Literature DB >> 28910349

A semi-symmetric image encryption scheme based on the function projective synchronization of two hyperchaotic systems.

Xiaoqiang Di1, Jinqing Li1, Hui Qi1, Ligang Cong1, Huamin Yang1.   

Abstract

Both symmetric and asymmetric color image encryption have advantages and disadvantages. In order to combine their advantages and try to overcome their disadvantages, chaos synchronization is used to avoid the key transmission for the proposed semi-symmetric image encryption scheme. Our scheme is a hybrid chaotic encryption algorithm, and it consists of a scrambling stage and a diffusion stage. The control law and the update rule of function projective synchronization between the 3-cell quantum cellular neural networks (QCNN) response system and the 6th-order cellular neural network (CNN) drive system are formulated. Since the function projective synchronization is used to synchronize the response system and drive system, Alice and Bob got the key by two different chaotic systems independently and avoid the key transmission by some extra security links, which prevents security key leakage during the transmission. Both numerical simulations and security analyses such as information entropy analysis, differential attack are conducted to verify the feasibility, security, and efficiency of the proposed scheme.

Entities:  

Mesh:

Year:  2017        PMID: 28910349      PMCID: PMC5599019          DOI: 10.1371/journal.pone.0184586

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


Introduction

With the rapid growth of broadband communication, multimedia transmission has increased over the Internet, which makes information and communication systems more vulnerable. Image security has attracted a huge amount of attention due to the widespread interconnection of almost all devices and communication networks. Image encryption differs from text encryption due to bulk data capacity, high redundancy and a strong correlation between adjacent pixels. Since Matthews [1] first proposed the chaos encryption algorithm in 1989, many studies have indicated that chaotic encryption are suitable for bulk data due to its favorable properties, such as complex and nonlinear, high sensitivity to initial conditions, control parameters, non-periodicity, and a pseudorandom nature. Many image encryption algorithms [2-25] based on chaos have been developed in last decades to ensure the security of digital images transmission and storage. Most of them adopted permutation-diffusion mechanism [3–7, 11, 16, 17, 19, 21], in which permuting the positions of image pixels incorporates with changing gray values of image pixels to confuse the relationship between the cipher image and the plain image. A previous study [26]proposed an image encryption/decryption algorithm with compound chaos mapping, in addition, a hyperchaotic system based on chaotic control parameters was put forward. Another study [27] presented an image encryption scheme on the foundation of multiple chaotic maps while an alternate work [28] proposed an image encryption algorithm on the basis of rotation matrix bit-level permutation and block diffusion. Akram Belazi proposed several image encryption schemes [23-25] based on chaos and obtained the good encryption effect. An encryption method on the basis of reversible cellular automata combined with chaos has also been designed in [12]. Ref [29] presented a color image encryption scheme on the foundation of the quantum chaotic system. According to the type of the key usage, encryption algorithm can be divided into symmetric encryption and asymmetric encryption. The same secret key is used to encrypt and decrypt in symmetric encryption algorithms. Most chaos image encryption schemes are based on symmetric cryptographic techniques, which have been proven to be more vulnerable than an asymmetric cryptosystem [30]. Common symmetric encryption algorithms include DES, 3DES and AES. They are widely used due to their advantages such as great speed, relatively low complexity as well as easy implementation in hardware. Since both encryption and decryption sides should configure the key by some extra methods, once the key is divulged the cryptosystems will be broken. Furthermore, each pair of users need choose a unique key that nobody else knows. This makes the quantity of key to be growing exponentially. Asymmetric encryption differs from symmetric encryption that it requires a key pair: a public key for encryption and a corresponding private key for decryption which is known only to the owner. The most common asymmetric encryption algorithm is RSA. In an asymmetric key cryptosystem, any user can encrypt a message using the public key of the receiver, but such a message can be decrypted only with the receiver’s private key [31]. It is unlike symmetric encryption to share the key, asymmetric encryption do not require a secure channel for the initial exchange of the key from transmitter to receiver. Although asymmetric cryptosystem has so many advantages, it also has disadvantages. For example, it is extremely difficult to factorize large numbers in order to obtain sufficiently long keys especially enormous data. Since Pecora and Corrall found the drive-response chaos synchronization phenomena [32], a lot of synchronization schemes have been proposed, such as complete synchronization, generalized synchronization, phase synchronization, lag synchronization, projective synchronization. Two chaotic systems synchronization phenomenon is similar to the asymmetric key mechanism, and they can synchronize with each other if they exchange information in just the right way. This motivates us to use chaos synchronization to avoid the key transmission in order to combine the advantage of the symmetric and asymmetric encryption and try to overcome their shortcomings. In this paper, we propose a new color image cryptosystem using a synchronization scheme for a 3-cell QCNN [33] and a 6-order CNN [34]. The 3-cell QCNN is regarded as the response system and the 6th order CNN is used for the drive system. In order to synchronize the drive-response system, the control law for stable synchronization errors and the update rule for unknown parameters estimation are given. The function projective synchronization [35] is treated as the decryption key generator. We prove that the 6-order CNN drive system and the 3-cell QCNN response system are asymptotically synchronized. Numerical simulations and security analyses such as information entropy analysis, differential attack are performed to verify the feasibility of the proposed scheme. As similar as the asymmetric encryption, our scheme does not require exchange key, and it effectively avoids the threat of key exposure, therefore, it will be called Semi-Symmetric encryption scheme. The rest of the paper is organized as follows: In the next section, we briefly describe the 3-cell QCNN system and the 6-order CNN system used in our scheme. In Section 3, the function projection synchronization between the response system and the drive system is presented. Section 4 gives the semi-symmetric encryption scheme. The experimental results and performance analyses are given in Section 5. Section 6 concludes the paper.

