
CONCLUSION
This work offers an innovative encryption technique that improves the protection of sensitive digital evidence including satellite images and is a noteworthy contribution to the field of digital forensics. Safeguarding information against illicit access is a major challenge in the real-world application of satellite imagery. Researchers are constantly challenged to develop novel algorithms that strengthen vital satellite data against possible cyber breaches as threats from malicious individuals keep evolving. Using chaotic systems to ensure transmission confidentiality, this paper aims to make a research contribution to the field of encrypted satellite images. The current research offers a useful instrument that can be used in forensic procedures to guarantee the confidentiality and integrity of sensitive data.
The suggested method consists of image scrambling, encryption using the Hill cipher, and the encryption of satellite images using a chaotic tent map and Kronecker xor product techniques. Specifically, the hyperbolic tangent tent map produces sophisticated, pseudo-random integers perfect for encrypting data. This contributes to the security of the suggested system and advances our knowledge of satellite image encryption. A thorough numerical analysis of multiple experimental tests has been conducted, demonstrating the long-term reliability of the recommended algorithm in opposition to different attacks, including statistical and differential attacks. The image encryption method we have suggested is a big step forward for the industry and provides a trustworthy and efficient means of protecting private data.
While the suggested plan has several benefits, there is still an opportunity for future advancements. Although classical chaotic systems have been extensively used, they possess some inherent drawbacks, including periodicity, vulnerability to phase space destruction, and low Lyapunov exponents. To overcome these limitations, researchers have been discovering ways to improve the chaotic behavior of classical systems via a process known as chaotification. The main objective of chaotification is to address these weaknesses and enhance the efficiency of chaotic encryption procedures. A possible future direction for this study could include substituting classical chaotic maps with chaotified maps, which may further improve the performance and security of the proposed encryption technique. Further, as a future study, any quantum key distribution technique62 can be combined for the secure key distribution with the current work.
The important findings from our performance analysis are displayed in the Table 10. The whole work including a comparison of the findings with the methods of other researchers is summarized in Table 11. Future work could enhance our encryption technique by integrating AI algorithms to further boost security. AI's impact in fields like diabetic retinopathy detection, cancer detection, and bio mathematical challenges shows its potential to create more adaptive encryption methods.63–68 Incorporating AI-driven chaotic maps or real-time threat detection, along with quantum key distribution, could significantly improve the protection of satellite imagery and other sensitive data.
TABLE 10 Key takeaways of the proposed encryption scheme on Satellite images.
Tests | Proposed Scheme |
Entropy | 7.9973 |
MSE | 8711.35 |
PSNR | 8.66257 |
SSIM | 0.0074515 |
NPCR | 99.6043 |
UACI | 33.4321 |
TABLE 11 Summary of the proposed work.
Tests | Algorithms | |||
Ref. [46] | Ref. [47] | Ref. [48] | Proposed Scheme | |
Entropy | 7.8879 | 7.5301 | 7.9973 | 7.9982 |
Ref. [42] | Ref. [43] | Proposed Scheme | ||
MSE | 7747.30 | 6147.51 | 8701.35 | |
PSNR | 9.23929 | 10.3167 | 8.76267 | |
Ref. [44] | Ref. [45] | Proposed Scheme | ||
SSIM | 0.000106 | 0.000021 | 0.0075615 | |
Ref. [53] | Ref. [54] | Proposed Scheme | ||
NPCR | 99.5855 | 99.6200 | 99.6038 | |
UACI | 30.3873 | 33.6400 | 33.5333 | |
Ref. [55] | Proposed Scheme | |||
Salt-and-pepper noise attack | ||||
Noise 10% | NPCR | UACI | NPCR | UACI |
9.7549% | 5.3951% | 9.9675% | 5.0117% | |
Noise 25% | NPCR | UACI | NPCR | UACI |
24.2918% | 12.5001% | 24.7706% | 12.4957% | |
Noise 5% | NPCR | UACI | NPCR | UACI |
4.8592% | 2.5034% | 4.9647% | 2.5049% | |
Ref. [57] | Proposed Scheme | |||
Gaussian noise attack | ||||
Variance 0.0001 | NPCR | UACI | NPCR | UACI |
82.0104% | 0.7685% | 99.5422% | 0.0031% | |
Variance 0.0003 | NPCR | UACI | NPCR | UACI |
88.3885% | 1.3320% | 99.5255% | 0.0053% | |
Variance 0.0005 | NPCR | UACI | NPCR | UACI |
90.3325% | 1.7234% | 99.5463% | 0.0068% |
AUTHOR CONTRIBUTIONS
Shamsa Kanwal: Conceptualization; methodology; writing – original draft. Saba Inam: Methodology; software; data curation. Asghar Ali Shah: Methodology; software; data curation; validation. Halima Iqbal: Methodology; validation; visualization; formal analysis; data curation. Anas Bilal: Methodology; software; writing – review and editing; formal analysis; data curation. Muhammad Usman Hashmi: Validation; formal analysis; writing – review and editing; software. Raheem Sarwar: Methodology; resources; project administration; visualization; investigation.
