A New One-Dimensional Compound Chaotic System and Its Application in High-Speed Image Encryption
Abstract
:1. Introduction
2. The Proposed New One-Dimensional Chaotic Map
2.1. Logistic Map (LM)
2.2. Tent Map (TM)
2.3. Logistic-Tent Map (LTM)
2.3.1. Boundedness of State Value Distribution of LTM System
2.3.2. Lyapunov Exponent and Bifurcation Diagram of LTM System
2.3.3. Approximate Entropy of LTM System
2.3.4. The Time-Series Diagram and Cobweb Graph of LTM System
2.3.5. NIST Statistical Test Analysis
Algorithm 1. An algorithm for converting real numbers into binary numbers. |
Intx = mod(floor(x × 1012),256); If Intx < 128 then bx = 1; Else bx = 0; End if |
3. The Proposed Image Encryption Scheme
3.1. The Encryption Process
3.1.1. Generate a Modified Chaotic Sequence
Algorithm2. Generate the modified chaotic sequences. |
Input: The number of rows M and columns N of the image to be encrypted, chaotic system parameters {x0, y0, a, b} and a positive integer N0. Output: Four sequences X, Y, I, J. |
3.1.2. Row-by-Row Encryption Processing
Algorithm 3. A row-by-row encryption algorithm that combines scrambling and substitution. |
Input: Image matrix to be encrypted P = {P(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}, x0, y0, a, b, C0 and N0. Output: Encrypted image matrix C = {C(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}. |
3.1.3. Column-by-Column Encryption Processing
Algorithm 4. A column-by-column encryption algorithm that combines scrambling and substitution. |
Input: Image matrix to be encrypted P = {P(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}, x0, y0, a, b, C0 and N0. Output: Encrypted image matrix C = {C(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}. |
3.2. Decryption Process
3.2.1. Generate a Modified Chaotic Sequence
3.2.2. Column-by-Column Decryption Processing
Algorithm 5. Column-by-column decryption algorithm. |
Input: Image matrix to be decrypted C = {C(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}, x0, y0, a, b, C0 and N0. Output: The decrypted image matrix P = {P(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}. |
3.2.3. Row-by-Row Decryption Processing
Algorithm6. Row-by-row decryption algorithm. |
Input: Image matrix to be decrypted C = {C(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}, x0, y0, a, b, C0 and N0. Output: The decrypted image matrix P = {P(i, j)|i = 1, 2, …, M; j = 1, 2, …, N}. |
4. Experimental Test and Security Analysis
4.1. Histogram Analysis
4.2. Correlation Analysis of Adjacent Pixels
4.3. Information Entropy Analysis
4.4. Sensitivity Analysis
4.5. Key Space Analysis
4.6. Encryption Speed Test
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Liang, H.; Zhang, G.; Hou, W.; Huang, P.; Liu, B.; Li, S. A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography. Appl. Sci. 2021, 11, 5691. [Google Scholar] [CrossRef]
- Li, Z.; Peng, C.; Tan, W.; Li, L. A Novel Chaos-Based Image Encryption Scheme by Using Randomly DNA Encode and Plaintext Related Permutation. Appl. Sci. 2020, 10, 7469. [Google Scholar] [CrossRef]
- El-Latif, A.A.A.; Abd-El-Atty, B.; Belazi, A.; Iliyasu, A.M. Efficient Chaos-Based Substitution-Box and Its Application to Image Encryption. Electronics 2021, 10, 1392. [Google Scholar] [CrossRef]
- Huang, L.-L.; Wang, S.-M.; Xiang, J.-H. A Tweak-Cube Color Image Encryption Scheme Jointly Manipulated by Chaos and Hyper-Chaos. Appl. Sci. 2019, 9, 4854. [Google Scholar] [CrossRef] [Green Version]
- Masood, F.; Ahmad, J.; Shah, S.A.; Jamal, S.S.; Hussain, I. A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map. Entropy 2020, 22, 274. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Moafimadani, S.S.; Chen, Y.; Tang, C. A New Algorithm for Medical Color Images Encryption Using Chaotic Systems. Entropy 2019, 21, 577. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Masood, F.; Driss, M.; Boulila, W.; Ahmad, J.; Rehman, S.U.; Jan, S.U.; Qayyum, A.; Buchanan, W.J. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 2021, 1–28. [Google Scholar] [CrossRef]
