Designing 1D Chaotic Maps for Fast Chaotic Image Encryption
Abstract
:1. Introduction
- A new method to improve 1D chaotic maps is designed to overcome the problems of 1D chaotic maps.
- A new key generation scheme is designed to update the initial keys according to information of plaintext image, and a new key expansion method is used to reduce the number of chaotic map iterations.
- In the diffusion phase, not only is the value of pixel modified but it is also shifted based on the location value of pixels and chaotic sequences.
- The proposed system not only provides a high degree of security but also ensures a low encryption time and a simple computational process.
2. Related Work
3. D Chaotic Map
3.1. Logistic Map
- The sequence of the Logistic map can be chaotic only when parameter in the range of [3.57, 4.0], which has been verified by the negative values in the curve of LE diagram that is shown in Figure 2a.
- Even in the range of ∈ [3.57, 4.0], there are values that result in no chaotic behaviours in the Logistic map. This has been verified by the blank area in the diagram of the bifurcation that is shown in Figure 1a.
3.2. Quadratic Map
4. New Chaotic Maps
4.1. System Designing
4.2. System Verified
4.2.1. 1D-ILM
4.2.2. 1D-IQM
4.2.3. Application to Other Maps
4.3. Performance Evaluation
4.3.1. Phase Diagram of Chaotic Map
4.3.2. Approximate Entropy (Complexity)
4.3.3. Map Sensitivity
- The chaotic map is iterated 100 times to form the first chaotic sequence.
- The chaotic map is re-iterated after tiny changes to one of its parameters to form the second sequence.
- The trajectories of the two generated sequences are compared.
4.3.4. Sequence Uniformity
5. Image Encryption System Based on 1D-ILM and 1D-IQM
5.1. Key Generation Scheme
5.2. Permutation Phase
5.3. Diffusion Phase
5.4. Extended to Colour Images
6. Performance Analysis
6.1. Statistical Analysis
6.1.1. Histogram Analysis
6.1.2. Adjacent Pixels Correlation
6.1.3. Correlations between Original and Encrypted Image
6.1.4. Information Entropy (IE)
6.2. Key Analysis
6.2.1. Key Space
6.2.2. Key Sensitivity
- Changing the key’s value throughout the encryption process causes a significant alteration to the encrypted image. The is tested in original secret keys. The results of the test following the slight change of by 10−15 are observed in Figure 14. The remaining secret keys are the same as above. Based on the results, the encrypted image undergoes a dramatic change in the case where the individual key has been changed 10−15. From such results, the proposed method has an efficient sensitivity of the encryption key.
- The slight change of the key value throughout the decryption process will have a considerable difference in the decrypted image. The test results in the case where the decryption key differs from the key of the encryption by 10−15 may be observed in Figure 15. Here, a considerable difference is seen between correctly and incorrectly decrypted images in the case where the decryption key differs from the key of encryption by 10−15. The accurately decrypted image in Figure 15d restores the original image successfully, while the inaccurately decrypted image in Figure 15c does not recognise any information compared to the original image. From this result, the proposed scheme has sufficient key sensitivity.