CONFLICT OF INTEREST STATEMENT
Authors have no conflict of interest relevant to this article.
DATA AVAILABILITY STATEMENT
The data that support the findings of this study are available on request from the corresponding author. The data are not publicly available due to privacy or ethical restrictions.
Muhaya FTB. Chaotic and AES cryptosystem for satellite imagery. Telecommun Syst. 2013;52:573‐581.
Widiono S, Safriandono AN, Budi S. Phishing website detection using bidirectional gated recurrent unit model and feature Selection. J Fut Artif Intell Technol. 2024;1(2):75‐83.
Macmillan PP. The Statesman's Yearbook 2024: the Politics. Cultures and Economies of the World; 2022.
Nair GM. Role of communications satellites in national development. IETE Tech Rev. 2008;25(1):3‐8.
Solak S, Abdirashid AM, Adjevi A, Sahu AK. Robust data hiding method based on frequency coefficient variance in repetitive compression. Eng Sci Technol Int J. 2024;56: [eLocator: 101756].
Menezes AJ, Van Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. CRC press; 2018.
Stallings W. Computer Networking with Internet Protocols and Technology. Pearson/Prentice Hall; 2004.
Stinson DR. Cryptography: Theory and Practice. Chapman and Hall/CRC; 2005.
Bensikaddour EH, Bentoutou Y, Taleb N. Embedded implementation of multispectral satellite image encryption using a chaos‐based block cipher. J King Saud Univ Comput Inform Sci. 2020;32(1):50‐56.
Usama M, Khan MK. Classical and chaotic encryption techniques for the security of satellite images. In 2008 International Symposium on Biometrics and Security Technologies. IEEE; 2008:1‐6.
Shannon CE. Communication theory of secrecy systems. Bell Syst Tech J. 1949;28(4):656‐715.
Arul Murugan C, KarthigaiKumar P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms. Mobile Netw Appl. 2023;28:1385‐1390.
Alexan W, Elkandoz M, Mashaly M, Azab E, Aboshousha A. Color image encryption through chaos and kaa map. IEEE Access. 2023;11:11541‐11554.
Radwan AG, AbdElHaleem SH, Abd‐El‐Hafiz SK. Symmetric encryption algorithms using chaotic and non‐chaotic generators: A review. J Adv Res. 2016;7(2):193‐208.
Behnia S, Akhshani A, Mahmodi H, Akhavan AJCS. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals. 2008;35(2):408‐419.
Bensikaddour E, Bentoutou Y. Satellite image encryption based on AES and discretised chaotic maps. Autom Control Comput Sci. 2020;54(5):446‐455.
Kanwal S, Inam S, Hajjej F, et al. A new image encryption technique based on sine map, chaotic tent map, and Circulant matrices. Secur Commun Netw. 2022;2022:4152683.
