Literature DB >> 34071912

Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems.

L E Reyes-López1, J S Murguía2,3, H González-Aguilar2,3, M T Ramírez-Torres4, M Mejía-Carlos1, J O Armijo-Correa2.   

Abstract

Despite that many image encryption systems based on chaotic or hyperchaotic systems have been proposed to protect different kinds of information, it has been crucial to achieve as much security as possible in such systems. In this sense, we numerically implement a known image encryption system with some variants, making special emphasis when two operations are considered in the scrambling stage. The variants of such an encryption system are based on some hyperchaotic systems, which generated some substitution boxes and the keys of the system. With the aim to have a more complete evaluation, some internal stages of the image encryption scheme have been evaluated by using common statistical tests, and also the scaling behavior of the encrypted images has been calculated by means of a two-dimensional detrended fluctuation analysis (2D-DFA). Our results show that the image encryption systems that include two operations or transformations in the scrambling stage present a better performance than those encryption systems that consider just one operation. In fact, the 2D-DFA approach was more sensitive than some common statistical tests to determine more clearly the impact of multiple operations in the scrambling process, confirming that this scaling method can be used as a perceptual security metric, and it may contribute to having better image encryption systems.

Entities:  

Keywords:  S-box; image encryption system; two-dimensional multifractal detrended fluctuation analysis

Year:  2021        PMID: 34071912      PMCID: PMC8226901          DOI: 10.3390/e23060672

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

Nowadays, the way in which society communicates has radically changed with the fast development of computers and the internet. In particular, multimedia communication has been gaining momentum in the exchange of information at all social levels. Therefore, in recent years, security and confidentiality have been of considerable interest. Text encryption has been found to be very different from image encryption due to some inherent image characteristics, such as data-rich capacity, high redundancy, and high correlation between adjacent pixels. Due to the demand to have a secure transmission through any means of communication, a great variety of encryption systems has been proposed [1,2,3,4,5]. Chaos theory is used in many fields of science due to its special properties, and cryptography is no exception. Many visual data encryption systems based on chaos theory consider the principle of applying chaotic maps to obtain highly mixing properties, which are similar to cryptographic systems. Encryption systems that involve chaotic systems have been extensively studied due to the large number of properties they present such as ergodicity, pseudo-randomness, and sensitivity to initial conditions, among others. These properties are analogous to the confusion and diffusion stages, which a general encryption system requires. In fact, for an image encryption system to be secure, it must have confusion and diffusion properties [6,7]. The confusion mechanism rearranges the pixel values, while the diffusion mechanism changes the values of each image pixel. To obtain a higher security level, the confusion and diffusion process can be repeated many times [8]. Then, the chaotic systems take a fundamental role to implement new encryption systems, where the system’s performance would be very good against any attack [1,3]. Moreover, with the aim to add more security, some image chaotic encryption algorithms have been included or considered additional stages such as a disturb process at the pixel level. One such example is based on the ZigZag transformation [3,4,5,9]. In [7], another image encryption scheme, with an improvement in security issues that considers a block scrambling and a modified zigzag transformation, has been implemented before encryption, and a key generator based on an enhanced logistic–tent map. Mansouri and Wang [10] presented an encryption system with a new Sine chaotic maps generator, where one-dimensional chaotic maps are used as seed maps to produce new chaotic maps. In fact, these authors consider a one preprocessing scheme on the plain image using different operations. Based on a ZigZag transformation and a three-dimensional logistic chaotic map, the authors of [11] present an encryption system, where at first an scrambling pixel position is considered, and then how the logistic map can be used to diffuse the pixel values in an image. Ahmad and Hwang [12] present a new image encryption system based on chaotic maps and affine transformation with provides a higher key space and removes correlation between adjacent pixels via random chaotic sequences. A new technique of image protection is presented in [1], which decomposes an image into bit-planes by means of XOR-operations between the scrambled images and chaotic map matrix, then the encrypted image is obtained. Karawia [13] presents an algorithm for multiple images using the two-dimensional economic map to get the combination of mixed images elements. As the size of the key space is huge, the latter approach is secure to many different attacks. Obviously, there are more similar image encryption systems, and one of their typical characteristic is that multiple operations in the scrambling stage are considered, but also with certain advantages or disadvantages when more operations are included in the encryption process. For instance, the process will be more complex and the execution time will be affected, but its security is increased. In this case, it is necessary to find a balance between the security of the encryption system and the processing time. In addition, a few attempts have been made to establish how many operations or transformations are required in an image encryption system, or if an evaluation of internal stages of the complete encryption process may be helpful in the design of image encryption systems. This work is devoted to enhance the safety of image encryption algorithms, and reveal weaknesses in such algorithms. In this sense, we consider the encryption system in [3] and some variants that modify the scrambling stage of the encryption system. In this stage, the original image goes through a process where initially a ZigZag transform is used to get a distorted image. After that, a sorting scramble algorithm or the use of a substitution box (S-box) is applied to the latter image. This allows us to have higher levels of security in the image encryption content, compared to other systems. In particular, in the encryption variants, we combine a ZigZag transform with a S-box, because the S-box substitutes the information content and provides the diffusion properties while maintaining high entropy levels [14]. Despite the chaotic encryption systems presenting a good performance, this study is devoted to measuring the impact of the scrambling process on the quality of the encrypted images and to making an assessment of some stages in the encryption process to see if we can have a stronger encryption system. In addition, to consider some common statistical tests in the assessment, we make usage of the two-dimensional Detrended Fluctuation Analysis (2D-DFA), a tool that can characterize and reveal weaknesses of the content of the encrypted images, where a correlation degree between the surface pixels is obtained. This method has been used to measure the entropy of noisy or textured encrypted images [15], which present values close to unity for this kind of content. It has been also used to measure the similarity between two images [16], where the 2D-DFA value will depend on the content of the processed images, and the similarity degree of the difference of the respective values. Besides, the 2D-DFA complemented the results with some statistical tests to analyze the encrypted image content. The paper is organized in the following way. In Section 2, a concise presentation of the main elements used in the image encryption systems is given. In Section 3, the image encryption systems and their variants are described, whereas Section 4 contains the results obtained by applying some statistical tests and the two-dimensional DFA technique to the images in different encryption stages. Section 5 is devoted to discuss our main findings, a comparison with some existing works, and some limitations of our proposal. Finally, the conclusions are drawn in Section 6.

