Literature DB >> 31856231

A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion.

Majid Khan1,2, Fawad Masood1,3, Abdullah Alghafis4, Muhammad Amin1,5, Syeda Iram Batool Naqvi1,5.   

Abstract

Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinates. Moreover, chaotic dynamical map has been used to add one more security level to the proposed encryption scheme. The proposed scheme is evaluated on different statistical tests and these results are compared with already existing benchmarks. The results show that the proposed algorithm has better security performances as compared to existing image enciphering schemes.

Entities:  

Mesh:

Year:  2019        PMID: 31856231      PMCID: PMC6922374          DOI: 10.1371/journal.pone.0225031

Source DB:  PubMed          Journal:  PLoS One        ISSN: 1932-6203            Impact factor:   3.240


1. Introduction

The security of digital information in wireless and wired communication media such as Wi-Fi and Ethernet is one of challenging issues of the contemporary world. Today, advancement in science and technology makes our lives easier as compared to earlier decades and the history is evident that this process of bringing comfort and ease pervades all aspect of human lives. The idea of transforming any analogue information for instance text, image, audio and video into digital bitstreams is one of the grounding breaking discovery by Claude Shannon in 1948. Shannon put forth the idea that once information becomes digital, it could be transmitted without error. This revolutionary concept led directly to digital storage media such as hard disks, CDs and USBs. The privacy of information and copyright protection became critical issue of the digital world. The eavesdropping of the digital information is possible in any part of the communication system from source through the transmitting medium to the sink. These cyber threats of data eavesdropping are developing at fast pace. Data communication has become pervasive in society spanning individuals, groups and state institutions. Many applications like video conferencing, photo album, medical images and databases require quick, reliable, computationally less intensive and robust systems for secure transmission of digital information from one end to another end. Therefore, privacy of data is a crucial factor which must be first choice to looked into to provide secure communication. In video and audio communication real time high data transmission rates at one hand provides seamless communication but on the other hand it requires robust security against interception and eavesdropping and extraction of plain text information. The major principles of cryptography are confidentiality, integrity and authentication that ensure secure communication. The confidentiality of information can be achieved through encryption procedure. The earlier cryptosystem used either substitution or permutation but separately and independently which means these schemes did not utilize confusion and diffusion simultaneously. The separate usage of confusion and diffusion in earlier schemes was vulnerable to different cryptographic attacks. Claude Shannon in 1949, devised a mechanism of confusion and diffusion in order to design secure cryptosystems. The modern information security system named it substitution-permutation network (SP-network). Traditional symmetric ciphers such as advanced encryption standard (AES) and data encryption standard (DES) and all other variants of these cryptosystems are designed with good confusion and diffusion properties [1-11]. Several encryption algorithms were designed for the confidentiality of digital information which utilized SP-network. A large number of modern ciphers schemes use many aspects of chaos to enhance confusion and diffusion capabilities. The chaos theory is closely related with cryptography. The chaotic systems have characteristic similar to cryptography such as highly sensitive to chaotic parameters, initial conditions, its un-deterministic nature, pseudo-randomness and ergodicity etc., which are fundamental requirements while designing any modern cryptosystems [12-16]. The connection between chaos and cryptography introduced a new regime in modern information security. Therefore, chaos theory after 1990’s, was extensively utilized for developing robust cryptosystems [17-70]. Our idea here is to use two dimensional chaotic maps along with Brownian motion in order to design a new scheme for the confidentiality of digital images. Brownian motion is random (zig zag) movement of particles that are suspended in fluid (liquid or gas) resulting due to fast collision of liquid or gas molecules. The term ‘Brownian motion’ is here mathematical term or model use for designing of secure cryptosystem and is use to describe ‘random movement of particles’. In 2014, Wang and Xu [64] considered single particle of Brownian theory as a pixel of image and used Monte Carlo method and encrypt original test image. In 2015, Zhu [65] had cracked the algorithm designed by Wang et al [64] because the system designed was based on permutation and diffusion sequence by Wang et al [64] that was not related to plaintext image thus the method designed by Wang et al [64] was unfeasible to show resistivity against the chosen plain text. The rest of the paper is organized as follows: Section 3 briefly introduces basic preliminaries used in designing of strong cryptosystem. The succeeding section 4 describes the proposed algorithm. The simulation results and security analysis are shown in section 5 and finally, we summarized our conclusion and results in section 6.

