Literature DB >> 33266637

A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System.

Irfan Younas1, Majid Khan2,3.   

Abstract

In this research article, we propose a new structure namely inverse left almost semigroup (LA-semigroup) by adding confusion in our proposed image encryption scheme along with discrete and continuous chaotic systems in order to complement the diffusion characteristics. The performance analysis was conducted in terms of the correlation analysis, the pixels uniformity analysis, the sensitivity analysis, the information entropy analysis, and pixels difference based measurements. The results show that the proposed algorithm has better information security properties, which can provide strong security and a high performance.

Entities:  

Keywords:  chaotic systems; confusion and diffusion; inverse left almost semigroup; statistical analysis

Year:  2018        PMID: 33266637      PMCID: PMC7512498          DOI: 10.3390/e20120913

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

The existing world demands fast and secure communication. The bandwidth is increasing every day due to third generation, fourth generation and fifth generation technologies. Digital contents can be easily accessed through any geographical remote area because of the ideology of a global village. By advancing the technologies, smart and simple to access information from any remote station creates a massive insecurity of digital information. The security of digital multimedia is one of the vital problems of the information sciences. The widespread broadcasting and distribution of digital information over the internet, especially social media like Facebook and Twitter, have made it important to protect our most important information from theft, illegal copying, handling and sharing. The advancement of digital media technology and other multimedia related technology has made it possible to perform some standard procedures in order to improve the security of our digital images/audio/videos from being utilized criminally over the web. There are a number of information security techniques that have been designed whose algorithms are based on cryptography, which is one of the most important branch of cryptology that is used to make an encryption scheme to secure information. Classical encryption techniques usually utilize either substitution or permutation to develop a cryptosystem; for instance, mono-alphabetical and polyalphabetic ciphers. The use of only substitution or permutation while developing any encryption scheme is susceptible to different cryptographic attacks. Consequently, the cryptosystems are getting weaker every day due to the advancement of technologies and computational powers of machines. In 1949, Claude Shannon gave the idea of confusion and diffusion, which completely changed the security mechanisms of the digital world. The information theory added a new pillar in information security. After the theory of Claude Shannon, the idea of confusion and diffusion was extensively used, which means substitution and permutation were utilized at a time in modern block ciphers [1,2]. According to Shannon, confusion specifies the connections between the cipher text and the key as much as complex whereas diffusion corresponds to the redundancy in the statistical data of the plaintext used in the statistical data of the cipher text. This master idea fundamentally changed the ideology of modern block and steam ciphers. The ideas of confusion and diffusion were utilized in a number of modern block ciphers namely international data encryption standard (IDEA), data encryption standard (DES), and advanced encryption standard (AES). Thereafter, different new techniques were designed which use chaos theory, wavelets transform, discrete transforms, optics, DNA sequences and quantum spinning and rotations [3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34]. In recent times, chaos theory has been used in an extensive way for the development of image encryption mechanisms [35,36]. The three fundamental characteristics of chaos that have made it possible to use it in the development of encryption algorithms are sensitive to the initial condition, topological mixing, and dense periodic orbits. These three properties were closely related to cryptography. Due to the cryptographically robust characteristics of chaos, we have utilized the Lorenz chaotic system while designing our novel image encryption technique. So far, different types of mathematical structures were utilized namely Group, Ring, Galois field and Galois ring for the construction of a substitution box (S-box), which is one of the most important nonlinear components of any modern block ciphers. The thrust of new mathematical structures for the development of encryption techniques is one of the most important areas of research in information security [8,11,12,15]. An algebraic structure equipped with a closed and left invertive binary operation is called a left almost semigroup (abbreviated as LA-semigroup). This notion was made known by Kazim and Naseeruddin in the early 1970s [37]. Mushtaq and Yusuf discussed some important properties in [38]. Such groupoids are also called right modular groupoids or left invertive groupoids or incorrectly as Abel Grassmann’s groupoid [39,40,41]. By successive applications of the left invertive law in an arbitrary LA-semigroup, it can be seen that the medial identity naturally holds in an LA-semigroup. It is important to mention here that every LA-semigroup is always medial but its converse is not true. It is a non-associative and non-commutative structure midway between a groupoid and commutative semigroup. In order to define the associative powers of elements in an LA-semigroup the identity (ss)s = s(ss) was introduced in Reference [42]. An LA-semigroup with this additional property is called a locally associative LA-semigroup. Some important decompositions of locally associative LA-semigroups were also investigated in References [42,43]. Consider a locally associative LA-semigroup defined by the Table 1.
Table 1

Locally associative left almost semigroup (LA-semigroup).

