Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application
Introduction
With the development of the Internet networks and free access to private information by unauthorized users, the use of an encryption system to protect multimedia systems such as image, video, and audio seems to be necessary. The image is widely used as one of the most important multimedia systems on personal computers and mobile phones. Several algorithms and methods have been used to encrypt the digital image in the last three decades, and the challenges are still ongoing [1].
Image encryption algorithms are divided into two categories: the spatial domain and the transform domain [2]. Spatial domain techniques directly encrypt the original image pixels, that have high speed and more security and easy to use. But the main problem in pixel-based methods is the high capacity of the encrypted image. Transform-based methods are used to encrypt compressed images, such as JPEG and JPEG2000, which has many uses and benefits in saving memory consumption. These algorithms are widely used in DCT and DWT transform domains [3], [4].
On the other hand, cryptosystem algorithms are divided into two class of block and stream cipher [5]. The block cipher has high security and less speed than the stream cipher. Particular examples of block cipher techniques are algorithms such as DES [6] and AES [7], which are also used in image encryption [8]. In most block and cipher stream algorithms, the pseudo-random number generator is used to ensure data security. The PRNGs are deterministic sequences that are generated with an initial condition that these initial conditions play as the secret key in the cryptosystem [9]. Providing a secure PRNG requires the passing of standard statistical tests such as NIST [10], Diehard [11], [12], ENT [13], TESTU01 [14] and etc.
The use of chaos theory as a secure cryptosystem in the last two decades has been at the forefront of dynamical systems. The sensitivity to the initial condition and the deterministic chaotic sequences in discrete chaotic maps are very important properties in cryptographic systems [15]. For this reason, chaotic iterated maps have been used as pseudo-random number generators along with encryption operators for image and video encryption [16], [17], [18]. A variety of applications such as image and video encryption [19], [20], [21], [22], [23], digital stenography [24], [25], [26], image and video watermarking [27], [28], [29], [30], [31], [32] and information hiding [33], [34], [35] are applications that use chaotic discrete maps in the security element of applied methods.
Classic maps such as logistic map [36], [37], [38], [39], Tent map [40], Arnold cat map [41], [42], Henon Map [43], [44], and Sine map [45] are used in many image encryption algorithms. Classical logistics or tent maps, due to their smaller keyspace, have low security which has been investigated in cryptanalysis of chaotic maps [46], [47].
In the research literature, in order to increase the key space, there are various chaotic maps such as DNA sequences[48], [49], hyper chaos [50], mixed map [51], [52], [53], [54], [55], chaotic neural network [56], Josephus Scrambling[57], and Quantum map [58]. Also, one of the most important uses of chaotic mapping in the last two decades has been the substitution boxes in block cipher methods [59], [60]. Using the science of cryptanalysis, a great deal of study has been done on the security of chaotic maps and the efficiency of these PRNGs [61], [62], [63], [64], [65].
A fractal is a geometric structure consisting of components that are obtained by increasing each component to a certain scale, the same basic structure. In other words, the fractal is a structure that each component of a structure is similar to the whole structure [66]. Fractals are found in many natural structures such as snow, mountains, clouds, roots, trunks and leaves of trees, the growth of crystals in igneous rocks, the network of waterways and rivers, electrochemical deposition, bacterial mass growth and blood vessel systems, DNA and..., which can be described, interpreted and predicted by many natural phenomena [67], [68]. Many classic fractals have been raised in real and complex domains, such as the Cantor set, the Koch curve, the Sierpinski gasket, the Julia set and the Mandelbrot set [69]. Fractal networks can be used to produce chaotic attractors that have sensitivity to the initial conditions and control parameters [70].
The chaos game as a self-similar fractal was presented in 1988 by Barnsley [71]. The Barnsley’s chaos game is a deterministic fractal shape which uses random numbers to produce a geometric structure. In this paper, a modified model of the chaos game is presented which is sensitive to initial conditions and has a fully chaotic behavior. To illustrate the chaotic behaviors of the proposed dynamic system, the Lyapunov exponent and bifurcation diagram are used. The standard randomness tests are used to display the randomness of the chaos game as a safe PRNG. Finally, a database of standard images is used to evaluate the performance of the proposed encryption algorithm and the obtained results of the proposed algorithm are compared with other algorithms.
The rest of the paper is organized as follows. In Section 2, the proposed chaos game will be introduced as a new dynamical system. The encryption and decryption process will be described in Section 3. The experimental results of the proposed method and the evaluation of efficiency parameters in the proposed algorithm are discussed in Section 4. Section 5 will be the conclusion section of this paper.
Section snippets
Barensley’s chaos game
Chaos game (CG) was first introduced by Michael F. Barnsley [71]. At first glance, there seems to be no connection between chaos and fractal. In fact, this is not just a game. In this game, there are some simple rules to select and all of them uses the same procedures. These rules are
- 1.
Set three points on the screen as bases (points are vertices of a triangle).
- 2.
The bases (vertices) are tagged with numbers 1, 2 and 3.
- 3.
Select a starting point on the sheet.
- 4.
Select a base randomly.
- 5.
