| Literature DB >> 33266697 |
Abstract
An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in the permutation stage, a middle parameter is designed to revise the outputs of the chaotic map, yielding a temporal delay phenomena. Then, diffusion operation is applied after a group of random numbers is inserted into the permuted image. Therefore, the gray distribution can be changed and is different from that of the plain-image. This insertion acts as a one-time pad. Moreover, the keystream for the diffusion operation is designed to be influenced by secret keys assigned in the permutation stage. As a result, the two stages are mixed together to strengthen entirety. Experimental tests also suggest that our algorithm, permutation- insertion-diffusion (PID), performs better when expecting secure communications for images.Entities:
Keywords: chaotic map; image encryption; information entropy; random insertion; time-delay
Year: 2018 PMID: 33266697 PMCID: PMC7512573 DOI: 10.3390/e20120974
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1Chaotic dynamics in the 2D-SLMM map.
Figure 2Experimental tests: (a) plain-image of Tree; (b) cipher-image of Tree; (c) decrypted image of Tree; (d) plain-image of Lake; (e) cipher-image of Lake; (f) decrypted image of Lake; (g) plain-image of Building; (h) cipher-image of Building; (i) decrypted image of Building.
Figure 3Histograms of: (a) the plain-image of Lena; (b) the cipher-image of Lena; (c) the plain-image of Baboon; (d) the cipher-image of Baboon; (e) the plain-image of Boat; (f) the cipher-image of Boat; (g) the plain-image of Peppers; (h) the cipher-image of Peppers.
Information entropy tests.
| Test Images | Plain-Image | Cipher-Image |
|---|---|---|
| Lena | 7.4532 | 7.9970 |
| Boat | 7.1238 | 7.9993 |
| Peppers | 7.5715 | 7.9992 |
| Baboon | 7.3579 | 7.9993 |
Figure 4Information entropy at different times of encryption.
Figure 5Key sensitivity tests for Lena: (a) decryption with ; (b) decryption with ; (c) decryption with ; (d) decryption with .
Sensitivity tests.
| Test Images | UACI | NPCR |
|---|---|---|
| Lena | 33.3537 | 99.6109 |
| Boat | 33.4899 | 99.5900 |
| Peppers | 33.5186 | 99.6044 |
| Baboon | 33.5280 | 99.6136 |
UACI: unified average changing intensity; NPCR: number of pixel change rate.
Run test for randomness.
| Images | Lena | Peppers | Boat | Baboon |
|---|---|---|---|---|
| Results | 0 | 0 | 0 | 0 |
| Randomness | Pass | Pass | Pass | Pass |
Comparisons of information entropy.
| Channels | R | G | B | Average |
|---|---|---|---|---|
| Ref. [ | 7.9903 | 7.9890 | 7.9893 | 7.9895 |
| Ref. [ | 7.9871 | 7.9881 | 7.9878 | 7.9877 |
| Ref. [ | 7.9278 | 7.9744 | 7.9705 | 7.9576 |
| Ref. [ | 7.9969 | 7.9974 | 7.9970 | 7.9971 |
| Ref. [ | 7.9895 | 7.9897 | 7.9893 | 7.9895 |
| Ref. [ | 7.9968 | 7.9970 | 7.9972 | 7.9970 |
| Ours | 7.9977 | 7.9973 | 7.9975 | 7.9975 |
Comparisons of speed performance.
| Sizes | Ref. [ | Ref. [ | Ref. [ | Ours |
|---|---|---|---|---|
|
| 0.1641 s | 0.0552 s | 0.0671 s | 0.0312 s |
|
| 0.6630 s | 0.2031 s | 0.2293 s | 0.1373 s |
Comparisons by gray Boat image.
| Sizes | Key Size | Information Entropy | Running Speed | Software |
|---|---|---|---|---|
| [ |
| 7.9993 | 21.684 s | Matlab |
| [ |
| 7.9993 | 5.960 s | Matlab |
| ours |
| 7.9992 | 0.137 s | Matlab |