2. Motivation

Information transmission through open public network are vulnerable to assorted type of attacks so designing these hybrid systems emphasized to meet security deficiency for real time multimedia communication. The proposed system is based on Brownian motion of particles along three different directions of X, Y and Z axis and inclusion of certain discrete time chaotic maps is to enhance its security to some more steps. The system helped us in transforming plain information to intelligible form. In first phase Brownian motion of particles are initialized and then stored its position at each iteration. The unique ternary orientation provided some extra layer of security that increased number of conditions to encrypt original information in the form of digital image. The security provider may use single direction to secure their information as well as combined effect of unique three directions in spatial domain. This hybrid system based on chaotic behavior have some unique features i.e. highly sensitive in nature while altering its initial condition this system show highly randomness for different initial condition. The system has another unique feature of strange attractor i.e. for each small change in initial condition will give you complete different attractor which will create difficulty to intruder or advertiser to decipher original image. These properties motivated us to design this cryptosystem.

3. Some basic preliminaries

In this section, we have defined some basic definitions and concepts, which will be quite helpful for subsequent sections.

3.1 Chaotic systems

Chaotic systems have some properties like highly random in nature, strange attractor, aperiodicity, ergodicity and sensitive to its initial conditions which makes it suitable for designing secure cryptosystem [29]. If the value of the initial condition is insignificantly changed, the output of the system will show unexpected change. Many systems in nature around us exhibit chaos [67].

3.1.1 Basin Chaotic Map

Chaotic maps have its intrinsic importance in designing secure cryptosystem. In order to make robust system, we introduced basin chaotic map and examined its desirable characteristics. It is discrete time two-dimensional chaotic map which takes some initial conditions e.g. x0 = −1.5, y0 = 1.5, and some other chaotic factors including k, μ, and ε. The mathematical expression for Basin chaotic map is defined as follow:

3.1.2 Ginger Breadman Chaotic Map

Ginger breadman is two-dimensional discrete time chaotic map which has noteworthy nature of randomness of chaos. The two-dimensional Ginger breadman chaotic map is represented in Eqs 5 and 6:

3.2 Brownian Motion

It is random (zig zag) movement of particles along three different directions namely X, Y and Z axis (see Fig 1). The behavior of particles named after botanist Brown who worked on microscopic particles. The idea he revealed for the first time through pollen grains which fell into river and observed fluctuations and random motion in water though he didn’t find the reason of behavior he observed. Later one of the great scientist Albert Einstein published one of his article in 1905 that explained the exact random motion of particles which Brown had observed through motion of particles by water molecules and this was a very significant contribution to science. He concluded that the kinetic energy of molecules of water was responsible for the zig zag motion of the particles [30-31].
Fig 1

Brownian movement particles in ternary position.

3.3 State of Art of Encryption for Proposed Scheme

Our main intention is designing robust algorithm having exceptional strength of resistivity against cryptanalysis and have negligible vulnerabilities to be cracked against gain of access of encrypted digital contents. In cryptanalysis where hacker study possible breaches and vulnerabilities in order to break down cryptographic algorithm. The robustness of proposed system can be validated using certain statistical tests that ensure the strength of proposed algorithm. The strength of cryptosystem highly depends upon two factors i.e. proposed algorithm for encryption and secrecy of keys used in proposed system to encrypt information. We used hybrid method of Brownian motion of particles and certain discrete dynamical chaotic maps to get maximum random sequence. We assumed and defined certain number of particles with respect to time before using certain chaotic maps. These particles helped us in achieving effect of zig zag motion of initially defined particles with respect to time and assumed number of particles. The assumed particles depend upon number of pixels in test image and the track changes due to changing effect of these particles. These particles are placed in spatial domain of three dimension along X. Y and Z axis where providing security expert has choice of choosing any direction of X, Y and Z axis to propose their cryptosystem. The system can be more secure by combined effect of X, Y and Z axis. Further to get better resistance the sequence generated using particles of zig zag motion is injected to some chaotic maps for instance Basin chaotic map and Gingerbread man chaotic map to get highly randomized sequence. The output sequence of zig zag particles generated at first phase using Brownian motion is multiplied with one dimensional Basic chaotic map for better security. The process is further treated with bitwise XOR with sequence generated using Gingerbread man chaotic map. The sequence generated after third phase showed some exceptional randomness for security of multimedia data.

4. Proposed image encryption scheme

The main emphasis of this section is on the proposed encryption scheme algorithm. The major steps involved in suggested encryption scheme are given below (see Fig 2):
Fig 2

Flow chart of proposed algorithm for secure communication.

