Professional Documents
Culture Documents
1, 2014
113
114
Introduction
The modern technological advancements have evolved the internet from fundamental
e-mail communication task to a plateform where computing resources along with data are
made available for the end users. Green clouds emphasise the deployment and
energy-efficient utilisation of underlying computing resources available over the clouds.
Such an environment requires increased sharing and exchange of computing resources
and sensitive data. This brings new challenges to design security methods that are
credential enough to provide the sufficient privacy to the important data shared over the
cloud, which can protect the data from unauthorised access and usage. At the same time,
due to advancements in the telecommunications technologies the multimedia-based
communication has become essential in everyones life. The rapid and frequent exchange
of multimedia data via internet and clouds has encouraged copyright frauds, unauthorised
access, illegal usage and uncontrollable distribution of multimedia content (Izquierdo
et al., 2003). The efforts have been done by researchers, academicians and practitioners
for enforcing security, providing protection, establishing ownership rights, ensuring
authorised access, preventing illegal replication, facilitating content authentication of
multimedia content (Kundur and Karthik, 2004). In order to deal with the technical
challenges pertinent to multimedia content, two major techniques are applied: multimedia
watermarking and encryption (Furht and Kirovski, 2005). Multimedia watermarking
techniques are applied to achieve copyright protection, ownership trace and
authentication. However, multimedia encryption techniques are applied to provide endto-end security when distributing digital content. Multimedia encryption techniques
transform the visual content of multimedia into an unintelligible form that can be
recovered with the correct secret key. The authorised customer who owns the key can
successfully recover the content (Lin et al., 2005). Thus, the strength of such techniques
lies in the secret key. The key space of the technique should be large enough to resist the
brute-force attack. The encryption technique should be cryptographically strong enough
to withstand the conventional and other types of cryptographic attacks (Schneier, 1996).
Hence, secure multimedia communication demands new encryption techniques that may
handle the multimedia data efficiently. Due to the inherent features of multimedia
data like: their bulk data capacity, high spatial and temporal redundancy, etc., the
conventional cryptographic techniques such as DES, triple-DES, RSA, IDEA, AES are
computationally inefficient in dealing with huge multimedia data. In the past one and half
decade, the chaotic systems are explored for the design of security methods which can
fulfil the need of secure communication over the attack-prone networks (Ahmad and
Farooq, 2010, 2011; Chen et al., 2010; Corron et al., 2010; Dang and Chau, 2000;
115
Deepthi et al., 2009; Francia et al., 2009; Fu et al., 2007; Hamdi and Boudriga, 2008;
Hasimoto-Beltrn, 2008; Lian, 2009; Tong and Cui, 2009; Sadhasivam and Jini, 2010;
Silva et al., 2009; Watfa et al., 2009; Zhang and Liu, 2009; Zhou et al., 2008). This is
because, the chaotic signals are blessed with features such as high sensitivity to initial
conditions/parameters, long periodicity, high randomness and mixing, which can be
exploited to employ in a cryptographic system. These characteristics make chaos-based
multimedia encryption methods excellent and robust against statistical attacks. In chaosbased image encryption methods, chaotic sequences are pre-processed to implement the
image pixels confusions and diffusions. Fu et al. (2007) proposed an image encryption
scheme by implementing simultaneously the pixels permutation and their diffusion using
3D Lorenz chaotic systems. Kanso and Ghebleh (2011) suggested an efficient algorithm
by applying the phases of confusions and diffusions using a single 3D Arnold cat map,
which provides resistant to the existing attacks. The features of fourth-order
hyper-chaotic system are improved and explored by Zhu (2012) for designing a new
method of image encryption. In Francois et al. (2012), a new image encryption scheme
based on coupling of chaotic function and XOR operator is provided. The scheme has the
features of high security, sensitivity and randomness. Hongjun and Xingyuan (2010)
designed a stream-cipher algorithm based on one-time keys and robust chaotic maps in
order to get high security and improve the dynamical degradation, where the initial
conditions are generated by the MD5 of mouse positions. This makes the algorithm
robust against noise and makes known attacks unfeasible. In Zhang et al. (2010), the
authors proposed a novel image encryption algorithm by exploring the combined features
of DNA computing and chaotic logistic function.
In this paper, the authors propose multimedia colour imagery encryption method by
exploiting the complex dynamic responses of multiple high-order chaotic systems. The
complex orbits of each chaotic system are recorded as real valued chaotic sequences to
carry out the image pixels shuffling and diffusion operations. The generated chaotic
sequences are pre-processed and quantised to extract the intermediate keys. To strengthen
the diffusion process of the proposed method, the keys are hybridised using XOR
operation to produce a number of encryption keys. The actual encryption of plain-images
is performed with their random selection in diffusion process. In addition, the shuffling
and diffusion of image pixels are made image dependent to resist the cryptographic
attacks. Rest of this paper is organised as follows: the proposed method is discussed in
Section 2, followed by the simulation results which are presented in Section 3. Finally,
the conclusion is drawn in Section 4.
