Professional Documents
Culture Documents
Li 2017
Li 2017
1
Faculty of Science and Technology, University of Macau, Ilhas, Macau SAR
2
Faculty of Science and Technology, University of Macau, Ilhas, Macau SAR
2
Faculty of Science and Technology, University of Macau, Ilhas, Macau SAR
E-MAIL: MB55460@umac.mo, MB55412@umac.mo, yytang@umac.mo
With the rapid development of digital technologies and com- This paper is organized as follows. Section 2 designs the new
puter network, more and more digital data carrying all kinds of PRNG based on the two-dimensional QRWs. Section 3 applies
information are transmitted over the networks[1]. Because dig- this PRNG to generate the key code streams for the use of im-
ital images can carry a large amount of information, the topic age encryption. Section 4 presents the confusion and diffusion
of image security has become an important research topic for algorithms and the whole encryption system. Section 5 shows
scholars. the simulation results and security analysis. Section 6 reaches
a conclusion.
` *&&&
1SPDFFEJOHTPGUIF*OUFSOBUJPOBM$POGFSFODFPO8BWFMFU"OBMZTJTBOE1BUUFSO3FDPHOJUJPO
/JOHCP
$IJOB
+VMZ
⎡ −1−s n1 1−n1
⎤
1 √
2 2 2
⎢ n1
s1 n1 ⎥
C1 = ⎣ √
2
√
2 ⎦
(3)
1−s1 n1
√ −1−s1
2 2 2
⎡ −1−s n2 1−n2
⎤
2 √
2 2 2
⎢ n2
s2 n2 ⎥
, C2 = ⎣ √
2
√
2 ⎦
(4)
1−s2 n2
√ −1−s2
2 2 2
ator applied to the coin state, the coin state a determines the
direction of movement on x axis and b determines the direction
on y axis. The coin states of the two particles are both assigned And the probability of locating the quantum at position (x, y)
to a value of 3 in order to let the walker be able to reach all after t steps is:
2
the nine positions nearby include the original position as fig- t
P (x, y, t) = x, y, a, b|(Û ) |φinitial (6)
ure 1 shows. And if the walker moves out of the boundary of a,b∈{0,1,2}
the plane, the next position is regarded as the boundary on the
other side. The conditional shift operator on the plane can be
expressed by equation 2 taking a=0 and b=0 as an example: 3 Pseudo random number generator based on quan-
S|0, 0, x, y = |0, 0, x − 1, y − 1 (2) tum random
walks
1SPDFFEJOHTPGUIF*OUFSOBUJPOBM$POGFSFODFPO8BWFMFU"OBMZTJTBOE1BUUFSO3FDPHOJUJPO
/JOHCP
$IJOB
+VMZ
Due to the big difference of the magnitude in the probability Original image
Diffusion(I) Confusion Diffusion(II)
Cipher image
PM*N CM*N
distribution, we evaluate the magnitudes of the probabilities:
Secret code stream
k(x, y) = f loor(log10 (P (x, y))) (8) generator
Plaintext-related
Secret Key Secret code stream
generator
lowing equation:
FIGURE 3. Decryption Scheme
X(x, y) = (f loor(P1 (x, y) × 1013 )) mod 256 (10)
1SPDFFEJOHTPGUIF*OUFSOBUJPOBM$POGFSFODFPO8BWFMFU"OBMZTJTBOE1BUUFSO3FDPHOJUJPO
/JOHCP
$IJOB
+VMZ
1SPDFFEJOHTPGUIF*OUFSOBUJPOBM$POGFSFODFPO8BWFMFU"OBMZTJTBOE1BUUFSO3FDPHOJUJPO
/JOHCP
$IJOB
+VMZ
Here we take the selected 3 images as examples, N = 2000. 9 Plaintext Sensitivity Analysis
According to the formula to calculate the horizontal, vertical
and diagonal three directions of the correlation coefficients, the For a given plain image P1 , the corresponding cipher im-
plain image and cipher image in the three directions of the cor- age C1 is obtained by encrypting with the secret key K. Then
relation coefficients are shown in table 2. randomly choose a pixel (i, j) and in order to analyze the sen-
sitivity of the algorithm, we make minor change on this pixel
TABLE 2. Correlation coefficients of the plain and cipher images
in equation 13:
Image Horizontal Vertical Diagnoal P2 (i, j) = (P1 (i, j) + 1) mod 256 (13)
Plaintext 0.9685 0.9385 0.9167
Lena
Ciphertext -0.0213 0.0267 0.0123
Plaintext 0.6096 0.7289 0.5768 And maintain the other pixels unchanged. Assume that P2 is
Baboon
Ciphertext 0.0268 -0.0154 0.0125
Plaintext 0.9543 0.9424 0.9207
encrypted into C2 with the same secret key. Then calculate the
Pepper NPCR and UACI with the formulas mentioned below.
Ciphertext 0.0143 -0.0125 -0.0287
M N
1
N P CR = |Sign(C1 (i.j) − C2 (i, j))| × 100%
M N i=1 j=1
(14)
M N
The correlation coefficient of the plain images are very large 1 |C1 (i.j) − C2 (i, j)|
U ACI = × 100%
which are close to 1, indicating that there is a strong correlation M N i=1 j=1 256
between the adjacent pixels of the plain images. And the cor-
relation coefficients of the cipher images are very small which
Here we test the three plain images and collect the results in
are close to 0. It shows that the proposed encryption algorith-
table 4.
m reduces the correlation between the pixels to a great extent.
These results indicate that our encryption algorithm has good TABLE 4. Results of plaintext sensitivity tests
ability to resist statistical attacks.