Read an image of size 512×512×3 in jpg format Resizing of image from 512×512×3 to 256×256×3 dimension in same extension Splitting of image into three layers of Red (R-layer), Green (G-Layer) and Blue (B-layer) Generation of Brownian motion with initialization of position of particles with respect to time in seconds, number of particles assumed and number of impulses per change in track Iteration of storing of position of particles for three different position along X, Y, and Z axis Generation of two-dimensional Basin chaotic map having same length of 256×256 Multiplication of generated Basin chaotic map with three different position of particles generated in step 5 Generation of two-dimension gingerbread man chaotic map having same length of 256×256 Bitwise XOR operation between generated position in step 5 and generated gingerbread man chaotic map sequence having length of 256×256 The output in step 9 is again Bitwise XOR with the generated layers of Red, Green, Blue in step 3 Combining layer of images into 256×256×3 to get encrypted image

5. Security performance analysis and experimental results

In this section, we have taken standard images [51,67] to authenticate our proposed algorithm by utilizing the security benchmarks available in literature. The tests include are correlation coefficient, mean absolute error, means square error (MSE), peak signal to noise error (PSNR), information entropy, sensitivity analysis and NIST test for randomness respectively.

5.1 Histogram Analysis

Histogram analysis is one of the momentous examination of pixels of image. Histogram must be different for plain and encrypted image. Plain image pixels are non-uniform and changes at each and every instant which reveals that the data is highly vulnerable to be attacked, while examining pixels of secure images where each pixel is well disciplined and have uniformly order having same length, size to one another. The well-disciplined and uniformity of pixels means that image is secure using proposed cryptosystem. We considered four images of 512×512×3 dimension and convert it into size of 256×256×3. The infrequent histogram and smooth continual is examined in Figs 3–13 respectively. Fig 3B show nature of non-uniformity as compare to succeeding Fig 13A–13C for three different directions along X, Y and Z axis where each pixel show resemblance to nearby pixel reveals that intruder will unable to decide that where maximum confidential information is available. Fig 4A–4C are layer wise images for pepper standard image having size 256×256×3 while the histogram for the layer wise figures are non-uniform reveals that the information can easily be take out on public network as shown in Fig 5A–5C. Looking into Figs 7, 9, 11 and 13, the Figs 7, 9 and 11 are layer wise different orientation of histogram where each pixel is equally distributed in the range of 0 to 256 and each pixel information is highly secure. Fig 13 is histogram of combined layers for three directions and show good pixels’ uniformity from start to end.
Fig 3

(a) Standard pepper image; (b) Histogram of pepper image.

Fig 13

(a) X-direction combined-layers Histogram; (b) Y-direction combined-layers Histogram; (c) Z-direction combined-layers Histogram.

Fig 4

(a) R-layer of size 256×256; (b) G-layer of size 256×256; (c) B-layer of size 256×256.

Fig 5

(a) R-layer Histogram; (b) G-layer Histogram; (c) B-layer Histogram.

Fig 7

(a) X-direction R-layer Histogram; (b) X-direction G-layer Histogram; (c) X-direction B-layer Histogram.

Fig 9

(a) Y-direction R-layer Histogram; (b) Y-direction G-layer Histogram; (c) Y-direction B-layer Histogram.

Fig 11

(a) Z-direction R-layer Histogram; (b) Z-direction G-layer Histogram; (c) Z-direction B-layer Histogram.

(a) Standard pepper image; (b) Histogram of pepper image. (a) R-layer of size 256×256; (b) G-layer of size 256×256; (c) B-layer of size 256×256. (a) R-layer Histogram; (b) G-layer Histogram; (c) B-layer Histogram. (a) X-direction R-layer; (b) X-direction G-layer; (c) X-direction B-layer. (a) X-direction R-layer Histogram; (b) X-direction G-layer Histogram; (c) X-direction B-layer Histogram. (a) Y-direction R-layer; (b) Y-direction G-layer; (c) Y-direction B-layer. (a) Y-direction R-layer Histogram; (b) Y-direction G-layer Histogram; (c) Y-direction B-layer Histogram. (a) Z-direction R-layer; (b) Z-direction G-layer; (c) Z-direction B-layer. (a) Z-direction R-layer Histogram; (b) Z-direction G-layer Histogram; (c) Z-direction B-layer Histogram. (a) X-direction combined-layers; (b) Y-direction combined-layers; (c) Z-direction combined-layers. (a) X-direction combined-layers Histogram; (b) Y-direction combined-layers Histogram; (c) Z-direction combined-layers Histogram.

