Literature DB >> 30034869

Generalized double-humped logistic map-based medical image encryption.

Samar M Ismail1, Lobna A Said2, Ahmed G Radwan3,2, Ahmed H Madian2,4, Mohamed F Abu-Elyazeed5.   

Abstract

This paper presents the design of the generalized Double Humped (DH) logistic map, used for pseudo-random number key generation (PRNG). The generalized parameter added to the map provides more control on the map chaotic range. A new special map with a zooming effect of the bifurcation diagram is obtained by manipulating the generalization parameter value. The dynamic behavior of the generalized map is analyzed, including the study of the fixed points and stability ranges, Lyapunov exponent, and the complete bifurcation diagram. The option of designing any specific map is made possible through changing the general parameter increasing the randomness and controllability of the map. An image encryption algorithm is introduced based on pseudo-random sequence generation using the proposed generalized DH map offering secure communication transfer of medical MRI and X-ray images. Security analyses are carried out to consolidate system efficiency including: key sensitivity and key-space analyses, histogram analysis, correlation coefficients, MAE, NPCR and UACI calculations. System robustness against noise attacks has been proved along with the NIST test ensuring the system efficiency. A comparison between the proposed system with respect to previous works is presented.

Entities:  

Keywords:  Double-humped; Image encryption; MLE; NPCR; Negative bifurcation; UACI

Year:  2018        PMID: 30034869      PMCID: PMC6052686          DOI: 10.1016/j.jare.2018.01.009

Source DB:  PubMed          Journal:  J Adv Res        ISSN: 2090-1224            Impact factor:   10.479


Introduction

Chaotic systems have gained a lot of interest for researchers lately, whether in their continuous or discrete forms. As for the discrete form, chaotic systems can be represented as maps, offering a great share in many research fields [1], [2], such as theory of business cycle [3], chemistry [4], dynamics of tumor cells [5], communication [6] and encryption [7]. The discrete chaotic maps are highly sensitive to initial conditions and control parameters, which increase their randomness, unpredictability yet, being deterministic and easily reproducible. These are the main reasons why they are used in designing pseudo-random sequence generators (PRNG) for encryption purposes [8], [9]. The one dimensional (1D) double humped (DH) logistic map was introduced by Coiteux [10]. It shows a double hump in its first iteration graph, and hence comes its name. The DH map has a fixed bifurcation diagram as well as a fixed chaotic range, with no control on its chaotic behavior. By using a generalization technique; through adding an extra general parameter to the equation; it gives more control to the chaotic behavior of the map facilitating the design of any map, rendering it more suitable for different applications. The generalization technique was previously introduced to generalize other logistic maps, such as the generalization of the logistic map based on fractional power introduced by Radwan [11], as well as the generalization of the logistic map in the fractional order domain by Ismail et al. [12]. The conventional DH map was previously used for PRNG in a biomedical image encryption application versus the delayed logistic map presented by Ismail et al. [13]. Medical images have become a key stone in the diagnosis and the follow up of almost all diseases. These images offer the first hand for physicians to help in patients’ examination and treatment. Different technologies facilitate the existence of such medical images, as they can be generated through Computed Tomography (CT) for example, or Magnetic Resonance Imaging (MRI), or X-rays and many other techniques [14]. The patient’s history is not just a plain text any more, but it also includes a lot of images documenting the development of his case to be saved in his record. These medical records are archived in a digital format and may need to be transmitted between doctors or hospitals for different clinical services via networks. Since the records contain a lot of private information about the patient, this has raised the need for developing more security techniques for this data to be transmitted and safely saved, through biomedical image encryption. Many image encryption techniques were previously used based on different technologies as the use of chaotic systems for key stream generation. The first objective of this work is to present the generalization of the double humped logistic map, adding more control on its chaotic behavior, enabling it to be more flexible to fit in many applications. To the best of our knowledge, it is the first time to discuss the dynamics analysis of the DH map mathematically based on Cardano’s formula [15]. The dynamics analysis of the proposed generalized map is discussed including fixed points, stability analysis, transient responses, bifurcation diagrams and chaotic regions. The complete bifurcation diagram, including the positive side as well as the negative side bifurcation, which is rarely discussed in literature, is also presented. The second objective of this work is to show how different designs of the proposed generalized map are used for pseudorandom key stream generation for encryption. An image encryption system is presented based on the generalized double-humped (GDH) map. The images under test are two standard images, as well as medical images including MRI images for patients suffering from Alzheimer disease (AD) and Parkinson disease and X-ray images. Different tests are applied to the proposed encryption system, including key sensitivity and key-space analyses, histogram analysis, correlation coefficients, the Mean Absolute Error (MAE), the number of pixel change rate percentage (NPCR), the unified averaged changed intensity (UACI), and entropy calculations, as well as robustness against noise attacks, ensuring the effectiveness of the system. NIST test results are also introduced. Finally, a comparison between the presented work and other previous systems presented in literature is also detailed. This paper first discusses the dynamics of the normal double humped logistic map. The generalized DH logistic map is then introduced including its dynamics analysis for both positive and negative sides of bifurcation. A complete overview for previously investigated image encryption systems is summarized. An image encryption system based on the proposed map is presented as an application. The security analysis of the encryption system is detailed afterwards. Comparison is introduced with previous work presented in literature and finalized by the conclusion.