6.3. Analysis of the Permutation Performance
6.4. Diffusion Performance Analysis
6.4.1. Differential Attack Analysis
6.4.2. Plaintext Attacks Analysis
6.4.3. Avalanche Criterion (AC)
6.5. Noise and Data Loss Attacks Analysis
6.5.1. Noise Attack Analysis
6.5.2. Data Loss Attack Analysis
6.6. The Quality of Decryption
6.7. Execution Time
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhu, H.; Zhao, C.; Zhang, X. A novel image encryption–compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. Image Commun. 2013, 28, 670–680. [Google Scholar] [CrossRef]
- Belazi, A.; Khan, M.; El-Latif, A.A.; Belghith, S. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dyn. 2017, 87, 337–361. [Google Scholar] [CrossRef]
- Zhang, Y.; Xiao, D.; Wen, W.; Wong, K.-W. On the security of symmetric ciphers based on DNA coding. Inf. Sci. 2014, 289, 254–261. [Google Scholar] [CrossRef]
- Huang, X.; Ye, G. An image encryption algorithm based on irregular wave representation. Multimed. Tools Appl. 2017, 77, 2611–2628. [Google Scholar] [CrossRef]
- Li, Y.; Song, B.; Cao, R.; Zhang, Y.; Qin, H. Image Encryption Based on Compressive Sensing and Scrambled Index for Secure Multimedia Transmission. ACM Trans. Multimed. Comput. Commun. Appl. 2016, 12, 1–22. [Google Scholar] [CrossRef]
- Panduranga, H.; Kumar, S.N. Kiran Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher. Eur. Phys. J. Spéc. Top. 2014, 223, 1663–1677. [Google Scholar] [CrossRef]
- Bao, L.; Zhou, Y.; Chen, C.L.P.; Liu, H. A new chaotic system for image encryption. In Proceedings of the 2012 International Conference on System Science and Engineering (ICSSE), Dalian, China, 30 June–2 July 2012; pp. 69–73. [Google Scholar]
- Kumar, R.R.; Kumar, M.B. A new chaotic image encryption using parametric switching-based permutation and diffusion. ICTACT J. Image Video Process. 2014, 4, 795–804. [Google Scholar]
- Liu, L.; Miao, S. An image encryption algorithm based on Baker map with varying parameter. Multimed. Tools Appl. 2017, 76, 16511–16527. [Google Scholar] [CrossRef]
- Sathishkumar, G.A.; Sriraam, D.N. Image encryption based on diffusion and multiple chaotic maps. arXiv 2011, arXiv:1103.3792. [Google Scholar] [CrossRef]
- Zhou, Y.; Bao, L.; Chen, C.L.P. A new 1D chaotic system for image encryption. Signal Process. 2014, 97, 172–182. [Google Scholar] [CrossRef]
- Ye, G. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit. Lett. 2010, 31, 347–354. [Google Scholar] [CrossRef]
- Zhang, W.; Zhu, Z.; Yu, H. A symmetric image encryption algorithm based on a coupled logistic–bernoulli map and cel-lular automata diffusion strategy. Entropy 2019, 21, 504. [Google Scholar] [CrossRef] [Green Version]
- Hua, Z.; Zhou, Y.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
- Lv-Chen, C.; Yu-Ling, L.; Sen-Hui, Q.; Jun-Xiu, L. A perturbation method to the tent map based on Lyapunov exponent and its application. Chin. Phys. B 2015, 24, 100501. [Google Scholar]
- Herbadji, D.; Derouiche, N.; Belmeguenai, A.; Herbadji, A.; Boumerdassi, S. A Tweakable Image Encryption Algorithm Using an Improved Logistic Chaotic Map. Trait. Signal 2019, 36, 407–417. [Google Scholar] [CrossRef]
- Song, C.-Y.; Qiao, Y.-L.; Zhang, X.-Z. An image encryption scheme based on new spatiotemporal chaos. Optik 2013, 124, 3329–3334. [Google Scholar] [CrossRef]
