Document Type : Original Article
Authors
1
Associate Professor, Shahid Bahnar University, Kerman, Iran
2
Master's degree, Shahid Bahaner University, Kerman, Iran
Abstract
With the expansion of the Internet network and public access to this network, the amount of information and data exchange increases day by day; Therefore, there will be a possibility of unauthorized access to the information that is exchanged. On the other hand, almost all programs that run on the Internet, such as social networks, have full access to images and content stored on the host device; Therefore, there is a pos-sibility of unauthorized access and theft of personal information. Therefore, the security and accuracy of information must be guaranteed. In order to maintain the confidentiality of data, information encryption methods, such as image encryption algorithms, can be used. In the proposed method of this article, the en-cryption algorithm key is created with the help of information extracted from the person's face, image ab-stract, and public key, so the encryption algorithm will be highly sensitive to the change of any of the infor-mation used in key generation. Lorenz chaos mapping is used for image encryption in the substitution phase. Each color channel of the image is divided into four parts and each part is encrypted using a sepa-rate pseudo-random sequence and the encrypted image is produced. In the permutation phase, to achieve the best encoded image, the genetic heuristic algorithm (GA) is used to bring the pixel correlation value of the encoded image to the minimum possible value by choosing the optimal parameters for the Arnold chaos mapping. According to the obtained results, the correlation values of pixels in all three horizontal, vertical, and diagonal directions are much smaller than other similar presented methods and the encryption algo-rithm has been able to significantly reduce the correlation and connection between pixels. to give Also, according to the results of NPCR and UACI differential analysis, it is higher than 99.6% and 33.4% for all the tested images, respectively. Therefore, the proposed method will have high resistance to statistical and differential attacks. Also, for the process of decoding the image, two-step authentication and safe storage of the encryption key are used in the blockchain network.
Keywords
Main Subjects