Zhu X, Liu H, Liang Y, Wu J. Image encryption based on Kronecker product over finite fields and DNA operation. Optik. 2020;224: [eLocator: 164725].
Wang X, Zhang M. An image encryption algorithm based on new chaos and diffusion values of a truth table. Inform Sci. 2021;579:128‐149.
Wu X, Kan H, Kurths J. A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput. 2015;37:24‐39.
Arifin S, Nicholas A, Baskoroputro H, Prabowo AS, Ibrahim MA, Rahayu A. Algorithm for digital image encryption using multiple hill ciphers, a unimodular matrix, and a logistic map. Int J Intell Syst Appl Eng. 2023;11(6):311‐324.
Kamil Khudhair S, Sahu M, Raghunandan KR, Sahu AK. Secure reversible data hiding using block‐wise histogram shifting. Electronics. 2023;12(5):1222.
Christensen C. Lester Hill revisited. Cryptologia. 2014;38(4):293‐332.
Hill LS. Cryptography in an algebraic alphabet. Am Math Month. 1929;36(6):306‐312.
Zhou Z, Bao Z, Jiang W, et al. Latent Vector Optimization‐Based Generative Image Steganography for Consumer Electronic Applications. IEEE Transactions on Consumer Electronics; 2024:4357‐4366.
Hemalatha J, Sekar M, Kumar C, Gutub A, Sahu AK. Towards improving the performance of blind image steganalyzer using third‐order SPAM features and ensemble classifier. J Inf Secur Appl. 2023;76: [eLocator: 103541].
Podder D, Deb S, Banik D, Kar N, Sahu AK. Robust medical and color image cryptosystem using array index and chaotic S‐box. Clust Comput. 2024;27:1‐26.
Sahu AK. A logistic map based blind and fragile watermarking for tamper detection and localization in images. J Amb Intell Human Comput. 2022;13(8):3869‐3881.
Nawaz F, Inam S, Kanwal S, Al‐Otaibi S, Hajjej F. A resilient image encryption scheme using Laplace transform. Egypt Inform J. 2024;27: [eLocator: 100512].
Kanwal S, Inam S, Othman MTB, et al. An effective color image encryption based on henon map, tent chaotic map, and orthogonal matrices. Sensors. 2022;22(12):4359.
Namin AH, Leboeuf K, Muscedere R, Wu H, Ahmadi M. Efficient hardware implementation of the hyperbolic tangent sigmoid function. In 2009 IEEE International Symposium on Circuits and Systems. IEEE; 2009:2117‐2120.
Mfungo DE, Fu X, Wang X, Xian Y. Enhancing image encryption with the Kronecker xor product, the Hill cipher, and the sigmoid logistic map. Appl Sci. 2023;13(6):4034.
Digital Globe Product Samples, https://www.digitalglobe.com/resources/product‐samples
Liu Z, Li J, Di X, Man Z, Sheng Y. A novel multiband remote‐sensing image encryption algorithm based on Dual‐Channel key transmission model. Secur Commun Netw. 2021;27(1): [eLocator: 9698371].
Li C, Luo G, Qin K, Li C. An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 2017;87:127‐133.
Acharya B, Rath G, Patra S, Panigraphy S. Novel methods for generating self‐invertible matrix for hill cipher algorithm. Int J Secur. 2007;1(1):14‐21.
Kanwal S, Inam S, Cheikhrouhou O, Mahnoor K, Zaguia A, Hamam H. Research Article Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes. 2021.
Kanwal S, Inam S, Quddus S, Hajjej F. Research on color image encryption approach based on chaotic duffing map. Physica Scripta. 2023;98(12):125252.
Kohli Y, Bhagwani S, Patro KAK, Acharya B. A secure bit‐level image encryption by using SELECTION based 1‐D chaotic maps. Computer Science Advances: Research and Applications. Nova Science Publishers, Inc.; 2019:163‐199.
