Acessibilidade / Reportar erro

Bogdanov Map-based Permuted Double Image Encryption

Abstract

Chaos-based image encryption schemes shuffle the position of the pixels (confuse), change their values (diffuse), to camouflage the identity of the original image. In this paper, a symmetric image cryptosystem based on permutation is proposed. Permutation, used both to change the position of the pixel and modify its value, is undertaken using the Bogdanov map. First, the input image is permuted using the Bogdanov map so that the pixel positions are changed. Thereafter, the resultant scrambled image is sliced into bit-planes which are again separately subjected to the Bogdanov map. The encrypted image is constructed by encrypting the scrambled bit-planes with the key generated using dyadic transform. The experimental results exhibited random behavior in the distribution of the pixel values of the encrypted image. The cryptosystem is simple and fast, as it is permutation-based and, secure, it may be used in real-time transmission.

Key words
Bogdanov map; chaos; dyadic transform; image cryptosystem; permutation; symmetric

INTRODUCTION

The Internet has become an integral part of today’s communication network. With the availability of abundant information communicated over the Internet, coupled with technological developments in the fields of visual communication and digital signal processing, there is a rapid increase in the widespread applications of digital imaging everyday. This entails security and authorized access to sensitive images such as those in the fields of medicine, defense, forensics, finance, research, etc. Consequently, with the rapid development of communication networks, there is a need to effectively protect such digital images in the open network environment. A solution to this would be to use a cryptosystem to render the information unintelligible, so an unintended recipient or intruder cannot take a chance on it. However, the traditional encryption algorithm based on the number theory may be inappropriate for digital images, given certain inherent features of these images such as large data volume, high redundancy, strong correlation among image pixels and storage characteristics. Hence, image cryptosystem has become an essential branch of cryptography. Comparatively speaking, image encryption algorithms have their own description and unique characteristics with exceptional specifications applicable to images. Chaos-based cryptosystems can provide efficient image encryption.