- Huang, X.; Liu, L.; Li, X.; Yu, M.; Wu, Z. A New Two-Dimensional Mutual Coupled Logistic Map and Its Application for Pseudorandom Number Generator. Math. Probl. Eng. 2019, 2019, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Zhang, T.; Li, S.; Ge, R.; Yuan, M.; Ma, Y. A Novel 1D Hybrid Chaotic Map-Based Image Compression and Encryption Using Compressed Sensing and Fibonacci-Lucas Transform. Math. Probl. Eng. 2016, 2016, 1–15. [Google Scholar] [CrossRef] [Green Version]
- Mansouri, A.; Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryp-tion scheme. Inf. Sci. 2020, 520, 46–62. [Google Scholar] [CrossRef]
- Niyat, A.Y.; Moattar, M.H.; Torshiz, M.N. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 2017, 90, 225–237. [Google Scholar] [CrossRef]
- Hua, Z.; Jin, F.; Xu, B.; Huang, H. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 2018, 149, 148–161. [Google Scholar] [CrossRef]
- Shahna, K.U.; Mohamed, A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 2020, 90, 106162. [Google Scholar]
- Masood, F.; Driss, M.; Boulila, W.; Ahmad, J.; Rehman, S.U.; Jan, S.U.; Qayyum, A.; Buchanan, W.J. A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations. Wirel. Pers. Commun. 2021, 1–28. [Google Scholar] [CrossRef]
- Qayyum, A.; Ahmad, J.; Boulila, W.; Rubaiee, S.; Masood, F.; Khan, F.; Buchanan, W.J. Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access 2020, 8, 140876–140895. [Google Scholar] [CrossRef]
- Herbadji, D.; Belmeguenai, A.; Derouiche, N.; Liu, H. Colour image encryption scheme based on enhanced quadratic cha-otic map. IET Image Process. 2019, 14, 40–52. [Google Scholar] [CrossRef]
- Pak, C.; An, K.; Jang, P.; Kim, J.; Kim, S. A novel bit-level color image encryption using improved 1D chaotic map. Multimedia Tools Appl. 2018, 78, 12027–12042. [Google Scholar] [CrossRef]
- Ge, R.; Yang, G.; Wu, J.; Chen, Y.; Coatrieux, G.; Luo, L. A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process. IEEE Access 2019, 7, 99470–99480. [Google Scholar] [CrossRef]
- Huang, L.-L.; Wang, S.-M.; Xiang, J.-H. A Tweak-Cube Color Image Encryption Scheme Jointly Manipulated by Chaos and Hyper-Chaos. Appl. Sci. 2019, 9, 4854. [Google Scholar] [CrossRef] [Green Version]
- Pak, C.; Huang, L. A new color image encryption using combination of the 1D chaotic map. Signal Process. 2017, 138, 129–137. [Google Scholar] [CrossRef]
- Yavuz, E.; Yazıcı, R.; Kasapbaşı, M.C.; Yamaç, E. A chaos-based image encryption algorithm with simple logical functions. Comput. Electr. Eng. 2016, 54, 471–483. [Google Scholar] [CrossRef]
- Wang, X.; Wang, Q.; Zhang, Y. A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 2015, 79, 1141–1149. [Google Scholar] [CrossRef]
- Liu, W.; Sun, K.; Zhu, C. A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 2016, 84, 26–36. [Google Scholar] [CrossRef]
- Hosny, K.; Kamal, S.; Darwish, M.; Papakostas, G. New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix. Electronics 2021, 10, 1066. [Google Scholar] [CrossRef]
- Liu, L.; Lei, Y.; Wang, D. A Fast Chaotic Image Encryption Scheme with Simultaneous Permutation-Diffusion Operation. IEEE Access 2020, 8, 27361–27374. [Google Scholar] [CrossRef]
- Ding, L.; Ding, Q. A Novel Image Encryption Scheme Based on 2D Fractional Chaotic Map, DWT and 4D Hyper-chaos. Electronics 2020, 9, 1280. [Google Scholar] [CrossRef]
- Wei, D.; Jiang, M. A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik 2021, 238, 166748. [Google Scholar] [CrossRef]
- Pincus, S. Approximate entropy (ApEn) as a complexity measure. Chaos: Interdiscip. J. Nonlinear Sci. 1995, 5, 110–117. [Google Scholar] [CrossRef]