*012
0221
1111
2111
Where , substantiates that a locally associative LA-semigroup not need to have associative powers necessarily. The LA-semigroups, after the evolved from the study of a diverse generalization of groups and semigroups. It has become a separate branch within itself with a considerable number of research results. The reason for its procession is its natural existence in almost all mathematical contexts in which groups and semigroups have been developed. The study of LA-semigroups has wide applications in the locally associative LA-semigroups, abelian groups, the theory of fuzzy LA-semigroups, ternary semihypergroups, -semihypergroups, neutrosophic LA-semigroups, soft sets and the theory of non-commutative groupoids [42,43,44,45,46,47,48,49]. Here, we propose a new scheme for the encryption of images based on an inverse LA-semigroup and a modified nonlinear chaotic map, which has better confusion and diffusion characteristics that are necessary for a modern substitution-permutation network. This article comprises of five sections. In Section 2, we introduce fundamentals of a novel structure inverse LA-semigroups. In Section 3, we propose an algorithm for the encryption of images. The efficiency and safety measures for the suggested algorithm are examined in Section 4. The numerical measures are also discussed in Section 4 to examine the response of suggested scheme against differential attacks. Finally, give conclusions in the Section 5.

2. Preliminaries

This section is primarily related to some standard definitions, which will be quite useful in subsequent sections. An LA-semigroup is a pair where is a non-empty set; satisfies for all . One can easily observe that the medial identity naturally holds in the LA-semigroups. It is important to mention here that every LA-semigroup is always medial but its converse is not true. An LA-semigroup satisfying the left permutable law is called LA**-semigroup. An LA-semigroup with left identity is always LA**-semigroup and LA**-semigroup naturally satisfies the paramedial identity . We provide counter examples of three groupoids of order in Table 2, where (i) is a medial groupoid but not an LA-semigroup, (ii) is a left permutable groupoid, which is also paramedial but not an LA-semigroup, (iii) is a left permutable groupoid with left identity but not an LA-semigroup (see Table 2).
Table 2

Counter Examples.

(i)(ii)(iii)
*101234*201234*301234
044422000000030440
140044100021142003
240424200011201234
302200300020304334
444444400010443003
An LA-semigroup ( equiped with left identity , that is, for all is LA-monoid. One can notice that left permutable law and paramedial law always hold in an LA-monoid . We also investigate a paramedial groupoid with a left identity is LA**-semigroup. An element for which there exist an element such that , then is called left inverse of . Right inverse for an element in an LA-monoid can also be defined analogously. It is easy to observe that if is the left inverse for an element , that is, . Then . Then . Showing that left and right inverses are unique in an LA-monoid. An LA-monoid, in which each element has its left inverse element is known as LA-group. An LA-semigroup satisfying the weak associative law is called LA*-semigroup. The identities are equivalent in an LA-semigroup . LA-group is an LA-monoid in which each element has a unique left multiplicative inverse. LA-monoids are special cases of LA-semigroups whereas LA-groups are special cases of LA-monoid. An LA-semigroup is unipotent if for all . We define a transformation by for all . An LA-semigroup is unipotent if and only if , where . Every unipotent left cancellative LA-semigroup is paramedial. Let ( and be any two LA-semigroups of the same order. A mapping is a homomorphism if it preserves the multiplication, that is, and an anti-homomorphism if it reverts the multiplication that is, . If such mapping is bijective, then it is known as isomorphism and anti-isomorphism respectively. If such a bijection exists, then the groupoids are isomorphic and anti-isomorphic respectively. For instance, if two LA-semigroups have isomorphic tables, they have the same structural properties. So we say that an isomorphism is an action between two multiplication tables. If we are provided with a permutation of the elements of , we transform the table by permuting the rows according to , then each column, and permuting the values at the end. An anti-isomorphism is an action followed by transposing the resulting table of an isomorphism. The outcome of applying the permutation is given in Table 3 (ii). Table 3 (i) and Table 3 (ii) are isomorphic. If has elements then atmost multiplication tables isomorphic to given LA-semigroup.
Table 3