To resist common attacks, a cryptosystem must satisfy two basic cryptographic properties: confusion and diffusion (Alvarez & Li 2006ALVAREZ G & LI S. 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08): 2129-2151.). As stated by Shannon (Kocarev & Lian 2011KOCAREV L & LIAN S. 2011. Chaos-based cryptography: Theory, algorithms and applications. Studies in Computational Intelligence. Springer 354: 398.), “Diffusion means spreading out the influence of a single plaintext bit over many ciphertext bits so as to hide the statistical structure of the plaintext. Confusion refers to the use of transformations that complicate dependence of the statistics of ciphertext on the statistics of plaintext”. A permutation process weakens the correlation among the pixels of the image. To secure a color watermark image from visual perception, the authors of (Agilandeeswari & Ganesan 2016AGILANDEESWARI L & GANESAN K. 2016. A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14): 8745-8780.), sliced the image into 24 bit-planes and permuted the pixels using the Arnold transform before embedding it into a video frame. The transform is utilized in the permutation process of the permutation-diffusion mechanism proposed by (Ye 2011YE R. 2011. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284(22): 5290-5298.). As in the case of (Ye 2011YE R. 2011. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284(22): 5290-5298.), cryptosystems proposed by (Kumar et al. 2011KUMAR GS, BAGAN KB & VIVEKANAND V. 2011. A novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems. Procedia Comput Sci 3: 378-387., Run-he et al. 2011RUN-HE Q, YUN C & YU-ZHEN F. 2011. Integrated confusion-diffusion mechanisms for chaos based image encryption. In: Image and Signal Processing (CISP), 4th ed., International Congress, IEEE 2: 629-632., Zhang et al. 2012ZHANG W, WONG KW, YU H & ZHU ZL. 2012. An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion. Opt Commun 285(9): 2343-2354., 2014ZHANG X, SHAO L, ZHAO Z & LIANG Z. 2014. An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electr Eng 40(3): 931-941.) do not require sorting to use Arnold transform-based permutation algorithms. During the process of encrypting biometric fingerprint images, (Abundiz-Pérez et al. 2014ABUNDIZ-PÉREZ F, CRUZ-HERNÁNDEZ C, MURILLO-ESCOBAR M & LÓPEZ-GUTIERREZ R. 2014. Fingerprint image encryption based on Rossler map. In: Proceedings of the International Conference on Communications, Signal Processing and Computers, 193-197.), took advantage of permutation after diffusion. An expand-and-shrink strategy to shuffle the image with reconstructed permuting plane is employed in (Zhang et al. 2013ZHANG W, WONG KW, YU H & ZHU ZL. 2013. A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci 18(3): 584-600.). To increase the speed of the permutation process (Guo et al. 2014GUO W, ZHAO J & YE R. 2014. A chaos-based pseudorandom permutation and bilateral diffusion scheme for image encryption. Int J Image Graphics Signal Process 6(11): 50-61.) carried out a row-by-row and column-by-column permutation operation. Like the Arnold transform, the Lorenz system of equations is also noteworthy for producing chaotic solutions for certain parameter values and initial conditions and hence are used as a permutation technique (Gonzales et al. 2000GONZALES OA, HAN G, DE GYVEZ JP & SÁNCHEZ-SINENCIO E. 2000. Lorenz-based chaotic cryptosystem: a monolithic implementation. IEEE Trans Circuits Syst I: Fundam Theory Appl 47(8): 1243-1247., Radwan et al. 2004RADWAN AG, SOLIMAN AM & EL-SEDEEK A. 2004. MOS realization of the modified Lorenz chaotic system. Chaos Soliton Fract 21(3): 553-561.). Authors of (Baptista 1998BAPTISTA MS. 1998. Cryptography with chaos. Phys lett A 240(1-2): 50-54., Pisarchik et al. 2006PISARCHIK AN, FLORES-CARMONA NJ & CARPIO-VALADEZ M. 2006. Encryption and decryption of images with chaotic map lattices. Chaos: J Nonlinear Sci 16(3): 033118., Pisarchik & Zanin 2008PISARCHIK AN & ZANIN M. 2008. Image encryption with chaotically coupled chaotic maps. Phys D: Nonlinear Phenom 237(20): 2638-2648., Som & Sen 2013SOM S & SEN S. 2013. A non-adaptive partial encryption of grayscale images based on chaos. Proc Tech 10: 663-671., Sun et al. 2008SUN F, LIU S, LI Z & LÜ Z. 2008. A novel image encryption scheme based on spatial chaos map. Chaos Soliton Fract 38(3): 631-640.) used conventional discrete chaotic maps in the permutation phase whereas (Zanin & Pisarchik 2014ZANIN M & PISARCHIK AN. 2014. Gray code permutation algorithm for high-dimensional data encryption. Inform Sciences 270: 288-297.) used the logistic map. Instead of permuting pixels in the case of the literature above, (Al-Romema et al. 2012AL-ROMEMA NA, MASHAT AS & ALBIDEWI I. 2012. New chaos-based image encryption scheme for RGB components of color image. Comput Sci Eng 2(5): 77-85.) permuted the bits of the pixels.