- Wang, C.; Ding, Q. A Class of Quadratic Polynomial Chaotic Maps and Their Fixed Points Analysis. Entropy 2019, 21, 658. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Li, R.; Liu, Q.; Liu, L. Novel image encryption algorithm based on improved logistic map. IET Image Process. 2019, 13, 125–134. [Google Scholar] [CrossRef]
- Wang, X.; Liu, C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimedia Tools Appl. 2016, 76, 6229–6245. [Google Scholar] [CrossRef]
- Borujeni, S.E.; Eshghi, M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun. Syst. 2011, 52, 525–537. [Google Scholar] [CrossRef]
- Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 2008, 35, 408–419. [Google Scholar] [CrossRef]
- Luo, Y.; Ouyang, X.; Liu, J.; Cao, L. An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems. IEEE Access 2019, 7, 38507–38522. [Google Scholar] [CrossRef]
- Lu, Q.; Zhu, C.; Deng, X. An Efficient Image Encryption Scheme Based on the LSS Chaotic Map and Single S-Box. IEEE Access 2020, 8, 25664–25678. [Google Scholar] [CrossRef]
- Lee, W.-K.; Phan, R.C.-W.; Yap, W.-S.; Goi, B.-M. SPRING: A novel parallel chaos-based image encryption scheme. Nonlinear Dyn. 2018, 92, 575–593. [Google Scholar] [CrossRef]
- Zhu, C. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
- Li, C.; Lin, D.; Feng, B.; Lü, J.; Hao, F. Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 2018, 6, 75834–75842. [Google Scholar] [CrossRef]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
- Zhang, G.; Liu, Q. A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284, 2775–2780. [Google Scholar] [CrossRef]
- Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 2011, 1, 31–38. [Google Scholar]
- Mikhail, M.; Abouelseoud, Y.; Elkobrosy, G. Two-Phase Image Encryption Scheme Based on FFCT and Fractals. Secur. Commun. Netw. 2017, 2017, 1–13. [Google Scholar] [CrossRef]
- Zefreh, E.Z. An image encryption scheme based on a hybrid model of DNA computing, chaotic systems and hash functions. Multimedia Tools Appl. 2020, 79, 24993–25022. [Google Scholar] [CrossRef]
- Wang, X.; Teng, L.; Qin, X. A novel colour image encryption algorithm based on chaos. Signal Process. 2012, 92, 1101–1108. [Google Scholar] [CrossRef]
- Zhu, C.; Wang, G.; Sun, K. Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps. Entropy 2018, 20, 843. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Norouzi, B.; Seyedzadeh, S.M.; Mirzakuchaki, S.; Mosavi, M.R. A novel image encryption based on hash function with only two-round diffusion process. Multimed. Syst. 2014, 20, 45–64. [Google Scholar] [CrossRef]
Image | Plain Image | Encrypted Image |
---|---|---|
Lena | 114,486.457 | 233.779 |
Boat | 383,969.687 | 239.060 |
Couple | 298,865.244 | 261.164 |
Tank | 957,952.570 | 259.609 |
Elaine | 140,667.152 | 237.857 |
Stream and bridge | 1,185,618.347 | 245.048 |
Man | 709,340.680 | 293.547 |
Airport | 1,974,776.136 | 278.427 |
Chemical plant | 50,326.4453 | 246.375 |
Clock | 282,061.562 | 255.359 |
Average | 609,806.400 | 255.022 |
Image | Plaintext Image | Encrypted Image | 2D-CC | ||||
---|---|---|---|---|---|---|---|
Horizontal | Vertical | Diagonal | Horizontal | Vertical | Diagonal | ||
Lena | 0.97380 | 0.98564 | 0.96039 | −0.000805 | −0.000776 | 0.003297 | 0.001463 |
Boat | 0.93812 | 0.97131 | 0.92216 | 0.001051 | 0.000723 | 0.000096 | 0.002264 |
Couple | 0.93707 | 0.89264 | 0.85572 | −0.00168 | 0.001695 | −0.000275 | 0.001045 |