Patro KAK, Soni A, Netam PK, Acharya B. Multiple grayscale image encryption using cross‐coupled chaotic maps. J Inf Secur Appl. 2020;52: [eLocator: 102470].
Rachmawanto EH, Zulfiningrum R. Medical image cryptosystem using dynamic Josephus sequence and chaotic‐hash scrambling. J King Saud Univ Comput Inform Sci. 2022;34(9):6818‐6828.
Robet R, Pribadi O, Widiono S, Sarker MK. Image encryption using half‐inverted cascading chaos cipheration. J Comput Theor Appl. 2023;1(2):61‐77.
Younas I, Khan M. A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy. 2018;20(12):913.
Dridi M, Hajjaji MA, Bouallegue B, Mtibaa A. Cryptography of medical images based on a combination between chaotic and neural network. IET Image Process. 2016;10(11):830‐839.
Wang J, Li J, Di X, Zhou J, Man Z. Image encryption algorithm based on bit‐level permutation and dynamic overlap diffusion. IEEE Access. 2020;8:160004‐160024.
Zhang LM, Sun KH, Liu WH, He SB. A novel color image encryption scheme using fractional‐order hyperchaotic system and DNA sequence operations. Chinese Phys B. 2017;26(10): [eLocator: 100504].
Al‐Hyari A, Obimbo C, Altaharwa I. Generating powerful encryption keys for image cryptography with chaotic maps by incorporating collatz conjecture. IEEE Access. 2024;12:4825‐4844.
Ke Z, Zheng W, Wang X, Lin M. Information entropy analysis of a PIV image based on wavelet decomposition and reconstruction. Entropy. 2024;26(7):573.
Mansoor S, Parah SA. HAIE: a hybrid adaptive image encryption algorithm using chaos and DNA computing. Multimed Tools Appl. 2023;82(19):28769‐28796.
Daga J, Pandey U, Patro KAK. A fast image encryption technique based on chaotic maps and image divisional techniques for multiple applications. In 2023 International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security (iQ‐CCHESS). IEEE; 2023:1‐6.
Sujan DM, Singh A, Patro KAK. A fast image encryption scheme for diverge applications using chaotic index swapping confusion‐diffusion. In 2023 OITS International Conference on Information Technology (OCIT). IEEE; 2023:665‐670.
Patro KAK, Kumar MP, Acharya B. An efficient dual‐stage pixel‐diffusion based multimedia‐image encryption using one‐type 1D chaotic maps. Sādhanā. 2022;47(3):161.
Alexan W, Alexan N, Gabr M. Multiple‐layer image encryption utilizing fractional‐order chen hyperchaotic map and cryptographically secure prngs. Fract Fraction. 2023;7(4):287.
Kumar A, Dua M. A novel exponent–sine–cosine chaos map‐based multiple‐image encryption technique. Multimedia Syst. 2024;30(3):141.
Raghuvanshi A, Budhia M, Patro KAK, Acharya B. FSR‐SPD: an efficient chaotic multi‐image encryption system based on flip‐shift‐rotate synchronous‐permutation‐diffusion operation. Multimed Tools Appl. 2023;83:1‐47.
Dash S, Padhy S, Devi SA, Sachi S, Patro KAK. An efficient intra‐inter pixel encryption scheme to secure healthcare images for an IoT environment. Expert Syst Appl. 2023;231: [eLocator: 120622].
Zhou N, Yan X, Liang H, Tao X, Li G. Multi‐image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quant Inform Process. 2018;17:1‐36.
Patro KAK, Acharya B. An efficient two‐level image encryption system using chaotic maps. Int J Inform Comput Secur. 2023;21(1–2):35‐69.
Konathalapalli K, Bhat NH, Patro KAK. An effective, permutation‐only, bit‐level image encryption system using chaotic maps. In 2023 International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security (iQ‐CCHESS). IEEE; 2023:1‐7.