2. Preliminaries

2.1. Hyperchaotic Systems

In this section, we briefly present the two hyperchaotic systems considered in this work. These kinds of systems, despite their simplicity, exhibit more complex dynamics than chaotic systems. They have received wide coverage in different areas of mathematics, physics, and engineering, among others [17,18,19]. The existence of the hyperchaos is verified by checking that there are at least two positive Lyapunov exponents [18]. Besides, according to the Kaplan–Yorke conjecture [20], the Lyapunov dimension () of any system in the hyperchaotic regime should be .

2.1.1. Hyperchaotic Lorenz System

The hyperchaotic dynamics of Lorenz’s system is modeled by the set of differential equations [17]: This system is hyperchaotic with Lyapunov exponents , , , , and the Lyapunov dimension is , this system is in the hyperchaotic regime. The hyperchaotic attractors generated by Lorenz’s system projected onto the planes and , are shown in Figure 1a,b, respectively.
Figure 1

The hyperchaotic attractors of Lorenz’s system projected on the planes (a) and (b) . The hyperchaotic attractors of Chen’s system projected on the planes (c) and (d) .

2.1.2. Hyperchaotic Chen System

We also consider the four-dimensional hyperchaotic system based on Chen’s system as defined in [19,21,22]: As the Lyapunov exponents are , , , , and the Lyapunov dimension is , this system is in the hyperchaotic regime. The hyperchaotic attractors generated by Chen’s system projected onto the planes and , are shown in Figure 1c,d, respectively.

2.2. ZigZag Transformation

One way to scramble image pixels is to use a ZigZag operation or transform [23]. This operation is usually performed to confuse the elements of the respective matrix data of a plain image. It can reduce the high correlation among image pixels to increase the security level of some encryption systems. To perform the ZigZag transform to the data matrix corresponds to sequentially read the elements of the matrix in a “Z” shape, followed by sequential saving within a data vector, which is reshaped in a certain way into a two-dimensional matrix. Figure 2 shows a standard ZigZag operation [23]. Obviously, there are other ways to implement a different version of the ZigZag transform to avoid that some element positions do not change. For instance, in [3], some improved ZigZag transformations have been considered with change of the scan order of the element positions.
Figure 2

A standard ZigZag transform scheme.