5.2 Correlation Coefficient

Correlation coefficient analysis show resemblance of nearby image pixels along three different directions namely horizontal, vertical, and diagonal. For plain image the pixel’s value approaches to 1, while for encrypted image the value converges to 0. In Figs 14–16, all values are making diagonal line showing that values are highly correlated to each other. The below Eq (5) is use to find out pixel values at two different stages i.e. measuring pixels’ value when image is in the form of plain text and then finding pixels value when the image is in encrypted form. In proposed algorithm, we investigated pixels in three different directions for four types of test images along X-direction of Brownian motion. Figs 14–19 are layer wise correlation of red, green and blue channels having size of 256×256 whilst Figs 20 and 21 illustrates combined channels correlation having size of 256×256×3. Figs 14–16, are plain red, green, blue channels where each pixel is highly correlated to one another while Figs 17–19, where pixels are distributed in all direction in the range of 0 to 255 i.e. pixels gained behavior of dissimilarity after passing it through encryption algorithm. Fig 20 show highly resemblance of pixels in three directions while Fig 21 show pixels became scattered and pixels are no more similar. All analyzed tests are done for image having size of 256×256×3 and 256×256 respectively. Results for each direction of channel is shown in Tables 1–3. Table 1 has four images of 256×256 dimension while ‘X’ direction of Brownian motion is considered. The results are evaluated for plain and encrypted images. The average value of plain image for pepper is taken and evaluated its average results which are 0.9565, 0.9638, 0.9489 respectively. The value of plain image for pepper is nearly equal to ‘1’ show highly similarity. Same as, average values for cipher red, green and blue channels along ‘X’ direction are 0.0014, 0.0012, 0.0014 reveals that system is highly secure. The succeeding Table 2 with four standard channels of pepper, airplane, splash and tiffany having dimension of 256×256×3 with three distinct orientation of horizontal, vertical and diagonal is shown. The average value of plain for pepper image is 0.9573 and cipher value -0.0003 i.e. plain image value is nearly equal to one and cipher image is nearly equal to zero. In the very next Table 3 we have compared our proposed correlation values with some existing scheme values which validated our proposed system robustness. Correlation coefficient can be defined by using the following mathematical expression: where σ is covariance and σ, σ are standard deviations of random variables x and y respectively. The correlation coefficient for layer wise of Brownian motion into X direction is presented in Figs 14–21 respectively.
Fig 14

(a) Plain red layer horizontal correlation; (b) Plain red layer diagonal correlation; (c) Plain red-layer vertical correlation.

Fig 16

(a) Plain blue layer horizontal correlation; (b) Plain blue layer diagonal correlation; (c) Plain blue layer vertical correlation.

Fig 19

(a) Ciphered blue layer horizontal correlation; (b) Ciphered blue layer diagonal correlation; (b) Ciphered blue layer vertical correlation.

Fig 20

(a) Plain pepper image having size 256×256×3 horizontal correlation; (b) Plain pepper image having size 256×256×3 diagonal correlation; (c) Plain pepper image having size 256×256×3 vertical correlations.

Fig 21

(a) Ciphered pepper image having size 256×256×3 horizontal correlation; (b) Ciphered pepper image having size 256×256×3 diagonal correlation; (c) Ciphered pepper image having size 256×256×3 vertical correlations.

Fig 17

(a) Ciphered red layer horizontal correlation; (b) Ciphered red layer diagonal correlation; (c) Ciphered red layer vertical correlation.

Table 1

Correlation coefficient for layer wise into three different directions.

Plain valuesCipher values
ImageChannelH-DD-DV-DA-VH-DD-DV-DA-V
PepperR-X0.96460.93690.96800.95650.00110.00020.00300.0014
G-X0.96980.94660.97500.9638-0.00160.0067-0.00140.0012
B-X0.95700.92630.96360.94890.00180.0040-0.00150.0014
AirplaneR-X0.93890.87380.92390.9122-0.00300.0012-0.0056-0.0074
G-X0.93090.88140.93430.91550.0006-0.0009-0.0053-0.0018
B-X0.95030.88000.90890.9130-0.0094-0.0034-0.0016-0.0048
SplashR-X0.98700.98240.99470.9880-0.00090.0001-0.0012-0.0020
G-X0.96880.95190.97870.9664-0.00440.0031-0.0023-0.0012
B-X0.97060.94070.96600.95910.00050.0011-0.00030.0004
TiffanyR-X0.95420.91290.94860.9385-0.00380.0004-0.0045-0.0026
G-X0.92620.88120.94670.9180-0.00160.0027-0.00080.0001
B-X0.93480.88500.93760.9191-0.00050.0045-0.00240.0005

R-X: Red layer in X direction; G-X: Green layer in X direction; B-X: Blue layer in X direction; H-D: Horizontal direction; D-D: Diagonal direction; V-D: Vertical direction; A-V: Average value.