System descriptions

3-cell QCNN hyperchaotic system

Quantum dots and quantum cellular automata (QCA) [36] constitute new types of semiconductor nano-materials that have many unique nano-features. The k QCA state equation is obtained by the Schrödinger equation [36]: where ℏ is Planck’s constant, γ is the inter-dot tunneling energy, which takes into account the neighboring polarizations, and E is the electrostatic energy cost of two adjacent fully polarized cells that have opposite polarization. The effect of local interconnections is considered in the term ; and φ is a quantum phase of the QCA. Eq (1) constitutes the QCNN state equations and its dynamics are characterized by two variables, P and ϕ. A 3–cell QCNN system can be described as Eq (2): where P1, P2, P3 and ϕ1, ϕ2, ϕ3 are the state variables; b01, b02, and b03 are the proportional inter–dot energy in each cell, and ω01, ω02, ω03 are effect weigh parameters on the differences in the polarization of the adjacent cells, like the cloning templates in traditional CNNs. The Fig 1, shows the attractor of system(2) in three dimensional space. We investigated the dynamic behavior of system(2) by calculating its Lyapunov exponents. When b01 = b02 = b03 = 0.28, ω01 = 0.5, ω02 = 0.2, and ω03 ∈ [0, 1], which are shown in Fig 2, system(2) is hyperchaotic due to three positive Lyapunov exponents.
Fig 1

3-cell QCNN system partial attractor distribution.

Fig 2

3-cell QCNN system Lyapunov exponents spectrum with b01 = b02 = b03 = 0.28, ω01 = 0.5, ω02 = 0.2, and ω03 ∈ [0, 1].

6-order CNN hyperchaotic system

The 6-order CNN is another hyperchaotic system used in this paper, which is introduced in Ref [34], and it is all the interconnection in a CNN. Its state equation is defined as Eq (3): where Eq (3) could be calculted as Eq (4): where p4 = 0.5(|x4 + 1| − |x4 − 1|). We calculated the Lyapunov exponents of system(4). When t → ∞, the six Lyapunov exponents are λ1 = 2.748, λ2 = −2.9844, λ3 = 1.2411, λ4 = −14.4549, λ5 = −1.4123 and λ6 = −83.2282. Two of these exponents are positive, so system(4) is also hyperchaotic. Fig 3 shows system(4)’s partial chaotic attractor distribution.
Fig 3

6-order CNN partial chaotic attractor distribution.

