skip to main content
10.1145/3352411.3352436acmotherconferencesArticle/Chapter ViewAbstractPublication PagesdsitConference Proceedingsconference-collections
research-article

A Secure Image Encryption Architecture Based on Pseudorandom Number Generator and Chaotic Logistic Map

Published: 19 July 2019 Publication History

Abstract

Communication is essential to every society, and securely exchanging data are critical in the age of digital data. The image has been the center of interest for security; chaotic maps image encryption become widely used in recent years. In our study, authors assessed the pixel rearrangement (permutation) and pixel dissemination (diffusion) stage used in cipher image established on designed scheme Pseudo-random number Generators (PRNGs) and Logistic chaotic map. Logistic maps used to generate seed value for PRNG and two-permutation stage and PRNGs used in diffusion operation. The proposed design through experimental tests demonstrate decent Statistical output, and high security for our image encryption schema, Our PRNGs passed NIST SP 800-22, and TestU01 practical randomness test suggests PRNGs have suitable statistical property.

References

[1]
V. K. Rai, S. Tripathy, and J. Mathew, "Memristor based Random Number Generator: Architectures and Evaluation," Procedia Comput. Sci., vol. 125, pp. 576--583, 2018.
[2]
E. Jokar and M. Mikaili, "Assessment of Human Random Number Generation for Biometric Verification," Journal of Medical Signals and Sensors, vol. 2, no. 2. India, pp. 82--87, 2012.
[3]
N. Persaud, "Humans can consciously generate random number sequences: A possible test for artificial intelligence," Med. Hypotheses, vol. 65, no. 2, pp. 211--214, 2005.
[4]
H. Zhu, C. Zhao, X. Zhang, and L. Yang, "A novel iris and chaos-based random number generator," Comput. Secur., vol. 36, pp. 40--48, 2013.
[5]
R. Enayatifar, A. H. Abdullah, I. F. Isnin, A. Altameem, and M. Lee, "Image encryption using a synchronous permutation-diffusion technique," Opt. Lasers Eng., vol. 90, pp. 146--154, 2017.
[6]
A. B. J. Teoh and D. C. L. Ngo, "Cancellable biometerics featuring with tokenised random number," Pattern Recognit. Lett., vol. 26, no. 10, pp. 1454--1460, 2005.
[7]
T. Stojanovski and L. Kocarev, "Chaos-based random number generators-part I: analysis {cryptography}," IEEE Trans. Circuits Syst. I Fundam. Theory Appl., vol. 48, no. 3, pp. 281--288, 2001.
[8]
J.-C. Hsueh and V. H.-C. Chen, "An ultra-low voltage chaos-based true random number generator for IoT applications," Microelectronics J., vol. 87, pp. 55--64, 2019.
[9]
M. O. Meranza-Castillón, M. A. Murillo-Escobar, R. M. López-Gutiérrez, and C. Cruz-Hernández, "Pseudorandom number generator based on enhanced Hénon map and its implementation," AEU - Int. J. Electron. Commun., vol. 107, pp. 239--251, 2019.
[10]
E. Dong, M. Yuan, S. Du, and Z. Chen, "A new class of Hamiltonian conservative chaotic systems with multistability and design of pseudo-random number generator," Appl. Math. Model., vol. 73, pp. 40--71, 2019.
[11]
G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749--761, 2004.
[12]
R. A. Elmanfaloty and E. Abou-Bakr, "Random property enhancement of a 1D chaotic PRNG with finite precision implementation," Chaos, Solitons & Fractals, vol. 118, pp. 134--144, 2019.
[13]
A. Akhshani, A. Akhavan, A. Mobaraki, S.-C. Lim, and Z. Hassan, "Pseudo random number generator based on quantum chaotic map," Commun. Nonlinear Sci. Numer. Simul., vol. 19, no. 1, pp. 101--111, 2014.
[14]
M. François, T. Grosges, D. Barchiesi, and R. Erra, "Pseudo-random number generator based on mixing of three chaotic maps," Commun. Nonlinear Sci. Numer. Simul., vol. 19, no. 4, pp. 887--895, 2014.
[15]
A. Broumandnia, "The 3D modular chaotic map to digital color image encryption," Futur. Gener. Comput. Syst., vol. 99, pp. 489--499, 2019.
[16]
L. Huang, S. Cai, X. Xiong, and M. Xiao, "On symmetric color image encryption system with permutation-diffusion simultaneous operation," Opt. Lasers Eng., vol. 115, pp. 7--20, 2019.
[17]
A. Broumandnia, "Designing digital image encryption using 2D and 3D reversible modular chaotic maps," J. Inf. Secur. Appl., vol. 47, pp. 188--198, 2019.
[18]
P. L'Ecuyer and R. J. Simard, "TestU01: A C library for empirical testing of random number generators," ACM Trans. Math. Softw., vol. 33, 2007.
[19]
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, "A statistical test suite for random and pseudorandom number generators for cryptographic applications," 2001.
[20]
Q. Li and G. Qian, "A New Image Encryption Algorithm Based on Chaotic Maps," in Proceedings of the 9th International Conference on Signal Processing Systems, 2017, pp. 65--69.
[21]
X. Wang and C. Liu, "A Novel and Effective Image Encryption Algorithm Based on Chaos and DNA Encoding," Multimed. Tools Appl., vol. 76, no. 5, pp. 6229--6245, Mar. 2017.
[22]
Z. Hua, Y. Zhou, C.-M. Pun, and C. L. P. Chen, "2D Sine Logistic modulation map for image encryption," Inf. Sci. (Ny)., vol. 297, pp. 80--94, 2015.
[23]
H. S. Kwok and W. K. S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation," Chaos, Solitons & Fractals, vol. 32, no. 4, pp. 1518--1529, 2007.
[24]
J. Peng, D. Zhang, and X. Liao, "A Digital Image Encryption Algorithm Based on Hyper-chaotic Cellular Neural Network," Fundam. Inf., vol. 90, no. 3, pp. 269--282, Aug. 2009.