A Multiplication table is mapped to another multiplication under permutation (b, d).

(i) (ii) (iii)
a B c d e apply (b, d) a d c b e rearrange a b c d e
a b E e a a a d e e a a a d a e e a
b a B b e e d a d d e e b e e a d d
c a b c d e c a d c b e c a b c d e
d e A a c b b e a a c d d a c d a e
e e a a b b e e a a d d e e d a a d
Let be an LA-semigroup satisfying paramedical law. Then, one has is an anti-endomorphism. is sub LA-semigroup of. is a congruence relation. An LA-semigroup , in which for every there exists a unique for which and is called an inverse LA-semigroup. This notion was made known by Mushtaq and Iqbal in Reference [ represents an inverse LA**-semigroup of order 256 generated by . Here, by an S-box of order , we mean a latin square of size whose entries are selected from a set of different symbols in such a way that there is no repetition in any row and column of the table.

3. Proposed Digital Image Encryption Algorithm

The present section deals with the encryption procedure.

3.1. Image Encryption

Designed image encryption techniques comprise of confusion and diffusion. As illustrated in Figure 1, the encryption method is based on the steps given below:
Figure 1

Proposed encryption algorithm.

Step 1: Take a standard digital color image of size Step 2: Read the inverse left almost LA-semigroup of order m Step 3: Apply a substitution transformation by using the LA-semigroup as listed in Step 2, which adds confusion to the proposed algorithm. Step 4: Generate chaotic sequences using Lorenz chaotic differential equations with a logistic map (seed values for each iteration comes from the Lorenz chaotic differential equation utilized three chaotic logistic maps used seeds from x, y and z directions solutions of Lorenz chaotic differential equations). Step 5: Apply a bitwise addition under modulo 2, of confused image produced in Step 3 with the chaotic sequences generated in Step 4 for each layer of the digital image that uses x component values for the red layer, y component values from the green layer and z component values of the logistic map for the blue layer of a given image. Step 6: Apply all of the above steps on each layer of the digital image. Step 7: Display the encrypted image.

3.2. Image Decryption

This method is used as a reverse process of our encryption procedure. The encrypted images through our proposed algorithm can be seen in Figure 2, Figure 3 and Figure 4 respectively.
Figure 2

The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Lena (a) plain image; (b) red; (c) green and (d) blue components respectively.

Figure 3

The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Baboon (a) plain image; (b) red; (c) green and (d) blue components respectively.

Figure 4

The images (e), (f), (g) and (h) are layer-wise encrypted results for images of Peppers (a) plain image; (b) red; (c) green and (d) blue components respectively.

4. Security Analysis of the Proposed Algorithm

Here, we apply some statistical measures on the typical digital contents to examine the safety during execution of the proposed encryption scheme. These measurements are strictly based on a precise evaluation, a realistic inspection and an inconsistency criterion for the encryption of images.

4.1. Uniformity Analysis of Image Pixels

A histogram of an image provides information about the circulation of the pixel intensity esteems for an image. A protected framework in encryption can have an identical histogram to resist statistical assaults. The histograms in Figure 5, Figure 6 and Figure 7 represent the standard and encrypted images of Lena, Baboon, and Peppers. From Figure 5, Figure 6 and Figure 7, we analyzed that the histograms of the standard images are not uniform, whereas the histograms of the encrypted digital images are uniform. The uniformity of pixel heights in the histograms of the encrypted images creates difficulty for attackers to find the clue for the maximum information region.
Figure 5

Histograms (a) red component; (b) green component and (c) blue component for the original images of Lena with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Lena.

