1
|
Wang X, Liu C, Jiang D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.06.032] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/28/2023]
|
2
|
Yan W, Jiang Z, Huang X, Ding Q. A Three-Dimensional Infinite Collapse Map with Image Encryption. ENTROPY 2021; 23:e23091221. [PMID: 34573846 PMCID: PMC8472400 DOI: 10.3390/e23091221] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/18/2021] [Revised: 09/12/2021] [Accepted: 09/13/2021] [Indexed: 11/16/2022]
Abstract
Chaos is considered as a natural candidate for encryption systems owing to its sensitivity to initial values and unpredictability of its orbit. However, some encryption schemes based on low-dimensional chaotic systems exhibit various security defects due to their relatively simple dynamic characteristics. In order to enhance the dynamic behaviors of chaotic maps, a novel 3D infinite collapse map (3D-ICM) is proposed, and the performance of the chaotic system is analyzed from three aspects: a phase diagram, the Lyapunov exponent, and Sample Entropy. The results show that the chaotic system has complex chaotic behavior and high complexity. Furthermore, an image encryption scheme based on 3D-ICM is presented, whose security analysis indicates that the proposed image encryption scheme can resist violent attacks, correlation analysis, and differential attacks, so it has a higher security level.
Collapse
|
3
|
Abstract
In this paper, a method to enhance the dynamic characteristics of one-dimension (1D) chaotic maps is first presented. Linear combinations and nonlinear transform based on existing chaotic systems (LNECS) are introduced. Then, a numerical chaotic map (LCLS), based on Logistic map and Sine map, is given. Through the analysis of a bifurcation diagram, Lyapunov exponent (LE), and Sample entropy (SE), we can see that CLS has overcome the shortcomings of a low-dimensional chaotic system and can be used in the field of cryptology. In addition, the construction of eight functions is designed to obtain an S-box. Finally, five security criteria of the S-box are shown, which indicate the S-box based on the proposed in this paper has strong encryption characteristics. The research of this paper is helpful for the development of cryptography study such as dynamic construction methods based on chaotic systems.
Collapse
|
4
|
Li T, Zhang D. Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion. ENTROPY 2021; 23:e23050510. [PMID: 33922594 PMCID: PMC8146381 DOI: 10.3390/e23050510] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/19/2021] [Revised: 04/21/2021] [Accepted: 04/22/2021] [Indexed: 11/16/2022]
Abstract
Image security is a hot topic in the era of Internet and big data. Hyperchaotic image encryption, which can effectively prevent unauthorized users from accessing image content, has become more and more popular in the community of image security. In general, such approaches conduct encryption on pixel-level, bit-level, DNA-level data or their combinations, lacking diversity of processed data levels and limiting security. This paper proposes a novel hyperchaotic image encryption scheme via multiple bit permutation and diffusion, namely MBPD, to cope with this issue. Specifically, a four-dimensional hyperchaotic system with three positive Lyapunov exponents is firstly proposed. Second, a hyperchaotic sequence is generated from the proposed hyperchaotic system for consequent encryption operations. Third, multiple bit permutation and diffusion (permutation and/or diffusion can be conducted with 1-8 or more bits) determined by the hyperchaotic sequence is designed. Finally, the proposed MBPD is applied to image encryption. We conduct extensive experiments on a couple of public test images to validate the proposed MBPD. The results verify that the MBPD can effectively resist different types of attacks and has better performance than the compared popular encryption methods.
Collapse
|
5
|
Janardhanan SV, Sanjeeva P. Bogdanov Map-based Permuted Double Image Encryption. AN ACAD BRAS CIENC 2020; 92:e20181207. [PMID: 32785426 DOI: 10.1590/0001-3765202020181207] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/31/2017] [Accepted: 03/05/2019] [Indexed: 11/22/2022] Open
Abstract
Chaos-based image encryption schemes shuffle the position of the pixels (confuse), change their values (diffuse), to camouflage the identity of the original image. In this paper, a symmetric image cryptosystem based on permutation is proposed. Permutation, used both to change the position of the pixel and modify its value, is undertaken using the Bogdanov map. First, the input image is permuted using the Bogdanov map so that the pixel positions are changed. Thereafter, the resultant scrambled image is sliced into bit-planes which are again separately subjected to the Bogdanov map. The encrypted image is constructed by encrypting the scrambled bit-planes with the key generated using dyadic transform. The experimental results exhibited random behavior in the distribution of the pixel values of the encrypted image. The cryptosystem is simple and fast, as it is permutation-based and, secure, it may be used in real-time transmission.
