| Literature DB >> 33265805 |
Shuqin Zhu1, Congxu Zhu2,3,4, Wenhong Wang1.
Abstract
In order to overcome the difficulty of key management in "one time pad" encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture of confusion and diffusion is adopted. Firstly, the surrounding of a plaintext image is surrounded by a sequence generated from the SHA-256 hash value of the plaintext to ensure that each encrypted result is different. Secondly, the image is scrambled according to the random sequence obtained by adding the disturbance term associated with the plaintext to the chaotic sequence. Third, the cyphertext (plaintext) feedback mechanism of the dynamic index in the diffusion stage is adopted, that is, the location index of the cyphertext (plaintext) used for feedback is dynamic. The above measures can ensure that the algorithm can resist chosen plaintext attacks and can overcome the difficulty of key management in "one time pad" encryption scheme. Also, experimental results such as key space analysis, key sensitivity analysis, differential analysis, histograms, information entropy, and correlation coefficients show that the image encryption algorithm is safe and reliable, and has high application potential.Entities:
Keywords: SHA-256 hash value; chaotic system; dynamic index; image encryption; permutation-diffusion
Year: 2018 PMID: 33265805 PMCID: PMC7513242 DOI: 10.3390/e20090716
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1An example of adding surrounding pixels. (a) plain-image P; (b) operation result.
Figure 2Hyper-chaotic attractor. (a) (x-y-z) plane; (b) (w-x-z) plane; (c) (w-y) plane; (d) (x-z) plane.
Figure 3Histogram of three CPRNG sequences. (a) The histogram of sequence S; (b)The histogram of sequence V; (c)The histogram of sequence T.
NIST SP800-22 standard test of pseudo-random sequence S′, V′ and T′.
| Statistical Test Name | ||||||
|---|---|---|---|---|---|---|
| Pass Rate | Pass Rate | Pass Rate | ||||
| Frequency(monobit) | 99.5% | 0.9346 | 99.3% | 0.4058 | 99.4% | 0.4708 |
| Block Frequency | 99.2% | 0.8068 | 99.1% | 0.6079 | 99.0% | 0.5485 |
| The Run Test | 99.5% | 0.4088 | 99.6% | 0.4317 | 99.5% | 0.5493 |
| Longest Run of Ones | 98.6% | 0.1481 | 98.8% | 0.4555 | 98.6% | 0.4419 |
| Rank | 98.5% | 0.0465 | 98.3% | 0.0467 | 98.1% | 0.0103 |
| DFT Spectral | 99.3% | 0.9537 | 99.1% | 0.5365 | 99.3% | 0.6539 |
| Non-Overlapping Templates | 99.1% | 0.6163 | 99.0% | 0.5348 | 98.8% | 0.4807 |
| Overlapping Templates | 98.8% | 0.7597 | 98.6% | 0.5331 | 98.4% | 0.6420 |
| Universal Statistical Test | 98.5% | 0.5825 | 98.3% | 0.4624 | 98.2% | 0.4171 |
| Linear Complexity | 98.9% | 0.2215 | 98.7% | 0.4642 | 98.5% | 0.4936 |
| Serial Test 1 | 99.1% | 0.3358 | 98.9% | 0.2421 | 98.7% | 0.2602 |
| Serial Test 2 | 99.2% | 0.2046 | 99.4% | 0.4207 | 99.3% | 0.2315 |
| Approximate Entropy | 98.8% | 0.7522 | 98.6% | 0.6033 | 98.8% | 0.4784 |
| Cumulative Sums (forward) | 99.6% | 0.4752 | 99.8% | 0.8023 | 99.7% | 0.8163 |
| Cumulative Sums (Reverse) | 99.4% | 0.8898 | 99.2% | 0.6596 | 99.3% | 0.8101 |
| Random Excursions | 98.7% | 0.1599 | 98.8% | 0.1713 | 98.6% | 0.1314 |
| Random Excursions Variant | 98.9% | 0.3226 | 98.4% | 0.1564 | 98.6% | 0.0942 |
Figure 4The architecture of the proposed encryption algorithm.
Figure 5Experimental results. (a) scrambled image; (b) cyphertext image; (c) decrypted plaintext image.
Key space comparisons.
| Encryption Algorithm | Key Space |
|---|---|
| Proposed scheme | 2339 |
| Reference [ | 2149 |
| Reference [ | 2256 |
| Reference [ | 2299 |
| Reference [ | 2375 |
| Reference [ | >2128 |
| Reference [ | 2357 |
Sensitivity tests for each initial secret key value.
| Keys | Change Rate of Cyphertext Image |
|---|---|
| 0.9963 | |
| 0.9964 | |
| 0.9976 | |
| 0.9975 |
Figure 6The image decrypted by the wrong keys. (a) decryption result of key Key1; (b) decryption result of Key2; (c) decryption result of Key3; (d) decryption result of Key4.