Table 3

Comparison of correlation coefficient values with existing techniques.

AlgorithmsH-DD-DV-D
Proposed Plain image0.96380.93710.9711
Proposed cipher image-0.00140.0043-0.0032
Ref. [32]0.00220.0001-0.0017
Ref. [33]0.12570.05810.0504
Ref. [34]0.06810.0845-
Ref. [35]0.00240.05800.0170
Ref. [36]0.00080.00080.0005
Ref. [37]0.00360.00230.0039
Ref. [38]0.00440.00340.0020
Ref. [39]0.00120.00260.0021
Ref. [40]0.00240.00120.0016
Ref. [41]0.00460.00400.0017
Ref. [42]0.00720.00580.0031
Ref. [43]0.02140.0465-0.0090
Ref. [44]0.0845-0.0681
Ref. [45]0.09650.0362-0.0581
Ref. [46]0.12570.02260.0581

H-D: Horizontal direction; D-D: Diagonal direction; V-D: Vertical direction.

Table 2

Correlation coefficient values for several standard test images.

Plain valuesEncrypted values
ImagesDimensionHDVA VHDVA V
Pepper256×2560.96380.93710.97110.9573-0.00140.0043-0.0032-0.0003
Airplane256×2560.93460.88190.93010.91550.00510.0047-0.00110.0029
Splash256×2560.97240.96040.98430.9723-0.0073-0.00310.0066-0.0012
Tiffany256×2560.95420.91290.94860.93850.0020-0.00270.00650.0019

H: Horizontal; D: Diagonal; V: Vertical; A V: Average values.

(a) Plain red layer horizontal correlation; (b) Plain red layer diagonal correlation; (c) Plain red-layer vertical correlation. (a) Plain green layer horizontal correlation; (b) Plain green layer diagonal correlation; (c) Plain green layer vertical correlation. (a) Plain blue layer horizontal correlation; (b) Plain blue layer diagonal correlation; (c) Plain blue layer vertical correlation. (a) Ciphered red layer horizontal correlation; (b) Ciphered red layer diagonal correlation; (c) Ciphered red layer vertical correlation. (a) Ciphered green layer horizontal correlation; (b) Ciphered green layer diagonal correlation; (c) Ciphered green layer vertical correlation. (a) Ciphered blue layer horizontal correlation; (b) Ciphered blue layer diagonal correlation; (b) Ciphered blue layer vertical correlation. (a) Plain pepper image having size 256×256×3 horizontal correlation; (b) Plain pepper image having size 256×256×3 diagonal correlation; (c) Plain pepper image having size 256×256×3 vertical correlations. (a) Ciphered pepper image having size 256×256×3 horizontal correlation; (b) Ciphered pepper image having size 256×256×3 diagonal correlation; (c) Ciphered pepper image having size 256×256×3 vertical correlations. R-X: Red layer in X direction; G-X: Green layer in X direction; B-X: Blue layer in X direction; H-D: Horizontal direction; D-D: Diagonal direction; V-D: Vertical direction; A-V: Average value. H: Horizontal; D: Diagonal; V: Vertical; A V: Average values. H-D: Horizontal direction; D-D: Diagonal direction; V-D: Vertical direction.

5.3 Mean square error

To compute accuracy of system, mean square error is to be measure. Mean square error can be computed from plain and cipher image using Eq 8 as shown: Bigger mean square error (MSE) value show the system is more secure against differential attacks. The calculated mean square error values are shown in Table 4.
Table 4

MSE and PSNR tests for various standard images.

Technique types
ImagesDimensionMSEPSNR
Peppers256×25610925.357.74
256×25610965.377.73
256×25610939.407.74
Airplane256×2569867.878.22
256×25610565.087.93
256×25610375.418.00
Splash256×25611405.027.59
256×25612294.937.27
256×2569845.958.23
Tiffany256×25617631.995.70
256×25613063.027.00
256×2567323.959.52