- Belazi, A.; Abd El-Latif, A.A.; Belghith, S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016, 128, 155–170. [Google Scholar] [CrossRef]
- Masood, F.; Boulila, W.; Ahmad, J.; Arshad; Sankar, S.; Rubaiee, S.; Buchanan, W.J. A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sens. 2020, 12, 1893. [Google Scholar] [CrossRef]
- May, R.M. Simple mathematical models with very complicated dynamics. Nature 1976, 261, 459–467. [Google Scholar] [CrossRef]
- Lambic, D. Security analysis and improvement of a block cipher with dynamic S-boxes based on tent map. Nonlinear Dynam. 2015, 79, 2531–2539. [Google Scholar] [CrossRef]
- Belazi, A.; El-Latif, A.A.A. A simple yet efficient S-box method based on chaotic sine map. Optik 2017, 130, 1438–1444. [Google Scholar] [CrossRef]
- Talhaoui, M.Z.; Wang, X.; Midoun, M.A. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. 2021, 37, 541–551. [Google Scholar] [CrossRef]
- Ponuma, R.; Amutha, R. Compressive sensing based image compression-encryption using Novel 1D-Chaotic map. Multimedia Tools Appl. 2018, 77, 19209–19234. [Google Scholar] [CrossRef]
- Talhaoui, M.Z.; Wang, X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf. Sci. 2021, 550, 13–26. [Google Scholar] [CrossRef]
- Zhu, S.; Wang, G.; Zhu, C. A Secure and Fast Image Encryption Scheme based on Double Chaotic S-Boxes. Entropy 2019, 21, 790. [Google Scholar] [CrossRef] [Green Version]
- Zhu, H.; Zhang, X.; Yu, H.; Zhao, C.; Zhu, Z. A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System. Entropy 2016, 18, 276. [Google Scholar] [CrossRef] [Green Version]
- Ramasamy, P.; Ranganathan, V.; Kadry, S.; Damaševičius, R.; Blažauskas, T. An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced logistic-tent map. Entropy 2019, 21, 656. [Google Scholar] [CrossRef] [Green Version]
- Gupta, M.; Gupta, K.K.; Khosravi, M.R.; Shukla, P.K.; Kautish, S.; Shankar, A. An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things. Wirel. Pers. Commun. 2021, 1–22. [Google Scholar] [CrossRef]
- Tong, X.J.; Wang, Z.; Zhang, M.; Liu, Y.; Xu, H.; Ma, J. An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dynam. 2015, 80, 1493–1508. [Google Scholar] [CrossRef]
- Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
- Dou, Y.; Li, M. Cryptanalysis of a New Color Image Encryption Using Combination of the 1D Chaotic Map. Appl. Sci. 2020, 10, 2187. [Google Scholar] [CrossRef] [Green Version]
- Zhu, C.; Wang, G.; Sun, K. Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps. Entropy 2018, 20, 843. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Hua, Z.; Zhou, Y. Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 2016, 339, 237–253. [Google Scholar] [CrossRef]
- Feng, W.; He, Y.; Li, H.; Li, C. Cryptanalysis and Improvement of the Image Encryption Scheme Based on 2D Logistic-Adjusted-Sine Map. IEEE Access 2019, 7, 12584–12597. [Google Scholar] [CrossRef]
- Wang, X.; Liu, C.; Zhang, H. An effective and fast image encryption algorithm based on Chaos and interweaving of ranks. Nonlinear Dynam. 2016, 84, 1595–1607. [Google Scholar] [CrossRef]
- Azimi, Z.; Ahadpour, S. Color image encryption based on DNA encoding and pair coupled chaotic maps. Multimed. Tools Appl. 2019, 79, 1727–1744. [Google Scholar] [CrossRef]
- Fath Allah, M.I.; Eid, M.M. Chaos based 3D color image encryption. Ain Shams Eng. J. 2019, 11, 67–75. [Google Scholar] [CrossRef]
- Malik, D.S.; Shah, T. Color multiple image encryption scheme based on 3D-chaotic maps. Math. Comput. Simul. 2020, 178, 646–666. [Google Scholar] [CrossRef]
- Hua, Z.; Yi, S.; Zhou, Y. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 2018, 144, 134–144. [Google Scholar] [CrossRef]
- Belazi, A.; Talha, M.; Kharbech, S.; Xiang, W. Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding. IEEE Access 2019, 7, 36667–36681. [Google Scholar] [CrossRef]
- Banu, S.A.; Amirtharajan, R. A robust medical image encryption in dual domain: Chaos-DNA-IWT combined approach. Med. Biol. Eng. Comput. 2020, 58, 1445–1458. [Google Scholar] [CrossRef]
- Yan, X.; Wang, X.; Xian, Y. Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed. Tools Appl. 2021, 80, 10949–10983. [Google Scholar] [CrossRef]