Dynamics of the double humped logistic map

The one dimensional DH logistic map is so called as it exhibits a double hump in its first iteration as shown in Fig. 1(a). The DH map follows the equation:where is the growth rate. Fig. 1(a) shows three successive function iterations of the DH logistic map, while Fig. 1(b) shows the 3D plots of the function iterations versus the growth parameter , with a 2D projection view of the fifth and sixth iterations. The first iteration in Fig. 1(a) has three intersection points, where , which are.
Fig. 1

DH logistic map (a) Higher order generations for r = 8 and (b) Different function iterations.

DH logistic map (a) Higher order generations for r = 8 and (b) Different function iterations. The minima and the maxima of , are extracted by solving . This gives three values for x, which are , and . Checking at each point gives:, indicating that the point is a minimum,, thus the two points are maxima. The fixed points of the map (1), are calculated by equating , this gives the first fixed point , and the solution of the equation:gives the other three roots, that will depend on the value of the parameter . In general, to solve an equation in the form of , Cardano’s formula [15] can be used, which says that the roots of the 3rd order degree equation are:where , , and . Define a constant D as: If , then the equation has one real root and two complex conjugate roots. If , the roots are all real, with two equal roots. While for , all the roots are real and unequal. Following Cardano’s formula to solve Eq. (2), where and , then and . To have unequal real roots then D should be less than zero. Solving (2) for these values, gives the parameter . Stability analysis of the map is studied at the fixed points. The first derivative of the function is to be calculated; the fixed points are stable if , or saddle points if . The first derivative of the function is: At the first fixed point , this point is stable if . This takes place for . It can be shown that for the range , there is only one fixed point which is . The second range is for , as just being proved, the function has two fixed points. Three fixed points appear at , while for , the function has four fixed points. This is fully illustrated graphically in Fig. 2(a).
Fig. 2

The DH map (a) fixed points for different ranges of r, (b) bifurcation diagram, (c) MLE, (d) Complete bifurcation diagram for , (e) stability ranges for different and , and (f) transient responses for positive and negative .

The DH map (a) fixed points for different ranges of r, (b) bifurcation diagram, (c) MLE, (d) Complete bifurcation diagram for , (e) stability ranges for different and , and (f) transient responses for positive and negative . The Bifurcation diagram of the DH map shown in Fig. 2(b), is very similar to the conventional logistic map bifurcation diagram. The only difference that here, there are repeated bifurcations as increases, as well as some gaps with a large one around . More than one chaotic region can be easily noticed in this diagram. Zooming through the diagram, when is approximately between 6.75 and 7.0, the function converges to a single value. There appears another large gap around , zooming into that region, there appears a 2-cycle function. Another gap appears at around , where the function shows a 3-cycle in the range between . All the different ranges are illustrated in Fig. 2(b) for all the regions specified. As a 3-cycle appears, the DH logistic map develops a chaotic behavior according to Sharkovsky's Theorem. For any dynamical system, Lyapunov exponent is a quantitative measure of the sensitive dependence of this system on the initial conditions. A positive Lyapunov exponent is a chaos indicator [16], while a negative exponent indicates normal system behavior. The maximal Lyapunov exponent (MLE), for discrete maps , for an orbit starting with can be defined as . Fig. 2(c) shows the Lyapunov exponent of the conventional DH map. The previous discussion shows a fixed chaotic behavior of the DH map, over which no control can be done, whether controlling the chaotic range, or the value of at which the function turns chaotic, or the value of the function at that point. To gain control on the bifurcation diagram parameters, and in order to be able to design specific maps, an extra generalized parameter can be added to the equation to make it more general and controllable through changing the value of this parameter and in consequence change the chaotic behavior of the map.

Generalized double humped (GDH) logistic map

This section introduces the generalization of the DH logistic map through adding an extra parameter to the original equation to have:where . The dynamics analysis of the proposed generalized equation is to be discussed hereby, once for the positive values of , followed by the negative values, covering the complete bifurcation diagram of such map, shown in Fig. 2(d), for .