Figure 6

Histograms (a) red component; (b) green component and (c) blue component for the original images of Baboon with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Baboon.

Figure 7

Histograms (a) red component; (b) green component and (c) blue component for the original images of Peppers with size 256 × 256. Histograms (d) red component; (e) green component; (f) blue component for the encrypted images of Peppers.

4.2 Correlation Analysis for Adjacent Pixels

The purpose of the correlation analysis was to examine the connections of neighboring pixels in the original and encrypted images. Mathematically, the correlation coefficients of two neighboring pixels is defined as: where X and Y are the estimations of two neighboring pixels of gray scale image, Var(X) and Var(Y) are deviations of X and Y individually and Cov(X,Y) represents the covariance. The correlation coefficients of the plain and encrypted digital images have a distinctive substance displayed in Table 4, Table 5, Table 6 and Table 7 identified by the plain and enciphered digital images are provided in Figure 8, Figure 9 and Figure 10. In addition, Table 4 contains the quantified evaluation of the correlation coefficient demonstrating the diffusion of the unique and encoded images horizontally, vertically and diagonally. Presently, we consider 2000 pairs of randomly selected neighboring pixels to look over the original and the enciphered images horizontally, vertically and diagonally. In Table 4, the correlation coefficients for the green, blue and red parts of the encrypted images are quite small, which implies an irrelevant correlation between adjoining pixels.
Table 4

Color components-wise correlation coefficient of cipher images.

ImageLayerCorrelation of Encrypted ImageCorrelation of Altered Encrypted Image
LenaRed−0.019408−0.026560
Green0.0051990.016749
Blue−0.057938−0.013504
BaboonRed−0.017262−0.062436
Green−0.018564−0.039240
Blue−0.0118670.037551
AirplaneRed−0.0350360.025052
Green0.040117−0.065009
Blue−0.0150170.014972
PepperRed−0.002283−0.035236
Green−0.0198590.007575
Blue−0.0286590.044896
HouseRed−0.0342270.037809
Green−0.079819−0.001682
Blue0.020816−0.014746
Jelly beansRed−0.069787−0.002181
Green−0.0293730.018362
Blue−0.003245−0.027437
TreeRed0.0158150.008496
Green0.0322060.007798
Blue−0.021771−0.015972
SplashRed−0.030921−0.023138
Green0.0723830.012479
Blue0.005316−0.024963
Sail boat on lakeRed0.0354080.000482
Green−0.004099−0.030648
Blue0.0209350.020618
Table 5

Correlation coefficients of original and encrypted images.

Standard ImagesOriginal ImageEncrypted Image
HorizontalVerticalDiagonalHorizontalVerticalDiagonal
Lena0.93390.96520.9076−0.0043−0.0090−0.0031
Baboon0.83100.77370.7723−0.0029−0.00790.0026
Peppers0.93920.90030.9444−0.0028−0.0090−0.0007
Table 6

Correlation coefficients of the plain and cipher image for the Lena color image of size 256 × 256.

Standard ImagesPlain ImageEncrypted Image
RedGreenBlueRedGreenBlue
Horizontal0.93390.90440.8609−0.0084−0.0028−0.0072
Vertical0.96520.94640.9086−0.0052−0.0066−0.0098
Diagonal0.90760.87960.8371−0.00160.00120.0013
Table 7

Comparison between the correlation coefficients of the proposed scheme and recent techniques using Lena image.

Correlation Directions
HorizontalVerticalDiagonal
Proposed encryption scheme−0.0043−0.0090−0.00310
Reference [3]0.068100.08450-
Reference [15]0.215700.058100.05040
Reference [17]0.007200.005800.00310
Reference [18]0.021400.04650−0.0090
Zhang et al. [26]0.082000.040000.00500
Zhou et al. [27]0.012000.027000.00700
Etimadi et al. [30]0.005000.011000.02300
Figure 8

Correlation coefficients between the pairs of the pixels for (a) Original Lena image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Lena image; (f) horizontally; (g) vertically; (h) diagonally.