- Alawida, M.; Samsudin, A.; Sen Teh, J.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar] [CrossRef]
- Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
- Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [Google Scholar] [CrossRef]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
Statistical Test Name | Pass Rate | p-Value |
---|---|---|
Frequency | 990/1000 | 0.024356 |
Block Frequency | 989/1000 | 0.043087 |
Cumulative Sums (forward) | 988/1000 | 0.429923 |
Cumulative Sums (Reverse) | 991/1000 | 0.329850 |
Runs | 987/1000 | 0.856359 |
Longest Run | 990/1000 | 0.836048 |
Rank | 987/1000 | 0.530120 |
FFT | 991/1000 | 0.254411 |
NonOverlapping Template | 990/1000 | 0.515882 |
Overlapping Template | 991/1000 | 0.088762 |
Universal | 986/1000 | 0.366918 |
Approximate Entropy | 993/1000 | 0.936823 |
Random Excursions | 610/615 | 0.522378 |
Random Excursions Variant | 610/615 | 0.47474 |
Serial Test 1 | 995/1000 | 0.599693 |
Serial Test 2 | 992/1000 | 0.34565 |
Linear Complexity | 986/1000 | 0.408275 |
Symbol | Meaning | Property | Examples of Usage |
---|---|---|---|
P | Represents a matrix of an image to be enccrypted | Two-dimensional (2D) matrix | P(i, j) is an element in row i and column j. P(i, :) is a row vector consisting of all elements in row i. P(:, j) is a column vector consisting of all elements in column j. |
C | Represents a matrix of an image enccrypted | Two-dimensional (2D) matrix | Same as the above. |
S | A vector consisting of a row (or column) of pixels | One-dimensional (1D) vector | S = [s1,s2,…,sM]T (T means matrix transpose) or S = [s1,s2,…,sN]. |
X, Y | Sequences transformed from chaotic sequences | One-dimensional vector | X = [X1, X2,…, XM]T, Xi∊{0, 1,…, 255} Y = [Y1, Y2,…, YN], Yj∊{0, 1,…, 255} |
I, J | Vectors composed of element position index in 1D sequences | One-dimensional (1D) vector | I = [I1, I2,…, Ii,…, IM]T, Ii∊{1, 2,…, M} J = [J1, J2,…, Jj,…, JN], Jj∊{1, 2,…, N} |
M, N; i, j | M is number of pixel rows, N is number of pixel columns. i is row numbers, j is column numbers. | Scalar variable | [M, N] = size (P), i = 1, 2, …, M; j = 1, 2, …,N. |
Algorithm | Horizontal | Vertical | Diagonal |
---|---|---|---|
Plain image | 0.9401 | 0.9695 | 0.9180 |
Cipher image (Ours) | 0.0062 | −0.0001 | 0.0018 |
Cipher image [33] | −0.0016 | 0.0043 | −0.0026 |
Cipher image [34] | −0.0017 | −0.0084 | −0.0019 |
Cipher image [35] | 0.0010 | −0.0009 | 0.0009 |
Cipher image [36] | −0.0086 | −0.1020 | 0.0125 |
Images | Plain Image | Ours | Ref. [33] | Ref. [34] | Ref. [35] | Ref. [36] |
---|---|---|---|---|---|---|
Lena | 7.5683 | 7.9978 | 7.9970 | 7.9975 | 7.9977 | 7.9976 |
Baboon | 7.3385 | 7.9974 | / | 7.9971 | 7.9970 | / |
Peppers | 7.5251 | 7.9973 | 7.9971 | 7.9970 | 7.9973 | 7.9974 |
Cameraman | 7.0097 | 7.9971 | 7.9971 | / | 7.9969 | / |
Images | This Paper | Ref. [33] | Ref. [34] | Ref. [35] | Ref. [36] |
---|---|---|---|---|---|
Lena | 0.9961 | 0.9961 | 0.9962 | 0.9964 | 0.9941 |
Cameraman | 0.9961 | 0.9964 | / | / | / |
Peppers | 0.9961 | 0.9963 | 0.9962 | / | 0.9942 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhu, S.; Deng, X.; Zhang, W.; Zhu, C. A New One-Dimensional Compound Chaotic System and Its Application in High-Speed Image Encryption. Appl. Sci. 2021, 11, 11206. https://doi.org/10.3390/app112311206
Zhu S, Deng X, Zhang W, Zhu C. A New One-Dimensional Compound Chaotic System and Its Application in High-Speed Image Encryption. Applied Sciences. 2021; 11(23):11206. https://doi.org/10.3390/app112311206
Chicago/Turabian StyleZhu, Shenli, Xiaoheng Deng, Wendong Zhang, and Congxu Zhu. 2021. "A New One-Dimensional Compound Chaotic System and Its Application in High-Speed Image Encryption" Applied Sciences 11, no. 23: 11206. https://doi.org/10.3390/app112311206
APA StyleZhu, S., Deng, X., Zhang, W., & Zhu, C. (2021). A New One-Dimensional Compound Chaotic System and Its Application in High-Speed Image Encryption. Applied Sciences, 11(23), 11206. https://doi.org/10.3390/app112311206