Positive side bifurcation

Solving to get the fixed points of the map (6), equate as , this gives the first fixed point , the second fixed point is calculated by solving the equation: Let , thus turning into a third order equation: Using Cardano’s formula as mentioned before: From (4), , To have unequal real roots then D should be less than zero, reaching: Solving for and , and using Eq. (3a), (3b), (3c), the roots of the generalized DH map Eq. (6) are:where the equation original roots are , resepectively. To calculate the maximum values of the function , then , should be solved, thus reaching: Solving the first derivative of the logistic equation , gives the critical points of the function where the function has a maximum. Three critical points can be found and . For the first critical point, . For the second and third critical points, , which must be less than , giving the value of the maximum value of . The first derivative of the function is: At the first fixed point , this point is stable if . This takes place for . For the other three fixed points ,and which are the roots of Eq. (12a), (12b), (12c); at each fixed point, a surface is drawn presented in Fig. 2(e). The graphs show the ranges at which the function is stable, , while elsewhere it is unstable. This depends on the values of and for each fixed point. Fig. 2(f) shows the transient response of the GDH map for different values of the generalization parameter ensuring chaotic behavior of the map at such values. As for the positive bifurcation side, the transient response is shown for , , and for , . The effect of the generalized parameter is shown in Fig. 3(a), where has a zooming effect on the bifurcation diagram of the DH map according to Eqs. (13), (14). The presence of the parameter offers the possibility of designing any specific DH map according to a required value of or which gives control on the chaotic range of the map which is not possible without having this parameter. Fig. 3(b) presents 3D snapshots of the DH bifurcation diagram versus and .
Fig. 3

The DH map bifurcation diagram (a) different values of for , (b) 3D snapshots versus for , (c) for different values of for , (d) 3D snapshots versus for .

The DH map bifurcation diagram (a) different values of for , (b) 3D snapshots versus for , (c) for different values of for , (d) 3D snapshots versus for .

Negative side bifurcation

The GDH map could be seen from the other side where the effect of the negative values of on the chaotic range can be inspected following the equation: The critical points are calculated by solving the equation . This gives three critical points and . For the first critical point, . For the second and third critical points, , which is equal to . Solving for , the expression of could be reached to be equal to: Substituting in , value could be calculated numerically from the following equation: Fig. 2(f) shows the function variations of the GDH map for different values of , versus , for , and , . The effect of the generalized parameter on the negative bifurcation diagram is shown in Fig. 3(c), for different values of , while Fig. 3(d) shows 3D snapshots of the bifurcation diagrams showing the zooming effect of on the map.

An application: image encryption system

Overview on encryption systems

There were previous encryption systems presented in literature based on the chaos theory such as the one introduced by Pisarchik et al. [17], proposing direct encryption and decryption of digital images with chaotic map lattices. The image encryption algorithm was based on many logistic maps in cascaded loops. While a secure cryptosystem was presented for color images by Pisarchik and Zanin [18], it was based on chaotically coupled chaotic maps, depending on mixing conventional logistic maps, offering good confusion and diffusion properties. A Partial encryption chaos-based system was presented by Soma and Sen to encrypt gray scale images [19]. The algorithm depended on bit plane decomposition of the original image then encrypted using pseudorandom binary number generator based on couple tent map. Telem et al. presented a robust gray image encryption system using conventional logistic map and artificial neural network [20]. The initial conditions of the logistic map were derived using an external secret key. A chaos-based symmetric image cryptosystem employing the Arnold cat map for bit-level permutation and the logistic map for diffusion, unlike the other systems based on pixel-level permutation, was presented by Zhu et al. [21]. While Pareek et al. proposed, a simple encryption algorithm for gray images based on diffusion and substitution processes, offering high encryption rate [22]. Moreover, a simple encryption system using fractional-order logistic map for key generation was presented by Ismail et al. [12], having larger key space and extra degree of freedom using the fractional-order parameter in the key. A stream cipher system was also proposed by Ismail et al. [13], using delayed version of the logistic map comparing it to the same system while using the double-humped logistic map versus different security analysis aspects. Abd-El-Hafiz et al. presented the mathematical aspects of a generalized sine map with arbitrary powers and scaling factor, and two image encryption applications were introduced based on the generalized sine map [23]. The first system only performed pixel value substitutions, while the second system performed both permutations and substitutions. Based on Lorenz chaotic system and perceptron model in a neural network, a chaotic image encryption system was proposed by Wang et al. [24]. Using the deoxyribonucleic acid (DNA) coding, a novel confusion and diffusion method for image encryption was proposed by Liu and Wang [25]. The chaotic map used was the piecewise linear chaotic map (PWLCM), and each nucleotide was transformed into its base pair using the DNA complementary rule. Also, an image encryption scheme was introduced by Wang et al. [26], depending on DNA sequence operations and the pseudorandom sequences produced by the spatiotemporal chaos system which was coupled map lattice (CML). Moreover, based on the mixed linear-nonlinear coupled map lattices, a new image encryption algorithm was presented by Zhang and Wang [27], [28], where bit-level pixel permutation was used allowing the lower and higher bit planes to permute mutually without any extra storage space. Wang et al. also proposed a new block image encryption scheme based on hybrid chaotic maps (Arnold cat map) and dynamic random growth technique [29]. A stream-cipher algorithm based on one-time keys and robust chaotic maps for colored image encryption was presented by Liu and Wang [30]. The piecewise linear chaotic map was used to generate a pseudo-random key sequence. They also presented a bit-level permutation and high-dimension chaotic map was used to encrypt color image [31]. The scrambling mapping was generated by PWLCM, and then the Chen system was employed to confuse and diffuse the red, green and blue components, simultaneously. Some other encryption systems were also presented in literature [32], [33], [34], [35], [36], [37], [38], [39] using chaotic maps whether for grayscale or colored images.

