Informatica logo


Login Register

  1. Home
  2. Issues
  3. Volume 31, Issue 4 (2020)
  4. Efficient Image Encryption Scheme Based ...

Informatica

Information Submit your article For Referees Help ATTENTION!
  • Article info
  • Full article
  • Related articles
  • Cited by
  • More
    Article info Full article Related articles Cited by

Efficient Image Encryption Scheme Based on 4-Dimensional Chaotic Maps
Volume 31, Issue 4 (2020), pp. 793–820
Ali Kanso   Mohammad Ghebleh   Abdullah Alazemi  

Authors

 
Placeholder
https://doi.org/10.15388/20-INFOR426
Pub. online: 24 September 2020      Type: Research Article      Open accessOpen Access

Received
1 February 2020
Accepted
1 August 2020
Published
24 September 2020

Abstract

This paper proposes a new family of 4-dimensional chaotic cat maps. This family is then used in the design of a novel block-based image encryption scheme. This scheme is composed of two independent phases, a robust light shuffling phase and a masking phase which operate on image-blocks. It utilizes measures of central tendency to mix blocks of the image at hand to enhance security against a number of cryptanalytic attacks. The mixing is designed so that while encryption is highly sensitive to the secret key and the input image, decryption is robust against noise and cropping of the cipher-image. Empirical results show high performance of the suggested scheme and its robustness against well-known cryptanalytic attacks. Furthermore, comparisons with existing image encryption methods are presented which demonstrate the superiority of the proposed scheme.

References

 
Alvarez, G., Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(08), 2129–2151.
 
Arnol’d, V.I., Avez, A. (1968). Ergodic Problems of Classical Mechanics. WA Benjamin.
 
Bassham, L.E. III., Rukhin, A.L., Soto, J., Nechvatal, J.R., Smid, M.E., Barker, E.B., Leigh, S.D., Levenson, M., Vangel, M., Banks, D.L. (2010). Sp 800-22 rev. 1a. A statistical test suite for random and pseudorandom number generators for cryptographic applications.
 
Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A. (2008). Chaotic cryptographic scheme based on composition maps. International Journal of Bifurcation and Chaos, 18(01), 251–261.
 
Cao, C., Sun, K., Liu, W. (2018). A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Processing, 143, 122–133.
 
Chai, X., Chen, Y., Broyde, L. (2017). A novel chaos-based image encryption algorithm using DNA sequence operations. Optics and Lasers in Engineering, 88, 197–213.
 
Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P. (2010). Digital image steganography: survey and analysis of current methods. Signal Processing, 90(3), 727–752.
 
Chen, G., Mao, Y., Chui, C.K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 21(3), 749–761.
 
Cokal, C., Solak, E. (2009). Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A, 373(15), 1357–1360.
 
Diaconu, A.-V. (2016). Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Information Sciences, 355, 314–327.
 
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(06), 1259–1284.
 
Fu, C., Lin, B-b., Miao, Y-s., Liu, X., Chen, J-j. (2011). A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Communications, 284(23), 5415–5423.
 
Fu, C., Zhang, G.-Y., Zhu, M., Chen, J.-X., Lei, W.-M. (2018). A fast chaos-based colour image encryption algorithm using a hash function. Informatica, 29(4), 651–673.
 
Ghebleh, M., Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898–1907.
 
Ghebleh, M., Kanso, A., Noura, H. (2014a). An image encryption scheme based on irregularly decimated chaotic maps. Signal Processing: Image Communication, 29(5), 618–627.
 
Ghebleh, M., Kanso, A., Own, H.S. (2014b). A blind chaos-based watermarking technique. Security and Communication Networks, 7(4), 800–811.
 
Guan, Z.-H., Huang, F., Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1–3), 153–157.
 
Hemdan, A.M., Faragallah, O.S., Elshakankiry, O., Elmhalaway, A. (2019). A fast hybrid image cryptosystem based on random generator and modified logistic map. Multimedia Tools and Applications, 78(12), 16177–16193.
 
Hermassi, H., Belazi, A., Rhouma, R., Belghith, S.M. (2014). Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimedia Tools and Applications, 72(3), 2211–2224.
 
Hua, Z., Zhou, Y. (2017). Design of image cipher using block-based scrambling and image filtering. Information Sciences, 396, 97–113.
 
Hua, Z., Zhou, Y., Pun, C.-M., Chen, C.P. (2015). 2D Sine Logistic modulation map for image encryption. Information Sciences, 297, 80–94.
 