2.2.1. Substitution Box (S-Box) Generation

To shuffle the information of any image, some articles have considered a substitution table known as substitution box (S-box), which is a nonlinear key component in block ciphers of encryption systems [2,14]. Recall that any S-box makes the statistical relationship between the ciphertext and the key as difficult as possible. In this work, we considered the hyperchaotic approach in [2] to generate two particular S-boxes based on the hyperchaotic systems of Lorenz and Chen, whose dynamics are very well modeled by the set of differential equations of (1)–(2), respectively. A reason to choose these hyperchaotic systems is that a persistent scaling behavior was observed in the fourth state of these systems, which may be useful in this kind of applications, see the works in [21,22]. The mechanism to generate the S-box is as follows: Select four initial conditions such that any system of (1) or (2) presents a hyperchaotic behavior, and obtain a state vector , for , corresponding to the normalized state vector of any system of (1) or (2). Multiply the state vector of step 1 by a factor of to obtain a new vector , for . Generate a new sequence , with , where is the projection function in the component k, and . Apply a permutation of the values to sequence S such that for . Generate the S-box . The respective two S-boxes obtained with this scheme are shown in Table A1 and Table A2 of the Appendix A, which are in the conventional representation format.
Table A1

Elements of the S-box based on the hyperchaotic Lorenz system (1) in the form of a  matrix.

0123456789ABCDEF
0 212188234104492451862493042518793254144113
1 15814314025155203100236125123169582183816018
2 1730127248126255137462401301344823014119180
3 153159163164131166165142384422914611271129106
4 109922107521214150772722811111513177148
5 1596207168182244895017015610547246190135197
6 31124250237621917820519961213139133671640
7 1528216241962193220107138198842086911678
8 192102115422417415154227231432213652217171
9 9759561942120884209606479801452666
A 34371011028202157532161031812923587115233
B 83132472321191223224217279590178618481
C 68149742512147211200942521551952232333206
D 191185179117243223957851141362417610863225
E 1969899820445726576121128118132142161110
F 1751832222012157023924125316720733591226189
Table A2

Elements of the S-box based on the hyperchaotic Chen system (2) in the form of a  matrix.

0123456789ABCDEF
0 4138982875233511921274245136252181247
1 84711232373420235234240211191236194176239117
2 2428380603624514215179154311181169556
3 5577882041102021301061391671831972262913151
4 2071121531371149102301902462381281088213148
5 1616245241427020913816614513312712111566157
6 2009919599725016320621620861199193227203249
7 210225781051351618522349644014712514235129
8 12417016517718614020521222186232119622221443
9 196189175173180255441592241046376155219188
A 3941411821642613219814347542221925218
B 1111721502512711310173195228303374248229126
C 1872541562177911120107967216857528939
D 3223168172132442102435023122093109122134
E 67188184178852019217417125316915162160158103
F 371024610015253149581489087811461446965

2.3. Two-Dimensional Detrending Fluctuation Analysis

The two-dimensional detrended fluctuation analysis (2D-DFA) algorithm was proposed by Gu and Zhou [24]. A modified and improved version of the 2D-DFA has been used by Vargas-Olmos et al. [15] to analyze encrypted images, as it has been a flexible and efficient method to measure the quality of the encrypted image content. This procedure consists of the following steps by taking into account that an image I of size is considered as a surface and denoted by a matrix , where the number of rows and columns is represented by and , respectively. Divide the surface into disjoint square windows of the same size , where and . Each window can be denoted by such that for , where and . Compute the cumulative sum for each window , positioned by m and n, as where is the average of the sub-image , for , . Determine the trend of the obtained sub-image by fitting the set of data to the plane , where a, b, and c are parameters which are estimated using the least square method. Subsequently, one calculates the local variances associated to each sub-image as Next, averaging over all sub-images, the overall detrended fluctuation is obtained as This procedure is repeated for a broad range of segment lengths s, considering the range . In order to assess a fractal scaling property of the pixelated surface, the fluctuation function should display a power law scaling where is called the scaling fluctuation exponent. This scaling exponent can be found as the slope of a double logarithmic plot of as a function of s, and it is a measure of the degree of correlation among the pixels of the surface. As is pointed out in [15], the fluctuation scaling exponent can be used as an appropriate and objective measure of the quality of encryption algorithms. When the exponent of the encrypted image is close to 1, then it is supposed that the encryption system is secure from the perceptual point of view. Furthermore, in [16], it is is established that the visual quality of the final encrypted image will be better if the scaling exponent of the final encrypted image is closer to that of the carrier image.