Proposed system

The employed GDH map, being a chaotic map, can be used for pseudorandom number key generation (PRNG) to be used in an image encryption system to secure biomedical images. The block diagram of the proposed encryption system is shown in Fig. 4(a). The key stream used for encryption consists of the GDH parameters, which are the map initial value , the growth rate and the generalization parameter . The pseudo random numbers are generated by recursively solving the map to get . For each iteration, the 8 Least Significant Bits of the new value of is xored with a new pixel from the image to be encrypted. The output is to be xored again with a delay block output, which gives a output for the first iteration only. Then in the successive iterations, it provides the previously encrypted pixel. This process is repeated for all the image pixels to reach the final encrypted image. Fig. 4(b) shows a set of six test images used for the encryption system evaluation, with different sizes. The test image could be any medical image including MRI, CT or X-ray images as well as any natural image. Two standard images are traditionally used in the image processing field, which are Lena and Barbara. The other four are medical images, which are a Lung-XRAY, an MRI image of a patient suffering of Alzheimer disease (AD), a Parkinson disease MRI and finally a knee sagittal MRI image.
Fig. 4

(a) Image encryption system block diagram, (b) Test images used for encryption, Pixel correlation diagrams of (c) Lung-Xray image and (d) its encrypted image for and .

(a) Image encryption system block diagram, (b) Test images used for encryption, Pixel correlation diagrams of (c) Lung-Xray image and (d) its encrypted image for and . Table 1 shows the encrypted versions of the input images for different values of , for both positive and negative bifurcation sides. For each case, a wrong decrypted image is presented as well; this is in response to adding a value of of the corresponding in the decryption process, compared to the value used in the encryption process. From the results shown, the image cannot be restored, which represents a very high sensitivity of the key generator to the generalization parameter.
Table 1

Encrypted and wrong decrypted images with different values of parameter c for .

Encrypted and wrong decrypted images with different values of parameter c for .

Security analysis

The efficiency of any encryption algorithm could be defined by using some numerical security analyses. In this section, the performance analysis measures like key space analysis and parametric sensitivity analysis, histogram analysis, uniformity variance analysis, correlation analysis, entropy as well as differential attacks analyses are presented to ensure the efficiency of the proposed system. The images used in security analyses of the cryptosystem proposed is the set of two standard images (Lena and Barbara) as well as some medical images.

Pixel correlation analysis

The correlation test is one of the frequently used methods for testing an encryption system, where the correlation is calculated by [7]:where calculates the covariance between and and is the variance of . Since the image pixels are highly correlated to each other, a decrease in the correlation coefficients of the horizontal, vertical, and diagonal pixels of the image is an indication of the encryption system strength. Table 2 presents the correlation coefficients for the all the source images and the encrypted images in details, for different values of , for both positive and negative bifurcation sides, showing very low correlation coefficients. Fig. 4(c) and (d) presents the correlation results for the Lung-X-ray image and its encrypted version for positive with GDH map used for key generation.
Table 2

Correlation coefficients and key sensitivity analysis.

Positive bifurcation +r
Lena
Barbara
Lung-X-ray
HVDHVDHVD
Source image0.89150.94940.86990.92320.97440.91860.99450.99730.9923
ENCc=0.850.00820.00250.00270.00760.00290.00020.00350.0002−0.0013
c=1−0.0005−0.00190.0003−0.0006−0.0018−0.00120.00350.0002−0.0012
c=1.5−0.00130.0080−0.0094−0.0013−0.00470.0007−0.00600.00180.0012



AD-MRI
Parkinson-MRI
Knee-MRI
HVDHVDHVD

Source image0.96270.95120.92230.90470.94320.85720.97460.98730.9690
ENCc=0.850.0075−0.00480.00390.0103−0.0031−0.00290.00520.0039−0.0011
c=10.0075−0.0059−0.0041−0.00260.00570.0012−0.0042−0.0045−5.0682e−04
c=1.5−0.00220.00250.00360.00040.0027−0.0020−0.00320.0036−0.0032