Hua, Z., Yi, S., Zhou, Y., Li, C., Wu, Y. (2017). Designing hyperchaotic cat maps with any desired number of positive Lyapunov exponents. IEEE Transactions on Cybernetics, 48(2), 463–473.
 
Hua, Z., Zhou, Y., Huang, H. (2019). Cosine-transform-based chaotic system for image encryption. Information Sciences, 480, 403–419.
 
Kanso, A., Ghebleh, M. (2012). A novel image encryption algorithm based on a 3D chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(7), 2943–2959.
 
Kanso, A., Ghebleh, M. (2013). A fast and efficient chaos-based keyed hash function. Communications in Nonlinear Science and Numerical Simulation, 18(1), 109–123.
 
Kanso, A., Ghebleh, M. (2015a). An efficient and robust image encryption scheme for medical applications. Communications in Nonlinear Science and Numerical Simulation, 24(1–3), 98–116.
 
Kanso, A., Ghebleh, M. (2015b). A structure-based chaotic hashing scheme. Nonlinear Dynamics, 81(1–2), 27–40.
 
Katz, J., Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A. (1996). Handbook of Applied Cryptography. CRC Press.
 
Khan, M., Shah, T. (2015). An efficient chaotic image encryption scheme. Neural Computing and Applications, 26(5), 1137–1148.
 
Khan, J.S., Khan, M.A., Ahmad, J., Hwang, S.O., Ahmed, W. (2017). An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes. Informatica, 28(4), 629–649.
 
Kwok, H., Tang, W.K. (2007). A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons & Fractals, 32(4), 1518–1529.
 
Li, C., Chen, G. (2008). On the security of a class of image encryption schemes. In: 2008 IEEE International Symposium on Circuits and Systems. IEEE, pp. 3290–3293.
 
Li, C., Arroyo, D., Lo, K.-T. (2010). Breaking a chaotic cryptographic scheme based on composition maps. International Journal of Bifurcation and Chaos, 20(08), 2561–2568.
 
Li, C., Liu, Y., Xie, T., Chen, M.Z. (2013). Breaking a novel image encryption scheme based on improved hyperchaotic sequences. Nonlinear Dynamics, 73(3), 2083–2089.
 
Liao, X., Lai, S., Zhou, Q. (2010). A novel image encryption algorithm based on self-adaptive wave transmission. Signal Processing, 90(9), 2714–2722.
 
Liu, H., Zhang, Y., Kadir, A., Xu, Y. (2019). Image encryption using complex hyper chaotic system by injecting impulse into parameters. Applied Mathematics and Computation, 360, 83–93.
 
Liu, W., Sun, K., Zhu, C. (2016). A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84, 26–36.
 
Liu, Y., Tong, X., Ma, J. (2016). Image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimedia Tools and Applications, 75(13), 7739–7759.
 
Mao, Q., Qin, C. (2013). A novel turbo unequal error protection scheme for image steganography. Informatica, 24(4), 561–576.
 
Ott, E. (2002). Chaos in Dynamical Systems. Cambridge University Press.
 
Ping, P., Xu, F., Mao, Y., Wang, Z. (2018). Designing permutation–substitution image encryption networks with Henon map. Neurocomputing, 283, 53–63.
 
Rijmen, V., Daemen, J. (2001). Advanced encryption standard. In: Proceedings of Federal Information Processing Standards Publications, National Institute of Standards and Technology, pp. 19–22
 
Rivest, R.L., Shamir, A., Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.
 
Shannon, C.E. (1948). A mathematical theory of communication. Bell System Technical Journal, 27(3), 379–423.
 
Shannon, C.E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28(4), 656–715.
 
Solak, E., Çokal, C., Yildiz, O.T., Biyikoğlu, T. (2010). Cryptanalysis of Fridrich’s chaotic image encryption. International Journal of Bifurcation and Chaos, 20(05), 1405–1413.
 
Soleymani, A., Nordin, M.J., Sundararajan, E. (2014). A chaotic cryptosystem for images based on henon and arnold cat map. The Scientific World Journal, 2014.
 
Sun, Y-J., Zhang, H., Wang, X-Y., Wang, X-Q., Yan, P-F. (2020). 2D non-adjacent coupled map lattice with q and its applications in image encryption. Applied Mathematics and Computation, 373, 125039.
 
Tang, M., Hu, J., Song, W. (2014). A high capacity image steganography using multi-layer embedding. Optik-International Journal for Light and Electron Optics, 125(15), 3972–3976.
 
Wang, C., Fan, C., Ding, Q. (2018). Constructing discrete chaotic systems with positive Lyapunov exponents. International Journal of Bifurcation and Chaos, 28(07), 1850084.
 