Collapse
Affiliation(s)
- Subashini V Janardhanan
- Department of Computer Science and Engineering, Jerusalem College of Engineering, Tamil Nadu, India
| | - Poornachandra Sanjeeva
- Department of Electronics and Communication Engineering, Excel Engineering College, Tamil Nadu, India
| |
Collapse
|
6
|
Nepomuceno EG, Nardo LG, Arias-Garcia J, Butusov DN, Tutueva A. Image encryption based on the pseudo-orbits from 1D chaotic map. CHAOS (WOODBURY, N.Y.) 2019; 29:061101. [PMID: 31266342 DOI: 10.1063/1.5099261] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/08/2019] [Accepted: 05/15/2019] [Indexed: 06/09/2023]
Abstract
Chaotic systems have been extensively applied in image encryption as a source of randomness. However, dynamical degradation has been pointed out as an important limitation of this procedure. To overcome this limitation, this paper presents a novel image encryption scheme based on the pseudo-orbits of 1D chaotic maps. We use the difference of two pseudo-orbits to generate a random sequence. The generated sequence has been successful in all NIST tests, which implies it has adequate randomness to be employed in encryption process. Confusion and diffusion requirements are also effectively implemented. The usual low key space of 1D maps has been improved by a novelty procedure based on multiple perturbations in the transient time. A factor using the plain image is one of the perturbation conditions, which ensures a new and distinct secret key for each image to be encrypted. The proposed encryption scheme has been efficaciously verified using the Lena, Baboon, and Barbara test images.
Collapse
Affiliation(s)
- Erivelton G Nepomuceno
- Control and Modelling Group (GCOM), Department of Electrical Engineering, Federal University of São João del-Rei, São João del-Rei, MG 36307-352, Brazil
| | - Lucas G Nardo
- Control and Modelling Group (GCOM), Department of Electrical Engineering, Federal University of São João del-Rei, São João del-Rei, MG 36307-352, Brazil
| | - Janier Arias-Garcia
- Department of Electronic Engineering, Federal University of Minas Gerais, Belo Horizonte, MG 31270-901, Brazil
| | - Denis N Butusov
- Youth Research Institute, Saint Petersburg Electrotechnical University "LETI," 5, Professora Popova st., 197376 Saint Petersburg, Russia
| | - Aleksandra Tutueva
- Department of Computer-Aided Design, Saint Petersburg Electrotechnical University "LETI," 5, Professora Popova st., 197376 Saint Petersburg, Russia
| |
Collapse
|
7
|
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019. [DOI: 10.1016/j.jisa.2019.02.011] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|
8
|
Kumar S, Kumar M, Budhiraja R, Das M, Singh S. A cryptographic model for better information security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.10.011] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
|
9
|
Ismail SM, Said LA, Radwan AG, Madian AH, Abu-Elyazeed MF. Generalized double-humped logistic map-based medical image encryption. J Adv Res 2018; 10:85-98. [PMID: 30034869 PMCID: PMC6052686 DOI: 10.1016/j.jare.2018.01.009] [Citation(s) in RCA: 57] [Impact Index Per Article: 8.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/26/2017] [Revised: 01/15/2018] [Accepted: 01/24/2018] [Indexed: 11/11/2022] Open
Abstract
This paper presents the design of the generalized Double Humped (DH) logistic map, used for pseudo-random number key generation (PRNG). The generalized parameter added to the map provides more control on the map chaotic range. A new special map with a zooming effect of the bifurcation diagram is obtained by manipulating the generalization parameter value. The dynamic behavior of the generalized map is analyzed, including the study of the fixed points and stability ranges, Lyapunov exponent, and the complete bifurcation diagram. The option of designing any specific map is made possible through changing the general parameter increasing the randomness and controllability of the map. An image encryption algorithm is introduced based on pseudo-random sequence generation using the proposed generalized DH map offering secure communication transfer of medical MRI and X-ray images. Security analyses are carried out to consolidate system efficiency including: key sensitivity and key-space analyses, histogram analysis, correlation coefficients, MAE, NPCR and UACI calculations. System robustness against noise attacks has been proved along with the NIST test ensuring the system efficiency. A comparison between the proposed system with respect to previous works is presented.
Collapse
Affiliation(s)
- Samar M Ismail
- Faculty of IET, German University in Cairo (GUC), Cairo 11865, Egypt
| | - Lobna A Said
- NISC Research Center, Nile University, Cairo 12588, Egypt
| | - Ahmed G Radwan
- Department of Engineering Mathematics and Physics, Cairo University, Cairo 12613, Egypt.,NISC Research Center, Nile University, Cairo 12588, Egypt
| | - Ahmed H Madian
- NISC Research Center, Nile University, Cairo 12588, Egypt.,Radiation Engineering Department, NCRRT, Egyptian Atomic Energy Authority, 29 Nasr City, Cairo, Egypt
| | - Mohamed F Abu-Elyazeed
- Electronics and Communication Engineering Department, Cairo University, Cairo 12613, Egypt
| |
Collapse
|
10
|
Elkady MM, Elnaby MMA, Hussein AH, Kader HMA. Chaotic Based Technique for Partial Image Encryption. 2016 26TH INTERNATIONAL CONFERENCE ON COMPUTER THEORY AND APPLICATIONS (ICCTA) 2016. [DOI: 10.1109/iccta40200.2016.9512943] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
|
11
|
Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review. J Adv Res 2015; 7:193-208. [PMID: 26966561 PMCID: PMC4767812 DOI: 10.1016/j.jare.2015.07.002] [Citation(s) in RCA: 65] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/27/2015] [Revised: 07/24/2015] [Accepted: 07/27/2015] [Indexed: 11/18/2022] Open
Abstract
This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold's cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper.