Negative bifurcation -r
Lena
Barbara
Lung-X-ray
HVDHVDHVD

Source image0.89150.94940.86990.92320.97440.91860.99450.99730.9922
ENCc=0.70.0110−0.00540.00180.01150.0016−6.7028e−040.00350.00180.0014
c=10.0133−0.0154−0.00320.01210.00238.3084e−04−0.00140.0021−3.9151e−04
c=1.2−0.00760.00120.00190.0053−5.8486e−04−1.6640e−040.0022−0.00120.0018



AD-MRI
Parkinson-MRI
Knee-MRI
HVDHVDHVD

Source image0.96270.95120.92230.90470.94320.85720.97460.98730.9690
ENCc=0.70.01210.0070−0.00140.02230.00201.0177e−040.00850.00210.0018
c=10.0100−0.00500.00860.02526.1136e−04−0.00270.0083−0.00110.0012
c=1.2−0.00980.0026−0.00650.00738.5364e−040.00130.00750.00650.0017
Correlation coefficients and key sensitivity analysis.

Key space analysis

The key space should be large enough to resist brute-force attacks. The key consists of three control parameters, the initial condition , the growth rate and the generalization parameter . Each parameter consists of 64 bits, rendering the key length equal to 192 bits long, with a precision of . The key space size employed in this work is .

Key sensitivity analysis

Chaotic maps are known that they are highly sensitive for any small change in the initial conditions or the system parameters. Sensitivity analysis is done for every parameter of the key generator used for encryption. Changing a very small perturbation of of the parameter under test, the encrypted image should be no longer restored to the original image. This indicates how the system is highly sensitive to very small changes in the key parameters insuring the encryption system high security level. Fig. 5 shows the resultant decrypted images for Lena image, in case there is a change of of the map parameters , or the initial condition for both positive and negative bifurcation sides of the map. For the negative side, for example, the initial condition , is once taken as and another time , with only difference, while fixing . The images cannot be decrypted to Lena again; this is due to the high sensitivity for the generalized logistic map proposed for generating the key.
Fig. 5

Sensitivity analysis to system parameters.

Sensitivity analysis to system parameters. Fig. 6(a) and (b) show two ciphered Lena image for parameters values ,, while changing and , respectively, with only difference. The two ciphered images are completely different with the difference image shown in Fig. 6(c). The simulation analysis show that the algorithm presented is key-sensitive, where a minor change in any of the key parameters results in a significant change in the ciphered results.
Fig. 6

Key sensitivity of parameter (a) ciphered image , (b) ciphered image and (c) difference between (a) and (b), Deciphered images of noisy plain-images with Gaussian noise in (d), (e) and (f) and with salt and pepper noise in (g), (h) and (i).

Key sensitivity of parameter (a) ciphered image , (b) ciphered image and (c) difference between (a) and (b), Deciphered images of noisy plain-images with Gaussian noise in (d), (e) and (f) and with salt and pepper noise in (g), (h) and (i). The decrypted images are also being compared quantitatively, by measuring the correlation coefficient between two decrypted images upon having a slight change in the decryption key compared to the encryption key used for encryption. The case under study is the decrypted images shown in Fig. 5 for the negative bifurcation side, including images in Fig. 5(g), (h) and (i), where the decryption key has a slight change in the initial condition , in the growth rate and in the generalization parameter , respectively. Table 2 shows that there is no clue about the plain image could be found upon having a little change in the key. The correlation coefficient calculated for each case is approaching zero. These results confirm the proposed system effectiveness. To have a quantity analysis of any key, mutual information (MI) calculation is employed to evaluate the key sensitivity of any two ciphered images for example ( and ), which are encrypted versions by different keys on the same plaintext image, upon changing a very small of the key parameters , or . The higher the sensitivity of the key, the lower the value of the mutual information of ( and ). The mutual information is calculated following the equation:where is the entropy of the ciphered image , is the entropy of the ciphered image , and is the mutual entropy between both images. For each key parameter, the MI is measured while fixing the other parameters, listed in Table 2. The plaintext images used are the standard images Lena, Barbara and Cameraman of extension ‘.bmp’. The information shared between the two ciphered images is close to zero, indicating the high key sensitivity of the system.

Histogram analysis

The distribution of information of pixel values inside any image can be shown using histogram analysis [7]. If the histogram of the image after being encrypted is uniformly distributed, this is considered an indication of the encryption system strength. Table 3 shows the histogram of the plain images as well as the ciphered images for at , and , displaying flat histograms for the images after encryption. The histograms of the ciphered images show completely uniform and significantly different than the fluctuating histograms of the plain images, which is important in resisting any statistical attack. The uniformity of the ciphered image gray scale, infers that no useful information could be retrieved upon performing any statistical attack on the ciphered image.
Table 3

Histogram of the original and the encrypted images for and variance analysis.

