DOI QR코드

DOI QR Code

Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption

  • Verma, Om Prakash (Dept. of Information Technology, Delhi Technological University) ;
  • Nizam, Munazza (Dept. of Information Technology, Delhi Technological University) ;
  • Ahmad, Musheer (Dept. of Computer Engineering, JMI University)
  • Received : 2012.11.13
  • Accepted : 2013.05.12
  • Published : 2013.06.29

Abstract

Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.'s PCS method.

Keywords

References

  1. G. Chen, Y. Mao, C. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps", Chaos, Solitons & Fractal , Vol.21, Issue 3, 2004, pp.749-61. https://doi.org/10.1016/j.chaos.2003.12.022
  2. F. Chiaraluce, L. Ciccarelli, "A new chaotic algorithm for video encryption,"IEEE Transactions on Consumer Electronics, Vol.48, Issue 4, 2002, pp.838-44.
  3. R. Matthews, "On the derivation of a chaotic encryption algorithm", Cryptologia, Vol.13, No. 1, Jan 1989, pp.29-41. https://doi.org/10.1080/0161-118991863745
  4. L. Zhang, X. Liao, X. Wang, "An image encryption approach based on chaotic maps," Chaos Solitons Fractals, Vol.24, Issue 3, 2005, pp.759 -765. https://doi.org/10.1016/j.chaos.2004.09.035
  5. S. Yang, S. Sun, "A video encryption method based on chaotic maps in DCT domain", Progress in Natural Science; Vol.18, 2008, pp.1299-1304. https://doi.org/10.1016/j.pnsc.2008.05.009
  6. C. Fu, Z. Zhang, Y. Cao, "An improved image encryption algorithm based on chaotic maps,"Procedings of the 3rd Int. Conf. on Natural Computation, (ICNC 2007): Haikou, Vol.3, pp.189-193.
  7. K. Sakthidasan, B. V. K. Santhosh, "A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images", International Journal of Information and Education Technology, Vol.1, No. 2, 2011, pp.137-141.
  8. W. Li, N. Yu, "A Robust chaos based Image encryption scheme", IEEE International Conference on Multimedia and Expo: New York, 2009, pp.1034-1037.
  9. M. El-Sayed, A. El-Alfy; Khaled, Al-Utaibi, "An Encryption Scheme for Color Images Based on-Chaotic Maps and Genetic Operators", The Seventh International Conference on Networking and Services, Venice/Mestre, Italy, 2011, pp.92-97.
  10. M. S. Baptista, "Cryptography with chaos", Phys Lett A, Vol.240, Issue 1-2 , 1998, pp.50-54. https://doi.org/10.1016/S0375-9601(98)00086-3
  11. P. L. de Oliveira Luiz, and S. Marcelo, "Cryptography with chaotic mixing" Chaos, Solitons and Fractals , Vol.35, Issue 3, 2008, pp.466-471. https://doi.org/10.1016/j.chaos.2006.05.049
  12. H. Gao, Y. Zhang, S. Liang, D. Li, "A new chaotic algorithm for image encryption", Chaos, Solitons and Fractals, Vol.29, Issue 2, 2006, pp.393-399. https://doi.org/10.1016/j.chaos.2005.08.110
  13. Y. Zhai, S. Lin, Q. Zhang, "Improving Image Encryption Using Multi-chaotic Map", Workshop on Power Electronics and Intelligent Transportation System (PEITS): Guangzhou, 2008, pp.143-148.
  14. G. Xin, L. Fen-lin, L. Bin, W. Wei, C. Juan, "An Image Encryption Algorithm Based on Spatiotem-poral Chaos in DCT Domain", The 2nd International Conference on Information Management and Engineering(ICIME): Chengdu,2010, pp.267-270.
  15. H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen, Y. Y. Tuan, "Digital color image encoding and decoding using a novel chaotic random generator," Chaos, Solitons and Fractals, Vol.32, Issue 3, 2007, pp.1070-1080. https://doi.org/10.1016/j.chaos.2005.11.057
  16. K. Wang, W. Pei, L. Zou, A. Song, Z. He, "On the security of 3D Cat map based symmetric image encryption scheme,"Phys. Lett. A, Vol.343, Issue 6, 2005, pp.432-439. https://doi.org/10.1016/j.physleta.2005.05.040
  17. Z. H. Guan, F. Huang, W. Guan, "Chaos-based image encryption algorithm," Phys. Lett. A, Vol.346, Issue 1-3, 2005, pp.153-157. https://doi.org/10.1016/j.physleta.2005.08.006
  18. T. G. Gao, Z.Q. Chen, "A new image encryption algorithm based on hyper-chaos," Phys. Lett. A, Vol.372, Issue 4, 2005, pp.394-400.
  19. S. Lian, "Efficient image or video encryption based on spatiotemporal chaos system", Chaos Solitons Fractals, Vol.40, Issue 5, 2009, pp.2509-2519. https://doi.org/10.1016/j.chaos.2007.10.054
  20. R. Rhouma, S. Belghith, "Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem", Phys. Lett. A, Vol.372, Issue 36, 2008, pp.5790-5794. https://doi.org/10.1016/j.physleta.2008.07.042
  21. C. K. Huang, H. H. Nien, "Multi chaotic systems based pixel shuffle for image encryption," Optics Communications, Vol.282, Issue 11, 2009, pp.2123-2127. https://doi.org/10.1016/j.optcom.2009.02.044
  22. E. Solak, R. /Rhouma, S. Belghith, "Cryptanalysis of a multi-chaotic systems based image cryptosys-tem", Optics Communications, Vol.283, Issue 2, 2010, pp.232-236. https://doi.org/10.1016/j.optcom.2009.09.070
  23. M. Ahmad, O. Farooq, "A Multi-Level Blocks Scrambling Based Chaotic Image Cipher", Communi-cations in Computer and Information Science,Noida -India, Vol.94, Part 1, 2010, pp.171-182. https://doi.org/10.1007/978-3-642-14834-7_17
  24. Y. Wu, J. P. Noonan, S. Agaian, "NPCR and UACI Randomness Tests for Image Encryption",Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Tele-communications (JSAT), April Edition, 2011, pp.31-38.

Cited by

  1. Binary Image Data Hiding Using Matrix Encoding Technique in Sensors vol.9, pp.11, 2013, https://doi.org/10.1155/2013/340963
  2. Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map 2015, https://doi.org/10.3745/JIPS.02.0024
  3. Watermark with DSA signature using predictive coding vol.74, pp.14, 2015, https://doi.org/10.1007/s11042-013-1667-6
  4. An algorithm for the construction of substitution box for block ciphers based on projective general linear group vol.7, pp.3, 2017, https://doi.org/10.1063/1.4978264
  5. Logistic and Standard Coupled Mapping on Pre and Post Shuffled Images: A Method of Image Encryption vol.10, pp.1, 2016, https://doi.org/10.3923/ajsr.2017.10.23