3. Encryption System Model

3.1. Encryption System

In this work, we consider the encryption system employed in [3], which is based on an improved ZigZag transform and a compound of dynamical chaotic systems. The general structure of such an encryption process is shown in Figure 3. This scheme consists of three parts: (1) of an improved ZigZag transform and the chaotic Lü system to scramble the original image pixels, which were complemented by a sorting scramble algorithm and (2) the chaotic Lü system and chaotic logistic map (LL compound) to generate a secure key. (3) Finally, an adjacent-side XOR method is used to complete the image encryption scheme.
Figure 3

Schematic diagram of the encryption system proposed by Xingyuan et al. [3]. At first, an improved ZigZag transform is applied to the original image () resulting in an image . The latter image and the generated key K are the input to the encryption function obtaining an encrypted image .

3.2. Modified Encryption System

Similarly to the encryption system used by Xingyuan et al. [3], Figure 4 depicts a schematic diagram of the steps involved in our proposal to generate a modified image encryption system, where an S-box and the key generation are based on a hyperchaotic system. Basically, there are two main differences to compute some encryption stages or transformations in the complete encryption system. The first main difference of the previous encryption system is the way to compute the image from the original image . In this modification, we just apply one ZigZag transformation to the image and after that an S-box is applied to obtain . The other difference is the way to carry out the key generation, which takes advantage of the process to compute the S-box, see Section 2.2.1. The main processes of this proposal are described in detail in the following.
Figure 4

Block diagram of our proposed encryption system. An image is obtained after the standard ZigZag, and the S-box procedures are applied to the original image . The image and the generated key K are the input to the encryption function resulting in an encrypted image .

Consider an original image (or plain-text image) of dimensions , where M and N are the number of rows and columns, respectively. Then, proceed with the following steps. Apply the scrambling block to the plain text image , which consists of the application of the standard ZigZag transformation to the image and followed by the generated S-box, as is described in Section 2.2.1, to obtain the image . The key generation process is carried out by means of the following approach. Choose four initial conditions such that any system of (1) or (2) presents a hyperchaotic behavior, depending on which system is used in the S-box generation, and obtain a state vector , for , corresponding to the state vector of the considered hyperchaotic system. Convert each state vector of step 1 into a new state vector of integer values, , where , for , and the function fix rounds the x value to the nearest integer toward zero. Compute two new vectors: and , where where , and C and are control parameters. Generate the keys by means of , with , and the symbol ⨁ represents the exclusive OR operation bit-by-bit. The encryption function comprises two parts: The first part is called the confusion stage, which is described as For encryption stage: If , then , otherwise, . For decryption stage: , then , otherwise, then . The second part of the encryption function, called the diffusion stage, is described by the following equations: where is the value of the i-th iteration of the fourth state of the hyperchaotic system. in (9) is the final result of the encryption system. The encryption key can be represented by an array of six elements: key = . The first four elements of the key, , , , , correspond to the initial conditions of the hyperchaotic dynamical system, whereas and are control parameters of the encryption system. In order to improve the sensitivity of the cipher, the value of should not be too small. In such a case, some adjustments are proposed. For example, considering that the original image to be encrypted is , where is the value of the pixel at position , then, the following values are calculated: where is the exclusive OR operation of all the grayscale values in the original image , whereas is the sum of all pixels modulo 256. With the and values, then and are calculated. The and values will be replaced by the values of and , respectively.

4. Results and Performance Analysis

To measure the impact of the scrambling process on the quality and the robustness of the image encryption system, some common statistical tests have considered such as the histogram analysis, the correlation among the adjacent pixels, the entropy, and the 2D-DFA metric. In order to make a comparison, we consider the image encryption systems discussed in Section 3.1: the system used in [3], called ; our modification with the hyperchaotic Lorenz and Chen system, denominated as and , respectively; and one more system based on our modification, called , which considers the S-box from [2]. The complete numerical implementation of the image encryption algorithms were performed under the MATLAB R2017b software on a Mac mini with Intel i3 quad-core, CPU 3.6 GHz, and 8 GB RAM memory. In addition, all the hyperchaotic systems considered here were simulated numerically with the classical fourth-order Runge–Kutta algorithm.

