Chaos-Based Novel Watermarked Satellite Image Encryption Scheme

Satellite images are widely used for remote sensing and defence applications, however, they are subject to a variety of threats. To ensure the security and privacy of these images, they must be watermarked and encrypted before communication. Therefore, this paper proposes a novel watermarked satelli...

Full description

Saved in:
Bibliographic Details
Published inComputer modeling in engineering & sciences Vol. 143; no. 1; pp. 1049 - 1070
Main Authors Medani, Mohamed, Said, Yahia, Adnan Othman, Nashwan, Yuldashev, Farrukh, Kchaou, Mohamed, Aldawood, Faisal Khaled, Rehman, Bacha
Format Journal Article
LanguageEnglish
Published Henderson Tech Science Press 2025
Subjects
Online AccessGet full text
ISSN1526-1506
1526-1492
1526-1506
DOI10.32604/cmes.2025.063405

Cover

More Information
Summary:Satellite images are widely used for remote sensing and defence applications, however, they are subject to a variety of threats. To ensure the security and privacy of these images, they must be watermarked and encrypted before communication. Therefore, this paper proposes a novel watermarked satellite image encryption scheme based on chaos, Deoxyribonucleic Acid (DNA) sequence, and hash algorithm. The watermark image, DNA sequence, and plaintext image are passed through the Secure Hash Algorithm (SHA-512) to compute the initial condition (keys) for the Tangent-Delay Ellipse Reflecting Cavity Map (TD-ERCS), Henon, and Duffing chaotic maps, respectively. Through bitwise XOR and substitution, the TD-ERCS map encrypts the watermark image. The ciphered watermark image is embedded in the plaintext image. The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map. The permuted image is then bitwise XORed with the values obtained from the Duffing map. For additional security, the XORed image is substituted through a dynamic S-Box. To evaluate the efficiency and performance of the proposed algorithm, several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1526-1506
1526-1492
1526-1506
DOI:10.32604/cmes.2025.063405