Certain authors combined chaotic and non-chaotic techniques to improve the security and robustness of their cryptosystem. For example, (Zhang & Xiao 2014ZHANG Y & XIAO D. 2014. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU-Int J Electron C 68(4): 361-368.) designed a cryptosystem based on a coupled logistic map, self-adaptive permutation, a substitution transform and combined global diffusion. A block cipher encryption system presented by (Abdeihaleem et al. 2014ABDEIHALEEM SH, RADWAN AG & ABD-EL-HAFIZ SK. 2014. A chess-based chaotic block cipher. In: New Circuits and Systems Conference (NEWCAS), 12th International ed., IEEE, 405-408.) used the Lorenz chaotic generation for the confusion process and a chess-based diffusion process. The image encryption scheme proposed by (Wu et al. 2015WU X, LI Y & KURTHS J. 2015. A new color image encryption scheme using CML and a fractional-order chaotic system. PloS ONE 10(3): 28.) used a coupled map lattice for permutation and a fractional-order Chen chaotic system for diffusion. A detailed study on symmetric encryption algorithms using chaotic and non-chaotic algorithms was done by (Radwan et al. 2016RADWAN AG, ABDELHALEEM SH & ABD-EL-HAFIZ SK. 2016. Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv Res 7(2): 193-208.). They classified algorithms into three: substitution-only, permutation-only or both. Most of the image encryption algorithms available fall under permutation-only, the advantage of these systems being their speed of encryption. Nevertheless, the safekeeping of the information depends entirely on the confidentiality of the algorithm used. In addition, the encryption is done only by permuting the pixel positions and is prone to attacks.

To safeguard the content of transmitted images, an effectually simple chaos-based symmetric encryption algorithm that is specific for images is proposed and its performance analysed in this paper. Bogdanov map-based permutation is used to apply the idea of confusion and diffusion for images. Confusion shuffles the pixel positions within the image and results in a new organisation of pixels, while diffusion changes the values of the pixels. Experimental results show that it is simple, fast and robust.

Section, Bogdanov Map, of this paper portrays the basics of Bogdanov map. In section, The proposed cryptosystem, Bogdanov map-based permuted encryption and decryption algorithms are discussed. Section, Results and discussion presents encryption outputs and evaluations. The section Conclusion summarizes the findings.

MATERIALS AND METHODS

Bogdanov map

The proposed method makes use of the Bogdanov map (Arrowsmith et al. 1993ARROWSMITH DK, CARTWRIGHT JH, LANSBURY AN & PLACE CM. 1993. The Bogdanov map: Bifurcations, mode locking, and chaos in a dissipative system. Int J Bifurcat Chaos 3(4): 803-842.), to scramble the pixel positions in an image. The Bogdanov map is a planar quadratic map with area-preserving nature. The proposed method takes the benefit of discretization and makes use of the map’s symplectic form,

x ' = x + y ' (1)
y ' = y + kx ( x 1 ) (2)

When applied to images, Eq. (1) and Eq. (2), (x, y) represent the coordinate position of the pixels in the original image and (x’, y’) is the resultant coordinates position of the pixel in the altered image and k is any positive integer.

The proposed cryptosystem

A chaos-based symmetric image cryptosystem is proposed. It is a permutation image encryption algorithm. The Bogdanov map is used to permute the image pixels. The classical confusion-diffusion architecture is adopted in the design of the proposed cryptosystem. Pixel level permutation is combined with bit level permutation and chaotic transform to attain good encryption levels.

Image encryption

The image encryption process is shown in Figure 1. In the confusion stage of image encryption, the Bogdanov map is used to scramble (permute) the pixels of the input image, I. The process is repeated m times to render the image unintelligible. Let the resultant image be Cs . As the pixel positions are exchanged, the correlation among the pixels in the input image weakens. In the diffusion stage, Cs is sliced into eight bit-planes, B i, 1 ≤ i ≤ 8. These eight bit-planes are subjected to the Bogdanov map separately in such a way that the Bogdanov map is applied ni times on the bit-plane Bi . Thereafter, the scrambled bit-planes Bi are reorganised to construct the partially encrypted image Ce . The scrambling of the bit-planes changes the pixel value and constructs the cipher image, Ce . To make the cipher image more robust to attacks Ce is again encrypted using the keys generated by dyadic transform. The procedure for encryption is as given below and the process can be defined by Eq. (3) to Eq. (7).

Figure 1
Image encryption process.

Encryption algorithm

Input : Plain image, I.

Output : Encrypted image or cipher image, C.

Procedure:

Step 1: Construct the scrambled image, Cs , by applying the Bogdanov map, M, m times on I, mp.

