Professional Documents
Culture Documents
Abstract—With the increasing demand of providing security for This paper introduces a new chaotic system which is
images/videos with private information, chaos-based crypto- composed of three different one-dimensional chaotic maps.
systems have played an important role in image encryption The proposed system uses the Logistic map as a controller to
because of their excellent random properties and encryption choose the Tent map or Sine map to generate random
performance. However, existing chaos-based systems have the
security defect due to small key space or other security weakness.
sequences. The new system shows more complicated chaotic
This paper introduces a new chaotic system using a combination behaviors.
of three conventional chaotic maps. The proposed chaotic system To simplify the structure of the encryption system while
shows excellent chaotic behaviors. To demonstrate its application providing the high level of security, a new image encryption
in image processing, a new image encryption scheme using the
proposed chaotic system is also introduced. Computer simulation algorithm is then introduced using the proposed encryption
and security analysis demonstrate that the proposed image system. To satisfy the Shannon’s confusion and diffusion
encryption scheme shows excellent encryption performance, high properties, the proposed encryption system uses the
sensitivity to the security keys, and a sufficiently large key space substitution-permutation network (SPN) structure [11]. To
to resist the brute attack. enhance the security level, the encryption and decryption keys
Keywords- image encryption; chaotic system
with the size of 240 bits are known to be long enough to
withstand the brute-force attacks. Computer simulation and
security analysis will be given.
I. INTRODUCTION
The paper is divided into five parts. In SectionII, the new
Nowadays, information always plays a vital role in social chaotic system will be introduced and its chaotic property will
communication. To deliver information, people utilize images, be also observed. Then in Section III, the SPN based
sounds, texts and videos to express what they want the others encryption system using the new chaotic system will be
to know. Among these ways, the image is so popular for its proposed. Computer simulation and security analysis will be
authenticity and intuitiveness. With wide use of the images, shown in Section IV. In Section V, a conclusion will be
especially the ones transmitting on the Internet, security of the reached.
images has become an imperative problem to deal with. Image
encryption is an effective method to protect images by
transforming them into an unrecognized format. In existing II. THE NEW CHAOTIC SYSTEM
methods of image encryption, the chaos-based image This section introduces a new framework of the chaotic
encryption algorithms have many advantages for the random system.
properties of chaotic maps/systems, such as sensitivity to
initial values/system parameters and state ergodicity [1]. The chaotic system consists of a control sequence generator
and a chaotic sequence generator. The Logistic map is used for
For these prominent features, the one/two/three- the control sequence generator to choose one of two maps: the
dimensional chaotic maps have been explored and utilized in Tent map and Sine map. In the part of the chaotic sequence
the design of the image encryption algorithms since Matthews generator, the Tent map and the Sine map are used as
[2]. One-dimensional chaotic maps, like the Logistic map [3], generating maps to generate the output chaotic sequence. The
Tent map [4], Sine map and Guass map [5], have been used in function F in Eqn. (1) represents the chaotic system. We use
practice for their simple structures, fast encryption speed and the control sequence to choose one of the generating maps.
limited calculation amount. In 1995, Phatak and Rao used the
Logistic map to generate pseudorandom numbers [6]. In 2001, f 1( Xi ) qi = 0
Sobhy and Shehata found that the opponent could identify a Xi + 1 = F ( Xi, qi ) = ® (1)
¯ f 2 ( Xi ) q i = 1
chaotic system with single one-dimensional chaotic map by
using the iteration and auto-correlation function [7]. Then in u ∗ Xi Xi < 0.5
f 1( Xi ) = T ( Xi ) = ® (2)
2006, a chaotic system employing two chaotic Logistic maps, ¯u ∗ (1 − Xi ) Xi ≥ 0.5
to overcome the small space and other security issues, was f 2( Xi ) = S ( Xi ) = a ∗ sin(π Xi ) (3)
applied to image encryption [8]. Although the chaotic system th
is simple, the encryption system is extremely complicated. In Here, qi is the i element of the control sequence
2011, the chaos-based encryption systems have been well produced by the Logistic map.
developed. However, in [9, 10], the authors intended to build a
complicated encryption structure without considering the f 3(Yi ) = L(Yi ) = r ∗ Yi ∗ (1 − Yi) (4)
chaotic map itself to provide a high security level.
0.8
value of sequence S3
0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1
value of sequence S0 value of sequence S2
(a) (b)
Figure 1. Random-like relationship between two chaotic sequences generated
by the new chaotic system under different conditions: (a) changing parameters;
(b) changing initial values;
70
TABLE I. FUNCTIONS OF TEN PARTS OF TEN ENCRYPTION KEY B. Generate the chaotic sequence
Key part Function The new chaotic system generates the chaotic sequences at
Ke0 To calculate the initial values of the Logistic map
Ke1 The parameter of the Logistic map
length of WhL. In the first step, the parameters of three one-
Ke2 The parameter of the Tent map dimensional maps and the initial values of the Logistic map are
Ke3 The parameter of the Sine map determined by the encryption key. Once the variables of the
Ke4 The initial value of the S0 chaotic system chaotic system are determined, the chaotic system is fixed and
Ke5 The initial value of the S1 chaotic system then starts to generate the chaotic sequences for image
Ke6 The initial value of the S2 chaotic system encryption.