Figure 9

Correlation coefficients between the pairs of the pixels for (a) original Baboon image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Baboon image; (f) horizontally; (g) vertically; (h) diagonally.

Figure 10

Correlation coefficients between the pairs of the pixels for (a) original Peppers image; (b) horizontally; (c) vertically and (d) diagonally (e) enciphered Peppers image; (f) horizontally; (g) vertically; (h) diagonally.

In addition, high correlation coefficients for the red, green and blue parts of the original images make data spillage conceivable. Table 6 provides us with similar position correlations for the red, green and blue parts, while Table 7 gives the adjoining position correlations for the red, green and blue parts. From Table 6 and Table 7, we analyze that the correlation coefficients of the encrypted digital images for the red, green and blue parts are all lower than −0.002, while the greatest correlation coefficient for the original images is 0.9652 in the event of the Lena image, 0.8310 for the Baboon and 0.9444 for the Peppers image, which indicates that the correlations for the red, green and blue parts of the encrypted images are adequately diminished. Therefore, our encryption scheme is highly defensive against statistical attacks. In addition, we plotted the correlation coefficients for the red, green and blue parts of the original images in Figure 8a–d, Figure 9a–d and Figure 10a–d and the encrypted images Figure 8e–h, Figure 9e–h and Figure 10e–h toward every directions, as delineated in Figure 8, Figure 9 and Figure 10. The solid correlation between adjoining pixels of the plain images is apparent as the specks are congregated along the slanting in Figure 8a–d, Figure 9a–d and Figure 10a–d. Nonetheless, the specks are scattered over the whole plane in Figure 8a–d, Figure 9a–d and Figure 10a–d, which shows that the correlation is incredibly diminished in the encrypted digital images.

4.3. Pixel Modification Based Measurements

The quality of an image depends upon the pixel difference which is calculated by means the mean square error (MSE), average difference (AD), maximum difference (MD), normalized absolute error (NAE), normalized cross correlation (NCC), structure content (SC) and peak signal to noise ratio) values (PSNR). These metrics are used for the comparison of unlike images.

4.3.1. Mean Square Error (MSE)

An encrypted image should not be equivalent to the original digital image due to the application of the encryption scheme over the plain image, which surely adds some noise to the actual digital content. We find MSE of the plain and encrypted images to analyze the level of enciphering. Mathematically, MSE is defined as: where and are the pixels positioned in the j-th row and k-th column of the plain and enciphered images respectively. A larger value of the MSE enhances the security of the encryption scheme.

4.3.2. Peak Signal to Noise Ratio (PSNR)

Mathematically, PSNR is defined as: where is the maximum value of pixel which can occur. The low value of PSNR shows the more difference of the original and enciphered images. In Table 8, we discuss values MSE and PSNR to ensure the versatility of the suggested scheme.
Table 8

MSE and PSNR of the suggested scheme.

ImagesPixel Difference Based Measures
MSEPSNR
Lena4859.0311.30
Baboon6399.0510.10
Peppers7274.449.55

4.3.3. Normalized Absolute Error (NAE)

Mathematically, normalized absolute error (abbreviated as NAE) is defined as: It is the proportion of the encrypted digital content to the original image. A bigger estimation of NAE demonstrates the great nature of coming about the scrambled image after the encryption process.

4.3.4. Maximum Difference (MD)

Mathematically, the maximum difference is defined as: where It measures the maximum of the error signal. A higher value of the maximum difference indicates that the quality of the encryption scheme is better.

4.3.5. Average Difference (AD)

The average difference measures the pixel contrast between the original image and its corresponding enciphered image. This quantitative measure is only utilized in object revealing and pattern recognition applications and it can likewise be pertinent to any image preparing applications where we locate the normal distinction between two digital contents. A larger estimation of the AD indicates the great quality of the digital image encryption (see Table 9). Mathematically, the average difference is defined as:
Table 9

Pixel difference-based and correlation-based measures of the proposed encryption scheme.