The synchronized key generation system

Let System(4) and System(2) be the drive system and the response system, respectively. Thus, the system(2) can be described by the Eq (5) via the function projective synchronization [35]: where b11, b12, b13, ω11, ω12 and ω13 are the parameters of response system(5) that need to be estimated in order to synchronize system(4) and system(5), and u1, u2, u3, u4, u5 and u6 are the controllers. Define synchronization error states as follows: which denotes the deviation between system(4) and system(5), when converges to zero as time tends to infinity , α(t) as the scaling function factor, drive system and response system reach synchronization. Substituting Eqs (2), (4) and (5) into Eq (6) yields the error dynamical system(7) as defined in Eq (7) between system(4) and system(5): We design the control law u(i = 1, 2, 3, 4, 5, 6) as Eq (8) to make the synchronization errors e1, e2, e3, e4, e5, and e6 to stabilize at the origin. Furthermore, the update rule for the six unknown parameters b11, b12, b13, ω11, ω12, and ω13 are Eq (9) defined as follows: Where k > 0(i = 1, 2, 3, …, 12), and e = b11−b01, e = ω11 − ω01, e = b12 − b02, e = ω12 − ω02, e = b13 − b03, e = ω13 − ω03. Theorem. For a given nonzero scaling function factor α(t), it can make response system(5) and drive system(4) to synchronize by the control law Eq (8) and the update rule Eq (9). Proof. Choose the following Lyapunov function: The time derivative of V along the trajectory of the error system(6) is where e = (e1, e2, e3, e4, e5, e6, e, e, e, e, e, e), and K = diag(k1, k2, k3, k4, k5, k6, k7, k8, k9, k10, k11, k12) Because , we have e1, e2, e3, e4, e5, e6, e, e, e, e, e, e → 0 as t → ∞. i.e.,. Proof completed. Simulation is performed in order to evaluate the feasibly and effectiveness of the proposed control law and the update rule for the 3-cell QCNN and 6-order CNN synchronization method. The initial values and control parameters of the drive and the response system for a time-step of 0.1 are shown in Table 1.
Table 1

Initial values and control parameters of drive and response system.

Drive systemResponse systemControl parameters of Response system
x1(0) = −0.92Pr1(0) = 0.1901b11 = 0.5
x2(0) = 1.41ϕr1(0) = −184.3ω11 = 0.6
x3(0) = −1.53Pr2(0) = 0.123b12 = 0.4
x4(0) = 0.48ϕr2(0) = −147.3ω12 = 0.7
x5(0) = 0.37Pr3(0) = 0.113b13 = 0.7
x6(0) = −1.21ϕr3(0) = −197.85ω13 = 0.5
In addition, the scaling function α(t) = 0.5 + 0.1 sin(t) and the control gains are defined as (k1, k2, k3, k4, k5, k6, k7, k8, k9, k10, k11, k12) = (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1). The simulations results are illustrated in Figs 4 and 5. Fig 4 shows that the errors e1, e2, e3, e4, e5, and e6 approach zero. Fig 5 shows that the estimated unknown parameters converge to b11 → 0.28, ω11 → 0.4, b12 → 0.28, ω12 → 0.35, b13 → 0.28, and ω13 → 0.25 as t → ∞. When t = 10, synchronization errors close 0 and unknown control parameters reach stability, which shows that the synchronization method is efficient.
Fig 4

Error signals between the drive and the response system.

Fig 5

Estimated values for unknown parameters.

The semi-symmetric image encryption scheme

In this paper, we propose a semi-symmetric image encryption/decryption scheme based on the function projective synchronization. The proposed scheme is illustrated in Fig 6. The scheme is deployed at the ends of Alice and Bob, respectively. Firstly, Alice adopts system(2) with initial parameters and control parameters to obtain the key. Bob adopts system(5) to obtain the key independently. Function projective synchronization ensures that Alice and Bob get the equivalent key. Secondly, Alice encrypts the plain image by his key and transmits the cipher image to Bob. Thirdly, Bob decrypts the cipher image with his key.
Fig 6

Semi-symmetric image encryption/decryption scheme.

