Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map
Abstract
:1. Introduction
2. PIES and MIES
3. The Two-Dimensional Chaotic Economic Map
4. The Secret Key Generation
5. The Proposed Multiple-Image Algorithm
Algorithm 1 Multiple-image encryption |
|
6. Experimental Results and Analyses
6.1. Analysis of the Key Space
6.2. Analysis of the Key Sensitivity
6.3. Analysis of the Histogram
6.4. Analysis of Histogram Variance
6.5. Analysis of Information Entropy
6.6. Analysis of the Correlation Coefficients
6.7. Analysis of Differential Attack
6.8. Chosen/Known Plaintext Attack Analysis
6.9. Noise Attack Analysis
6.10. Analysis of Occlusion Attack
7. Comparison with Other Algorithms
8. Conclusions
Funding
Acknowledgments
Conflicts of Interest
References
- Askar, S.S.; Karawia, A.A.; Alshamrani, A. Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. 2015, 2015, 341729. [Google Scholar] [CrossRef]
- Askar, S.S.; Karawia, A.A.; Alammar, F.S. Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 2018, 12, 158–167. [Google Scholar] [CrossRef]
- Cao, Y.; Fu, C. An image encryption scheme based on high dimension chaos system. In Proceedings of the 2008 International Conference on Intelligent Computation Technology and Automation, Changsha, China, 20–22 October 2008; pp. 104–108. [Google Scholar]
- Jeyamala, J.; GrpiGranesh, S.; Raman, S. An image encryption scheme based on one time pads-a chaotic approach. In Proceedings of the 2010 Second International conference on Computing, Communication and Networking Technologies, Karur, India, 29–31 July 2010; pp. 1–6. [Google Scholar]
- Sivakumar, T.; Venkatesan, R. Image encryption based on pixel shuffling and random key stream. Int. J. Comput. Inf. Technol. 2014, 3, 1468–1476. [Google Scholar]
- Zhang, J.; Fang, D.; Ren, H. Image encryption algorithm based on DNA encoding and chaotic maps. Math. Probl. Eng. 2014, 2014, 917147. [Google Scholar] [CrossRef]
- Vaferi, E.; Sabbaghi-Nadooshan, R. A new encryption algorithm for color images based on total chaotic shuffling scheme. Opt.-Int. J. Light Electron Opt. 2015, 126, 2474–2480. [Google Scholar] [CrossRef]
- Elsheh, E.; Hamza, A. Secret sharing approaches for 3D object encryption. Expert Syst. Appl. 2011, 38, 13906–13911. [Google Scholar] [CrossRef]
- Wang, J.; Ding, Q. Dynamic rounds chaotic block cipher based on keyword abstract extraction. Entropy 2018, 20, 693. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and chaos. Comput. Electr. Eng. 2017, 62, 401–413. [Google Scholar] [CrossRef]
- Xiong, Y.; Quan, C.; Tay, C.J. Multiple image encryption scheme based on pixel exchange operation and vector decomposition. Opt. Lasers Eng. 2018, 101, 113–121. [Google Scholar] [CrossRef]
- Zhang, X.; Wang, X. Multiple-image encryption algorithm based on mixed image element and permutation. Opt. Lasers Eng. 2017, 92, 6–16. [Google Scholar] [CrossRef]
- Wu, J.; Xie, Z.; Liu, Z.; Liu, W.; Zhang, Y.; Liu, S. Multiple-image encryption based on computational ghost imaging. Opt. Commun. 2016, 359, 38–43. [Google Scholar] [CrossRef]
- Liu, W.; Xie, Z.; Liu, Z.; Zhang, Y.; Liu, S. Multiple-image encryption based on optical asymmetric key cryptosystem. Opt. Commun. 2015, 335, 205–211. [Google Scholar] [CrossRef]
- Deng, P.; Diao, M.; Shan, M.; Zhong, Z.; Zhang, Y. Multiple-image encryption using spectral cropping and spatial multiplexing. Opt. Commun. 2016, 359, 234–239. [Google Scholar] [CrossRef]
- Li, X.; Meng, X.; Yang, X.; Wang, Y.; Yin, Y.; Peng, X.; He, W.; Dong, G.; Chen, H. Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme. Opt. Lasers Eng. 2018, 102, 106–111. [Google Scholar] [CrossRef]
- Lin, Q.; Yin, F.; Mei, T.; Liang, H. A blind source separation-based method for multiple images encryption. Image Vis. Comput. 2008, 26, 788–798. [Google Scholar] [CrossRef]
- Wang, Q.; Guo, Q.; Zhou, J. Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain. Opt. Commun. 2012, 285, 4317–4323. [Google Scholar] [CrossRef]
- Li, C.; Li, H.; Li, F.; Wei, D.; Yang, X.; Zhang, J. Multiple-image encryption by using robust chaotic map in wavelet transform domain. Opt.-Int. J. Light Electron Opt. 2018, 171, 277–286. [Google Scholar] [CrossRef]
- Tang, Z.; Song, J.; Zhang, X.; Sun, R. Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt. Lasers Eng. 2016, 80, 1–11. [Google Scholar] [CrossRef]
- Parvin, Z.; Seyedarabi, H.; Shamsi, M. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions. Multimed. Tools Appl. 2016, 75, 10631–10648. [Google Scholar] [CrossRef]
- Patro, K.; Acharya, B. Secure multi–level permutation operation based multiple colour image encryption. J. Inf. Secur. Appl. 2018, 40, 111–133. [Google Scholar] [CrossRef]
- Askar, S.S. Complex dynamic properties of Cournot duopoly games with convex and log-concave demand function. Oper. Res. Lett. 2014, 42, 85–90. [Google Scholar] [CrossRef]
- Wang, W.; Tan, H.; Pang, Y.; Li, Z.; Ran, P.; Wu, J. A Novel encryption algorithm based on DWT and multichaos mapping. J. Sens. 2016, 2016, 2646205. [Google Scholar] [CrossRef]
- Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef]
- Belazi, A.; Abd El-Latif, A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
Algorithm | Tang’s Algorithm [20] | Zhang’s algorithm [10] | Proposed Algorithm |
---|---|---|---|
Figure 19a | |||
Figure 19b | |||
Figure 19c | |||
Figure 19d |
Images | (a) | (b) | (c) |
Entropy | 7.9984 | 7.9987 | 7.9986 |
Images | (d) | (e) | (f) |
Entropy | 7.9982 | 7.9986 | 7.9983 |
Images | (g) | (h) | (i) |
Entropy | 7.9986 | 7.9989 | 7.9986 |
Image | Noise | MSE | PSNR |
---|---|---|---|
Figure 23a | |||
Figure 23b | Gaussian | ||
Figure 23c | variance = 0.001 | ||
Figure 23d | |||
Figure 23a | |||
Figure 23b | salt & pepper | ||
Figure 23c | density = 0.05 | ||
Figure 23d |
Algorithm | Time |
---|---|
Zhang’s algorithm [10] | 2.169 |
Proposed algorithm | 2.386 |
© 2018 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Karawia, A.A. Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. Entropy 2018, 20, 801. https://doi.org/10.3390/e20100801
Karawia AA. Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. Entropy. 2018; 20(10):801. https://doi.org/10.3390/e20100801
Chicago/Turabian StyleKarawia, A. A. 2018. "Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map" Entropy 20, no. 10: 801. https://doi.org/10.3390/e20100801
APA StyleKarawia, A. A. (2018). Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. Entropy, 20(10), 801. https://doi.org/10.3390/e20100801