LenaBarbara
Lung-X-rayAD-MRI

Parkinson-MRIKnee-MRI

Histogram of the original and the encrypted images for and variance analysis. The uniformity of the histogram analysis can be quantified by measuring the minimum value, the maximum value as well as the variance of the histogram of the plain-image. Moreover, the minimum value, the maximum value as well as the variance of the histogram of the ciphered-image are calculated. The efficiency of the system is validated when comparing the range of the minimum and maximum values of the plain-image versus the corresponding range of the ciphered image, calculated as (maximum-minimum). It is very clear that the ciphered-image, having an approximately flat histogram, has a very small range in comparison with the plain-image fluctuating histogram. Also, the variance values calculated for the plain-image histogram is much more less than the variance value calculated for the ciphered-image histogram, validating the uniformity of the histogram analysis of the proposed cryptosystem. These results of the variance, minimum-maximum range values are enumerated in Table 3, for different standard images of different sizes. Discussing one case for example, for plain-image Lena of size , the range between the minimum and maximum values is , while the range of the corresponding ciphered-image is only 180. Moreover, for the same case, the variance of the plain-image is found to be , while the variance of the ciphered image is only , validating the uniformity of the flat histogram obtained after encryption.

Entropy analysis

Information entropy is one of the most important parameter for measuring randomness. The image information content can be measured using the entropy , if the probability distribution of the image is known. For a random variable with a probability distribution , the entropy can be calculated for values as follows [7]: The entropy is measured in bits. Ideally if H is equal to 8, this means that the information is totally random. The entropy values presented are approximately which validates the encryption system efficiency. Table 4 shows the entropy results for all the set of images, for both positive and negative bifurcation sides versus different values of the generalization parameter .
Table 4

Differential Attacks analysis results for different images.

Positive bifurcation +r
Negative bifurcation -r
cEntropyMAENPCR (avg)UACI (avg)cEntropyMAENPCR (avg)UACI (avg)
Lena0.857.988577.779075.625634.94410.77.987177.212975.6256135.0643
17.988977.009475.625634.952717.989277.825375.6256134.8779
1.57.990778.175475.625634.86511.27.988877.462475.625634.9782



Barba0.857.999376.210375.500031.42310.77.999276.298475.500031.4492
17.999276.231075.500031.461817.999276.170875.500031.4732
1.57.999276.226175.500031.47321.27.999376.137475.500031.4442



Lung0.857.998781.210175.500031.81330.77.998681.261775.500031.7949
17.998581.004275.500031.734117.998781.126675.500031.7597
1.57.998781.153175.500031.80261.27.998681.029175.500031.7571



AD0.857.995487.562575.557529.71070.77.994688.313275.557529.7632
17.994587.778175.557529.755517.995787.8426275.557529.7861
1.57.994687.577675.557529.75631.27.995688.0774675.557529.7857



Parkn0.857.997894.358175.500029.40950.77.997593.8371375.500029.3711
17.997794.066375.500029.368417.997793.9436775.500029.3771
1.57.998194.368675.500029.40231.27.997794.4690475.500029.3771



Knee0.857.9986100.091775.500024.85650.77.9984100.199475.500024.8939
17.998899.853675.500024.826817.9986100.106075.500024.8278
1.57.9983100.185675.500024.92011.27.9984100.035975.500024.8522
Differential Attacks analysis results for different images.

Classical types of attacks

There are four types of classical cryptanalytic attacks based on the amount of information known to the cryptanalyst, and these types are: Ciphertext only: In this method, the opponent has access to a string of ciphertext. He does not have access to corresponding plaintext. Known plaintext: In this method, the opponent knows a string of plaintext, and the corresponding ciphertext. Using this information, it is required to decrypt the rest of the ciphertext. Chosen plaintext: In this method, the opponent can access the encryption device and chooses a string of plaintext and construct its corresponding ciphertext string. By this information, it is easy to determine the encryption key. Chosen ciphertext: In this method, the opponent can access the decryption device and chooses a string of ciphertext and construct its corresponding plaintext string. The chosen plaintext attack is the most powerful attack and if a cryptosystem can resist this attack, it can resist other types of attack as previously reported [34].