The proposed method is based on the use of multiple three-order chaotic systems. The
one-dimensional chaotic system provides: low key space, their iteration operations
generate single sequence and they are weak against adaptive parameter synchronous
attack (Fu et al., 2007). Moreover, the usage of single chaotic system in an encryption
process fails in providing the sufficient security and large key space. To overcome the
limitations of low-dimensional and single chaotic systems, multiple three-dimensional
Chen, Rossler and Chua chaotic systems are employed in the design. The dynamics of
these systems are more complex and generate more unpredictable, distinct and stochastic
chaotic sequences as compared to low-dimensional systems. Eventually, high security,
116
extremely large key space and high statistical properties are achieved. The state equations
describing the three chaotic systems are:
Chen system:
x1 = a1 ( x2 x1 )
x2 = ( c1 a1 ) x1 x1 x3 x2
(1)
x3 = x1 x2 b1 x3
Rossler system:
y1 = ( y2 + y3 )
y2 = y1 + a2 y2
(2)
y3 = b2 + y3 ( y1 c2 )
Chua system:
z1 = ( z2 z1 h ( z1 ) )
z2 = z1 z2 + z3
z3 = z2 z3
h ( z1 ) = m1 z1 + 0.5 ( m0 m1 ) ( z1 + 1 z1 1 )
(3)
(4)
where (i) = x1(i), x2(i), x3(i), y1(i), y2(i), y3(i), z1(i), z2(i) and z3(i) are real-valued chaotic
sequence generated by systems of equations (1), (2), (3) respectively in the ith iteration
and 0 < (i) < 1.
Figure 1
3D phase plot showing chaotic behaviour of Chen systems (see online version for
colours)
117
The algorithmic steps of the proposed framework for securing multimedia colour images
are described as:
Step 1
Step 2
Evaluate the image dependent parameters NR, NG and NB from image P using
XOR operation as:
N M
N R = 1 + PR (i, j )
j =1 i =1
N M
N G = 1 + PG (i, j )
j =1 i =1
N M
N B = 1 + PB (i, j )
j =1 i =1
if (M > N)
{Y3 = Y3(1 to N), Z2 = Z2(1 to N), Z1 = Z1(1 to N)}
else
{X1 = X1(1 to M), Y2 = Y2(1 to M), X3 = X3(1 to M)}
Step 7
Determine the indices permutation vectors from above vector(s) as: sort the
vector X 1 = {x1 (1), x1 (2), , x1 ( )} to get new
vector {x1 (1), x1 (2), , x1 ( )}. Find the position of values
{x1 (1), x1 (2), , x1 ( )} in {x1 (1), x1 (2), , x1 ( )} and mark down
Let VR, VG, VB, UR, UG, and UB be the position vectors obtained corresponding to
the processed chaotic vectors X1, Y2, X3, Y3, Z2, and Z1, respectively. Now,
permutation vectors VR, VG, and VB, are used to perform row-wise shuffling of
pixels in R, G and B components of image. Where as, vectors UR, UG, and UB are
used for column-wise shuffling of pixels.
Step 9
118
Step 12 Take properly another set of initial conditions for Chen, Rossler, and Chua
chaotic systems utilised in diffusion process, and CR(0), CG(0), CB(0). Let t = 1.
Step 13 Again, iterate the chaos systems of equations (1), (2) and (3) to obtained chaotic
variables x1(t), x2(t), x3(t), y1(t), y2(t), y3(t), z1(t), z2(t), z3(t) and pre-process them
according to equation (4).
Step 14 Perform 8-bit quantisation (G = 28) of the pre-processed chaotic variables as:
(1) = 1 (t ) 2 (t ) 3 (t )
(2) = 2 (t ) 3 (t ) 1 (t )
(3) = 3 (t ) 1 (t ) 2 (t )
(4) = 2 (t ) 1 (t ) 3 (t )
(5) = 3 (t ) 2 (t ) 1 (t )
(6) = 1 (t ) 3 (t ) 2 (t )
(7) = 1 (t ) 1 (t ) 1 (t )
(8) = 2 (t ) 2 (t ) 2 (t )
(9) = 3 (t ) 3 (t ) 3 (t )
Step 16 Evaluate the indices i, j, k, l, m and n of hybridised keys from the pre-processed
chaotic variables obtained in step 13.