NPCR and UACI test results of slight change of plaintext in our algorithm.
| Images | Rice | Autumn | Pepper | Cameraman | |
|---|---|---|---|---|---|
| Max | 99.8943 | 99.7932 | 99.9012 | 99.7821 | |
| Min | 99.5426 | 99.4213 | 99.3809 | 99.4608 | |
| Average | 99.6062 | 99.6115 | 99.5956 | 99.5697 | |
| Max | 33.5698 | 33.7754 | 33.8712 | 33.6590 | |
| Min | 33.3216 | 33.5500 | 33.4919 | 33.1958 | |
| Average | 33.4419 | 33.6319 | 33.5418 | 33.3618 | |
NPCR and UACI test results of slight change of plaintext in [35].
| Images | Rice | Autumn | Pepper | Cameraman | |
|---|---|---|---|---|---|
| Max | 99.8812 | 99.6623 | 99.8719 | 99.8864 | |
| Min | 99.4961 | 99.5512 | 99.5698 | 99.5091 | |
| Average | 99.6006 | 99.6098 | 99.5796 | 99.5692 | |
| Max | 33.5612 | 33.6067 | 33.8523 | 33.7019 | |
| Min | 33.3187 | 33.5602 | 33.4967 | 33.2195 | |
| Average | 33.4297 | 33.5897 | 33.5154 | 33.3478 | |
Figure 7Histogram analysis. (a) The plaintext image of “pepper”; (b) the histogram of the plaintext image; (c) the cyphertext image; (d) the histogram of the cyphertext image.
Chi-test results of 30 encrypted images under confidence level is 0.05.
| Test Images | |||
|---|---|---|---|
| cameraman | 16,711,680 | 288.9823 < 295.25 | 285.3125 < 295.25 |
| pepper | 50,135,040 | 269.3387 < 295.25 | 260.3421 < 295.25 |
| rice | 96,312 | 284.2387 < 295.25 | 278.6172 < 295.25 |
| autumn | 18,122,850 | 289.9832 < 295.25 | 288.5792 < 295.25 |
Entropy of cyphertext images.
| Images | This Paper | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Ref. [ |
|---|---|---|---|---|---|---|
| Rice (256 × 256) | 7.9973 | 7.9864 | 7.9936 | 7.9643 | 7.9875 | 7.9968 |
| cameraman (256 × 256) | 7.9989 | 7.9763 | 7.9952 | 7.9867 | 7.9946 | 7.9865 |
| autumn (206 × 345) | 7.9968 | 7.9564 | 7.9962 | 7.9698 | 7.9864 | 7.9972 |
| pepper (512 × 512) | 7.9992 | 7.9819 | 7.9983 | 7.9949 | 7.9896 | 7.9993 |
Figure 8The correlation plots of the cameraman image and the corresponding ciphered image of cameraman. (a) Horizontal correlation of the cameraman image; (b) Vertical correlation of the cameraman image; (c) Diagonal correlation of the cameraman image; (d) Horizontal correlation of the cyphered image of cameraman; (e) Vertical correlation of the cyphered image of cameraman; (f) diagonal correlation of the cyphered image of cameraman.
Correlation coefficients between adjacent elements of original image and encrypted image.
| Images | Horizontal | Vertical | Diagonal |
|---|---|---|---|
| Plaintext “Rice” | 0.9427 | 0.9263 | 0.8994 |
| Cyphertext “Rice” | −0.0046 | 0.0287 | −0.0361 |
| Plaintext “Cameraman” | 0.9588 | 0.9360 | 0.9095 |
| Cypher “Cameraman” | −0.0017 | −0.0279 | 0.0047 |
| Plaintext “autumn” | 0.9675 | 0.9845 | 0.9821 |
| Cyphertext “autumn” | −0.0087 | 0.0142 | 0.0098 |
| Plaintext “pepper” | 0.9894 | 0.9931 | 0.9847 |
| Cyphertext “pepper” | −0.0055 | −0.0194 | −0.0295 |
Comparison of encryption or dcryption time (EDT) of 8-bit gray level images for different image sizes.
| Image Size ( | Ref. [ | Ref. [ | Ref. [ | Ref. [ | Proposed System |
|---|---|---|---|---|---|
| 64 × 64 | 0.07 | 0.03 | 0.19 | 0.61 | 0.02 |
| 128 × 128 | 0.19 | 0.08 | 0.29 | 2.17 | 0.06 |
| 256 × 256 | 0.46 | 0.18 | 6.01 | 7.73 | 0.22 |
| 512× 512 | 1.88 | 0.97 | 35.59 | 31.59 | 0.85 |
| 1024 × 1024 | 3.62 | 2.94 | 253.88 | 169.21 | 3.11 |