Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application

https://doi.org/10.1016/j.jisa.2020.102472Get rights and content

Abstract

In this paper, a digital image encryption algorithm is proposed based on the generalized model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo-random number generator (PRNG) in the proposed encryption algorithm. The foundation of the chaos game is based on basic points and its distance ratio that determine the basis of how they distribute random values in 2D or 3D space. These basic points are entered by the user interface and are the result of an encrypted image with a fractal structure. The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems. In the proposed method, the region of interest is determined by a number of Bases, and the fractal mechanism of chaos game for the encryption process is performed on the image. This process is very sensitive to any changes in keys and refers to confusion. The evaluation results of security and performance analysis on standard images confirm the efficiency of the proposed method and demonstrate that the proposed method is robust against attacks.

Introduction

With the development of the Internet networks and free access to private information by unauthorized users, the use of an encryption system to protect multimedia systems such as image, video, and audio seems to be necessary. The image is widely used as one of the most important multimedia systems on personal computers and mobile phones. Several algorithms and methods have been used to encrypt the digital image in the last three decades, and the challenges are still ongoing [1].

Image encryption algorithms are divided into two categories: the spatial domain and the transform domain [2]. Spatial domain techniques directly encrypt the original image pixels, that have high speed and more security and easy to use. But the main problem in pixel-based methods is the high capacity of the encrypted image. Transform-based methods are used to encrypt compressed images, such as JPEG and JPEG2000, which has many uses and benefits in saving memory consumption. These algorithms are widely used in DCT and DWT transform domains [3], [4].

On the other hand, cryptosystem algorithms are divided into two class of block and stream cipher [5]. The block cipher has high security and less speed than the stream cipher. Particular examples of block cipher techniques are algorithms such as DES [6] and AES [7], which are also used in image encryption [8]. In most block and cipher stream algorithms, the pseudo-random number generator is used to ensure data security. The PRNGs are deterministic sequences that are generated with an initial condition that these initial conditions play as the secret key in the cryptosystem [9]. Providing a secure PRNG requires the passing of standard statistical tests such as NIST [10], Diehard [11], [12], ENT [13], TESTU01 [14] and etc.

The use of chaos theory as a secure cryptosystem in the last two decades has been at the forefront of dynamical systems. The sensitivity to the initial condition and the deterministic chaotic sequences in discrete chaotic maps are very important properties in cryptographic systems [15]. For this reason, chaotic iterated maps have been used as pseudo-random number generators along with encryption operators for image and video encryption [16], [17], [18]. A variety of applications such as image and video encryption [19], [20], [21], [22], [23], digital stenography [24], [25], [26], image and video watermarking [27], [28], [29], [30], [31], [32] and information hiding [33], [34], [35] are applications that use chaotic discrete maps in the security element of applied methods.

Classic maps such as logistic map [36], [37], [38], [39], Tent map [40], Arnold cat map [41], [42], Henon Map [43], [44], and Sine map [45] are used in many image encryption algorithms. Classical logistics or tent maps, due to their smaller keyspace, have low security which has been investigated in cryptanalysis of chaotic maps [46], [47].

In the research literature, in order to increase the key space, there are various chaotic maps such as DNA sequences[48], [49], hyper chaos [50], mixed map [51], [52], [53], [54], [55], chaotic neural network [56], Josephus Scrambling[57], and Quantum map [58]. Also, one of the most important uses of chaotic mapping in the last two decades has been the substitution boxes in block cipher methods [59], [60]. Using the science of cryptanalysis, a great deal of study has been done on the security of chaotic maps and the efficiency of these PRNGs [61], [62], [63], [64], [65].

A fractal is a geometric structure consisting of components that are obtained by increasing each component to a certain scale, the same basic structure. In other words, the fractal is a structure that each component of a structure is similar to the whole structure [66]. Fractals are found in many natural structures such as snow, mountains, clouds, roots, trunks and leaves of trees, the growth of crystals in igneous rocks, the network of waterways and rivers, electrochemical deposition, bacterial mass growth and blood vessel systems, DNA and..., which can be described, interpreted and predicted by many natural phenomena [67], [68]. Many classic fractals have been raised in real and complex domains, such as the Cantor set, the Koch curve, the Sierpinski gasket, the Julia set and the Mandelbrot set [69]. Fractal networks can be used to produce chaotic attractors that have sensitivity to the initial conditions and control parameters [70].

The chaos game as a self-similar fractal was presented in 1988 by Barnsley [71]. The Barnsley’s chaos game is a deterministic fractal shape which uses random numbers to produce a geometric structure. In this paper, a modified model of the chaos game is presented which is sensitive to initial conditions and has a fully chaotic behavior. To illustrate the chaotic behaviors of the proposed dynamic system, the Lyapunov exponent and bifurcation diagram are used. The standard randomness tests are used to display the randomness of the chaos game as a safe PRNG. Finally, a database of standard images is used to evaluate the performance of the proposed encryption algorithm and the obtained results of the proposed algorithm are compared with other algorithms.

The rest of the paper is organized as follows. In Section 2, the proposed chaos game will be introduced as a new dynamical system. The encryption and decryption process will be described in Section 3. The experimental results of the proposed method and the evaluation of efficiency parameters in the proposed algorithm are discussed in Section 4. Section 5 will be the conclusion section of this paper.