Differential attacks

Differential attacks are some measurements done to confirm the security of a given encryption system [7]. Three common measures of the differential attacks are the Mean Absolute Error (MAE), the number of pixel change rate percentage (NPCR) and the unified averaged changed intensity (UACI). Conventionally, high MAE, NPCR and UACI values are usually interpreted as a high resistance of the encryption system to differential attacks. The absolute change between the encrypted image E and the source image , measured by the MAE, is defined as [7]:where and are the width and height of the source image (). The differential attacks study the relation between the normal encrypted image (E1) and another encrypted image under the effect of changing one pixel in the original image (E2). E is the pixel value at the location for the corresponding image E. The percentage of the number of pixel change between the two images (E1) and (E2) is measured by NPCR, calculated as [7], [40]: The term UACI measures the average light intensity of the differences between the two images (E1) and (E2), and it is calculated as [7], [40]: Table 4 shows the differential Attacks analysis results for the images for the three cases of . The NPCR and the UACI results are calculated as the average of 50 trials. An efficient cryptosystem should be sensitive to the secret keys as was shown in the key sensitivity analysis as well as the plaintext. For all the images under test and for all the cases whether positive or negative bifurcation maps, in each time two ciphered images are obtained upon changing only one bit in the plain-image, and measure the NPCR of the resultant ciphered images. The values of the NPCR presented in Table 4 shows that upon changing only one pixel in the plain-image, different ciphered images are obtained; confirming that the cryptosystem proposed is sensitive to changing plain image and can resist the chosen plain-text attack [34]. Moreover, the closer the UACI values to the values presented in Wu et al. [40], the more the effectiveness of the cryptosystem in resisting differential attack [34]. The UACI value depends on the size of the image as can be seen in the table and as reported earlier by Wu et al. [40].

Robustness against noise

The electronic transmission of ciphered images from transmitter to receiver, may suffer some additive noise in practical life, which may cause an inevitable error leading to difficulties in decryption, and this point is very important specially in medical images transfer through doctors and hospitals. If the cryptosystem is noise sensitive, then a small change in the ciphered image due to noise addition may hinder the original image restoration after decryption [25], [39]. The system proposed is being tested to applying white Gaussian noise to the ciphered image of Lena, with different variances. This type of noise is a reasonable assumption of randomness caused by real physical channels, and the random numbers of this noise is uniformly distributed through the ciphered image. The results shown in Fig. 6(d–f) show how much the cryptosystem proposed is robust against noise. Moreover, the same image Lena, is being tested while adding Salt and Pepper (S and P) noise to the ciphered image, with different densities, and the decrypted image of each case is shown in Fig. 6 also confirming the system efficiency against noise attacks. The correlation coefficients (CC) between the noiseless decrypted image and the noisy decrypted image are enumerated for each noisy case in Fig. 6. If the deciphered image is very close to the original whether visually or numerically through the measurement of the correlation coefficients, i.e. close to 1, this proves that the system is noise immune, which is proved in the reported results, as the decrypted images still maintain the overall information of the original image.

NIST statistical test

The NIST statistical test suite provides typical tests to measure the randomness of the encrypted image [41]. In this evaluation, two standard images were used “Lena” and “Man” with resolution and four different combinations of the generalized DH map were applied. Cases and are for positive bifurcation side of the GDH map, with values (), and () respectively. On the other hand, cases and are for negative bifurcation side of the GDH map with values (), and () respectively. The test results are reported in Table 5, and the success in all the 15 tests further asserts the randomness of the encrypted images.
Table 5

NIST test.

Sample NIST results for encrypted images (1024 × 1024)
TestCase 1
Case 2
Case 3
Case 4
PVPPPVPPPVPPPVPP
Frequency1.0001.0001.0001.000
Block Frequency1.0001.0001.0001.000
Cumulative Sums1.0001.0001.0001.000
Runs1.0001.0001.0001.000
Longest Run1.0001.0001.0001.000
Rank1.0001.0001.0001.000
FFT1.0001.0001.0001.000
Non Overlapping Template0.9940.9920.9920.995
Overlapping Template1.0001.0001.0001.000
Universal1.0001.0001.0001.000
Approximate Entropy1.0001.0001.0001.000
Random Excursions1.0001.0000.9751.000
Random Excursions Variant1.0001.0000.9890.972
Serial1.0001.0001.0000.938
Linear Complexity1.0001.0001.0001.000
Final ResultSuccessSuccessSuccessSuccess
NIST test.

Discussion and comparisons

This section presents a comparison for the proposed system with previously introduced systems in literature. For the sake of fair comparisons, only the standard images with different sizes are employed in this section. The comparison includes key space analysis, sensitivity analysis, entropy analysis, and correlation coefficients calculations. The key space size employed in this work is which is more than the key space presented elsewhere [22], [32], [33], [34] as being compared in Table 6. Thus, the encryption system used in this work can resist all kinds of brute force attacks having a large enough key space.
Table 6

Comparison between previous encryption systems and this work.