The proposed scheme is different with symmetric algorithms that Alice and Bob use in different key generation systems. The symmetric algorithms transmit the key by some extra security methods. The proposed scheme is similar to asymmetric algorithms that the keys generated by the two systems need not transmit to each other over other security link, which prevents security key leakage during the transmission. Our scheme is a hybrid chaotic encryption algorithm. It consists of a scrambling stage and a diffusion stage. In encryption phase, 3-cell QCNN system(2) is used for scrambling and diffusing the plain image. In decryption phase, since the function projective synchronization is used to synchronize the response system(5) and drive system(4), the 6-order CNN drive system(4) with control laws(8) and update rules(9) generates the key to decrypt the cipher image.

Encryption algorithm

This encryption flowchart is presented in Fig 7.
Fig 7

Encryption flowchart.

The 3-cell QCNN system(2) is the encryption key generator. The initial conditions ϕ1(0), ϕ2(0), ϕ3(0), P1(0), P2(0), and P3(0) and control parameters b01, b02, b03, ω01, ω02, and ω03 are used to iterate system(2) M times. The results are ϕ1, ϕ1, ϕ3, P1, P2, and P3 encryption keys. In the scrambling stage, the Arnold mapping [37] defined that Eq (10) is used to scramble the three color components of the plain color image. Since det(A) = 1, the parameters are described as follows: The iterations of Arnold mappings are The plain image is scrambled by Eq (10) in order to generate the permutation image. It is transformed into three 1 × (N × N) streams S = {S(1), S(2), ……S(N × N)}, j ∈ {r, g, b} by arranging its pixels from top to bottom and left to right. In the diffusion stage, 6-order CNN system(4) is used to diffuse the image, which changes the permutation image pixel’s values. The initial conditions are described as follows: Of these initial conditions, γ is taken as the appropriate integer. P is chaotic value, so the initial conditions x(0) is also chaotic value. Let the plain image be an N × N image. The 6-CNN is iterated times and its result is divided into three matrices:X, X, and X: Arranging matrix elements from top to bottom and from left to right, X, X, and X are transformed into three 1 × (N × N) streams: The diffusion key streams, K, are generated by using sequences X_Stream and S as described by Eq (12): Let S(0) = 127. The scramble image is shifted to the cipher image by key streams, K. i = 1, 2, ……, N × N, bitxor(.) function returns the bitwise exclusive OR value of two integers. These C, C, and C row vectors are transformed into N × N matrix. Compose the three color components to obtain the encrypted image.

Decryption algorithm

As shown in Fig 8, the decryption is the inverse process of the encryption, except that the decryption key P, P, P, ϕ, ϕ, and ϕ are generated by the synchronized key generation system instead of 3-cell QCNN(2).
Fig 8

Decryption flowchart.

Performance analysis

In this section, we perform 11 experiments to validate the proposed scheme. The results show that our scheme has good encryption performance.

Key space analysis

The key space size is the total number of different keys that can be applied in the encryption process. The key space must be large enough to make brute-attacks infeasible. Stinson DR. [38] suggested that the key space should be at least 2100 to ensure a high level security. In our algorithm there are twelve parameters for the keys: six initial conditions P1, Φ1, P2, Φ2, P3, Φ3 and six control parameters . They are all floating point numbers. According to the IEEE floating-point standard [39], the computational precision of the 64-bit double-precision numbers is 2—52. So the key space of the proposed encryption method is (252)12 = 2624, which is sufficiently large enough to resist all kinds of brute-force attacks.