119
Step 17 Select lines s0, s1 and s2 decide the actual encryption keys KR, KG and KB used to
mask the pixels of multimedia colour image components.
s0 = lsb ( 1 (t ) ) lsb ( 2 (t ) ) lsb ( 3 (t ) )
Step 18 Random selection of actual encryption keys KR, KG and KB is made through
following if-else rules:
if (s0 = = 0)
KR = (i)
else
if (s1 = = 0)
else
KR = (j)
if (s2 = = 0)
KG = (k)
KB = (m)
else
KG = (l)
KB = (n)
Step 19 Encrypt the pixels of SR, SG and SB components of self-diffused shuffled image S
obtained after step 11 to get pixels of cipher-image C, in CBC mode as:
CR (t ) = K R {S R (t ) + K G + K B } mod(G ) CR (t 1)
CG (t ) = K G {SG (t ) + K R + K B } mod(G ) CG (t 1)
CB (t ) = K B {S B (t ) + K G + K R } mod(G ) CB (t 1)
Step 20 Set t = t + 1 and repeat steps 13 to 19 for M N times to encrypt all the pixels of
image S.
Step 21 Reshape the 1D vectors CR, CG and CB of length M N into 2D grey-value
matrices each of size M N and combine the colour components to get final
encrypted colour image C.
The decoding of encrypted image is performed by applying the above steps of encryption
process in reverse order, except that the following formulation is used for decrypting the
pixels of self-diffused components SR, SG and SB of shuffled image S.
S R (t ) = { K R CR (t ) CR (t 1) + 2 G K G K B } mod(G )
SG (t ) = { K G CG (t ) CG (t 1) + 2 G K R K B } mod(G )
S B (t ) = { K B CB (t ) CB (t 1) + 2 G K G K R } mod(G )
120
Simulation results
Colour plain-images of, (a) cattle-driver (b) Barbara (c) airplane (d) peppers
(e) baboon (f) parrots (see online version for colours)
(a)
(b)
(c)
(d)
(e)
(f)
121
Shuffled colour images of, (a) cattle-driver (b) Barbara (c) airplane (d) peppers
(e) baboon (f) parrots (see online version for colours)
(a)
(b)
(c)
(d)
(e)
(f)
Test image
Original
R
Encrypted
Cattle-driver
102.94
86.44
14.39
127.64
127.36
127.67
Barbara
130.57
101.08
92.57
127.41
127.54
127.35
Airplane
177.57
177.85
190.21
127.22
127.71
127.21
Peppers
149.82
115.56
66.53
127.40
127.60
127.45
Baboon
137.39
128.86
113.12
127.41
127.51
127.31
Parrots
130.79
120.60
81.94
127.27
127.64
127.66
122
Figure 4
Encrypted colour images of, (a) cattle-driver (b) Barbara (c) airplane (d) peppers
(e) baboon (f) parrots (see online version for colours)
Table 2
(a)
(b)
(c)
(d)
(e)
(f)
Test image
Encrypted
97,668.19
224,686.46
2,235,475.44
251.72
247.57
262.03
Barbara
90,310.73
151,450.03
131,300.43
274.59
292.79
285.42
Airplane
678,415.25
677,708.35
1,107,794.21
238.23
242.39
242.14
Peppers
213,187.22
318,382.93
491,428.18
305.82
256.28
255.25
Baboon
82,839.65
142,450.74
79,932.61
284.34
274.67
270.18
Parrots
251,997.08
147,892.24
350,855.42
236.88
241.79
240.79
Cattle-driver
2 =
i =1
( Oi Ei )2
Ei
123
where i is the number of grey values, Oi and Ei are observed and expected occurrence of
each grey value (0 to G 1), respectively. The less the value of chi-square 2 better will
be the encryption performance of the scheme. The values of chi-square for two set of
images are listed in Table 2. The chi-square values for encrypted images are extremely
low as compared to the values obtained for the original images. The extremely low values
of chi-square depict that the proposed method provides fairly high encryption effect.