Cited By

View all
  • (2023)New color image encryption using hybrid optimization algorithm and Krawtchouk fractional transformationsThe Visual Computer: International Journal of Computer Graphics10.1007/s00371-022-02736-339:12(6395-6420)Online publication date: 1-Dec-2023
  • (2020)The Presence of the Uncanny Valley Between Animation and CinemaMultidisciplinary Perspectives on New Media Art10.4018/978-1-7998-3669-8.ch005(97-118)Online publication date: 26-Jun-2020
  • (2020)Healthcare Security Based on Blockchain within Multi-parameter Chaotic Map2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)10.1109/UEMCON51285.2020.9298090(0770-0778)Online publication date: 28-Oct-2020

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
DSIT 2019: Proceedings of the 2019 2nd International Conference on Data Science and Information Technology
July 2019
280 pages
ISBN:9781450371414
DOI:10.1145/3352411
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • The Hong Kong Polytechnic: The Hong Kong Polytechnic University
  • Natl University of Singapore: National University of Singapore

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 July 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Chaotic map
  2. Logistic map
  3. Pseudorandom number generator
  4. Random number tests
  5. cipher Image
  6. image processing
  7. statistical analysis

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

DSIT 2019

Acceptance Rates

DSIT 2019 Paper Acceptance Rate 43 of 95 submissions, 45%;
Overall Acceptance Rate 114 of 277 submissions, 41%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)New color image encryption using hybrid optimization algorithm and Krawtchouk fractional transformationsThe Visual Computer: International Journal of Computer Graphics10.1007/s00371-022-02736-339:12(6395-6420)Online publication date: 1-Dec-2023
  • (2020)The Presence of the Uncanny Valley Between Animation and CinemaMultidisciplinary Perspectives on New Media Art10.4018/978-1-7998-3669-8.ch005(97-118)Online publication date: 26-Jun-2020
  • (2020)Healthcare Security Based on Blockchain within Multi-parameter Chaotic Map2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)10.1109/UEMCON51285.2020.9298090(0770-0778)Online publication date: 28-Oct-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media