Key sensitivity analysis

A secure encryption algorithm must be sensitivity to its keys which satisfies the requirement of resisting brute-force attack. Under the same experiment condition as Eq (13). P1(0), P2(0), P3(0), ϕ1(0), ϕ2(0), ϕ3(0) are QCNN system(2) initial conditions, used as user keys in the proposed encryption scheme. With a tiny difference in the encryption keys, six groups of test cases are designed, which differ 10—13 to every encryption key, respectively. Table 2 lists the percentage of different pixels in RGB color component using Key or Key1, Key2, …, Key6 seven encrypt images, respectively. Therefore, it can be concluded the slightly deviation in the key brings out absolutely different in the corresponding encryption images. Consequently, the proposed scheme has a high key sensitivity and can resist the brute-force attack.
Table 2

Percentage of different pixels in RGB color component using Key or Key1, Key2, …, Key6 encrypted images.

Image color componentKey1Key2Key3Key4Key5Key6
Airplane Red99.595699.615599.583499.64699.589599.588
Airplane Green99.58899.591199.589599.591199.591199.6262
Airplane Blue99.574399.603399.621699.594199.615599.5941
Cablecar Red99.609499.618599.623199.600299.604899.6353
Cablecar Green99.589599.601799.598799.592699.617099.5941
Cablecar Blue99.586599.597299.592699.620199.588099.5789
Cornfield Red99.656799.617099.630799.597299.600299.5804
Cornfield Green99.610999.606399.610999.612499.580499.6323
Cornfield Blue99.603399.585099.589599.627799.549999.6063
Peppers Red99.612499.592699.624699.607899.612499.6231
Peppers Green99.633899.61499.58899.623199.543899.5804
Peppers Blue99.606399.61499.563699.603399.642999.5605
Boat Red99.601799.592699.591199.604899.607899.588
Boat Green99.603399.615599.639999.665899.571299.5834
Boat Blue99.58899.583499.624699.610999.58899.5804
Fruits Red99.574399.580499.638499.646099.630799.5865
Fruits Green99.620199.615599.583499.650699.649099.5758
Fruits Blue99.641499.630799.571299.615599.614099.5987
Yacht Red99.588099.585099.612499.591199.658299.6078
Yacht Green99.572899.652199.591199.617099.575899.6155
Yacht Blue99.652199.595699.615599.642999.630799.5941

Histogram analysis

A good image encryption approach should always generate the uniform histogram of cipher image for any plain image. The plain images, cipher images, decrypted images, and the histograms of their three-color components are shown in Figs 9–12. As illustrated, the histograms of the encrypted images are fairly uniform and significantly different from the respective histograms of the original images. Hence, our proposed scheme does not provide any clue to statistical attacks.
Fig 9

“Flower” original, cipher image and decrypted image.

Fig 12

Three color component histograms of “Cablecar” original, encrypted and decrypted image.

Correlation coefficient analysis

To test the correlation of pixels (vertical, horizontal, diagonal), we randomly select 4000 adjacent pairs of the plain image and the cipher image, and calculated the correlation coefficients of pixels, according to the following formula: Figs 13 and 14 show image “Flower” and “Cablecar” correlation of two adjacent pixels. Table 3 provides more tests of the correlations, which show that two adjacent pixels in the plain images are highly correlated while the cipher images showed negligible correlations. The result indicates that our proposed encryption model functions properly.
Fig 13

“Flower” image correlation of two adjacent pixels.

(a) the distribution of two horizontal adjacent pixels in the original image, (b) the distribution of two horizontal adjacent pixels in the encryption image, (c) the distribution of two vertically adjacent pixels in the original image, (d) the distribution of two vertically adjacent pixels in the encryption image, (e) the distribution of two diagonally adjacent pixels in the original image, and (f) the distribution of two diagonally adjacent pixels in the encryption image.

Fig 14

“Cablecar” image correlation of two adjacent pixels.

(a) the distribution of two horizontal adjacent pixels in the original image, (b) the distribution of two horizontal adjacent pixels in the encryption image, (c) the distribution of two vertically adjacent pixels in the original image, (d) the distribution of two vertically adjacent pixels in the encryption image, (e) the distribution of two diagonally adjacent pixels in the original image and (f) the distribution of two diagonally adjacent pixels in the encryption image.