C s = Μ ( I , m ) (3)

Step 2: Separate the bit-planes of Cs . Let the bit-planes be Bi , 1 ≤ i ≤ 8.

Step 3: Subject the bit-planes, Bi , to the Bogdanov map ni times, ni p. Let the permuted bit-planes be, BSi 1 ≤ i ≤ 8.

Step 4: Construct partially ciphered image, Ce , by reorganising the permuted bit planes, BSi , 1 ≤ i ≤ 8.

C e = Ρ ( Μ ( B s i ( C s ) , n i ) ) (4)

where P is the reconstruction function.

Step 5: Generate a key matrix, K, using dyadic transform (Pisarchik & Zanin 2010PISARCHIK AN & ZANIN M. 2010. Chaotic map cryptography and security. In: Encryption: Methods, Software and Security. Nova Science Publishers Inc, 1-28.), defined as

δ ( x ) = { 2 x 0 x < 0.5 2 x 1 0.5 x < 1 x n + 1 = δ ( x ) , n = 0 , 1 , 2 , (5)

with the condition if x = 0 or 1 then x = x 0, x 0 is the initial value.

Step 6: Encrypt Ce by K.

C = E ( C e , K ) (6)

using (Chen et al. 2004CHEN G, MAO Y & CHUI CK. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3): 749-761.)

C ( x ) = K ( x ) [ I ( x ) + K ( x ) ] mod G C ( x 1 ) (7)

where E is the encryption function, G is the value of color levels and C(0) is the seed for encryption.

The parameter p symbolizes the Bogdanov period, the number of iterations after which the image return to its original form. The parameter vector (m, ni , K, seed), 1 ≤ i ≤ 8, forms the symmetric key and controls the encryption process.

Image Decryption

Since the proposed cryptosystem is a symmetric cipher, the decryption process is the inverse of the encryption process with the same parameter vector (m, ni , K, seed), 1 ≤ i ≤ 8 and can be defined as in Eq. (8) to Eq. (11). The image decryption process is shown in Figure 2. First, the cipher image, C, is decrypted by using K and seed to get the partially deciphered image Ce. Ce is then separated into eight bit-planes, Bei , 1 ≤ i ≤ 8, and the inverse Bogdanov map is applied ni times on the bit-plane, Bei The unscrambled bit-planes of Bei are then reorgainsed to construct the scrambled image CS . The image CS is, however, unintelligible as the pixels are not positioned in their original position. The inverse Bogdanov map is once again applied m times on CS to unscramble the image. The resultant will be the original image, I, provided the encrypted image is not subjected to attacks.

Figure 2
Image decryption process.

Decryption algorithm

Input : Cipher image, C.

Output : Decrypted image or plain image, I.

Procedure:

Step 1: Decrypt C by K to get the partially deciphered image Ce .

C e = D ( C , K ) (8)

using (Chen et al. 2004CHEN G, MAO Y & CHUI CK. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3): 749-761.)

C e ( x ) = [ K ( x ) C ( x ) C ( x 1 ) + G K ( x ) ] mod G (9)

Step 2: Separate the bit-planes of Ce . Let the bit-planes be , 1 ≤ i ≤ 8.

Step 3: Subject the bit-planes to the inverse Bogdanov map, M’. Apply the map on the bit-planes,, ni times, ni p, 1 ≤ i ≤ 8.

Step 4: Construct the scrambled image Cs , by reorganising the unscrambled bit planes, Bi , 1 ≤ i ≤ 8.

C s = P ( Μ ' ( B e i ( C e ) , n i ) ) (10)

Step 5: Unscramble Cs using the inverse Bogdanov map ‘m’ times to get the plain image, I, mp.