4.1. Database of the Images

With the aim to evaluate the performance of our proposal, a representative test bank of images with different characteristics is considered. In particular, a total of six gray-level images were used in this study. All of them have dimensions of pixels, and they have been chosen because they are widely used as standard test images in the field of image processing. These original images are shown in Figure 5, which are freely available at http://www.imageprocessingplace.com/root_files_V3/image_databases.htm (accessed on 15 April 2021).
Figure 5

The image dataset considered in this work. Original images () of size , each image is numbered 1 to 6 from left to right and top to bottom.

4.2. Histogram Analysis

Histogram analysis is an important statistical feature of the images, which is generally used to evaluate the performance of image encryption systems. An image histogram shows how pixels in an image are distributed by plotting the number of pixels at each color intensity level. If the histogram of an encrypted image has a uniform distribution, then the encryption system is able to hide the redundancy of original image [3,16]. We calculate the histograms for all gray-level images of the image database, and their respective images and considering the four image encryption systems. As an example, the histograms of the Lena test image and its respective images are shown in Figure 6. We can observe in Figure 6c,d acceptable levels of confusion in the visual form of the data when an S-box is considered in the encryption systems , , and , respectively. It is clear that in these cases we cannot achieve a complete unintelligible form as the system achieved, see Figure 6e. We will see that the previous results with another encryption stage or transformation, then we can achieve a better unintelligible form. In the bottom row of the same figure, their respective histograms images are displayed. One can see that there is no difference between the histograms of images and of system, Figure 6f,g, respectively, whereas the rest of them do not present a similarity between the histogram of the original image with its respective histograms of images .
Figure 6

Histogram analysis for the Lena test image. (a) The plain image . (b–e) The images considering the image encryption systems , , , and , respectively. (f–j) The corresponding histograms of images (a–e).

Similarly to the previous case, the histograms of the Lena test image and its encrypted images are shown in Figure 7. In these cases, the encrypted images achieved an unintelligible form. Moreover, one can see that the histograms of the encrypted images are uniformly distributed and significantly different from the respective histogram of the Lena test image. Therefore, all of the image encryption schemes can make statistical analysis unfeasible to some extent.
Figure 7

Histogram analysis for the Lena test image. (a) The plain image . (b–e) The encrypted images with the image encryption systems , , , and , respectively. (f–j) The corresponding histograms of images (a–e).

With the aim to verify that the encrypted image histogram follows a uniform distribution, and as is pointed out in [25], we consider the chi-square test using where and are the observed and the expected occurrence frequencies of each pixel (0–255), respectively. Using a level of significance of , the p-values for each of the encrypted images are shown in Table 1, where the null hypothesis is not rejected if the p-value is greater than . Therefore, it is concluded that the histograms present a uniform distribution for this level of significance.
Table 1

p-values of the hypothesis test for the encrypted images.

Imagep-Values
E1 E2 E3 E4
10.31870.13750.75220.3187
20.25230.23150.50760.3419
30.06150.73840.00520.1463
40.65790.24430.94450.4398
50.37180.57870.51500.3920
60.78480.96760.26270.8596

4.3. Correlation between Adjacent Pixels

It is known that plain images usually present a high correlation between their adjacent pixels, a feature that exposes their security making it vulnerable to statistical attacks [3]. If the coefficient is close to 0, it suggests that there is no linear correlation or a weak linear correlation. Therefore, a well-designed encryption system should not present a high correlation in the horizontal, vertical, and diagonal directions. To show that the encrypted image is independent of the test plain image, we calculate the correlation coefficient between the adjacent pixels of both images using where In the last expressions, x and y represent the corresponding pixels between the two images; N is the total number of pixels; and cov, , and represent covariance, variance and mean, respectively. Note that we randomly select 5000 pairs of adjacent pixels in each direction from the plain images and their respective images or . Then, for each case, we have computed the correlation coefficient of each pair. In Figure 8, the distribution of adjacent pixels at the horizontal direction in the Lena test image and their versions is illustrated. The plain image, Figure 8a, presents a strong correlation between adjacent pixels since most of the pixels are on the identity line . As is shown in Figure 8b–e, and after the scrambling stage, independently of the image encryption system, the pixels of images are scattered more uniformly, but preserves many pixels on the identity line. This situation is different after the encryption stage, where the pixels of the images are scattered very uniformly as is displayed in Figure 9b–e.
Figure 8

Correlation plot of two adjacent pixels at the horizontal direction for (a) the Lena test image and (b–e) the images considering the image encryption systems , , , and , respectively.