Pixel Difference MeasuresCorrelation Measures
ImageLayerMSEPSNRADMDNAENCCSC
LenaRed106377.862552.31092550.46740.65981.6004
Green9245.28.4716−28.92112350.79680.99830.5788
Blue7169.49.5760−22.27762290.67131.09520.5632
BaboonRed8740.18.71561.96102550.59380.82590.9174
Green7802.89.2083−5.98052300.60250.91060.7810
Blue9714.38.2567−21.88182440.76700.90380.6819
AirplaneRed100398.113849.65052550.46160.67581.5368
Green106627.852449.59752420.47500.66411.5619
Blue107647.811063.11202550.44580.64601.7249
PepperRed8041.99.077222.13272340.49410.78081.1235
Green109937.7197−11.58432420.73960.78420.8678
Blue110487.6980−60.35582201.27881.33190.2955
The value of AD is ideally zero for two same digital images.

4.4. Similarities Measures

The likenesses between two signals can be estimated through a cross-correlation, structure similarity, and structure content. These are the standard devices for assessing how much two signs are comparable or divergent. It is a basic way to match two image patches, for highlight recognition and in addition a part of more refined systems. The method has a few favorable circumstances. We have used a standardized correlation and structure content with the end goal to demonstrate the dissimilarities among the original and scrambled images.

4.4.1. Normalized Cross Correlation (NCC)

A normalized cross-correlation (NCC) has been normally utilized as a metric to assess the level of likeness (or difference) between two digital images. The normalized cross-correlation is limited in the range between −1 and 1. The setting of the location edge esteem is significantly less difficult than the cross-correlation. The NCC measures the cozy connection between two images, it might be plain and enciphered digital images. All of the correlation-based measures are considered as 1, as the distinction between the two images is considered as zero. In each image, the similitude estimation is done dependent on the direct splendor and complexity varieties of utilizing cross-correlation. Mathematically, normalized cross-correlation is defined as: where m × n is the size of both plain image P and cipher image C. The estimation of NCC for encryption varies from or not near unity, which unmistakably means that the proposed scheme includes solid dissimilarities among the pixels of plain and scrambled images (see Table 9).

4.4.2. Structural Content (SC)

This measure viably thinks about the aggregate weight of an original signal to that of a coded or given. It is, hence, a worldwide metric. This measure is likewise called as structural content (SC), and in the event that it is spread at 1, at that point the changed over image is of better quality and a huge estimation of SC implies that the image is of low quality. Mathematically, structural content is defined as: On account of the plain and encoded images, the estimation of SC is not close to unity because the encryption scheme includes confusion and diffusion-like noise and commotion in the original image. The estimation of SC isn’t near one if there should be an occurrence of all advanced standard shading images (red, green and blue layers) (see Table 9).

4.5. Entropy Investigation

Entropy is evaluated to analyze the spreading of the gray scale estimations of the images. The coarser the image is, the bigger the entropy is. For an irregular image with 256 gray levels, the entropy ought to, in a perfect world, be 8 [9]. On the off chance that the entropy of the encrypted image is under 8, there is a probability of consistency, and this is a risk to the anticipated security. Mathematically, we can represent the entropy H for a data source y is characterized as: where are all possible states of information and y is the source images. For a completely sporadic source exuding signs, entropy should be N. In Table 10, the entropies of different plain and enciphered image entropies are given as demonstrated by the plain images in Figure 2, Figure 3 and Figure 4. These values are very close to the theoretical value which is 8. Consequently, information spillage in our encryption is negligible and well secured for physical attacks. We have looked at data entropy for our proposed encryption method with the already developed encryption plans. Table 11 shows that the entropy of the offered scheme for the scrambled images are better than the already available algorithms.
Table 10

Entropies of various plain and enciphered images.

