An efficient self-adaptive model for chaotic image encryption algorithm

https://doi.org/10.1016/j.cnsns.2014.04.012Get rights and content

Highlights

  • The keystreams generated in both the processes of permutation and diffusion are dependent on the plain-image.

  • Block method is introduced in the encryption process with fast computation.

  • High-dimensional complex partial equations are avoided.

  • Self-adaptive update models are designed automatically for keys according to the images, and round number.

Abstract

In this paper, an efficient self-adaptive model for chaotic image encryption algorithm is proposed. With the help of the classical structure of permutation-diffusion and double simple two-dimensional chaotic systems, an efficient and fast encryption algorithm is designed. However, different from most of the existing methods which are found insecure upon chosen-plaintext or known-plaintext attack in the process of permutation or diffusion, the keystream generated in both operations of our method is dependent on the plain-image. Therefore, different plain-images will have different keystreams in both processes even just only a bit is changed in the plain-image. This design can solve the problem of fixed chaotic sequence produced by the same initial conditions but for different images. Moreover, the operation speed is high because complex mathematical methods, such as Runge–Kutta method, of solving the high-dimensional partial differential equations are avoided. Numerical experiments show that the proposed self-adaptive method can well resist against chosen-plaintext and known-plaintext attacks, and has high security and efficiency.

Introduction

In a modern society, we are processing more and more digital information through electronic equipments such as computers, notebooks, iPhone, iPad, and so on. Among the information sources, digital is one of the most important information, which it can let us understand the content directly. Thus, many images are transmitted over public network every day. However, for some private images, we do not want them to be accessed by unauthorized persons. Obviously, a simple and direct way is to perform encryption on them, so that they can only be decrypted correctly with the correct key. As a result, how to efficiently provide security protection to these secret images has become an urgent issue [1]. However, different from text encryption, images have their intrinsic properties such as bulky data capacity, high redundancy, and high correlation between image pixels [2], traditional techniques (for example, AES and IDEA) are not suitable for real-time encryption of images [3].

To meet the challenge of image protection, there are many schemes [4], [5], [6] proposed in recent years. Among them, the chaos-based encryption algorithms [6], [7], [8], [9], [10], [11], [12], [13], [14], [15] have shown good efficiency. Maybe we should attribute this success to the characteristics of chaotic system itself such as parameter setting, random behavior, and sensitivity to initial condition. Normally, we adopt the classical permutation-diffusion architecture. This means that the whole encryption process is divided into two stages, i.e., permutation (In this stage, we just shuffle the pixels in the plain-image by some invertible mapping) and diffusion (Pixel values of the permuted image will be further changed by some chaotic sequence and operation in this stage). To achieve high security, the encryption algorithm should have the ability to let a tiny change in any pixel of the plain-image or any small changes in initial condition resulting in an absolutely different cipher-image [16].

Currently, the low security defect is found in some image encryption algorithms. In [17], Zhu proposed an encryption scheme with two rounds of diffusion only, the chaotic sequence was generated by a four-dimensional hyperchaotic system with four given initial conditions x0,y0, z0, and w0. Then the method did a preprocessing for the iterated values from the chaotic system to make a better statistical performance. After that, the chaotic sequence was used for diffusion. However, Li et al. [18] analyzed the security of [17] and suggested a cryptanalysis method known-plaintext. They pointed out that the secret keys, which are used, could be found when two pairs of known plain-image and cipher-images are available [18]. A colour image encryption algorithm was introduced in [19], which used only the Logistic map to generate the chaotic sequence with given initial conditions a,x0 and a1,y0. The iterated chaotic values were used for pixel scrambling and diffusion. Arroyo et al. [20] successfully cryptanalyzed this scheme through a chosen-plaintext attack. The drawbacks of the cryptosystem were also analyzed in detail in two aspects [20]: (1) Small key space, and (2) Low sensitivity to the plain-image.

In this paper, we propose a new image encryption algorithm which possesses the self-adaptive feature. In the permutation stage, the chaotic sequence for the circular shuffling is generated dependent on the plain-image. It solves the key-dependent only problem found in most of the existing algorithms. The keystreams for different plain-images are not identical, which enhances the resistance to known- and chosen-plaintext attacks. Furthermore, in the diffusion, the permuted image is divided into blocks. We choose the last block to update the initial conditions of the chaotic system. As a result, the keystream for diffusion is also dependent on the image. Two mathematical models are established for updating the initial conditions of the chaotic system. Fortunately, with just one round of iteration, the system can nearly reach the required security level.

The rest of this paper is organized as follows, the proposed self-adaptive image encryption algorithm is described in Section 2. Two updating mathematical models are established for the initial conditions of the system. Section 3 gives the numerical experiments using our algorithm. The performance analyses performed in Section 4 demonstrate the security and the efficiency. Finally, some conclusions are drawn in Section 5.

Section snippets

Chaotic system

We know that 1D Logistic map (given by (1)) is a simple chaotic map and has been widely employed in many image encryption algorithms [7], [8], [21].xi+1=μxi(1-xi),i=0,1,2,.When 3.56994<μ4, the system will become chaotic. However, it may lead to insecure encryption algorithm due to small key space and limited number of control parameters. A better way to use is to find a high-dimensional chaotic system which possesses a large key space.

2D Logistic map [8], an extension of the 1D one, is given

Numerical experiment

In this section, we do some experiments for the proposed algorithm to show the efficiency. With initial conditions x0=0.301,y0=0.638 and r1=202 for 2D Logistic map, and x0=0.614,y0=0.447 and r2=234 for generalized Arnold map. Control parameters are μ1=3.25,μ2=3.17,γ1=0.204,γ2=0.142,a=2, and b=1. To deduce the computation, we just simply set ϕi=0,i=1,2,3,4. All tests are carried out by Matlab 7.0 using a platform of Win7 PC with an Intel (R) Core (TM) i3–2350 M, 2.30 GHz CPU. Peppers image of

Key space and sensitivity

A direct method for cipher-image analysis is to launch the brute-force attack if there is enough time. We should first let the key space be as large as possible. In our proposed algorithm, the key space is built up by x0,y0,x0, and y0 without considering the control parameters. It can be as large as 1042 if the precision is set to 10-14. Thus the key space of the algorithm can satisfy the secure requirement, i.e., at least 1030 [27], [28]. It can resist the exhaustivity attack of key space.

An

Conclusions

We have designed a novel self-adaptive chaotic image encryption algorithm. Two simple chaotic systems, 2D Logistic and the generalized Arnold map, are used to generate the chaotic sequences. However, different from existing algorithms, the keystreams generated in the permutation and diffusion stages are both dependent on the plain-image. It can solve the fixed keystream problem. In each round, the keystream is also different, due to the self-adaptive updating method. Performance test have shown

Acknowledgments

The work described in this paper was fully supported by the National Natural Science Foundation of China (No. 11301091), the Natural Science Foundation of Guangdong Ocean University of China (No. C13455), and the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province of China (No. 2013LYM0037).

References (32)

Cited by (73)

  • Efficient and secure image encryption using key substitution process with discrete wavelet transform

    2023, Journal of King Saud University - Computer and Information Sciences
View all citing articles on Scopus
View full text