Section snippets

Barensley’s chaos game

Chaos game (CG) was first introduced by Michael F. Barnsley [71]. At first glance, there seems to be no connection between chaos and fractal. In fact, this is not just a game. In this game, there are some simple rules to select and all of them uses the same procedures. These rules are

  • 1.

    Set three points on the screen as bases (points are vertices of a triangle).

  • 2.

    The bases (vertices) are tagged with numbers 1, 2 and 3.

  • 3.

    Select a starting point on the sheet.

  • 4.

    Select a base randomly.

  • 5.

    Mark the midpoint

Proposed ROI image encryption

The proposed encryption and decryption process for a region of interest in the digital image is described by the following steps:

  • Step 1: The input image, the initial conditions (x0, y0, z0), the control parameters (μ, α), the bases of chaos game(B[.][.]) and the maximum iteration(MaxItr) are entered as input parameters by users.

  • Step 2: A three-dimensional chaotic map with cubic organizing will run 100 times to produce values within the region of interest.

  • Step 3: The chaotic sequence is selected

Image database

To simulate the proposed algorithm on a region of interest, a number of non-standard images are extracted from the Internet. Various regions of the image were selected and various fractals were encrypted on the original images. The results of these encrypted and decrypted images are clearly seen in Fig. 10 and Fig. 11.

To evaluate the quality of the proposed algorithm, the Kodak and SIPI4

Conclusion

In this paper, a generalization of a dynamical system called the chaos game is presented. The chaos game is a chaotic fractal sequence that can be used as an encryptor in the ROI or non-ROI from the digital image. Chaos game was used as a pseudo-random number generator in the encryption and decryption process, with a key length of 232 bits. To demonstrate the chaotic behavior of the proposed dynamic system, the Lyapunov exponent and the bifurcation diagram were used and also exploited from

Compliance with ethical standards

All authors declare that they have no conflict of interest.

Declaration of Competing Interest

All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.

CRediT authorship contribution statement

Peyman Ayubi: Conceptualization, Methodology, Software, Investigation, Writing - original draft, Visualization. Saeed Setayeshi: Writing - original draft, Writing - review & editing, Project administration. Amir Masoud Rahmani: Writing - original draft, Writing - review & editing.

Acknowlgedgments

This article is dedicated to Imam Hussein, who has all my scientific life from his love.

References (77)

  • H. Liu et al.

    Asymmetric color image encryption scheme using 2d discrete-time map

    Signal Process

    (2015)
  • H. Wang et al.

    Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map

    Signal Process

    (2018)
  • X. Chai et al.

    A color image cryptosystem based on dynamic dna encryption and chaos

    Signal Process

    (2019)
  • J. Chen et al.

    Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption

    Signal Process

    (2018)
  • C. Cao et al.

    A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map

    Signal Process

    (2018)
  • C. Pak et al.

    A new color image encryption using combination of the 1d chaotic map

    Signal Process

    (2017)
  • M. Asgari-Chenaghlu et al.

    A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation

    Signal Process

    (2019)
  • H.-I. Hsiao et al.

    Color image encryption using chaotic nonlinear adaptive filter

    Signal Process

    (2015)
  • K. Ratnavelu et al.

    Image encryption method based on chaotic fuzzy cellular neural networks

    Signal Process

    (2017)
  • R. Lan et al.

    Integrated chaotic systems for image encryption

    Signal Process

    (2018)
  • A. Akhshani et al.

    An image encryption scheme based on quantum logistic map

    Commun Nonlinear Sci NumerSimul

    (2012)
  • C. Li et al.

    When an attacker meets a cipher-image in 2018: a year in review

    J Inf Secur Appl

    (2019)
  • A. Akhshani et al.

    Pseudo random number generator based on quantum chaotic map

    Commun Nonlinear Sci NumerSimul

    (2014)
  • N. Ponomarenko et al.

    Image database tid2013: Peculiarities, results and perspectives

    Signal Process

    (2015)
  • O.S. Faragallah et al.

    Image encryption: a communication perspective

    (2013)
  • M. Kaur et al.

    A comprehensive review on image encryption techniques

    Arch Comput Methods Eng

    (2018)
  • Y. Song et al.

    Joint image compression–encryption scheme using entropy coding and compressive sensing

    Nonlinear Dyn

    (2018)
  • X.-J. Tong et al.

    A new algorithm of the combination of image compression and encryption technology based on cross chaotic map

    Nonlinear Dyn

    (2013)
  • C. Paar et al.

    Understanding cryptography: a textbook for students and practitioners

    (2009)
  • W. Tuchman

    A brief history of the data encryption standard

    Internet besieged

    (1997)
  • J. Daemen et al.

    Aes proposal: Rijndael

    (1999)
  • M. Kumari et al.

    A survey of image encryption algorithms

    3D Research

    (2017)
  • R.T. Kneusel

    Random Numbers and Computers

    (2018)
  • A. Rukhin et al.

    A statistical test suite for random and pseudorandom number generators for cryptographic applications

    Tech. Rep.

    (2001)
  • G. Marsaglia

    Diehard: a battery of tests of randomness

    Open Source software library

    (1996)
  • R.G. Brown et al.

    Dieharder: a random number test suite

    Open Source software library

    (2013)
  • J. Walker

    Ent: a pseudorandom number sequence test program

    (2008)
  • P. L’Ecuyer et al.

    Testu01: Ac library for empirical testing of random number generators

    ACM Trans Math Software (TOMS)

    (2007)
  • Cited by (89)

    View all citing articles on Scopus
    View full text