Figure 9

Correlation plot of two adjacent pixels at the horizontal direction for (a) the Lena test image and (b–e) the encrypted images with the image encryption systems , , , and , respectively.

The correlation coefficients of the image dataset and the respective images with different scrambling processes are listed in Table 2, Table 3, Table 4, Table 5, Table 6 and Table 7, considering the horizontal(h), vertical(v), and diagonal(d) directions. In Table 2 and Table 3 are the results when one operation is applied to the images in the scrambling stage the standard and improved ZigZag operation, and the S-box of the , , and systems, respectively. For the case of the ZigZag transformation, we can observe in both cases a strong correlation in the horizontal direction, but a weak correlation in the rest of the directions, whereas for the images obtained with the S-box in the scrambling stage are exhibited just weak correlations. Then, it seems that the application of the S-box in the scrambling stage decreases the correlation coefficients. In addition, we can find that the correlation between adjacent pixels in images becomes low when the scrambling process combines a ZigZag transformation with a sorting scrambling algorithm or an S-box, see Table 4 and Table 5. On the other hand, as is shown in Table 6 and Table 7, the correlation coefficients of the encrypted images are close to 0, and therefore there is no correlation among the pixels independently of the used encryption scheme, which suggests that such encryption systems can resist statistical attacks.
Table 2

Correlation coefficients between adjacent pixels of plain images and their images considering the standard and improved ZigZag transformation in the scrambling stage.

Correlation Coefficients
Image Io Standard ZigZag Operation Improved ZigZag Operation
h v d h v d h v d
10.98380.98580.97430.9747−0.0549−0.05200.96880.56240.5627
20.98480.98950.97980.96700.03280.03770.96470.32750.3320
30.97100.97910.96050.94120.10390.09790.93870.35420.3603
40.97270.97520.96290.93430.22560.21490.93190.35550.3564
50.99420.99590.99230.99370.04970.04950.98620.47990.4798
60.94770.93170.90780.86620.10030.12210.85790.31170.2972
Table 3

Correlation coefficients between adjacent pixels of plain images and their images obtained with the S-box of the , and systems in the scrambling stage.

Correlation Coefficients
Image E2 E3 E4
h v d h v d h v d
10.23300.23110.18520.35800.32750.24830.19840.24940.1758
20.14420.13480.06360.14970.19450.14420.08620.10190.0618
30.05850.09170.05310.13870.13530.07400.08710.05960.0426
40.10950.13830.07480.17090.18700.15220.06870.05320.0418
50.11040.13840.11230.20020.27150.16950.14700.12340.0676
60.07420.04620.04740.08890.11130.07070.02800.04890.0444
Table 4

Correlation coefficients between adjacent pixels of the images considering the and  systems.

Correlation Coefficients
Image E1 E2
h v d h v d
10.0153−0.03090.00140.20950.21650.1432
20.01880.0297−0.00030.01220.01200.0979
30.0109−0.00250.00040.07520.08250.0513
40.00160.05880.01300.01000.07010.0980
50.00650.01520.01820.01430.00120.0092
6−0.0001−0.0016−0.06610.00310.00320.0023
Table 5

Correlation coefficients between adjacent pixels of the images considering the and  systems.

Correlation Coefficients
Image E3 E4
h v d h v d
10.34990.31460.25880.20940.22480.1455
20.16080.19310.13270.08220.08740.0887
30.01430.01340.01290.09520.09770.0543
40.01620.02120.01510.07260.05170.0516
50.00210.00230.00190.11340.13380.1156
60.08120.00430.06900.05780.05420.0158
Table 6

Correlation coefficients between adjacent pixels of the images considering the and  systems.

Correlation Coefficients
Image E1 E2
h v d h v d
10.06900.00340.02610.0029−0.0019−0.0126
20.0727−0.0198−0.4840.0029−0.0019−0.0126
3−0.0087−0.00780.02390.06980.07290.0792
4−0.00350.0096−0.01900.0117−0.02250.0156
50.0511−0.050−0.00390.01830.0092−0.0168
6−0.0058−0.00500.04520.00440.02110.0159
Table 7

Correlation coefficients between adjacent pixels of the images considering the and  systems.

