An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps
Abstract
:1. Introduction
2. The Two-Dimensional Map
3. The Algorithm
- (Shuffling of rows) In this step, we recall the logistic map . The logistic map is used to generate a set of random values in the interval , say . The rows of the array are changed according to those random values, and hence, a new array is obtained:
- (Shuffling of columns) Using a similar technique as in (1), we generate a new set of random values in the interval , say . The columns of take the following form:
- Step 1:
- Read the original image, then convert it to a gray image, say .
- Step 2:
- Perform row and column shuffling to generate the shuffling array, say .
- Step 3:
- Convert the pixel values of from decimal to binary, .
- Step 4:
- Use the two-dimensional chaotic economic map (1) to generate values as follows:
- (i)
- For i = , Compute:. End.
- (ii)
- Set and as initial values.
- (iii)
- Generate values and using the two-dimensional chaotic economic map (1).
- Step 5:
- Do the following preprocessing for the generated values in Step 4:
- Step 6:
- Convert the preprocessing values in Step 5 from decimal to binary, and for and , respectively.
- Step 7:
- Perform the bit-wise between the values of and , , where equals the value of the array after reshaping it to be a vector of size .
- Step 8:
- Perform the bit-wise between the values of and , .
- Step 9:
- Perform the bit-wise between the values of and , .
- Step 10:
- Convert the values of from binary to decimal, say .
- Step 11:
- The cipher pixel set is denoted by .
- Step 12:
- Reshape the set to be an array of size , say as the cipher image.
- Step 1:
- Read the cipher image, with size .
- Step 2:
- Reshape to the cipher pixel set .
- Step 3:
- Convert the values of from decimal to binary, say .
- Step 4:
- Repeat in the encryption algorithm to generate values for the two vectors, and .
- Step 5:
- Do the following preprocessing for the generated values in Step 4:
- Step 6:
- Convert the preprocessing values in Step 5 from decimal to binary, and for and , respectively.
- Step 7:
- Perform the bit-wise between the values of and , .
- Step 8:
- Perform the bit-wise between the values of and ,
- Step 9:
- Perform the bit-wise between the values of and ,
- Step 10:
- Convert the values of from binary to decimal, say .
- Step 11:
- Reshape to be an array of size , say .
- Step 12:
- Perform row and column shuffling to get the decryption image, say .
The Secret Key Generation
4. Experimental Analysis
5. Security Analysis
5.1. Statistical Analysis
5.1.1. Analysis of the Histogram
5.1.2. Entropy Process of Information
5.1.3. Examination of Correlation
5.2. Sensitivity Analysis
5.2.1. Differential Attack
5.2.2. Key Sensitivity Test
5.3. The Analysis of Our Key Space
5.4. Noise Attacks
5.5. Contrast Analysis
5.6. Gray Value Degree Analysis
5.7. Peak Signal to Noise Ratio Analysis
5.8. Computational Complexity
6. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Askar, S.S.; Karawia, A.A.; Alammar, F. Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process. 2018, 12, 158–167. [Google Scholar] [CrossRef]
- Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
- Abomhara, M.; Zakaria, O.; Khalifa, O. An Overview of Video Encryption Techniques. Int. J. Comput. Theory Eng. 2010, 2, 1793–8201. [Google Scholar] [CrossRef]
- Chen, G.; Mao, Y.; Chui, C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 2004, 21, 749–761. [Google Scholar] [CrossRef]
- Chiaraluce, F.; Ciccarelli, L.; Gambi, E.; Pierleoni, P.; Reginelli, M. A new chaotic algorithm for video encryption. IEEE Trans. Consum. Electron. 2002, 48, 838–843. [Google Scholar] [CrossRef]
- Askar, S.S.; Karawia, A.A.; Alshamrani, A. Image encryption algorithm based on chaotic economic model. Math. Probl. Eng. 2015, 2015, 341729. [Google Scholar] [CrossRef]
- Matthews, R. On the derivation of a chaotic encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
- Xu, E.; Shao, L.; Cao, G.; Ren, Y.; Qu, T. A New Method of Information Encryption. In Proceedings of the International Colloquium on Computing, Communication, Control, and Management, Sanya, China, 8–9 August 2009; Volume 4, pp. 583–586. [Google Scholar]