I = Μ ' ( C s , m ) (11)

RESULTS AND DISCUSSION

The proposed cryptosystem abide by the basic principles of a chaotic cryptosystem: confusion and diffusion by changing both the position and value of the pixels. Both the operations take in permutation processes, where-in they take the advantage of the Bogdanov map. Unlike Arnold transform, which applies only to square images, Bogdanov map applies to images of arbitrary size. As the cryptosystem is symmetric, it uses the same set of keys for both encryption and decryption.

In the confusion phase, the input image is subjected to the Bogdanov map m times. The Bogdanov map shuffles the pixel positions however does not change the value of the pixels. Its repeated application on the input image results in a scrawled image. Figure 3a-d depict the jet plane image of size 384 x 512, its histogram, the scrambled image and its histogram respectively. The scrambled image was obtained by applying Bogdanov map eight times (m = 8) on the jet plane image when k = 2. As a histogram reveals the distribution of pixel values with the image, it can be seen that the frequencies of the pixels are not altered by the application of the Bogdanov map. The changed pixel positions, however, offer a visual perception of encryption.

Figure 3
(a) Jet plane image (b) Histogram of jet plane image (c) Scrambled jet plane image (d) Histogram of scrambled jet plane image.

The change in pixel positions weakens the correlation among the adjacent pixels in the image. The correlation distributions of the jet plane image and the scrambled image in horizontal, vertical and diagonal directions are plotted in Figure 4. It is evident that there is a high correlation among the adjacent pixels in the plain image, as the dots are located surrounding the diagonal in Figure 4a-c, whereas they are scattered over the entire plane in Figure 4d-f. The Lena image, its scrambled image for the same parameters (k = 2 and m = 8) and their correlation distributions are plotted in Figure 5. Figure 5a-d depict the plain image and its correlation distribution in horizontal, vertical and diagonal directions respectively and Figure 5e-h for the scrambled image.

Figure 4
Correlation distribution of adjacent pixels of the jet plane image in (a) horizontal (b) vertical (c) diagonal directions and the scrambled jet plane image in (d) horizontal (e) vertical (f) diagonal directions.
Figure 5
Correlation distribution of adjacent pixels of the (a) Lena image in (b) horizontal (c) vertical (d) diagonal directions and the (e) scrambled Lena image in (f) horizontal (g) vertical (h) diagonal directions.

In the diffusion phase, the scrambled image is sliced into eight bit planes. In Figure 6a-h represents the bit-planes of the jet plane image and i-p represents the bit-planes of the scrambled image. Even though the corresponding bit planes of the original and scrambled image are not similar, the percentage of information provided by the i th bit of the pixels is the same. The computation (Zhu et al. 2011ZHU ZL, ZHANG W, WONG KW & YU H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sciences 181(6): 1171-1186.) is given by Eq. (12). The data pertaining to the same is listed in Table I.

p ( i ) = 2 i 1 1 8 2 i 1 (12)
Figure 6
Eight bit planes of the jet plane image a-h and the scrambled image i-p in order.
Table I
Percentage of information provided by the bits of pixels.

Thus, only the confusion phase is not enough to attain a good encryption as the actual information content of the image remains unaltered. Only the perceptual information apparent to the human eye differs.

Each bit-plane of the scrambled image was individually subjected to the Bogdanov map ni times, 1 ≤ i ≤ 8. The image is reconstructed by reorganising the scrambled bit planes. As the ni are not the same for all the bit-planes, the bits of the pixels change, resulting in changes in the pixel value. At this stage, the image pixel positions and values are changed, resulting in an encrypted image. The encrypted jet plane image and the corresponding histogram are shown in Figure 7a, b respectively. The encrypted image was constructed with scrambled bit planes, where the bit planes 1 to 8, are subjected to Bogdanov map 5, 4, 8, 6, 5, 9, 3, 8 and 8 times respectively.

Figure 7
(a) Encrypted jet plane image after bit-plane scrambling and (b) its histogram.