Mark the midpoint
Proposed ROI image encryption
The proposed encryption and decryption process for a region of interest in the digital image is described by the following steps:
- •
Step 1: The input image, the initial conditions (x0, y0, z0), the control parameters (μ, α), the bases of chaos game(B[.][.]) and the maximum iteration(MaxItr) are entered as input parameters by users.
- •
Step 2: A three-dimensional chaotic map with cubic organizing will run 100 times to produce values within the region of interest.
- •
Step 3: The chaotic sequence is selected
Image database
To simulate the proposed algorithm on a region of interest, a number of non-standard images are extracted from the Internet. Various regions of the image were selected and various fractals were encrypted on the original images. The results of these encrypted and decrypted images are clearly seen in Fig. 10 and Fig. 11.
To evaluate the quality of the proposed algorithm, the Kodak and SIPI4
Conclusion
In this paper, a generalization of a dynamical system called the chaos game is presented. The chaos game is a chaotic fractal sequence that can be used as an encryptor in the ROI or non-ROI from the digital image. Chaos game was used as a pseudo-random number generator in the encryption and decryption process, with a key length of 232 bits. To demonstrate the chaotic behavior of the proposed dynamic system, the Lyapunov exponent and the bifurcation diagram were used and also exploited from
Compliance with ethical standards
All authors declare that they have no conflict of interest.
Declaration of Competing Interest
All authors have participated in (a) conception and design, or analysis and interpretation of the data; (b) drafting the article or revising it critically for important intellectual content; and (c) approval of the final version.
CRediT authorship contribution statement
Peyman Ayubi: Conceptualization, Methodology, Software, Investigation, Writing - original draft, Visualization. Saeed Setayeshi: Writing - original draft, Writing - review & editing, Project administration. Amir Masoud Rahmani: Writing - original draft, Writing - review & editing.
Acknowlgedgments
This article is dedicated to Imam Hussein, who has all my scientific life from his love.
References (77)
- et al.
A fast color image encryption technique based on three dimensional chaotic map
Optik
(2019) - et al.
A new transform domain steganography based on modified logistic chaotic map for color images
J Inf Secur Appl
(2017) - et al.
Design and implementation of coupled chaotic maps in watermarking
Appl Soft Comput
(2014) - et al.
Multiple-watermarking scheme based on improved chaotic maps
Commun Nonlinear Sci NumerSimul
(2010) - et al.
A novel colour image encryption algorithm based on chaos
Signal Process
(2012) - et al.
A rgb image encryption algorithm based on total plain image characteristics and chaos
Signal Process
(2015) - et al.
A novel image encryption scheme based on substitution-permutation network and chaos
Signal Process
(2016) - et al.
A new hybrid digital chaotic system with applications in image encryption
Signal Process
(2019) - et al.
Color image encryption based on chaotic systems and elliptic curve elgamal scheme
Signal Process
(2017) - et al.
Image encryption using 2d hénon-sine map and dna approach
Signal Process
(2018)
Asymmetric color image encryption scheme using 2d discrete-time map
Signal Process
Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map
Signal Process
A color image cryptosystem based on dynamic dna encryption and chaos
Signal Process
Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption
Signal Process
A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map
Signal Process
A new color image encryption using combination of the 1d chaotic map
Signal Process
A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation
Signal Process
Color image encryption using chaotic nonlinear adaptive filter
Signal Process
Image encryption method based on chaotic fuzzy cellular neural networks
Signal Process
Integrated chaotic systems for image encryption
Signal Process
An image encryption scheme based on quantum logistic map
Commun Nonlinear Sci NumerSimul
When an attacker meets a cipher-image in 2018: a year in review
J Inf Secur Appl
Pseudo random number generator based on quantum chaotic map
Commun Nonlinear Sci NumerSimul
Image database tid2013: Peculiarities, results and perspectives
Signal Process
Image encryption: a communication perspective
A comprehensive review on image encryption techniques
Arch Comput Methods Eng
Joint image compression–encryption scheme using entropy coding and compressive sensing
Nonlinear Dyn
A new algorithm of the combination of image compression and encryption technology based on cross chaotic map
Nonlinear Dyn
Understanding cryptography: a textbook for students and practitioners
A brief history of the data encryption standard
Internet besieged
Aes proposal: Rijndael
A survey of image encryption algorithms
3D Research
Random Numbers and Computers
A statistical test suite for random and pseudorandom number generators for cryptographic applications
Tech. Rep.
Diehard: a battery of tests of randomness
Open Source software library
Dieharder: a random number test suite
Open Source software library
Ent: a pseudorandom number sequence test program
Testu01: Ac library for empirical testing of random number generators
ACM Trans Math Software (TOMS)
Cited by (89)
A novel pseudo-random number generator based on multivariable optimization for image-cryptographic applications[Formula presented]
2024, Expert Systems with ApplicationsOFDM-PON physical layer encryption scheme based on chaotic Joseph ring and fractal system
2024, Optics CommunicationsChaotic Complex Hashing: A simple chaotic keyed hash function based on complex quadratic map
2023, Chaos, Solitons and FractalsImage steganography technique based on bald eagle search optimal pixel selection with chaotic encryption
2023, Alexandria Engineering JournalAn Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques
2023, Mathematics and Computers in SimulationUnbiased random bitstream generation using injection-locked spin-torque nano-oscillators
2024, Physical Review Applied