Key space comparison with existing algorithms
AlgorithmsRef [32]Ref [22]Ref [35]Ref [21]Ref [33]Ref [34]This work
Key space1030103810381042105610561057
Comparison between previous encryption systems and this work. Referring to Table 2, measuring the MI of ciphered images for different keys, the highest and least sensitivities are very close, thus the opponent cannot distinguish which parameter is being varied in the key. Comparing the average performance of the presented work of values around , which is less than the average performance obtained by others [27], [28]. In Table 6, the entropy of the proposed system is being compared with the results obtained in some references, with the case of positive bifurcation with the generalized parameter , showing that the results of this work prove the system to have very good performance. All the images used for comparison are of extension ‘.bmp’. A comparison of the proposed cryptosystem with respect to the correlation coefficients of ciphered image Lena.bmp, with different previous works, is also presented in Table 6, highlighting the efficiency of the system.

Conclusions

The generalization of the Double-Humped logistic map was presented in this paper. The GDH map was used for pseudo-random number key generation (PRNG) in a medical image encryption system. The general parameter added more control on the chaotic range of the map. Changing the general parameter resulted in a new special map with a zooming effect of the bifurcation diagram. The dynamic behavior of the generalized map is analyzed, including the study of the fixed points and stability ranges and the complete bifurcation diagram. The option of designing any specific map is made possible through changing the general parameter increasing the randomness and controllability of the map. An image encryption algorithm is introduced based on pseudo-random sequence generation using the proposed generalized DH map offering secure communication transfer of medical MRI and X-ray images. Different tests are applied to the proposed encryption system, including sensitivity test, histogram analysis, correlation coefficients, MAE, NPCR and UACI calculations ensuring the effectiveness of the system. NIST analysis was performed to prove the system efficiency. Comparison was performed relative to other systems presented in literature validating the proposed system efficiency.

Conflict of interest

The authors have declared no conflict of interest.

Compliance with Ethics Requirements

This article does not contain any studies with human or animal subjects.
  4 in total

1.  Encryption and decryption of images with chaotic map lattices.

Authors:  A N Pisarchik; N J Flores-Carmona; M Carpio-Valadez
Journal:  Chaos       Date:  2006-09       Impact factor: 3.642

2.  Database integration of protocol-specific neurological imaging datasets.

Authors:  Emil E Pacurar; Sean K Sethi; Charbel Habib; Marius O Laze; Rachel Martis-Laze; E Mark Haacke
Journal:  Neuroimage       Date:  2015-05-08       Impact factor: 6.556

3.  On some generalized discrete logistic maps.

Authors:  Ahmed G Radwan
Journal:  J Adv Res       Date:  2012-06-28       Impact factor: 10.479

Review 4.  Symmetric encryption algorithms using chaotic and non-chaotic generators: A review.

Authors:  Ahmed G Radwan; Sherif H AbdElHaleem; Salwa K Abd-El-Hafiz
Journal:  J Adv Res       Date:  2015-08-01       Impact factor: 10.479

  4 in total
  7 in total

1.  A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings.

Authors:  Umar Hayat; Ikram Ullah; Naveed Ahmed Azam; Sumaira Azhar
Journal:  Entropy (Basel)       Date:  2022-04-19       Impact factor: 2.738

2.  Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm.

Authors:  T Avudaiappan; R Balasubramanian; S Sundara Pandiyan; M Saravanan; S K Lakshmanaprabu; K Shankar
Journal:  J Med Syst       Date:  2018-09-22       Impact factor: 4.460

3.  Secure CT-Image Encryption for COVID-19 Infections Using HBBS-Based Multiple Key-Streams.

Authors:  Omar Reyad; Mohamed Esmail Karar
Journal:  Arab J Sci Eng       Date:  2021-01-05       Impact factor: 2.807

4.  A New Algorithm for Medical Color Images Encryption Using Chaotic Systems.

Authors:  Seyed Shahabeddin Moafimadani; Yucheng Chen; Chunming Tang
Journal:  Entropy (Basel)       Date:  2019-06-10       Impact factor: 2.524

5.  A new image encryption algorithm based on the OF-LSTMS and chaotic sequences.

Authors:  Yi He; Ying-Qian Zhang; Xin He; Xing-Yuan Wang
Journal:  Sci Rep       Date:  2021-03-18       Impact factor: 4.379

6.  A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map.

Authors:  Bin Zhang; Bahbibi Rahmatullah; Shir Li Wang; Zhaoyan Liu
Journal:  Multimed Tools Appl       Date:  2022-09-23       Impact factor: 2.577

7.  Novel Privacy Preserving Non-Invasive Sensing-Based Diagnoses of Pneumonia Disease Leveraging Deep Network Model.

Authors:  Mujeeb Ur Rehman; Arslan Shafique; Kashif Hesham Khan; Sohail Khalid; Abdullah Alhumaidi Alotaibi; Turke Althobaiti; Naeem Ramzan; Jawad Ahmad; Syed Aziz Shah; Qammer H Abbasi
Journal:  Sensors (Basel)       Date:  2022-01-08       Impact factor: 3.576

  7 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.