An ideal encrypted image should avert the adversary from extracting any meaningful information from it. Hence, to make it more robust, the resultant image was again subjected to encryption by the keys generated using dyadic transform presented in Step 5 of the encryption algorithm. The encryption process of each pixel encompasses the previous encrypted pixel with a randomly generated initial seed value. This leads to a change in the pixel values once again, culminating in a doubly encrypted image.

Correlation is a measure of the relationship between the plain and the encrypted images (Amrane et al. 2016AMRANE H, ZOUHIR M, KAMAL EM & ABDELMALIK B. 2016. A novel binary image encryption algorithm based on diffuse representation. Eng Sci Technol Int J 19(4): 1887-1894.). When the images are totally different, the correlation coefficient equals zero. The correlation coefficients of image pixels in horizontal (H), vertical (V) and diagonal (D) directions of the given plain image and the corresponding encrypted image are shown in Table II. The table also presents the correlation coefficient between the plain and the encrypted images. Smaller the correlation, gives better encryption effect and higher the security (Shuqin et al. 2018SHUQIN Z, CONGXU Z & WENHONG W. 2018. A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20(9): 716-718.).

Table II
Correlation Coefficients.

A histogram graphically represents the frequency of distribution of pixel values within an image. Histogram analysis illustrates the quality of an encrypted image. A good image encryption method produces an encrypted image having uniformly-distributed histogram. The plain images listed in Table II, their histogram, the corresponding encrypted images and the respective histograms are depicted in Figure 8 a-e, f-j, k-o and p-t respectively.

Figure 8
Plain images (a) Jet plane (b) Cameraman (c) Lena (d) Mandril (e) Peppers, (f-j) their histograms, (k-o) corresponding encrypted images and (p-t) the histograms of encrypted images.

The error in the encrypted image compared to that of the original image can be measured using MSE (Mean Square Error) metric (Al-Romema et al. 2012AL-ROMEMA NA, MASHAT AS & ALBIDEWI I. 2012. New chaos-based image encryption scheme for RGB components of color image. Comput Sci Eng 2(5): 77-85.). The MSE is computed using the mathematical formula

MSE = i = 1 M j = 1 N [ I ( i , j ) C ( i , j ) ] 2 M × N (13)

where I and C are the plain and cipher images of size M x N respectively. The values of the MSE and the error are directly proportional, that is the lower value of MSE indicates lesser error and the higher value of MSE indicates more error. The MSE measured during encryption is depicted in Table III. The MSE value increases with the processes of encryption resulting in a noisy image.

Table III
Mean Square Error.

To acquire the information from the ciphered data, the adversary may observe the difference between the results after making minor modifications on the encrypted image (Chen et al. 2004CHEN G, MAO Y & CHUI CK. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3): 749-761.). This will help them to derive relationship between the plain and the encrypted image. If a trivial change in plain image causes significant variation in the encrypted image, makes these attacks inefficient. The number of pixels change rate (NPCR) and the unified averaged changing intensity (UACI) are the two most quantities used to evaluate the strength of the image encryption algorithms with respect to differential attacks (Wu et al. 2011WU Y, NOONAN JP & AGAIAN S. 2011. NPCR and UACI randomness tests for image encryption. J Sel Area Telecommun 1(2): 31-38.). Let C 1 and C 2 be the two encrypted images corresponding to the plain images having a pixel difference between them. The NPCR measure the number of pixels which changes value between C 1 and C 2 in percentage whereas UACI measures the average intensity difference between C 1 and C 2 in percentage. The NPCR and UACI are defined by the equations Eq. (14) and Eq. (16) respectively.

NPCR = i , j D ( i , j ) T × 100 % (14)

where

D ( i , j ) = { 0 , if C 1 ( i , j ) = C 2 ( i , j ) 1 if C 1 ( i , j ) C 2 ( i , j ) (15)
UACI = i , j | C 1 ( i , j ) C 2 ( i , j ) | 255 × T × 100 % (16)

where (i, j) defines the position of the pixel and T is the total number of pixels in the image.

