×

An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase. (English) Zbl 1458.94235

Summary: In recent years, with the rapid development of chaotic technology, many chaotic image cryptosystems based on pixel/bit-level techniques have been investigated. However, the drawbacks of a cryptosystem are as follows: (1) the security and efficiency are merely based on an investigation into standard test images and are not suitable for certain unique images in which the existence of “1s” or “0s” is significant; (2) the processing of bits requires more chaotic variables that elevate the computational complexity; (3) computational redundancy occurs when encrypting certain unique images. The first comprehensive analysis of different types of existing bit/pixel-level permutation techniques is carried out to show the inapplicability of such algorithms for popular cloud computing technology. To address the aforementioned security pitfalls of the state-of-the-art approaches and promote efficiency, an improved scrambling algorithm (ISA) and a reverse diffusion based on a dynamic keystream allocation strategy (DKAS) have been proposed. The present study adopts a spatiotemporal mixed linear-nonlinear coupling with the logistic-sine system (SMLNLC-LSS) for chaotic orbit generation. This system uses coveted cryptographic properties contrasted with the existing chaotic systems. The employed strategies such as ISA and reverse diffusion strongly enhance the relationship between the plaintext and encryption process to fortify the breaking of the proposed algorithm under known attacks. Because the ISA and DKAS mechanism share the same keystream, the efficiency of the proposed algorithm is effectively improved. Extensive security evaluation methods such as statistical, sensibility, visual-assessment, and efficiency analyses were imposed on the proposed methodology. The corresponding results accentuate the efficiency of the image cryptosystem while maintaining the superior security performance provided by the assurance of the desirable cryptographic properties.

MSC:

94A60 Cryptography
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
Full Text: DOI

References:

[1] Ahmad, J.; Hwang, S. O., Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dyn., 82, 4, 1839-1850 (2015) · Zbl 1441.94066
[2] Akhavan, A.; Samsudin, A.; Akhshani, A., Cryptanalysis of an improvement over an image encryption method based on total shuffling, Opt. Commun., 350, 77-82 (2015)
[3] Bechikh, R.; Hermassi, H.; Abd El-Latif, A. A.; Rhouma, R.; Belghith, S., Breaking an image encryption scheme based on a spatiotemporal chaotic system, Signal Process Image Commun., 39, 115-151 (2015)
[4] Norouzi, B.; Mirzakuchaki, S., Breaking an image encryption algorithm based on the new substitution stage with chaotic functions, Optik, 127, 5695-5701 (2016)
[5] Bhateja, V.; Srivastava, A.; Kalsi, A., Fast SSIM index for color images employing reduced-reference evaluation, (Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) (2013), Springer), 451-458, 2014
[6] Chen, J. X.; Zhu, Z. L.; Fu, C.; Yu, H., An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism, Opt. Express, 21, 27873-27890 (2013)
[7] Chen, J. X.; Zhu, Z. L.; Fu, C.; Yu, H., A fast image encryption scheme with a novel pixel swapping-based confusion approach, Nonlinear Dyn, 77, 1191-1207 (2014)
[8] Chen, J. X.; Zhu, Z. L.; Fu, C.; Yu, H.; Zhang, L. B., A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism, Commun. Nonlinear Sci. Numer. Simul, 20, 846-860 (2015)
[9] Chong, F.u.; Meng, W.-h.; Zhan, Y.-f.; Zhu, Z.-l.; Lau, F. C.M.; Tse, C. K.; Hong-feng, M.a., An efficient and secure medical image protection scheme based on chaotic maps, Comput. Biol. Med., 43, 1000-1010 (2013)
[10] Caragata, D.; Tutanescu, I., On the security of a new image encryption scheme based on a chaotic function, SIViP, 8, 641-646 (2014)
[11] Devika; Nayak, M.; Dash, D.; Sa, K. D., An improved image encryption technique using diffusion method associated with hill cipher and chaotic logistic map, (Second International Conference on Man and Machine Interfacing (MAMI) (2017))
[12] Laiphrakpam, D. S.; Khumanthem, M. S., Cryptanalysis of symmetric key image encryption using chaotic Rossler system, Optik, 135, 200-209 (2017)
[13] Eslami, Z.; Bakhshandeh, A., An improvement over an image encryption method based on total shuffling, Opt. Commun., 286, 51-55 (2013)
[14] Freedman, D.; Pisani, R.; Purves, R., Statistics (2007), W. W. Norton &; Company: W. W. Norton &; Company New York, NY · Zbl 1353.62003
[15] Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcation Chaos, 8, 6, 1259-1284 (1998) · Zbl 0935.94019
[16] Fu, C.; Chen, J.; Zou, H.; Meng, W.; Zhan, Y.; Yu, Y., A chaos-based digital image encryption scheme with an improved diffusion strategy, Opt. Express, 20, 3, 2363-2378 (2012)
[17] Gayathri, J.; Subashini, S., A. survey on security and efficiency issues in chaotic image encryption, Int. J. Inf. Comput. Secur., 8, 4, 347-381 (2016)
[18] Gayathri, J.; Subashini, S., A spatiotemporal chaotic image encryption scheme based on self adaptive model and dynamic keystream fetching technique, Multimedia Tools and Applications, 77, 19, 24751-24787 (2018)
[19] H. Diab, An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations 2018, 77, 24751-24787. doi: 10.1109/ACCESS.2018.2858839; H. Diab, An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations 2018, 77, 24751-24787. doi: 10.1109/ACCESS.2018.2858839
[20] Zhua, H.; Zhaob, C.; Zhang, X.; Yang, L., An image encryption scheme using generalized Arnold map and affine cipher, Optik, 125, 6672-6677 (2014)
[21] Zhang, L. Y.; Xiaobo, H.; Liu, Y.; Wong, K.-W.; Gan, J., A chaotic image encryption scheme owning temp-value feedback, Commun. Nonlinear Sci. Numer. Simul., 19, 10, 3653-3659 (2014) · Zbl 1470.94100
[22] Lian, S. G.; Sun, J.; Wang, Z., A block cipher based on a suitable use of the chaotic standard map, Chaos Solitons Fractals, 26, 1, 117-129 (2005) · Zbl 1093.37504
[23] Liu, L.; Zhang, Q.; Wei, X., A RGB image encryption algorithm based on DNA encoding and chaos map, Comput. Electr. Eng., 38, 5, 1240-1248 (2012)
[24] Lin, T.; Wang, X., A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive, Opt. Commun., 285, 4048-4054 (2012)
[25] Li, C.; Liu, Y.; Xie, T.; Chen, M., Breaking a novel image encryption scheme based on improved hyperchaotic sequences, Nonlinear Dyn., 73, 3, 2083-2089 (2013) · Zbl 1281.68103
[26] Li, H.; Wang, X., Color image encryption using spatial bit-level permutation and high dimension chaotic system, Opt. Commun, 284, 16-17, 3895-3903 (2011)
[27] Xu, L.; Li, Z.; Li, J.; Hua, W., A novel bit-level image encryption algorithm based on chaotic maps, Opt. Lasers Eng., 78, 17-25 (2016)
[28] Mao, Y.; Chen, G.; Lian, S., A novel fast image encryption scheme based on 3D chaotic baker maps, In Bifurcation Chaos, 14, 10, 3613-3624 (2004), 38(5):1240-1248 http://dx.doi.org/10.1142/S021812740401151X · Zbl 1064.94509
[29] Gaata, M. T.; Hantoosh, F. F., An efficient image encryption technique using chaotic logistic Map and RC4 stream Cipher, Int. J. Modern Trends Eng. Res., 3, 9, 2013-2018 (2016)
[30] Ming, L.; Liu, S.w.; Niu, L.; Liu, H., Cryptanalyzing a chaotic encryption algorithm for highly autocorrelated data, Opt. Laser Technol, 86, 33-38 (2016)
[31] Mrinal, K. M.; Madhumita, K.; Sandesh, K. S.; Vivek, K. B., Symmetric key image encryption using chaotic Rossler system, Secur. Commun. Netw., 7, 2145-2152 (2014)
[32] Murillo-Escobar, M. A.; Cruz-Hernández, C.; Abundiz-Pérez, F.; López-Gutiérrez, R. M.; Acosta Del Campo, O. R., A RGB image encryption algorithm based on total plain image characteristics and chaos, Signal Process., 109, 119-131 (2015)
[33] Özkaynak; Özer, A. B., Cryptanalysis of a new image encryption algorithm based on chaos, Optik, 127, 5190-5192 (2016)
[34] Pareek, N. K.; Patidar, V.; Sud, K. K., Image encryption using chaotic logistic map, Image Vis. Comput., 24, 9, 926-934 (2006)
[35] Song, C-Y.; Qiao, Y-L.; Zhang, X-Z., An image encryption scheme based on new spatiotemporal chaos. 811, Optik, 124, 3329-3334 (2013)
[36] The USC-SIPI image database, http://sipi.usc.edu/database/database.php; The USC-SIPI image database, http://sipi.usc.edu/database/database.php
[37] Wang, Y.; Wong, K.; Liao, X.; Chen, G., A new chaos-based fast image encryption algorithm, Appl. Soft Comput., 11, 1, 514-522 (2011)
[38] Wu, Y.; Noonan, J. P.; Agaian, S., NPCR and UACI randomness tests for image encryption, Cyber journals: multidisciplinary journals in science and technology, J. Sel. Areas Telecommun. (JSAT), 31-38 (2011)
[39] Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J. P.; Natarajan, P., Local Shannon entropy measure with statistical tests for image randomness, Inf. Sci., 222, 323-334 (2013) · Zbl 1293.94019
[40] Xingyuan, W.; Liu, L.; Zhang, Y.q., A novel chaotic block image encryption algorithm based on dynamic random growth technique, Opt. Lasers Eng., 66, 10-18 (2015)
[41] Xingyuan, W.; Teng, L., An image blocks encryption algorithm based on spatiotemporal chaos, Nonlinear Dyn., 67, 365-371 (2012)
[42] Zhan, Y. Q.; Wang, X. Y., A symmetric image encryption algorithm based on mixed linear-non linear coupled map lattice, Inf. Sci., 273, 329-351 (2014)
[43] Zhang, W.; Wong, K. W.; Yu, H.; Zhu, Z., A symmetric color image encryption algorithm using the intrinsic features of bit distributions, Commun. Nonlinear Sci. Numer. Simul., 18, 3, 584-600 (2013) · Zbl 1302.94014
[44] Zhi, L.; Zhang, W.; Wong, K.; Yu, H., A chaos-based symmetric image encryption scheme using a bit-level permutation, Inf. Sci., 181, 6, 1171-1186 (2011)
[45] Zhou, Y.; Bao, L.; Chen, C. L.P., A new 1D chaotic system for image encryption, Sig Process., Vol. 97, 172-182 (2014)
[46] Zhou, Y.; Cao, W.; Chen, C. L.P., Image encryption using binary bitplane, Signal Process, 100, 197-207 (2014)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.