- Zhang, D.; Gu, Q.; Pan, Y.; Zhang, X. Discrete Chaotic Encryption and Decryption of Digital Images. In Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, China, 12–14 December 2008; Volume 3, pp. 849–852. [Google Scholar]
- Nien, H.; Huang, W.; Hung, C.; Chen, S.; Wu, S.; Huang, C.; Hsu, Y. Hybrid image encryption using multi-chaos-system. In Proceedings of the International Conference on Information, Communications and Signal Processing (ICICS), Macau, China, 8–10 December 2009; pp. 1–5. [Google Scholar]
- Cao, Y.; Fu, C. An image encryption scheme based on high dimension chaos system. In Proceedings of the International Conference on Intelligent Computation Technology and Automation, Changsha, China, 20–22 October 2008; Volume 2, pp. 104–108. [Google Scholar]
- Jeyamala, J.; GrpiGranesh, S.; Raman, S. An image encryption scheme based on one time pads—A chaotic approach. In Proceedings of the International Conference on Computing, Communication and Networking Technologies, Karur, India, 29–31 July 2010; pp. 1–6. [Google Scholar]
- Zhu, W.; Shen, Y. Encryption Algorithms Using Chaos and CAT Methodology. In Proceedings of the International Conference of Anti-Counterfeiting Security and Identification in Communication (ASID), Chengdu, China, 18–20 July 2010; pp. 20–23. [Google Scholar]
- Elnashaie, S.; Abashar, M. On the chaotic behavior of forced fluidized bed catalytic reactors. Chaos Solitons Fractals 1995, 5, 797–831. [Google Scholar] [CrossRef]
- Kocarev, L. Chaos-based cryptography: A brief overview. IEEE Circuits Syst. Mag. 2001, 1, 6–21. [Google Scholar] [CrossRef]
- Ponomarenko, V.; Prokhorov, M. Extracting information masked by the chaotic signal of a time-delay system. Phys. Rev. E 2002, 66, 1–7. [Google Scholar] [CrossRef]
- Sivakumar, T.; Venkatesan, R. Image Encryption Based on Pixel Shuffling and Random Key Stream. Int. J. Comput. Inf. Technol. 2014, 3, 1468–1476. [Google Scholar]
- Zhang, J.; Fang, D.; Ren, H. Image Encryption Algorithm Based on DNA Encoding and Chaotic Maps. Math. Probl. Eng. 2014, 2014, 917147. [Google Scholar] [CrossRef]
- Wang, W.; Tan, H.; Pang, Y.; Li, Z.; Ran, P.; Wu, J. Novel Encryption Algorithm Based on DWT and Multichaos Mapping. J. Sens. 2016, 2016, 2646205. [Google Scholar] [CrossRef]
- Zou, J.; Weng, T. A New Image Encryption Instant Communication Method Based On Matrix Transformation. In Advances in Intelligent Information Hiding and Multimedia Signal Processing. Smart Innovation, Systems and Technologies; Pan, J.S., Tsai, P.W., Huang, H.C., Eds.; Springer: Berlin, Germany, 2017; Volume 63, pp. 321–329. [Google Scholar]
- Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
- Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 2016, 78, 17–25. [Google Scholar] [CrossRef]
- Askar, S.S. Complex dynamic properties of Cournot duopoly games with convex and log-concave demand function. Oper. Res. Lett. 2014, 42, 85–90. [Google Scholar] [CrossRef]
- Kwok, H.; Tang, W. A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 2007, 32, 1518–1529. [Google Scholar] [CrossRef]
- Sobhy, M.; Shehata, A. Methods of attacking chaotic encryption and countermeasures. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Salt Lake City, UT, USA, 7–11 May 2001; Volume 2, pp. 1001–1004. [Google Scholar]
- Tao, X.; Liao, X.; Tang, G. A novel block cryptosystem based on iterating a chaotic map. Phys. Lett. A 2006, 349, 109–115. [Google Scholar]
- Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 2013, 222, 323–342. [Google Scholar] [CrossRef] [Green Version]
- Pareek, N.; Patidar, V.; Sud, K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
- Song, C.; Qiao, Y.; Zhang, X. An image encryption scheme based on new spatiotemporal chaos. Opt.—Int. J. Light Electron Opt. 2013, 124, 3329–3334. [Google Scholar] [CrossRef]
- Parvin, Z.; Seyedarabi, H.; Shamsi, M. A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools Appl. 2016, 75, 10631–10648. [Google Scholar] [CrossRef]
- Hanchinamani, G.; Kulakarni, L. Image Encryption Based on 2-D Zaslavskii Chaotic Map and Pseudo Hadmard Transform. Int. J. Hybrid Inf. Technol. 2014, 7, 185–200. [Google Scholar] [CrossRef]