Table 3

Correlation coefficients of original images and encryption images.

Encryption algorithmHorizontalVerticalDiagonal
Ref [20] algorithm0.06810.0845-
Ref [22] algorithm-0.03180.09650.0362
Ref [24] algorithm0.0051-0.0093-0.0205
Ref [26] algorithm0.00860.0195-0.0093
Ref [40] algorithm-0.001640.01304-0.01911
Ref [41] algorithm0.07730.0770-0.0.0693
Proposed algorithm “Flower”-0.00620.00520.0043
Proposed algorithm “Cablecar”-0.00610.00700.0102

“Flower” image correlation of two adjacent pixels.

(a) the distribution of two horizontal adjacent pixels in the original image, (b) the distribution of two horizontal adjacent pixels in the encryption image, (c) the distribution of two vertically adjacent pixels in the original image, (d) the distribution of two vertically adjacent pixels in the encryption image, (e) the distribution of two diagonally adjacent pixels in the original image, and (f) the distribution of two diagonally adjacent pixels in the encryption image.

“Cablecar” image correlation of two adjacent pixels.

(a) the distribution of two horizontal adjacent pixels in the original image, (b) the distribution of two horizontal adjacent pixels in the encryption image, (c) the distribution of two vertically adjacent pixels in the original image, (d) the distribution of two vertically adjacent pixels in the encryption image, (e) the distribution of two diagonally adjacent pixels in the original image and (f) the distribution of two diagonally adjacent pixels in the encryption image.

Information entropy analysis

Information entropy is thought to be one of the most important features of randomness. To measure the entropy, H(m), of a source m, the following equation can be employed: where p(m) represents the probability of symbol m, and the entropy is expressed in bits. For example, when n = 8, the image color strength value is m = {m0, ……, m255}. For a random process, each symbol has equal probability, p(m) = 1/256, H(m) = 8. In general, the entropy value of the message is smaller than 8 but should to be close to ideal. Table 4 provides a comparison of average entropy values for a considerable number of images for the proposed method and some other methods. We noticed that our scheme outperforms other schemes and approaches the ideal value of 8.
Table 4

Information entropy of ciphered images with three color components.

Encryption algorithmredgreenblue
Ref [20] algorithm7.97327.97507.9715
Ref [22] algorithm7.98517.98527.9832
Ref [23] algorithm7.99917.99907.9989
Ref [26] algorithm7.99717.99687.9974
Ref [41] algorithm7.99747.99667.9975
Ref [42] algorithm7.98087.98117.9814
Proposed algorithm “Flower”7.99937.99927.9987
Proposed algorithm “Cablecar”7.99727.99757.9972

Differential attack

Cryptanalysis features an important method called differential attack to crack the encryption algorithm in order to quantitatively measure the influence of a one–pixel change on the cipher image. This influence can be measured via the number of pixel change rate (NPCR) and the unified averaged changing intensity (UACI), which are computed with the following formula: where W and H represent the width and height of the image, respectively. C(i, j) and C′(i, j) are the ciphered images before and after one pixel of the plain image is changed. For position (i, j), if C(i, j) ≠ C′(i, j), then D(i, j) = 1; else D(i, j) = 0. We tested the NPCR and UACI values for images Flower and Cablecar for the proposed scheme. As shown in Tables 5 and 6, the proposed scheme is very sensitive with small changes in the plain image. This result shows that our scheme can resist differential attack well.
Table 5

NPCR of ciphered image.

NPCRredgreenblue
Ref [23] algorithm99.623999.621699.6236
Ref [27] algorithm99.544599.587599.5374
Ref [29] algorithm99.615599.653699.6475
Ref [41] algorithm99.639999.600299.5773
Ref [42] algorithm99.617099.600299.5925
Proposed algorithm “Flower”99.600299.606399.5834
Proposed algorithm “Cablecar”99.614099.609499.5926
Table 6

UACI of ciphered image.