Mishra BB, Patro KAK, Das S. A diffusion‐only image encryption system for high‐speed applications. In 2023 International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security (iQ‐CCHESS). IEEE; 2023:1‐6.
Panigrahy AK, Maniyath SR, Sathiyanarayanan M, et al. A faster and robust artificial neural network based image encryption technique with improved SSIM. IEEE Access. 2024;12:10818‐10833.
Akrom M. Hybrid quantum key distribution protocol with chaotic system for securing data transmission. J Comput Theor Appl. 2023;1(2):188‐200.
Bilal A, Imran A, Baig TI, et al. Improved support vector machine based on CNN‐SVD for vision‐threatening diabetic retinopathy detection and classification. PLoS One. 2024;19(1): [eLocator: e0295951].
Bilal A, Liu X, Shafiq M, Ahmed Z, Long H. NIMEQ‐SACNet: A novel self‐attention precision medicine model for vision‐threatening diabetic retinopathy using image data. Comput Biol Med. 2024;171: [eLocator: 108099].
Bilal A, Sun G, Li Y, Mazhar S, Khan AQ. Diabetic retinopathy detection and classification using mixed models for a disease grading database. IEEE Access. 2021;9:23544‐23553.
Bilal A, Imran A, Liu X, Liu X, et al. BC‐QNet: A quantum‐infused ELM model for breast cancer diagnosis. Comput Biol Med. 2024;175: [eLocator: 108483].
Bilal A, Imran A, Baig TI, Liu X, Abouel Nasr E, Long H. Breast cancer diagnosis using support vector machine optimized by improved quantum inspired grey wolf optimization. Sci Rep. 2024;14(1):10714.
Bilal A, Sun G, Mazhar S, Junjie Z. Neuro‐optimized numerical treatment of HIV infection model. Int J Biomath. 2021;14(5): [eLocator: 2150033].
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024. This work is published under http://creativecommons.org/licenses/by/4.0/ (the "License"). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
In the modern era, where satellite imagery is vital for applications like ecological monitoring and national security, ensuring the safety and integrity of these data repositories is crucial. This study presents an improved satellite image encryption technique that combines the cryptographic strength of the circulant matrix in the Hill cipher with the dynamic characteristics of the hyperbolic tangent tent map, further enhanced by the Kronecker XOR product. The algorithm initiates with computing alterations by a shift amount. After preserving the leftmost pixel in each row, it executes XOR operations between alternating rows, combining the value of the current even or odd row with corresponding pixels in the adjacent rows followed by encryption using the Hill cipher. The resulting image undergoes a diffusion process utilizing a hyperbolic tangent tent map. The Kronecker XOR product operation is then applied to individual pixels to produce a secure image followed by additional diffusion with keys from the hyperbolic tangent tent map to achieve the final encrypted image. We conducted simulations using MATLAB to assess the efficiency of the proposed satellite image encryption from theoretical and statistical perspectives. The results exhibit robust encryption performance as demonstrated by metrics such as an entropy value of 7.9982, a UACI of 33.5333%, and an NPCR of 99.6038%. The experiment results demonstrate the proposed image encryption scheme's reliability, practicability, and efficiency in securing satellite images during data storage and transmission. Comprehensive testing against various attacks including correlation, histogram, chi‐square, NPCR, PSNR, UACI, SSIM, key space and key sensitivity analysis confirms the scheme's robustness, efficiency and speed. These findings verify the scheme's ability to come across the most stringent encryption and decryption standards, making it an effective solution for securing sensitive satellite image data.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 Department of Mathematical Sciences, Fatima Jinnah Women University, Rawalpindi, Pakistan
2 Center of Excellence in Artificial Intelligence (CoE‐AI), Department of computer science, Bahria University, Islamabad, Pakistan
3 College of Information Science and Technology, Hainan Normal University, Haikou, China
4 Department of computer science, Bahria University, Islamabad, Pakistan
5 OTEHM, Manchester Metropolitan University, Manchester, UK