- Rhouma, R.; Solak, E.; Belghith, S. Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 2010, 15, 1887–1892. [Google Scholar] [CrossRef]
Image | ||
---|---|---|
Plain Image | Cipher Image | |
Lena | ||
Cameraman | ||
Barbara |
Image | Theoretical Block Entropy | |||
---|---|---|---|---|
Global | Actual Block | |||
Entropy | Entropy | |||
lena (256 × 256) | 7.9981 | 7.1921 | Pass | Pass |
lena (512 × 512) | 7.9994 | 7.1862 | Pass | Pass |
barbara (256 × 256) | 7.9973 | 7.1801 | Pass | Pass |
airplane (512 × 512) | 7.9996 | 7.1817 | Pass | Pass |
boat (512 × 512) | 7.9995 | 7.1849 | Pass | Pass |
house (256 × 256) | 7.9984 | 7.1829 | Pass | Pass |
baboon (512 × 512) | 7.9995 | 7.1827 | Pass | Pass |
moon surface (256 × 256) | 7.9982 | 7.1819 | Pass | Pass |
resolution chart (256 × 256) | 7.9980 | 7.1812 | Pass | Pass |
Image | Plain Image | Cipher Image | |
---|---|---|---|
lena (128 × 128) | H | 0.8906 | −0.0102 |
V | 0.9518 | −0.0230 | |
D | 0.8512 | 0.0119 | |
lena (256 × 256) | H | 0.9351 | 0.0005 |
V | 0.9692 | 0.0017 | |
D | 0.9181 | −0.0025 | |
lena (512 × 512) | H | 0.9659 | −0.0091 |
V | 0.9837 | −0.0198 | |
D | 0.9552 | −0.0062 | |
barbara (256 × 256) | H | 0.8105 | −0.0088 |
V | 0.8797 | −0.0179 | |
D | 0.8335 | −0.0054 | |
airplane (512 × 512) | H | 0.9566 | 0.0096 |
V | 0.9600 | 0.0053 | |
D | 0.9237 | 0.0063 | |
boat (512 × 512) | H | 0.9385 | −0.0025 |
V | 0.9669 | 0.0186 | |
D | 0.9225 | −0.0111 | |
house (256 × 256) | H | 0.9812 | 0.0003 |
V | 0.9660 | −0.0178 | |
D | 0.9402 | 0.0050 | |
baboon (512 × 512) | H | 0.9121 | 0.0110 |
V | 0.8634 | 0.0019 | |
D | 0.8282 | 0.0118 | |
moon surface (256 × 256) | H | 0.8859 | −0.0026 |
V | 0.9316 | 0.0100 | |
D | 0.8988 | −0.0029 | |
resolution chart (256 × 256) | H | 0.8828 | 0.0007 |
V | 0.8793 | 0.0106 | |
D | 0.7524 | 0.0159 |
Image | Cipher Image | |||||||
---|---|---|---|---|---|---|---|---|
Proposed | [6] | [1] | [21] | [22] | ||||
Case I | Case II | Case III | ||||||
H | 0.0005 | 0.0122 | 0.0075 | −0.0038 | 0.0077 | - | −0.0230 | |
lena | V | 0.0017 | −0.0456 | −0.0079 | 0.0093 | 0.0168 | - | 0.0019 |
() | D | −0.0025 | −0.0188 | −0.0093 | −0.0189 | 0.0104 | - | −0.0034 |
Cipher Algorithm | ||
---|---|---|
Theoretical expected value | ||
Proposed (lena) | ||
Proposed (barbara) | ||
Proposed (house) | ||
[1] (lena) | ||
[21] (lena) | ||
[22] (lena) |
Noise | MSE | MSE | PSNR | PSNR |
---|---|---|---|---|
(Our Algorithm) | [30] | (Our Algorithm) | [30] | |
Gaussian noise with variance = 0.01 and mean = 0 | 2321.4 | 4410.1 | 14.5 | 11.7 |
Gaussian noise with variance = 0.1 and mean = 0 | 5201.2 | 5631.4 | 11.0 | 10.6 |
Salt and pepper noise with density 0.05 | 437.9 | 869.9 | 21.7 | 18.7 |
Salt and pepper noise with density 0.1 | 893.1 | 1829.6 | 18.6 | 15.5 |
Image | Contrast | |
---|---|---|
Plain Image | Cipher Image | |
lena () | 0.3563 | 10.6201 |
house () | 0.1741 | 10.5431 |
barbara () | 0.9463 | 10.6986 |
Image | Contrast | |||||||
---|---|---|---|---|---|---|---|---|
Cipher Image | ||||||||
Plain | Proposed | [6] | [21] | [22] | [1] | |||
Image | Algorithm | Case I | Case II | Case III | ||||
lena | 0.3563 | 10.6201 | 10.1655 | 10.3909 | 10.3971 | 10.5034 | 10.4723 | 10.4767 |
Image | GVD Value |
---|---|
lena | |
barbara | |
house | |
moon surface | |
resolution chart |
Image | PSNR Value |
---|---|
lena | |
barbara | |
house | |
moon surface | |
resolution chart |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Askar, S.S.; Karawia, A.A.; Al-Khedhairi, A.; Al-Ammar, F.S. An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy 2019, 21, 44. https://doi.org/10.3390/e21010044
Askar SS, Karawia AA, Al-Khedhairi A, Al-Ammar FS. An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy. 2019; 21(1):44. https://doi.org/10.3390/e21010044
Chicago/Turabian StyleAskar, Sameh S., Abdel A. Karawia, Abdulrahman Al-Khedhairi, and Fatemah S. Al-Ammar. 2019. "An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps" Entropy 21, no. 1: 44. https://doi.org/10.3390/e21010044
APA StyleAskar, S. S., Karawia, A. A., Al-Khedhairi, A., & Al-Ammar, F. S. (2019). An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. Entropy, 21(1), 44. https://doi.org/10.3390/e21010044