UACIredgreenblue
Ref [23]algorithm33.662333.682733.6754
Ref [27]algorithm34.317434.178633.6467
Ref [29]algorithm33.697034.325132.2345
Ref [41]algorithm33.591633.501033.4853
Ref [42]algorithm33.425233.589833.4466
Proposed algorithm “Flower”33.363533.489133.5000
Proposed algorithm “Cablecar”33.482833.279033.4992

Known plaintext attack and chosen plaintext attack

The diffusion key stream K, in Eq (12), not only depends on the security key (initial conditions of 3-cell QCNN, P1(0), P2(0), P3(0), ϕ1(0), ϕ2(0), ϕ3(0)) but also on the plain image itself. Hence, when the same security key encrypts different images, the diffusion key streams are different. Therefor it is ineffective on input an all “0” or all “1” image into this scheme. Accordingly, our scheme can resist known plaintext attack and chosen plaintext attack.

Encryption quality analysis

In an ideal cryptographic model, encrypted images should have uniform histogram distribution to hide pixels relevant information. It implies the encryption algorithm changes the the cipher pixel value to make the probability of each cipher pixel being totally uniform. Literature [43] gives a method for estimating the encryption quality, deviation from uniform histogram(D), which is given by Eq (14). In Eq (14), M × N is the image size and C is the image pixel gray or color level, C ∈ [0, 255]. H is the histogram value at index i, and H is the actual histogram of encrypted image. The smaller D value indicates the more uniform histogram distribution and the higher encryption quality. We obtain D comparison reports for three images through using our algorithm with other chaotic encryption algorithms in Ref [25]. As can be seen from Table 7, all D values are very low. Moreover, our algorithm has more uniform histogram distribution and better encryption quality than Ref [10, 13, 25, 44].
Table 7

Deviation from uniform histogram(D).

ImageProposed algorithmRef [10]Ref [13]Ref [25]Ref [44]
Peppers0.04920.09380.09790.09170.0977
Airplane0.05180.09690.09950.09830.0943
Boat0.05240.09020.09950.09580.0985

Chi-square test

A Chi-squared test [45, 46], also written as X2 test, is any statistical hypothesis test wherein the sampling distribution of the test statistic is a chi-squared distribution when the null hypothesis is true. Chi-squared test illustrate the possibility of statistical attacks. To evaluate if and what extent distribution of encrypted image histograms approach the features of a uniform distribution, Chi-squared tests are computed for 7 cipher images’ histograms, and then are summarized in Table 8. We find the histograms of the encrypted images are fairly uniform, so the proposed scheme can defend statistical attack.
Table 8

Chi-square test results for encrypted images.

Test ImageX2 P-valueDecision on H0
Cablecar0.710Accepted
Cornfield0.969Accepted
Peppers0.791Accepted
Airplane0.321Accepted
Fruits0.580Accepted
Boat0.679Accepted
Yacht0.684Accepted

NIST SP800-22 test

NIST SP800-22 test [47] includes 16 test methods, which are used to analyse the randomness of binary sequences generated by cipher systems. We performed all the 16 tests for 65536–8 bits key stream sequence and the results are shown in Table 9. From the Table 9, it shows that our scheme goes through all NIST SP800-22 tests successfully. Therefore, the key stream sequence is absolutely random in our scheme.
Table 9

NIST SP800-22 tests results for encrypted key.

Test nameP-valueResult
Frequency0.9801Success
Block-frequency0.2775Success
Runs0.3160Success
Long runs of ones0.3954Success
Rank0.0296Success
Spectral DFT0.1550Success
No overlapping templates0.9967Success
Overlapping templates0.4514Success
Universal0.6556Success
Linear complexity0.9056Success
SerialP-value10.9266Success
SerialP-value20.7865Success
Approximate entropy0.6375Success
Cumulative sums forward0.5436Success
Cumulative sums reverse0.5651Success
Random excursionsX = -40.7220Success
X = -30.7752Success
X = -20.2677Success
X = -10.2656Success
X = 10.1007Success
X = 20.3482Success
X = 30.4977Success
X = 40.5168Success
Random excursions variantX = -90.2492Success
X = -80.1723Success
X = -70.2026Success
X = -60.4146Success
X = -50.4073Success
X = -40.3178Success
X = -30.3753Success
X = -20.6367Success
X = -10.4315Success
X = 10.6596Success
X = 20.7163Success
X = 30.6525Success
X = 40.4903Success
X = 50.3089Success
X = 60.2110Success
X = 70.1905Success
X = 80.1267Success
X = 90.1269Success

