DOI QR코드

DOI QR Code

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

  • Zhang, Xiao (Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems Science, Beihang University) ;
  • Wang, Chengqi (Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems Science, Beihang University) ;
  • Zheng, Zhiming (Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems Science, Beihang University)
  • Received : 2016.05.16
  • Accepted : 2017.01.23
  • Published : 2017.03.31

Abstract

In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.

Keywords

Acknowledgement

Supported by : National Natural Science Foundation of China

References

  1. Y. Wang, K. W. Wong, X. F. Liao, T. Xiang and G. R. Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773-1783, 2009. https://doi.org/10.1016/j.chaos.2008.07.031
  2. C. Fu, W. H. Meng, Y. F. Zhan, Z. L. Zhu, F. C. M. Lau, C. K. Tse and H. F. Ma, "An efficient and secure medical image protection scheme based on chaotic maps," Computers in biology and medicine, vol. 43, no. 8, pp. 1000-1010, 2013. https://doi.org/10.1016/j.compbiomed.2013.05.005
  3. N. K. Pareek, V. Patidar and K. K. Sud, "Cryptography using multiple one-dimensional chaotic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 10, no. 7, pp. 715-723, 2005. https://doi.org/10.1016/j.cnsns.2004.03.006
  4. Q. Mao, C. C. Chang and H. L. Wu, "An image encryption scheme based on concatenated torus automorphisms," KSII Transactions on Internet & Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013. https://doi.org/10.3837/tiis.2013.06.009
  5. K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S. W. Baik, "A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption," KSII Transactions on Internet & Information Systems, vol. 9, no. 5, pp. 1938-1962, 2015. https://doi.org/10.3837/tiis.2015.05.022
  6. Y. J. Liu and Y. Q. Zheng, "Adaptive robust fuzzy control for a class of uncertain chaotic systems," Nonlinear dynamics, vol. 57, no. 3, pp. 431-439, 2009. https://doi.org/10.1007/s11071-008-9453-0
  7. C. Q. Wang, X. Zhang and Z. M. Zheng, "Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme," PLoS One, vol. 11, no. 2, pp. e0149173, 2016. https://doi.org/10.1371/journal.pone.0149173
  8. C. Q. Wang, X. Zhang and Z. M. Zheng, "A novel image encryption algorithm based on multiple chaotic systems and self-adaptive model," in Proc. of the 2015 International Conference on Communications, Signal Processing, and Systems, pp. 677-685, 2016.
  9. O. Fatih, O. B. Ahmet and Y. Sirma, "Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 24, pp. 4946-4948, 2012. https://doi.org/10.1016/j.optcom.2012.07.106
  10. D. Xiao, X. F. Liao, S. J. Deng, "A novel key agreement protocol based on chaotic maps," Information Sciences, vol. 177, no. 4, pp.1136-1142, 2007. https://doi.org/10.1016/j.ins.2006.07.026
  11. C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, "An extended chaotic maps-based key agreement protocol with user anonymity," Nonlinear Dynamics, vol. 69, no. 1, pp. 79-87, 2012. https://doi.org/10.1007/s11071-011-0247-4
  12. C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyper-chaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013. https://doi.org/10.1007/s11071-013-0924-6
  13. C. Q. Wang, X. Zhang and Z. M. Zheng, "An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems," Multimedia Tools and Applications, pp. 1-27, 2016.
  14. C. X. Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29-37, 2012. https://doi.org/10.1016/j.optcom.2011.08.079
  15. B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion," Multimedia tools and applications, vol. 71, no. 3, pp. 1469-1497, 2014. https://doi.org/10.1007/s11042-012-1292-9
  16. C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyperchaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013. https://doi.org/10.1007/s11071-013-0924-6