i =1
i =1
xi2
( x y ) x y
i =1
i =1
xi
i =1
i =1
yi2
i =1
yi
Pixels distributions in, (a) red (b) green and (c) blue components of cattle-driver
plain-image (see online version for colours)
(a)
(b)
(c)
124
Figure 6
Pixels distributions in, (a) red (b) green and (c) blue components of encrypted
cattle-driver image (see online version for colours)
(a)
Table 3
(b)
(c)
Test image
Encrypted
Cattle-driver
0.974612
0.961335
0.811543
0.00510
0.00534
0.00889
Barbara
0.979240
0.978349
0.981297
0.00320
0.00291
0.00394
Airplane
0.966751
0.970289
0.947278
0.00011
0.00625
0.00349
Peppers
0.967209
0.983952
0.966568
0.00114
0.00402
0.00631
Baboon
0.874908
0.778703
0.886015
0.00443
0.00548
0.00880
Parrots
0.981942
0.974399
0.978606
0.00860
0.00213
0.00847
H (S ) =
p ( s ) ( log ( p ( s ) )
i
(5)
i =0
Table 4
Test image
Cattle-driver
Barbara
Airplane
Peppers
Baboon
Parrots
Original
Encrypted
7.692186
7.662956
6.717770
7.338827
7.706669
7.423341
7.306129
7.468446
6.805542
7.496253
7.475279
7.538088
7.317564
7.538000
6.213994
7.058305
7.752245
7.292859
7.999307
7.999245
7.999345
7.999158
7.999218
7.999349
7.999319
7.999194
7.999334
7.999293
7.999244
7.999335
7.999279
7.999213
7.999333
7.999295
7.999255
7.999337
125
i, j
D(i, j )
100%
M N
0 C1 (i, j ) = C2 (i, j )
where D(i, j ) =
1 C1 (i, j ) C2 (i, j )
To calculate the values of NPCR, the only one pixel of plain-image located at centre
position is changed. The NPCR obtained for set of C1(i, j) and C2(i, j) images are listed in
Table 5. The high values of NPCR confirm that the proposed method is highly sensitive
to a swift change in the plain-image and results into significant change in the encrypted
images C2(i, j).
Table 5
Test image
Cattle-driver
99.596
99.585
99.610
Barbara
99.613
99.564
99.607
Airplane
99.576
99.535
99.591
Peppers
99.558
99.621
99.583
Baboon
99.579
99.604
99.566
Parrots
99.613
99.589
99.540
126
different shuffling and diffusion of image pixels is resulted when different plain-images
are encrypted. Therefore, the known-plaintext (KPA), chosen-plaintext (CPA) and
chosen-ciphertext (CCA) attacks are become inapplicable. Hence, the proposed method
can resist the KPA/CPA/CCA attacks.
Conclusions
To rule out the shortcomings of single and low-dimensional chaotic systems, a multiple
high-order chaos-based multimedia colour image encryption method is presented. The
method constitutes the shuffling and diffusion phases. Theses phases are designed such
that any minor change in the plain-image leads to different image shuffling and diffusion.
The image-information dependent shuffling is performed to destroy the correlation
among the adjacent pixels and complicate the work of cryptanalysts. To further enforce
the security and statistical performance of the method, the shuffled image is diffused in
CBC mode using the encryption keys extracted from the complex dynamic responses of
multiple third-order chaotic systems. The encryption keys are randomly generated out of
numbers of hybridised keys to strengthen the encryption performance. The proposed
method is experimented on a number of standard multimedia colour images to highlight
the encryption performance. The method is resistant to the known cryptographic attacks.
Moreover, the statistical analyses confirm that the proposed method is highly effective,
secure and exhibits great encryption performance.
Acknowledgements
The authors would like to thank the anonymous reviewers for their valuable comments
and suggestions which improved the quality of the paper.
References
Ahmad, M. and Farooq, O. (2010) A multi-level blocks scrambling based chaotic image cipher,
Communications in Computer and Information Science, Vol. 94, No. 4, pp.171182.
Ahmad, M. and Farooq, O. (2011) Secure satellite images transmission scheme based on chaos
and discrete wavelet transform, Communications in Computer and Information Science,
Vol. 169, No. 2, pp.257264.
Chen, Z., Ip, W.H., Cha, C.Y. and Yung, K. (2010) Two-level chaos based video cryptosystem on
H.263 codec, Nonlinear Dynamics, Vol. 62, No. 3, pp.647664.
Corron, N.J., Reed, B.R., Blakely, J.N., Myneni, K. and Pethel, S.D. (2010) Chaotic scrambling
for wireless analog video, Communication in Nonlinear Science and Numerical Simulation,
Vol. 15, No. 9, pp.25042513.
Dang, P.P. and Chau, P.M. (2000) Image encryption for secure internet multimedia applications,
IEEE Transactions on Consumer Electronics, Vol. 46, No. 3, pp.395403.
Deepthi, P.P., Sathidevi, P.S. and Lakshmi, V.S. (2009) A new hardware efficient stream cipher
based on hash functions, International Journal of Communication Networks and Distributed
Systems, Vol. 3, No. 4, pp.340361.
Francia, G.A., Yang, M. and Trifas, M. (2009) Applied image processing to multimedia
information security, International Conference on Image Analysis and Signal Processing,
pp.104107.