Correlation Coefficients
Image E3 E4
h v d h v d
10.00360.00480.0152−0.00500.00060.0015
20.00360.00480.0152−0.0156−0.01150.0189
30.13990.12930.09760.0261−0.00140.0288
40.0068−0.0062−0.0018−0.00180.0250−0.0057
5−0.0193−0.0031−0.01030.0178−0.01390.0061
60.00150.0016−0.0109−0.00280.0104−0.0143

4.4. NPCR and UACI Analysis

In image encryption, the cipher resistance to differential attacks is commonly analyzed with the two measures: the number of pixels changing rate (NPCR) and the unified averaged changed intensity (UACI). Both measures are based on slight changes of two images keeping the key unchanged. For the original () and encrypted () images of dimensions , the NPCR make the assessment of the pixel difference between them as follows: where is calculated as In a similar way, the UACI evaluates the mean intensity of differences between the and images as follows where L is the largest value pixel value of both images. A value of 99% for the NPCR test and a value of 33% for UACI are interpreted as success criteria. As is pointed out in [10,26], for a significance level , the obtained results are accepted if the NPCR values are greater than the critical NPCR value , and the UACI values should be in the critical interval . Table 8 shows the , and values for some cases, where, in accordance to the works in [10,26], we also set . It seems that the encryption system with two operations at the scrambling stage achieves a better performance, as the critical NPCR value is greater than the encryption system with just one operation at the scrambling stage. To illustrate the evaluation results of the NPCR and UACI, Table 9, Table 10, Table 11, Table 12 and Table 13 present the evaluation results of NPCR and UACI at the scrambling stage and the encryption stage. We can observe a better performance when two operations are considered at the scrambling stage. Such a situation indicates that our conjecture will provide good resistance against differential attacks.
Table 8

Expected NPCR (%) and UACI (%) values for some cases when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images in the scrambling and encryption stages.

Image → IS IC
System Nα* Uα* Uα*+ Nα* Uα* Uα*+
E1 with I-ZZ97.502332.102332.993898.123333.331233.6310
E2 with S-box97.900231.102531.953398.231333.113333.7521
E2 with S-ZZ and S-box99.331233.281533.573199.613533.332833.5451
Table 9

NPCR (%) and UACI (%) values when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images in the scrambling and encryption stages.

IS IC
Image S-ZZ I-ZZ S-ZZ I-ZZ
NPCR UACI NPCR UACI NPCR UACI NPCR UACI
197.567233.383097.060031.229098.610833.333097.013732.2630
297.662232.996598.176931.992998.783032.218797.199232.5631
397.453132.123897.994531.999598.861233.095398.094532.9752
497.995431.954997.430131.943798.016733.331698.901233.2139
597.912832.998198.195632.219098.562133.431998.160533.4691
697.418232.479497.398132.296498.159833.418998.915833.4498
Pass55655455
Mean97.668132.655997.709231.946698.498933.137798.047432.9940
Std0.05710.31340.22650.14320.11510.21750.65720.2404
Table 10

NPCR (%) and UACI (%) values considering and images when the S-box of the , and systems are applied to images in the scrambling stage.

IS
Image E2 E3 E4
NPCR UACI NPCR UACI NPCR UACI
197.912431.925297.046732.376896.996132.4314
298.049631.246197.045932.459297.119832.9832
397.904731.901097.883032.167497.917932.9174
498.395531.206197.781931.019497.599131.0173
597.872831.218797.129832.210997.065232.2487
698.180731.220597.961231.017597.192131.0147
Pass665454
Mean98.052631.452997.474731.875297.315032.1021
Std0.04150.12720.19670.45170.13230.7860
Table 11

NPCR (%) and UACI (%) values considering the and images when the S-box of the , , and systems are applied to images in the scrambling stage.

IS
Image E2 E3 E4
NPCR UACI NPCR UACI NPCR UACI
199.078333.133898.298332.992799.048532.9832
298.991633.185998.963032.795099.739133.3861
399.584233.499799.459833.093798.993733.2487
498.446133.264399.529333.219798.367133.2201
598.184533.343298.993233.314198.682533.2826
698.290132.337998.201733.335798.995133.3261
Pass565555
Mean98.762433.127498.907533.125198.971033.2411
Std0.29690.16610.31420.04330.20900.0193
Table 12

NPCR (%) and UACI (%) values considering and images with the systems in the scrambling stage with two operations.