5.4 Peak signal to noise ratio

To evaluate image quality of cipher image, peak to signal noise ratio (PSNR) is to be measure which can be illustrated using Eq 9 as shown: The peak signal to noise ratio (PSNR) must be minimum to ensure good security. The two criterions are conflicting in nature. Mean square error must be approaching to maximum and peak to signal noise ratio must be approaching to minimum to complete security requirements that needed to design algorithm. PSNR calculated values using proposed algorithm are shown in Table 4. We evaluated tests for four standard images of pepper, airplane, splash and tiffany of having size 256×256×3. The average value for MSE that must be near to 10000 while for better peak to signal noise ratio the average value must be near to 8.50. Looking into Tables 4 and 5 for pepper as a test image for three respective channels. Average value of MSE for all three channels are 10943.37 while average PSNR value is almost equal to 7.74. The very next standard image is airplane having same length of 256×256 calculates MSE value which is greater than 10000 and PSNR value less than 8.50. The succeeding image splash having average MSE value with 11181.96 is exceptional after tiffany image having value of 12672.98 for the same size with average PSNR is less than 8.50. The final image tiffany having same size of 256×256×3 gained MSE output result equal to 12672.98 with peak to signal noise ratio having 7.40. PSNR and MSE average for different four standard images authenticated robustness of proposed cryptosystem. Table 6 show comparison of MSE and PSNR with existing algorithms.
Table 5

Average MSE and PSNR values for certain test images.

Projected technique
ImagesDimensionsAvg. MSEAvg. PSNR
Pepper256×256×310943.377.74
Airplane256×256×310269.458.05
Splash256×256×311181.967.69
Tiffany256×256×312672.987.40
Table 6

Comparison of existing MSE values with proposed cryptosystem output values.

Preexisting algorithmsDimensionsCompared MSE Values
Ref. [47]256×256×38369
Ref. [48]256×256×35800
Ref. [49]256×256×33300
Ref. [50]256×256×38760
AES256×256×34600
AES-CBC256×256×34637
AES-Counter256×256×34938
AES-Feedback256×256×34577
AES-Stream256×256×34911
Proposed256×256×310943

5.5 Mean Absolute Error

Mean absolute error is criterion use to examine security of the system. Higher the value of mean absolute error, the stronger the system is designed. Suppose two images, the one plain image 'P' and another encrypted image 'E' be grey level of pixels at i row and j column having M×N size of plain and cipher image respectively. The Mean absolute error between two images of plain and encrypted images can be calculated using simple equation: By investigating Table 7 for mean absolute error values for four standard test images having same length of 256×256×3. The average value for mean absolute error is approximately equal to 70 ~ 75. The larger the value is achieved; the more reliable and secure cryptosystem is designed. In Table 7 values for all four standard test images have shown. In the same table we compared the proposed cryptosystem values with already existing algorithm for same standard images having same size.
Table 7

MAE values for certain standard images and its comparison.

ImageDimensionMAE valueRef. [51]Ref. [66]
Pepper256×256867474
Airplane256×25610174
Splash256×256117-76
Tiffany256×2561617694

5.6 Information Entropy

Randomness test theory was put forward by Shannon in 1949 and estimated randomness and unpredictability of information [44]. Information entropy analysis is one of the familiar methods of finding randomness of secure sequence. The ideal value for maximum entropy is always 8 for 8-bit system. We calculated entropy against each layer for different standard test images with different dimensions. The value examined using proposed algorithm is 7.999 which is very close to ideal value of 8 which validated our proposed cryptosystem and ensured its high security against any linear and differential attack. The comparison of computed layer as well combined form is shown in Tables 8–11 respectively. Information entropy can be computed using equation: where p(m) is probability of massages ‘m’, 2 means all possible outcomes where ‘K ’is number of bits included for each massage and ‘log’ in equation is logarithm with logarithmic base. Looking into Tables 8–11. Table 8 are calculated values of entropy for different layers having length of 256×256×3 and 512×512×3 image with channel wise having length of 256×256 and 512×512 respectively. The ideal entropy value is always 8 for 8-bit system. The evaluated values of channel wise pepper image have some exceptional outputs of 7.997, 7.997, 7996 which approximates to ideal value, further the values are evaluated for number of standard test images for different channels are shown in Table 8. In Table 9 we compared our evaluated value of proposed cryptosystem with already existing values. The proposed value of 7.999 is almost equal to ideal value of maximum randomness of 8 for 8-bit system which validated robustness of our proposed cryptosystem. In Table 10 we compared results of proposed algorithm of 256×256×3 with several existing algorithms. In Table 11 images having size of 256×256×3 and 512×512×3 is shown. This concluded that system show some extra behavior of robustness to be breakdown against linear and differential passwords.
Table 8

Information entropy analysis for certain standard images of dimension 256×256 and 512×512.