The Lena image of size 512 x 512 is subjected to above test with one pixel variation at position (1,1). The pixel value at (1,1), 162 was changed to 163 by modifying the least significant bit from 0 to 1. i.e., “10100010” to “10100011”. Then, the images are encrypted using the same set of parameters and key to get the cipher images C 1 and C2 respectively. The value of the parameter k = 2. The size of the key is same as the size of the image. The other parameters used for encryption are presented in Table IV.

Table IV
Encryption Parameters.

The computed values of NPCR and UACI for the 5 rounds are compared with the results produced by (Zhu et al. 2011ZHU ZL, ZHANG W, WONG KW & YU H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sciences 181(6): 1171-1186.) and the same is presented in Table V and Table VI respectively. The results show that the proposed method performs better.

Table V
NPCR.
Table VI
UCAI.

Also, the average time taken to execute the encryption algorithm is much lesser than that of Zhu’s method. The average time taken by Zhu’s method to encrypt the Lena image is 36.1 ms whereas the proposed system is 2.59 ms. The average was computed by encrypting the Lena image by each cryptosystem ten times.

CONCLUSION

A chaos-based simple image cryptosystem is proposed, using the Bogdanov map to accomplish the permutation process both at the pixel level and bit-level. In the confusion phase, the pixel positions are shuffled. The pixel values are modified twice in the diffusion phase: once by shuffling the bits of the bit-plane using Bogdanov map followed by encryption with the keys generated using dyadic transform. As a result, the permutation has the effects of both confusion and diffusion, and employs the Bogdanov map for permutation (shuffling). The cryptosystem is simulated using Matlab and its performance analysed. The result of the analysis shows that the proposed double image encryption model is simple, fast and secure with a sufficiently large keyspace. This guarantees its use in real-time image transmission and in e-commerce transactions.