Index Lena Baboon Pepper Theoretical Value
NPCR 99.6094 99.6079 99.6106 99.6094
7 Encryption and Decryption Speed UACI 33.3249 33.448 33.4276 33.4635
Choose the key K = [(1, 0, 0), (0, 1, 0), {130, 140, 150},
√
{ 22 , 12 }, {56, 212, 85}]. Then the original images are encrypt- For two random noise images, the theoretical values of N-
ed and decrypted for 100 times and the mean encryption time PCR and UACI are 99.6094% and 33.4635%[2]. From the
and decryption time are shown in table 3. table we can see that the test results of are very close to the
theoretical ones. It indicates that the proposed encryption algo-
TABLE 3. Results of encryption and decryption time
rithm has excellent property of plaintext sensitivity and is able
Original Image Encryption time Decryption time to resist differential attacks.
Lena 0.1810 0.1806
Baboon 0.1802 0.1807
Pepper 0.1806 0.1806
10 Key Sensitivity Analysis
1SPDFFEJOHTPGUIF*OUFSOBUJPOBM$POGFSFODFPO8BWFMFU"OBMZTJTBOE1BUUFSO3FDPHOJUJPO
/JOHCP
$IJOB
+VMZ
TABLE 5. Results of key sensitivity tests plain image, infinitely close to 8, proving that the encryption
Index Lena Baboon Pepper Theoretical
scheme makes the image randomly distributed.
Value
NPCR 99.5987 99.6002 99.6307 99.6094
x
UACI 33.4302 33.4977 33.3510 33.4635
12 Conclusion
NPCR 99.6216 99.6017 99.5667 99.6094
y
UACI 33.4451 33.3496 33.5039 33.4635 In summary, we have proposed a new PRNG based on a two-
NPCR 99.6109 99.6109 99.6109 99.6094 dimensional QRWs. And we applied this PRNG to generate the
z
UACI 33.4230 33.3843 33.4326 33.4635
NPCR 99.5773 99.6124 99.6429 99.6094
secret code streams for the use of image encryption. Further-
s1 more, to prove the high-level security of this encryption sys-
UACI 33.4695 33.4767 33.2604 33.4635
NPCR 99.6399 99.6033 99.5926 99.6094 tem, we have done the simulation experiment and the security
s2
UACI 33.5382 33.4631 33.5612 33.4635 analysis includes encryption and decryption speed test, key s-
r1
NPCR 99.5865 99.5728 99.5880 99.6094 pace calculation, key sensitivity and plaintext sensitivity anal-
UACI 33.3347 33.5201 33.4175 33.4635 ysis and information entropy etc. As a result, the proposed en-
NPCR 99.6307 99.5895 99.5682 99.6094 cryption scheme has many good characters and is able to resist
r2
UACI 33.4565 33.4762 33.3324 33.4635
differential attacks, statistical attacks and chosen/known plain-
NPCR 96.6629 96.6629 96.6629 99.6094
r3
UACI 33.6183 33.8190 33.8376 33.4635 text attacks and thus can be used for practical communication.
References
As can be seen in table 5, the test values are close to the
theoretical values which indicates that the proposed encryption
[1] Zhongyun Hua and Yicong Zhou. Image encryption using 2d
algorithm is sensitive to the secret key. logistic-adjusted-sine map. Information Sciences, 339:237–253,
2016.
11 Information Entropy
[2] Yong Zhang. The image encryption algorithm with plaintext-
related shuffling. IETE Technical Review, 33(3):310–322, 2016.
Information entropy is used to determine the randomness of
cipher images, the ideal value is 8. We use the proposed scheme [3] A Akhshani, A Akhavan, S-C Lim, and Z Hassan. An image en-
cryption scheme based on quantum logistic map. Communication-
to encrypt the three pictures separately and calculate the infor-
s in Nonlinear Science and Numerical Simulation, 17(12):4653–
mation entropy in the formula of their original image and cipher
4661, 2012.
image respectively.
[4] Yu-Guang Yang, Xin Jia, Si-Jia Sun, and Qing-Xiang Pan. Quan-
L
H(m) = − p(mi ) log2 p(mi ) (15) tum cryptographic algorithm for color images using quantum
i=0 fourier transform and double random-phase encoding. Informa-
tion Sciences, 277:445–457, 2014.
Where L is the gray scale level of the image and p(mi ) is the [5] Ri-Gui Zhou, Qian Wu, Man-Qun Zhang, and Chen-Yi Shen.
emergence probability of gray value i. Quantum image encryption and decryption algorithms based on
quantum image geometric transformations. International Journal
TABLE 6. Results of information entropy tests of Theoretical Physics, 52(6):1802–1817, 2013.
plaintext 7.5770 [6] G Benetti and G Casati. Principles of quantum computation and
Lena
ciphertext 7.9970 infornmation. 2005.
plaintext 7.3891
Baboon [7] Yu-Guang Yang and Qian-Qian Zhao. Novel pseudo-random
ciphertext 7.9971
plaintext 7.5868 number generator based on quantum random walks. Scientific re-
Pepper
ciphertext 7.9972 ports, 6, 2016.
[8] Julia Kempe. Quantum random walks: an introductory overview.
Contemporary Physics, 44(4):307–327, 2003.
As shown in table 6, from which we know that the value of [9] Yicong Zhou, Long Bao, and CL Philip Chen. Image encryption
the original images information entropy is much lower than 8. using a new parametric switching chaotic system. Signal process-
Because the image redundancy is relatively high. The informa- ing, 93(11):3039–3052, 2013.
tion entropy of the cipher images is much larger than that of the