Collapse
Affiliation(s)
- Ahmed G. Radwan
- Engineering Mathematics Department, Faculty of Engineering, Cairo University, Giza 12613, Egypt
- Nanoelectronics Integrated Systems Center (NISC), Nile University, Cairo, Egypt
- Corresponding author. Tel.: +20 1224647440; fax: +20 235723486.
| | - Sherif H. AbdElHaleem
- Engineering Mathematics Department, Faculty of Engineering, Cairo University, Giza 12613, Egypt
| | - Salwa K. Abd-El-Hafiz
- Engineering Mathematics Department, Faculty of Engineering, Cairo University, Giza 12613, Egypt
| |
Collapse
|
12
|
|
13
|
|
14
|
Zhang YQ, Wang XY. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.156] [Citation(s) in RCA: 449] [Impact Index Per Article: 40.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
15
|
Zanin M, Pisarchik AN. Gray code permutation algorithm for high-dimensional data encryption. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.131] [Citation(s) in RCA: 31] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
16
|
Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF. An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 2013; 43:1000-10. [PMID: 23816172 DOI: 10.1016/j.compbiomed.2013.05.005] [Citation(s) in RCA: 130] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2011] [Revised: 05/06/2013] [Accepted: 05/07/2013] [Indexed: 11/15/2022]
Abstract
Recently, the increasing demand for telemedicine services has raised interest in the use of medical image protection technology. Conventional block ciphers are poorly suited to image protection due to the size of image data and increasing demand for real-time teleradiology and other online telehealth applications. To meet this challenge, this paper presents a novel chaos-based medical image encryption scheme. To address the efficiency problem encountered by many existing permutation-substitution type image ciphers, the proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm. As the pixel value mixing effect is contributed by both the improved permutation process and the original substitution process, the same level of security can be achieved in a fewer number of overall rounds. The results indicate that the proposed approach provides an efficient method for real-time secure medical image transmission over public networks.
Collapse
Affiliation(s)
- Chong Fu
- School of Information Science and Engineering, Northeastern University, Shenyang 110004, China.
| | | | | | | | | | | | | |
Collapse
|
17
|
Wang X, Zhang W, Guo W, Zhang J. Secure chaotic system with application to chaotic ciphers. Inf Sci (N Y) 2013. [DOI: 10.1016/j.ins.2012.09.037] [Citation(s) in RCA: 46] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
18
|
|
19
|
|
20
|
El-Latif AAA, Li L, Wang N, Niu X. Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. 2011 SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING 2011. [DOI: 10.1109/iihmsp.2011.67] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
|
21
|
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers. STUDIES IN COMPUTATIONAL INTELLIGENCE 2011. [DOI: 10.1007/978-3-642-20542-2_8] [Citation(s) in RCA: 41] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
|
22
|
|
23
|
|
24
|
Li C, Lo KT. Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2010 2010. [DOI: 10.1007/978-3-642-15702-8_55] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
|
25
|
Arroyo D, Alvarez G, Li S. Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis. ACTA ACUST UNITED AC 2009. [DOI: 10.3182/20090622-3-uk-3004.00034] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
|
26
|
Solak E, Cokal C. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]. CHAOS (WOODBURY, N.Y.) 2008; 18:038101. [PMID: 19045506 DOI: 10.1063/1.2966114] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
Abstract
In this paper, we comment on the chaotic encryption algorithm proposed by A. N. Pisarchik et al. [Chaos 16, 033118 (2006)]. We demonstrate that the algorithm is not invertible. We suggest simple modifications that can remedy some of the problems we identified.
Collapse
Affiliation(s)
- Ercan Solak
- Department of Computer Science and Engineering, Isik University, Istanbul TR 34980, Turkey.
| | | |
Collapse
|
27
|
Arroyo D, Rhouma R, Alvarez G, Li S, Fernandez V. On the security of a new image encryption scheme based on chaotic map lattices. CHAOS (WOODBURY, N.Y.) 2008; 18:033112. [PMID: 19045450 DOI: 10.1063/1.2959102] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
Abstract
This paper reports a detailed cryptanalysis of a recently proposed encryption scheme based on the logistic map [A. Pisarchik et al., Chaos 16, 033118 (2006)]. Some problems are emphasized concerning the key space definition and the implementation of the cryptosystem using floating-point operations. It is also shown how it is possible to reduce considerably the key space through a ciphertext-only attack. Moreover, a timing attack allows for the estimation of part of the key due to the existent relationship between this part of the key and the encryption/decryption time. As a result, the main features of the cryptosystem do not satisfy the demands of secure communications. Some hints are offered to improve the cryptosystem under study according to those requirements.
Collapse
Affiliation(s)
- David Arroyo
- Instituto de Física Aplicada, Consejo Superior de Investigaciones Científicas, Serrano 144-28006 Madrid, Spain.
| | | | | | | | | |
Collapse
|