REFERENCES

  • ABDEIHALEEM SH, RADWAN AG & ABD-EL-HAFIZ SK. 2014. A chess-based chaotic block cipher. In: New Circuits and Systems Conference (NEWCAS), 12th International ed., IEEE, 405-408.
  • ABUNDIZ-PÉREZ F, CRUZ-HERNÁNDEZ C, MURILLO-ESCOBAR M & LÓPEZ-GUTIERREZ R. 2014. Fingerprint image encryption based on Rossler map. In: Proceedings of the International Conference on Communications, Signal Processing and Computers, 193-197.
  • AGILANDEESWARI L & GANESAN K. 2016. A robust color video watermarking scheme based on hybrid embedding techniques. Multimed Tools Appl 75(14): 8745-8780.
  • AL-ROMEMA NA, MASHAT AS & ALBIDEWI I. 2012. New chaos-based image encryption scheme for RGB components of color image. Comput Sci Eng 2(5): 77-85.
  • ALVAREZ G & LI S. 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08): 2129-2151.
  • AMRANE H, ZOUHIR M, KAMAL EM & ABDELMALIK B. 2016. A novel binary image encryption algorithm based on diffuse representation. Eng Sci Technol Int J 19(4): 1887-1894.
  • ARROWSMITH DK, CARTWRIGHT JH, LANSBURY AN & PLACE CM. 1993. The Bogdanov map: Bifurcations, mode locking, and chaos in a dissipative system. Int J Bifurcat Chaos 3(4): 803-842.
  • BAPTISTA MS. 1998. Cryptography with chaos. Phys lett A 240(1-2): 50-54.
  • CHEN G, MAO Y & CHUI CK. 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3): 749-761.
  • GONZALES OA, HAN G, DE GYVEZ JP & SÁNCHEZ-SINENCIO E. 2000. Lorenz-based chaotic cryptosystem: a monolithic implementation. IEEE Trans Circuits Syst I: Fundam Theory Appl 47(8): 1243-1247.
  • GUO W, ZHAO J & YE R. 2014. A chaos-based pseudorandom permutation and bilateral diffusion scheme for image encryption. Int J Image Graphics Signal Process 6(11): 50-61.
  • KOCAREV L & LIAN S. 2011. Chaos-based cryptography: Theory, algorithms and applications. Studies in Computational Intelligence. Springer 354: 398.
  • KUMAR GS, BAGAN KB & VIVEKANAND V. 2011. A novel algorithm for image encryption by integrated pixel scrambling plus diffusion [IISPD] utilizing duo chaos mapping applicability in wireless systems. Procedia Comput Sci 3: 378-387.
  • PISARCHIK AN, FLORES-CARMONA NJ & CARPIO-VALADEZ M. 2006. Encryption and decryption of images with chaotic map lattices. Chaos: J Nonlinear Sci 16(3): 033118.
  • PISARCHIK AN & ZANIN M. 2008. Image encryption with chaotically coupled chaotic maps. Phys D: Nonlinear Phenom 237(20): 2638-2648.
  • PISARCHIK AN & ZANIN M. 2010. Chaotic map cryptography and security. In: Encryption: Methods, Software and Security. Nova Science Publishers Inc, 1-28.
  • RADWAN AG, ABDELHALEEM SH & ABD-EL-HAFIZ SK. 2016. Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J Adv Res 7(2): 193-208.
  • RADWAN AG, SOLIMAN AM & EL-SEDEEK A. 2004. MOS realization of the modified Lorenz chaotic system. Chaos Soliton Fract 21(3): 553-561.
  • RUN-HE Q, YUN C & YU-ZHEN F. 2011. Integrated confusion-diffusion mechanisms for chaos based image encryption. In: Image and Signal Processing (CISP), 4th ed., International Congress, IEEE 2: 629-632.
  • SHUQIN Z, CONGXU Z & WENHONG W. 2018. A new image encryption algorithm based on chaos and secure hash SHA-256. Entropy 20(9): 716-718.
  • SOM S & SEN S. 2013. A non-adaptive partial encryption of grayscale images based on chaos. Proc Tech 10: 663-671.
  • SUN F, LIU S, LI Z & LÜ Z. 2008. A novel image encryption scheme based on spatial chaos map. Chaos Soliton Fract 38(3): 631-640.
  • WU X, LI Y & KURTHS J. 2015. A new color image encryption scheme using CML and a fractional-order chaotic system. PloS ONE 10(3): 28.
  • WU Y, NOONAN JP & AGAIAN S. 2011. NPCR and UACI randomness tests for image encryption. J Sel Area Telecommun 1(2): 31-38.
  • YE R. 2011. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284(22): 5290-5298.
  • ZANIN M & PISARCHIK AN. 2014. Gray code permutation algorithm for high-dimensional data encryption. Inform Sciences 270: 288-297.
  • ZHANG W, WONG KW, YU H & ZHU ZL. 2012. An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion. Opt Commun 285(9): 2343-2354.
  • ZHANG W, WONG KW, YU H & ZHU ZL. 2013. A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci 18(3): 584-600.
  • ZHANG X, SHAO L, ZHAO Z & LIANG Z. 2014. An image encryption scheme based on constructing large permutation with chaotic sequence. Comput Electr Eng 40(3): 931-941.
  • ZHANG Y & XIAO D. 2014. Self-adaptive permutation and combined global diffusion for chaotic color image encryption. AEU-Int J Electron C 68(4): 361-368.
  • ZHU ZL, ZHANG W, WONG KW & YU H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sciences 181(6): 1171-1186.

Publication Dates

  • Publication in this collection
    10 Aug 2020
  • Date of issue
    2020

History

  • Received
    31 Oct 2017
  • Accepted
    5 Mar 2019
Academia Brasileira de Ciências Rua Anfilófio de Carvalho, 29, 3º andar, 20030-060 Rio de Janeiro RJ Brasil, Tel: +55 21 3907-8100 - Rio de Janeiro - RJ - Brazil
E-mail: aabc@abc.org.br