Wang, K., Pei, Zou, L., Song, A., He, Z. (2005). On the security of 3D cat map based symmetric image encryption scheme. Physics Letters A, 343(6), 432–439.
 
Wang, X., Wang, Q., Zhang, Y. (2015). A fast image algorithm based on rows and columns switch. Nonlinear Dynamics, 79(2), 1141–1149.
 
Wu, Y., Noonan, J.P., Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31–38.
 
Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P. (2013). Local shannon entropy measure with statistical tests for image randomness. Information Sciences, 222, 323–342.
 
Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317–339.
 
Xiao, D., Liao, X., Wei, P. (2009). Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons & Fractals, 40(5), 2191–2199.
 
Xie, E.Y., Li, C., Yu, S., Lü, J. (2017). On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Processing, 132, 150–154.
 
Xu, L., Li, Z., Li, J., Hua, W. (2016). A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering, 78, 17–25.
 
Zhang, Q., Guo, L., Wei, X. (2010). Image encryption using DNA addition combining with chaotic maps. Mathematical and Computer Modelling, 52(11–12), 2028–2035.
 
Zhang, X., Nie, W., Ma, Y., Tian, Q. (2017). Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimedia Tools and Applications, 76(14), 15641–15659.
 
Zhou, Y., Bao, L., Chen, C.P. (2013). Image encryption using a new parametric switching chaotic system. Signal Processing, 93(11), 3039–3052.
 
Zhou, Y., Bao, L., Chen, C.P. (2014). A new 1D chaotic system for image encryption. Signal Processing, 97, 172–182.
 
Zhu, C. (2012). A novel image encryption scheme based on improved hyperchaotic sequences. Optics Communications, 285(1), 29–37.
 
The 2nd BOWS contest. http://bows2.ec-lille.fr. Accessed: 2019-12-14.
 
Attribution-noncommercial-noderivatives 4.0 international (CC BY-NC-ND 4.0). https://creativecommons.org/licenses/by-nc-nd/4.0/. Accessed: 2020-02-20.
 
Signal and Image Processing Institute: Miscellaneous volume. http://sipi.usc.edu/database/database.php?volume=misc, Accessed: 2019-12-14.

Biographies

Kanso Ali
ali.kanso@ku.edu.kw

A. Kanso is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc degree in mathematics from Queen Mary and Westfield College (University of London), in 1994. He earned his MSc degree in applied computing technology in the Electronic Engineering Department of Middlesex University, in 1996. In 1999 he obtained his PhD in mathematics from Royal Holloway and Bedford New College (University of London). His research interests include chaos-based encryption systems, information hiding, hash functions, secret sharing, and graph theory.

Ghebleh Mohammad
mohammad.ghebleh@ku.edu.kw

M. Ghebleh is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc and MSc in mathematics from Sharif University of Technology, Tehran, Iran (1997 and 1999), and his PhD in mathematics from Simon Fraser University, Burnaby, British Columbia, Canada (2007). His research interests include graph theory, combinatorics, and digital security topics such as encryption, data hiding, hash functions, and secret sharing.

Alazemi Abdullah
abdullah.alazemi@ku.edu.kw

A. Alazemi is an associate professor of mathematics at Kuwait University, Kuwait. He received his BSc in mathematics from Kuwait University, Kuwait. He earned his MSc and PhD in mathematics from Colorado State University, Colorado, the United States (2004 and 2007). His research interests include incidence structures, classification problems, spectral graph theory, graph theory, combinatorics and algebra.


Full article Related articles Cited by PDF XML
Full article Related articles Cited by PDF XML

Copyright
© 2020 Vilnius University
by logo by logo
Open access article under the CC BY license.

Keywords
cryptography chaos cat map pseudorandom numbers image encryption

Metrics
since January 2020
1476

Article info
views

823

Full article
views

925

PDF
downloads

226

XML
downloads

Export citation

Copy and paste formatted citation
Placeholder

Download citation in file


Share


RSS

INFORMATICA

  • Online ISSN: 1822-8844
  • Print ISSN: 0868-4952
  • Copyright © 2023 Vilnius University

About

  • About journal

For contributors

  • OA Policy
  • Submit your article
  • Instructions for Referees
    •  

    •  

Contact us

  • Institute of Data Science and Digital Technologies
  • Vilnius University

    Akademijos St. 4

    08412 Vilnius, Lithuania

    Phone: (+370 5) 2109 338

    E-mail: informatica@mii.vu.lt

    https://informatica.vu.lt/journal/INFORMATICA
Powered by PubliMill  •  Privacy policy