Ke7 The initial value of the S3 chaotic system
Ke8 The initial value of the S4 chaotic system
Ke9 The initial value of the S5 chaotic system C. Encrypt the input image
th
Here, Ki represents the i part of the encryption key with This paper uses the SPN structure to organize the
24 bits. Kei stands for the decimal numbers calculated by framework of the image encryption process using the chaotic
Eqn.(8). sequences. The SPN mainly consists of two basic operations:
23
the pixel permutation and pixel substitution.
¦K ij ×2j There are several different methods to perform the pixel
Kei =
j =0 (8) permutation. This paper uses the chaotic sequence S with the
24
2
To improve the random properties of the new chaotic length of WhL, produced by the proposed chaotic system, as
system, the parameters of three one-dimensional maps are set reference matrix to scramble image pixel positions. The
in the range where each one-dimensional map shows excellent algorithm first changes the input image into one-dimension
chaotic behaviors. By the simulation of three one-dimensional matrix column by column from left to right. Then by sorting
maps, individually, it is easy to get the results. The range of the the order of the sequence S, the chaotic sequence is changed
Logistic maps is between 3.8 and 4. The range of the Tent into a sorted order. In relation of changing the sequence S, the
maps is between 1.5 and 2. The range of the Sine maps is same change is made to the one-dimensional image matrix to
between 0.9 and 1. So changes in the parameter settings are scramble pixels positions in the input image. By this way, the
made according to Eqns. (9)-(11). positions of pixels are upset and the image is unrecognized.
Although the pixel permutation will make the content of
Ke1 image unrecognized, the attacker will get some information by
r= + 3.8 (9)
5 the histogram analysis to rebuild the image. Therefore, doing
Ke 2 only the pixel permutation is not enough. Therefore, the pixel
u= + 1.5 (10) substitution is adapted to change the image histogram.
2
Ke3 The random-like sequence S is used to encrypt the input
a= + 0.9 (11) image by using Eqn. (15).
10
The decryption Kd is generated by the encryption system. C = mod ( floor ( S ∗ F ) + P, F ) (15)
The difference between Kd and Ke is the value of the first Here, the FLOOR(X) rounds the elements of X to the
part ( K 0 ) of the keys. Kd0 is defined in Eqn. (12). nearest integers towards minus infinity and MOD(x, y) is
reminder of x/y.
Ke0 + Kp
Kd 0 = (12) The pixel substitution changes the image histogram into
2
uniform-like distribution.
Here, Kp is obtained from a given plaintext image P as
shown in Eqn. (13). The value of F depends on the type of IV. SIMULATION AND ANALYSIS
images to be encrypted. For the grayscale images, F is equal to
256. A. Simulation results
W L
The encryption and decryption algorithms are
¦¦ P
j =1 i =1
i, j
implemented in MATLAB. The simulation results
Kp = (13) demonstrate that the proposed new algorithm shows good
W *L*F
performances in image encryption.
Each initial value Xi (0) (i=0, 1, 2, 3, 4, 5) of the Logistic
map in the new chaotic system is decided by Kd 0 and the The encrypted image in Figure 4(b) is completely different
from the original image and cannot be recognized. This shows
initial value Kei of the corresponding new chaotic system. the success of the encryption algorithm. The decrypted image
Kd 0 + Kei + 4 in Figure 4(c), getting from the decryption process, is the same
Xi ( 0 ) = (14) as the original image in Figure 4(a). This shows the success of
2 the decryption algorithm.
71
key will result in a value change (at least 5.9605 ∗ 10−8 ). A
well-known test has been performed in this paper. The original
image is encrypted with the key1 and key2 to obtain two
encrypted images. The absolute value of the difference
between these two encrypted images is then obtained.
Key1=“0123456789abcdefedcba9876543210123456789ab
cdefedcba987654321”
600
2000 2000
500
Key2=“0123456789abcdefedcba9876543210123456789ab
1500 400 1500
cdefedcba987654320”
300
1000 1000
500
200
500
The difference between key1 and key2 is value of the last
100
500
500
expand the space by doing so, the system will generate the
300
200
200
200
200
0 0
0 0
sensitive to the encryption key. The encryption key in the (a) (b) (c) (d)
proposed encryption algorithm is composed of ten parts which Figure 5. Key sensitivity test on the encryption keys: (a) original image
determine the parameters and initial values. Every part and its histogram; (b) encrypted image ( P1 ) using key1 and its histogram; (c)
consists of 24 bits which means that a single difference in the the encrypted image ( P2 ) using key2 and its histogram;(d) difference image
˄ |P1-P2| ˅and its histogram
72
VI. ACKNOWLEDGEMENT
This work was supported by Research Committee of the
University of Macau under grant SRG007-FST12-ZYC and
conference grant as well as the National Natural Science
Foundation of China with Grant No. 61172089.