Tank | 0.96566 | 0.93040 | 0.91676 | 0.000832 | 0.000673 | −0.003580 | −0.003580 |
Elaine | 0.97565 | 0.97302 | 0.96925 | 0.000989 | −0.001817 | −0.001210 | −0.000595 |
Stream and bridge | 0.94041 | 0.92751 | 0.89749 | 0.000407 | −0.003383 | 0.001103 | −0.004226 |
Man | 0.97745 | 0.98127 | 0.96715 | 0.001012 | −0.000191 | 0.001548 | −0.000125 |
Airport | 0.90993 | 0.90337 | 0.85905 | −0.001955 | −0.000400 | −0.000430 | 0.000143 |
Chemical plant | 0.94662 | 0.89841 | 0.85291 | 0.0019064 | −0.000793 | −0.001858 | −0.005777 |
Clock | 0.95649 | 0.97408 | 0.93893 | 0.0080607 | −0.001130 | 0.000842 | −0.004517 |
Average | 0.95212 | 0.943765 | 0.913981 | 0.000982 | −0.00054 | −0.000046 | −0.00139 |
Algorithm | Proposed | Ref. [28] | Ref. [44] | Ref. [45] | Ref. [46] |
---|---|---|---|---|---|
Horizontal | −0.000805 | 0.0054 | 0.0019 | −0.0056 | −0.0022 |
Vertical | −0.000776 | 0.0064 | −0.0024 | 0.0006 | 0.0015 |
Diagonal | 0.003297 | 0.0046 | 0.0011 | 0.0018 | 0.0025 |
Image | IE |
---|---|
Lena | 7.9994 |
Boat | 7.9993 |
Couple | 7.9993 |
Tank | 7.9993 |
Elaine | 7.9993 |
Stream and bridge | 7.9993 |
Man | 7.9998 |
Airport | 7.9998 |
Chemical plant | 7.9973 |
Clock | 7.9972 |
Average | 7.9990 |
Image | NPCR | UACI | MAE |
---|---|---|---|
Lena | 99.6114% | 33.5499% | 85.5523 |
Boat | 99.6151% | 33.5107% | 85.4523 |
Couple | 99.5934% | 33.4131% | 85.2035 |
Tank | 99.6063% | 33.5461% | 85.5426 |
Elaine | 99.6155% | 33.4066% | 85.1868 |
Stream and bridge | 99.6170% | 33.4287% | 85.2432 |
Man | 99.6111% | 33.4590% | 85.3205 |
Airport | 99.6066% | 33.4751% | 85.3615 |
Chemical plant | 99.6124% | 33.4435% | 85.2808 |
Clock | 99.6155% | 33.4625% | 85.3295 |
Average | 99.6114% | 33.46952% | 85.3473 |
Algorithm | Proposed | Ref. [28] | Ref. [44] | Ref. [46] |
---|---|---|---|---|
NPCR | 99.61% | 99.62% | 99.61% | 99.62% |
UACI | 33.54% | 33.51% | 33.46% | 33.51% |
Image | Correlation | Information Entropy (IE) | Differential Attack | ||||
---|---|---|---|---|---|---|---|
Horizontal | Vertical | Diagonal | NPCR | UACI | MAE | ||
White | 0.003161 | −0.000333 | −0.002679 | 7.9992 | 99.6136 | 33.4224 | 85.2272 |
Black | 0.001546 | 0.001025 | −0.000541 | 7.9994 | 99.6143 | 33.4613 | 85.3262 |
Attack | Noise Attack | Data Lose Attack | ||||
---|---|---|---|---|---|---|
1% Noise | 5% Noise | 10% Noise | 1/16 Crop | 1/4 Crop | 1/2 Crop | |
MSE | 10.5007 | 43.0918 | 72.1406 | 17.2808 | 52.2921 | 59.7997 |
PSNR (dB) | 19.8831 | 13.7393 | 11.4837 | 17.6868 | 12.8504 | 12.2726 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Khairullah, M.K.; Alkahtani, A.A.; Bin Baharuddin, M.Z.; Al-Jubari, A.M. Designing 1D Chaotic Maps for Fast Chaotic Image Encryption. Electronics 2021, 10, 2116. https://doi.org/10.3390/electronics10172116
Khairullah MK, Alkahtani AA, Bin Baharuddin MZ, Al-Jubari AM. Designing 1D Chaotic Maps for Fast Chaotic Image Encryption. Electronics. 2021; 10(17):2116. https://doi.org/10.3390/electronics10172116
Chicago/Turabian StyleKhairullah, Mustafa Kamil, Ammar Ahmed Alkahtani, Mohd Zafri Bin Baharuddin, and Ammar Mohammed Al-Jubari. 2021. "Designing 1D Chaotic Maps for Fast Chaotic Image Encryption" Electronics 10, no. 17: 2116. https://doi.org/10.3390/electronics10172116
APA StyleKhairullah, M. K., Alkahtani, A. A., Bin Baharuddin, M. Z., & Al-Jubari, A. M. (2021). Designing 1D Chaotic Maps for Fast Chaotic Image Encryption. Electronics, 10(17), 2116. https://doi.org/10.3390/electronics10172116