ImageLayerPlain ImageAltered ImageEnciphered ImageEnciphered Altered Image
LenaRed7.23527.23537.99657.9975
Green7.58127.58147.99707.9970
Blue7.56827.56837.99717.9971
BaboonRed7.77667.77667.99657.9967
Green7.49117.49117.99687.9973
Blue7.75467.75467.99737.9973
AirplaneRed6.85056.85057.99727.9972
Green6.86226.86227.99697.9968
Blue6.45376.45377.99727.9972
PepperRed7.38437.38437.99767.9970
Green7.62307.62307.99717.9971
Blue7.14377.14387.99717.9971
HouseRed6.43106.43107.99707.9974
Green6.23206.23217.99697.9971
Blue6.53896.53897.99667.9970
Jelly beansRed5.26265.26267.99687.9968
Green6.54646.54637.99717.9973
Blue5.69475.69477.99717.9972
TreeRed7.21047.21047.99677.9966
Green6.92076.92067.99737.9973
Blue7.41367.41367.99737.9969
SplashRed7.20227.20227.99717.9973
Green7.00997.01007.99727.9970
Blue6.30566.30567.99717.9972
Table 11

Comparison between the entropies for 256 × 256 Lena image.

AlgorithmEntropy
Proposed7.9968
Sun’s algorithm [31]7.9965
Baptista’s algorithm [31]7.9260
Wong’s algorithm [31]7.9690
Xiang’s algorithm [31]7.9950
In Table 11 and Table 12, we compare the entropy of the proposed algorithm to the already defined algorithms. Our entropies are approximately equal to 8, which is the most suitable value. This minimizes the chance of data spillage during the encryption. Consequently, the proposed image cryptosystem is secure against an entropy assault. In addition, the entropy estimations of the introduced scheme are better than the encryption schemes [3,4,5,6].
Table 12

Comparison of the entropy of the proposed algorithm to the already defined algorithms.

Encryption TechniquesTest ImageColor Components of Original ImageColor Components of Encrypted Image
RedGreenBlueRedGreenBlue
Proposed schemeLena7.29337.58127.56827.99657.99707.9971
Reference [32]Lena7.29337.58127.56827.99037.98907.9893
Reference [5]Lena7.29337.58127.56827.97327.97507.9715
Reference [4]Lena7.29337.58127.56827.97917.98027.9827
Reference [5]Lena7.29337.58127.56827.98717.98817.9878
Reference [4]Lena7.29337.58127.56827.98747.78727.7866
Reference [6]Lena7.29337.58127.56827.92787.97447.9705

4.6. Robustness against Differential Attack

Diffusion is a basic parameter to examine the randomness in the encryption scheme. It is an important measurement in the proposed digital image encryption algorithm because it reflects even a minor change in the plain image [4,5]. By and large, the enemy may roll out by a slight improvement. For instance, by altering a single pixel of the original image and after that observe the difference in the outcome. Along these lines, we may discover a significant connection of the original and encrypted image. Since a little change in the original image can create a critical change in the encrypted image. Thus, differential attacks would be exceptionally wasteful and for all intents and purposes futile. On the off chance that an encryption scheme has a decent trademark, the connection between the original image and the encrypted image is extremely complex and it cannot be expected easily. We can measure the diffusion of an encryption scheme by changing a pixel in the original image [6]. To measure the effect of a one-pixel change in the original image and encrypted image, we used three estimations MAE, NPCR and UACI to examine security in the encrypted image against differential attacks. Suppose and are encrypted images before and after one pixel change in the plain image respectively. Then the MAE, NPCR and UACI are defined as: where represent the value of pixel at grid and D(i, j) is a bipolar array at grid In Table 13 and Table 14, we have MAE (> 75), (NPCR (> 99%) and UACI (≈ 33%) for the red, green and blue part of the encrypted standard images. These values of MAE, NPCR and UACI are very close to the best-approximated values already available in the literature. Hence, the suggested encryption algorithm can create more difficulty for differential attackers.
Table 13

The evaluation of the security measurements of the suggested encrypted algorithm.

Test ImagesNPCRUACIMAE
MaxMinMeanMaxMinMean
Lena99.99799.61299.71334.4333.2133.8779.22
Fruits99.99499.51599.69833.9833.0233.7183.45
Parrot99.99899.59799.86933.5333.1133.2475.38
Table 14

The evaluation of the security measurements of the suggested encrypted algorithm.