127
Francois, M., Grosges, T., Barchiesi, D. and Erra, R. (2012) A new image encryption scheme
based on a chaotic function, Signal Processing: Image Communication, Vol. 27, No. 3,
pp.249259.
Fu, C., Zhang, Z. and Cao, Y. (2007) An improved image encryption algorithm based on chaotic
maps, International Conference on Natural Computation, pp.189193.
Furht, B. and Kirovski, D. (2005) Multimedia Security Handbook, CRC Press, Boca Raton.
Hamdi, M. and Boudriga, N. (2008) Secret-image sharing for multimedia chaotic encryption,
International Conference on Information and Communication Technologies: From Theory to
Applications, pp.16.
Hasimoto-Beltrn, R. (2008) High performance multimedia encryption system based on chaos,
Chaos, Vol. 18, No. 2, pp.18.
Hongjun, L. and Xingyuan, W. (2010) Color image encryption based on one-time keys and robust
chaotic maps, Computers and Mathematics with Applications, Vol. 59, No. 10,
pp.33203327.
Izquierdo, E., Hyoung, J.K. and Macq, B. (2003) Introduction to the special issue on
authentication, copyright protection, and information hiding, Special Issue IEEE Transactions
on Circuits and Systems for Video Technology, Vol. 13, No. 8, pp.729731.
Kanso, A. and Ghebleh, M. (2011) A novel image encryption algorithm based on a 3D chaotic
map, Communication in Nonlinear Science and Numerical Simulation, Vol. 17, No. 7,
pp.29432959.
Kundur, D. and Karthik, K. (2004) Video fingerprinting and encryption principles for digital rights
management, Proceedings of the IEEE, Vol. 92, No. 6, pp.918932.
Kwok, H.S. and Tang, W.K.S. (2007) A fast image encryption system based on chaotic maps with
finite precision representation, Chaos, Solitons and Fractals, Vol. 32, No. 4, pp.15181529.
Lian, S. (2009) Efficient image or video encryption based on spatiotemporal chaos system,
Chaos, Solitons & Fractals, Vol. 40, No. 5, pp.25092519.
Lin, E.I., Eskicioglu, A.M., Lagendijk, R.L. and Delp, E.J. (2005) Advances in digital video
content protection, Proceedings of the IEEE, Vol. 93, No. 1, pp.171183.
Sadhasivam, G.S. and Jini, C.G. (2010) Secure communication between grid domains based on
trust relationships and group keys, International Journal of Communication Networks and
Distributed Systems, Vol. 5, No. 3, pp.263278.
Schneier, B. (1996) Applied Cryptography: Protocols Algorithms and Source Code in C, Wiley,
New York.
Shannon, C.E. (1948) A mathematical theory of communication, Bell Systems Technical Journal,
Vol. 27, No. 3, pp. 379423 (Part I), pp.623856 (Part II).
Silva, R.M., Crespo, R.G., and Nunes, M.S. (2009) LoBa128, a Lorenz-based PRNG for wireless
sensor networks, International Journal of Communication Networks and Distributed Systems,
Vol. 3, No. 4, pp.301318.
Stefan, N. (2011) Stefan Norblins painting in India [online] http://www.culture.pl/web/english/
visual-arts-full-page/-/eo_event_asset_publisher/Ny17/content/
stefan-norblin-s-paintings-in-india (accessed 12/09/2011).
Tong, X. and Cui, M. (2009) Image encryption scheme based on 3D baker with dynamical
compound chaotic sequence cipher generator, Signal Processing, Vol. 89, No. 4, pp.480491.
Watfa, M.K., El-Ghali, M. and Halabi, H. (2009) A hybrid security protocol for sensor networks,
International Journal of Communication Networks and Distributed Systems, Vol. 3, No. 2,
pp.116145.
Zhang, C.N. and Liu, X.W. (2009) An algorithm based mesh check-sum fault tolerant scheme for
stream ciphers, International Journal of Communication Networks and Distributed Systems,
Vol. 3, No. 3, pp.217233.
Zhang, Q., Guo, L. and Wei, X. (2010) Image encryption using DNA addition combining with
chaotic maps, Mathematical and Computer Modelling, Vol. 52, Nos. 1112, pp.20282035.
128
Zhou, Y., Panetta, K. and Aagaian, S. (2008) Partial multimedia encryption with different security
levels, IEEE Conference on Technologies for Homeland Security, pp.513518.
Zhu, C. (2012) A novel image encryption scheme based on improved hyperchaotic sequences,
Optics Communications, Vol. 285, No. 1, pp.2937.