Encryption speed and computation complexity

The encryption speed is an important issue for a well applicable encryption system. Nevertheless, it depends on many factors as hardware, software and programming [25]. Ref [24, 48] have performed encryption speed tests for some algorithms in [5, 7, 24, 48–52] at the same enviorment. From Ref [48], we know that the encryption speed of algorithm [5, 7, 48, 49] are >10s, 2.3s, 1.25s, and 2.901s respectively. The execution time of scheme in [24, 50–52] are 155ms, 173ms, 2.089s and 334ms [24]. In our scheme, Arnold mapping iteration times t in Eq (11), is randomness for improving security, so it is hard to build a baseline to compare encryption speed with other methods, especially programming skill and code optimization [25]. So we give the encryption speed with different Arnold mapping iteration times in Table 10, and the environment is Microsoft Windows 7, Matlab8.4, a laptop with an Intel Xeon CPU E3-1220 v3 3.10GHz, 8.00GB RAM. As can be seen from the Table 10, our scheme has an acceptable speed.
Table 10

The speed range for the proposed algorithm.

ImageIteration 1 time Speed(ms)Iteration 10 times Speed(ms)Iteration 20 times Speed(ms)Iteration 30 times Speed(ms)Iteration 40 times Speed(ms)Iteration 50 times Speed(ms)
Peppers10336866696012611554
Cablecar10235964493112151501
Airplane10437266695912561550
Cornfield10135864693412141512
Boat10137166896012561553
Fruits10236365593112161528
Yacht10135864493212151504
Additionally, the computation complexity relies on the number of operations and steps to fulfill the encryption. Our scheme needs to complete the entire encryption process, where n is the pixel number of images. Thus, the efficiency of the proposed algorithm is competent in the application level encryption requirements.

Conclusion

In this paper, a semi-symmetric image encryption scheme based on function projective synchronization between two hyperchaotic systems is proposed, and it has several advantages such as great speed, relatively low complexity compared respectively to symmetric and asymmetric algorithms. Especially, the key is generated simultaneously in encryption side and decryption side independently, which effectively avoids the key transmission and threats of key exposure. The presented scheme is a hybrid chaotic encryption algorithm and it consists of a scrambling stage and a diffusion stage. Moreover, the 6-order CNN is not only regarded as the drive system for the key synchronization, but also is used for diffusing key generation to enhance the security and sensitivity of the scheme. The simulation experiments and security performance analyses show that our scheme has a satisfactory security performance.

“Flower” original image.

(TIF) Click here for additional data file.

“Cablecar” original image.

(TIF) Click here for additional data file.

“Airplane” original image.

(TIF) Click here for additional data file.

“Boat” original image.

(TIF) Click here for additional data file.

“Cornfield” original image.

(TIF) Click here for additional data file.

“Fruits” original image.

(TIF) Click here for additional data file.

“Peppers” original image.

(TIF) Click here for additional data file.

“Yacht” original image.

(TIF) Click here for additional data file.
  1 in total

1.  A new color image encryption scheme using CML and a fractional-order chaotic system.

Authors:  Xiangjun Wu; Yang Li; Jürgen Kurths
Journal:  PLoS One       Date:  2015-03-31       Impact factor: 3.240

  1 in total
  1 in total

1.  An Encryption Algorithm for Region of Interest in Medical DICOM Based on One-Dimensional eλ-cos-cot Map.

Authors:  Xin Meng; Jinqing Li; Xiaoqiang Di; Yaohui Sheng; Donghua Jiang
Journal:  Entropy (Basel)       Date:  2022-06-29       Impact factor: 2.738

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.