  17. Y. S. Zhang, D. Xiao, W. Y. Wen and M. Li, "Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Nonlinear Dynamics, vol. 76, no. 3, pp. 1645-1650, 2014. https://doi.org/10.1007/s11071-014-1235-2
  18. E. Solak, C. Cokal, O. T. Yildiz and T. Biyikoglu, "Cryptanalysis of Fridrich's chaotic image encryption," International Journal of Bifurcation and Chaos, vol. 20, no. 5, pp. 1405-1413, 2010. https://doi.org/10.1142/S0218127410026563
  19. Y. T. Li, D. Xiao, S. J. Deng, Q. Han and G. Zhou, "Parallel Hash function construction based on chaotic maps with changeable parameters," Neural Computing and Applications, vol. 20, no. 8, pp. 1305-1312, 2011. https://doi.org/10.1007/s00521-011-0543-4
  20. Y. P. Hu, C. X. Zhu and Z. J. Wang, "An improved piecewise linear chaotic map based image encryption algorithm," The Scientific World Journal, pp. 1-7, 2014.
  21. G. R. Chen, Y. B. Mao and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004. https://doi.org/10.1016/j.chaos.2003.12.022
  22. T. G. Gao and Z. Q. Chen, "A new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008. https://doi.org/10.1016/j.physleta.2007.07.040
  23. G. Alvarez and S. J. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006. https://doi.org/10.1142/S0218127406015970
  24. P. Ping, F. Xu and Z. J. Wang, "Image encryption based on non-affine and balanced cellular automata," Signal Processing, vol. 105, pp. 419-429, 2014. https://doi.org/10.1016/j.sigpro.2014.06.020
  25. X. Y. Wang and C. Q. Jin, "Image encryption using game of life permutation and PWLCM chaotic system," Optics Communications, vol. 285, no. 4, pp. 412-417, 2012. https://doi.org/10.1016/j.optcom.2011.10.010
  26. R. J. Chen and J. L. Lai, "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631, 2007. https://doi.org/10.1016/j.patcog.2006.11.011
  27. L. Y. Zhang, X. B. Hu, Y. S. Liu, K. W. Wong and J. Gan, "A chaotic image encryption scheme owning temp-value feedback," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 10, pp. 3653-3659, 2014. https://doi.org/10.1016/j.cnsns.2014.03.016
  28. V. Patidar, N. K. Pareek, G. Purohit and K. K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331-4339, 2011. https://doi.org/10.1016/j.optcom.2011.05.028
  29. X. L. Huang and G. D. Ye, "An efficient self-adaptive model for chaotic image encryption algorithm," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 12, pp. 4094-4104, 2014. https://doi.org/10.1016/j.cnsns.2014.04.012
  30. C. Q. Wang, X. Zhang and Z. M. Zheng, "An efficient image encryption algorithm based on a novel chaotic map," Multimedia Tools and Applications, pp. 1-30, 2016.
  31. C. Q. Li, "Cracking a hierarchical chaotic image encryption algorithm based on permutation," Signal Processing, vol. 118, pp. 203-210, 2016. https://doi.org/10.1016/j.sigpro.2015.07.008
  32. Z. X. Qian, H. Zhou, X. P. Zhang and W. M. Zhang, "Separable Reversible Data Hiding in Encrypted JPEG Bitstreams," IEEE Transactions on Dependable and Secure Computing, pp. 1-13, 2016.
  33. Z. X. Qian, X. P. Zhang and S. Z. Wang, "Reversible data hiding in encrypted JPEG bitstream," IEEE transactions on multimedia, vol. 16, no. 5, pp. 1486-1491, 2014. https://doi.org/10.1109/TMM.2014.2316154

Cited by

  1. Adaptive firefly algorithm based optimized key generation for image security vol.36, pp.5, 2019, https://doi.org/10.3233/jifs-169998
  2. An ASCII based effective and multi-operation image encryption method vol.79, pp.31, 2017, https://doi.org/10.1007/s11042-020-08897-4
  3. A New Method of Denoising Crop Image Based on Improved SVD in Wavelet Domain vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/9995813
  4. Software Implementation and Design of Information Encryption Algorithm Based on DNA Nano Self-Assembled Sensor Array vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/5800620