ImageChannelsDimensionEvaluated entropy values
PeppersRC256×2567.997
GC256×2567.997
BC256×2567.996
RC512×5127.999
GC512×5127.999
BC512×5127.999
AirplaneRC256×2567.997
GC256×2567.997
BC256×2567.997
RC512×5127.999
GC512×5127.999
BC512×5127.999
SplashRC256×2567.997
GC256×2567.997
BC256×2567.997
RC512×5127.999
GC512×5127.999
GC512×5127.999
TiffanyRC256×2567.996
GC256×2567.997
BC256×2567.997
RC512×5127.999
GC512×5127.999
BC512×5127.999

RC: Red channel; GC: Green channel; BC: Blue channel

Table 11

Entropy values for certain standard images with dimension of 256×256×3 and 512×512×3.

ImagesDimensionProjected technique
Pepper256×2567.999
512×5127.999
Airplane256×2567.999
512×5127.999
Splash256×2567.999
512×5127.999
Tiffany256×2567.999
512×5127.999
Table 9

Comparison of proposed image entropy value with existing algorithm entropy.

AlgorithmsDimensionCompared values
Proposed image256×256×37.9992
Ref [52]256×256×37.9993
Ref [53]256×256×37.9990
Ref [54]256×256×37.9974
Ref [55]256×256×37.9971
Ref [56]256×256×37.9970
Table 10

Comparison of proposed layer wise entropy values with existing values of certain algorithms.

AlgorithmsDimensionRedGreenBlue
Rhouma et al. [44]256×256×37.97327.97507.9715
Hongjun et al. [45]256×256×37.98517.98527.9832
Huang et al. [46]256×256×37.85017.90287.5582
Proposed256×256×37.9977.9977.996
RC: Red channel; GC: Green channel; BC: Blue channel

5.7 Sensitivity analysis

The number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI) are two standardized tests use to examine plain image sensitivity against external differential attack. This test elaborates one effect on another i.e. making very small change in plain image will cause immense difference in the corresponding encrypted images. Higher the value of NPCR is achieved, the more effective cryptosystem is designed and will highly oppose differential and linear attacks. The ideal value for NPCR is always 100. The values calculated using proposed cryptosystem is around to 99.64 which is too close to 100 shows the system is strong enough against attack. UACI test calculates average intensity change between plain and cipher image. The value must be near to 33. The examined values for the proposed image of pepper is around to 33 which is higher than expected value ensure robustness of cryptosystem.

5.7.1 Number of changing pixel rate

In this test we analyzed difference in cipher images with change in single pixel of source image. The test evaluated values are shown in Table 12. We represented first cipher image as E1( and second cipher E2( image as respectively. where F = 0 for E1( = E2( and F = 1 for E1( ≠ E2(.
Table 12

Layer wise NPCR and UACI values of standard images.

Projected technique
ImageLayer typeDimensionNPCRUACI
PepperR-L256×25699.6433.49
G-L256×25699.6433.56
B-L256×25699.6433.50
AirplaneR-L256×25699.6532.48
G-L256×25699.6532.48
B-L256×25699.6532.48
SplashR-L256×25699.6733.87
G-L256×25699.6733.87
B-L256×25699.6733.87
TiffanyR-L256×25699.6236.11
G-L256×25699.6236.11
B-L256×25699.6236.11

5.7.2 Unified averaged changed intensity

It is one of the important examinations for ensuring whether the proposed system is robust against differential attack or not. This examination is based on intensity of difference between two images. UACI can be computed using formula given: Table 12 show UACI test is applied for different test images having size of 256×256×3 and investigated its result for layer wise respectively. We evaluated results for the same standard images with dimension of 256×256 in layer wise. The standard value of NPCR is approximately equal to 9.60 whilst the achieved values are more than 9.60 ensure proposed algorithm is secure. The UACI average values of 33.51, 32.48, 33.87 and 36.11 also confirmed security of proposed algorithm is remarkable (see Table 13).
Table 13

Comparison of Proposed algorithms for NPCR and UACI test with various existing algorithms.