1400 600 1400 600
1200
1000
500
1200
1000
500 REFERENCES
400 400
800 800
300 300
600 600
0
0
(a) (b) (c) (d) Proceedings. 4th International Conference on, 2003, pp.
Figure 6. Key sensitivity test on the decryption keys: (a) original image 819-823.
and its histogram; (b) encrypted image and its histogram; (c) decrypted image
using dekey1 and its histogram; (d) decrypted image using dekey2 and its [2] R. Matthews, "On the derivation of a Chaotic encryption
histogram algorithm," Cryptologia, vol. 8, pp. 29-41, 1984.
[3] N. Singh and A. Sinha, "Optical image encryption using
F −1
1
H (I ) = ¦ P (i ) log 2 (16) Hartley transform and logistic map," Optics
P (i )
i =0
Communications, vol. 282, pp. 1104-1109, 2009.
Here, P(i) represents the probability of pixels with the [4] X. Yi, "Hash function based on chaotic tent maps," IEEE
value equal to i ( from 0 to F-1 ). Transactions on Circuits and Systems II: Express Briefs,
vol. 52, pp. 354-357, 2005.
TABLE II. INFORMATION ENTROPY ANALYSIS [5] W. Yue, J. P. Noonan, and S. Agaian, "A wheel-switch
File name Information entropy of Information entropy of chaotic system for image encryption," in System Science
original image encrypted image and Engineering (ICSSE), 2011 International
Lena image 7.5534 7.9669
Conference on, 2011, pp. 23-27.
Circle image 6.0408 7.9652
Clock image 6.7057 7.9667 [6] S. C. Phatak and S. S. Rao, "Logistic map: A possible
random-number generator," Physical Review E, vol. 51,
In these tests on the grayscale images, F is equal to 8 and 8 p. 3670, 1995.
bits are used to represent the pixel value. From Table II, [7] M. I. Sobhy and A. E. R. Shehata, "Methods of attacking
information entropy has been increased with the encryption
chaotic encryption and countermeasures," in Acoustics,
system and the information entropy of the encrypted image is
almost near to 8. This confirms that the pixel values after Speech, and Signal Processing, 2001. Proceedings.
encryption process seems random, which is sufficient secure (ICASSP '01). 2001 IEEE International Conference on,
for information leakage. 2001, pp. 1001-1004 vol.2.
[8] N. K. Pareek, V. Patidar, and K. K. Sud, "Image
V. CONCLUSION encryption using chaotic logistic map," Image and
Vision Computing, vol. 24, pp. 926-934, 2006.
In this paper, a new chaotic system using a combination of
[9] C. Fu, B.-b. Lin, Y.-s. Miao, X. Liu, and J.-j. Chen, "A
three conventional one-dimensional chaotic maps has been
proposed. The new system chooses the Sine map or the Tent novel chaos-based bit-level permutation scheme for
map to generate the chaotic sequence according to the output digital image encryption," Optics Communications, vol.
value of the Logistic map. The system shows better chaotic 284, pp. 5415-5423, 2011.
performance by inheriting the high sensitivity to the initial [10] R. Ye, "A novel chaos-based image encryption scheme
conditions and expanding the range of parameters. At the with an efficient permutation-diffusion mechanism,"
same time, this combination makes the generation of the Optics Communications, vol. 284, pp. 5290-5298, 2011.
chaotic sequences more complicated and difficult to be [11] D. R.Stinson, Cryptography.Theory and Practice.Third
identified by iterates and auto-correlation functions. edition: Chapman & Hall/CRC, 2006.
We have introduced a novel image encryption algorithm [12] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone,
using the proposed new chaotic system. The SPN structure of Handbook of Applied Cryptography. New York: CRC
the encryption algorithm ensures its properties of diffusion Press, Inc., 1997.
and confusion. Meantime, histogram analysis shows the [13] G. Alvarez and S. Li, "Some basic cryptographic
encryption performance of the proposed algorithm. The requirements for chaos-based cryptosystems,"
security key analysis shows that algorithm has the sufficiently International Journal of Bifurcation and Chaos, vol. 16,
large key space to resist the brute-force attack and high pp. 2129-2151, 2006.
sensitivity to the key changes for encryption and decryption.
All these show that the proposed encryption algorithm has a
high level of security.
73