ImageLayerNPCRUACI
LenaRed0.995920.33497
Green0.995950.33325
Blue0.996000.33223
BaboonRed0.995940.33589
Green0.995630.33352
Blue0.996230.33408
AirplaneRed0.996240.33469
Green0.996170.33473
Blue0.995910.33625
PepperRed0.995770.33446
Green0.995940.33453
Blue0.996070.33747
HouseRed0.995510.33487
Green0.996090.33492
Blue0.996030.33284
Jelly beansRed0.996120.33317
Green0.996170.33408
Blue0.996360.33406
TreeRed0.996270.33385
Green0.996200.33518
Blue0.996320.33577
SplashRed0.996060.33522
Green0.996000.33504
Blue0.996010.33395
Sail boat on lakeRed0.996180.33718
Green0.996040.33429
Blue0.996090.33493
A comparison of the differential analysis with some of the already existing results is listed in Table 15 and Table 16 respectively.
Table 15

A comparison of calculated UACI and NPCR for 512 × 512 plain Lena image.

Standard Lena ImageSuggestedRef. [19]Ref. [20]Ref. [21]Ref. [22]Ref. [23]Ref. [24]
UACI0.33920.33620.33510.33600.33510.33510.3342
NPCR0.99730.99610.99610.99630.99610.99600.9967
Table 16

NPCR, UACI values for the color components of the digital Lena image of size 256 × 256.

ChannelMetricsLenaRef. [33]Ref. [34]
RedNPCR0.995920.9960130.996108
UACI0.334970.3342100.334525
GreenNPCR0.995950.99613199.60580
UACI0.333250.3344850.334798
BlueNPCR0.996000.9962260.996057
UACI0.332230.3348150.334387
We have also calculated the pixels difference base and similarities measurements between the original encrypted image and the one bit change encrypted image . The mathematical expressions for the pixels difference and similarity measures for and are given below: where The analyses of the pixel difference and similarity measures are shown in Table 17. This shows that a slight difference in the neighboring pixels creates an avalanche effect, which is one of the basic requirements while designing any image encryption technique. The numerical values of MSE, PSNR, NCC, NAE AD, SC and MD for original encrypted image and the one bit change encrypted image clearly reflect that our proposed algorithm is resistive against differential attacks.
Table 17

Pixel difference analysis for the one bit change encrypted image with the plain image.

ImageLayerMSEPSNRNCCADSCMDNAE
LenaRed107707.80880.658052.55581.59992550.4713
Green9179.88.50250.9924−28.08620.58462470.7937
Blue7168.79.57641.0933−22.13000.56452260.6720
BaboonRed8683.78.74370.82512.24740.92122550.5919
Green7763.99.23000.9082−5.66910.78542250.6008
Blue9679.38.27230.9107−22.48630.67662490.7655
AirplaneRed101168.08070.671850.47121.55052530.4635
Green106267.86700.663449.77741.56792480.4740
Blue106487.85830.649162.64071.71592460.4427
PepperRed8043.99.07610.782121.80811.12002550.4943
Green111397.66240.7790−11.50380.86992460.7473
Blue111277.66701.3306−60.31760.29472281.2846

5. Conclusions

The present research article provides a new idea for the construction of an image encryption technique. A completely new inverse LA-semi group was investigating and applied for substitution, which is one of the most important components in symmetric encryption. This new mechanism added confusion, which is fundamentally responsible for breaking the pattern between the original and encrypted information. Moreover, we have utilized chaotic continuous systems in order to add diffusion into our proposed image encryption scheme. The proposed idea adds a new milestone for oncoming researchers.
  2 in total

1.  Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion.

Authors:  Taiyong Li; Duzhong Zhang
Journal:  Entropy (Basel)       Date:  2021-04-23       Impact factor: 2.524

2.  Cryptanalysis of a New Chaotic Image Encryption Technique Based on Multiple Discrete Dynamical Maps.

Authors:  Haiju Fan; Chenjiu Zhang; Heng Lu; Ming Li; Yanfang Liu
Journal:  Entropy (Basel)       Date:  2021-11-26       Impact factor: 2.524

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.