Avg. NPCR comparisonAvg. UACI comparison
Proposed algorithm99.6433.51
Ref [57]99.5226.79
Ref [58]99.5833.37
Ref [59]99.5917.60
Ref [60]99.6033.23
Ref [61]99.6028.13
Ref [62]99.5533.40
Ref [63]99.5933.46

5.8 Time complexity analysis

Time complexity is one of the most important analysis use to find out efficiency of certain cryptographic algorithms. This test describes actual time taken in execution of encryption using proposed algorithm. The proposed system is very much efficient then already existing schemes. The efficiency of system depends upon computational cost and resources which must be minimum to ensure that system is much efficient then already existing schemes. We investigated our proposed encryption algorithm using windows 10 pro operating system with system specification that includes CPU core™ i3 3227U, 1.9 GHZ with 8 GB ram and MATLAB 2017(a) version. Table. 14 demonstrates the time taken during encryption of proposed scheme. The test is done for several standard images and compared to already existing cryptosystem encryption time complexity. The encryption and decryption time are almost same for unique cryptosystem. The projected technique in Table. 14 show that the proposed hybrid system of Brownian movement of particles with certain chaotic dynamical system is highly efficient. This test validated our proposed cryptosystem and ensured the efficiency of system.
Table 14

Time complexity analysis for certain images.

ImagesProposed schemesRef. [68]Ref. [69]
Pepper2.172.763.68
Lena2.142.253.23
Splash2.17--
Airplane2.10--
Sailboat2.132.663.55
Baboon2.172.553.53

5.9 Investigation of NIST test

NIST test examination is one the most notable approved standard use to find randomness. This test involves number of autonomous statistical tests. We have investigated NIST tests for our proposed encryption algorithm in order to authenticate the randomness. The probabilities of passing each test must be greater than 0.01. In case of our anticipated scheme, the number values for NIST are all greater than 0.01 which qualify the suggested scheme for true random cipher (See Table 15).
Table 15

NIST test analysis for different layers of encrypted image.

Color components of image layers
Test namesRedGreenBlueRemarks
Frequency0.375920.20590.24198Success
Block Frequency0.382740.681790.47892Success
Run (m = 10000)0.116640.869330.48024Success
Long runs of ones0.71270.71270.67514Success
Rank0.291910.291910.29191Success
Spectral DFT0.771670.013640.46816Success
No overlapping1.000000.999810.99999Success
Overlapping0.859880.859880.85988Success
Universal0.992770.98350.99631Success
Serial 1p values0.142360.050630.2845Success
Serial 2p values0.752730.046340.53489Success
Approx. Entropy0.772160.068490.62349Success
Cumulative sum forward0.411490.352560.049371Success
Cumulative sum reverse0.775060.917581.5885Success
X = -40.223360.028940.59869Success
X = -30.000650.000380.78206Success
X = -20.001480.523780.61767Success
X = -10.288670.61310.7699Success
Random excursionsX = 10.810440.584120.89735Success
X = 20.219180.730980.89552Success
X = 30.82820.753350.81792Success
X = 40.083610.87040.51758Success
X = -40.877370.207710.32658Success
X = -30.589330.136040.24574Success
X = -20.637350.210960.34897Success
Random excursion variantsX = -11.000000.133610.7456Success
X = 10.838260.182420.87113Success
X = 20.813660.289840.92538Success
X = 30.648080.233040.77167Success
X = 40.589150.256840.58107Success

5.10 Software and system specifications

In this section we conducted tests for several standard test images having size of 256×256×3 and layer wise having size of 256×256 and OS of CPU core™ i3 3227U, 1.9 GHZ with 8 GB ram and MATLAB 2017(a) version.

6 Conclusion

We have proposed a digital confidentiality preserving scheme which is based on Brownian motion and chaotic iterative maps. The suggested scheme is authenticated against various standard benchmarks available in literature. Our proposed scheme is quite competent of providing secrecy to digital contents and prevent eavesdropper to steals the secret information. The proposed algorithm is designed for security of images though it can be extended to the encryption of some other types of data such as audio and video information. The system designed can be implemented for real time communication.
  1 in total

1.  A novel image encryption scheme based on quantum dynamical spinning and rotations.

Authors:  Majid Khan; Hafiz Muhammad Waseem
Journal:  PLoS One       Date:  2018-11-19       Impact factor: 3.240

  1 in total
  2 in total

1.  A Novel Hybrid Secure Image Encryption Based on Julia Set of Fractals and 3D Lorenz Chaotic Map.

Authors:  Fawad Masood; Jawad Ahmad; Syed Aziz Shah; Sajjad Shaukat Jamal; Iqtadar Hussain
Journal:  Entropy (Basel)       Date:  2020-02-28       Impact factor: 2.524

2.  New insights into the existing image encryption algorithms based on DNA coding.

Authors:  Xianglian Xue; Dongsheng Zhou; Changjun Zhou
Journal:  PLoS One       Date:  2020-10-23       Impact factor: 3.240

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.