Scrambling Block
Image NPCR UACI
E1 E2 E3 E4 E1 E2 E3 E4
198.999399.569199.688199.172733.466233.293133.462133.4638
299.395699.614299.612999.432833.368733.463733.467433.4643
399.213799.634499.601799.344933.443133.463133.453833.4459
499.442999.614799.604599.632733.453733.463833.462533.4452
599.441499.613499.682799.615733.423833.454533.454533.4637
699.421599.613599.612299.602033.463233.462333.463233.4628
Pass66666666
Mean99.319099.609899.633699.466733.436433.433433.460533.4576
Std0.03200.00040.00160.03400.00130.00470.00250.0084
Table 13

NPCR (%) and UACI (%) values considering and images with the systems when two operations are considered in the scrambling stage.

Encryption Block
Image NPCR UACI
E1 E2 E3 E4 E1 E2 E3 E4
199.611299.622699.908399.602833.492633.474833.484333.4838
299.593299.663399.682599.603333.469333.468333.468333.4782
399.613599.638399.683899.613933.473933.487433.463533.4632
499.613399.625399.633599.687333.484333.472433.463933.4639
599.633299.782399.717299.764333.493433.489133.471833.4763
699.612399.629899.638299.627333.479333.463633.469333.4697
Pass66666666
Mean99.612799.655299.710599.649833.482133.475933.470133.4725
Std0.00160.00390.01030.00410.09370.00120.00540.0063

4.5. Information Entropy

To measure the randomness of images, the information entropy test was carried out. This test provides us information on the texture of an image and returns a scalar value H which is calculated as [27] where denotes the probability of the appearance of the symbol . For each image of 256 gray levels, the more entropy value H gets close to the ideal theoretical value of 8, the less possible for attackers to decode encrypted images. Table 14, Table 15 and Table 16 show the numerical entropy values of the , , and images when the ZigZag transformation, the S-box, and both of them have been applied to images in the scrambling stage, respectively. We can observe that the entropy values obtained for the images are close or greater than 7, but the images present an increment in their entropy values, for all encryption systems, and are close to the ideal value, which also means high resistance to entropy attacks.
Table 14

The comparison of information entropies for the and images when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images in the scrambling stage.

Entropy
Image IS IC
IO S-ZZ I-ZZ S-ZZ I-ZZ
17.04787.04797.04777.99897.9980
27.44517.44527.44497.99777.9975
37.23677.23677.23687.99667.9964
46.95426.95446.95417.99657.9953
57.27577.27607.27657.99747.9983
67.29257.29307.29217.99907.9990
Table 15

The comparison of information entropies for the and images when the S-box of the , , and systems is applied to images in the scrambling stage.

Entropy
Image IS IC
E2 E3 E4 E2 E3 E4
17.04777.04807.04787.99807.99847.9983
27.44597.44657.44607.99867.99847.9988
37.23707.23747.23677.99907.99917.9991
46.95506.95486.95457.99917.99917.9991
57.27407.27437.27407.99837.99877.9980
67.29357.29307.29297.99917.99917.9989
Table 16

The comparison of information entropies for the and images when the complete scrambling stage is applied to images .

Entropy
Image IS IC
E1 E2 E3 E4 E1 E2 E3 E4
17.04787.04777.04777.04647.99937.99937.99937.9993
27.44517.44517.44517.44517.99937.99937.99937.9993
37.23677.23677.23677.23677.99927.99937.99947.9993
46.95426.95426.95426.95427.99937.99937.99937.9994
57.27577.27377.27377.27577.99927.99927.99937.9994
67.29257.29257.29257.29257.99937.99937.99937.9994

4.6. Peak Signal to Noise Ratio (PSNR) Analysis

The peak signal to noise ratio (PSNR) has been considered as an objective metric to measure the quality of an image [15]. The PSNR metric is computed as where is the original image, is the encrypted image, and b is the number of bits required to represent each pixel of the images, which is equal to 8. The mean squared error, which is denoted by MSE, is defined by Equation (17), where is the size of the images, whereas corresponds to the coordinates of the pixel. The value of the PSNR represents the similarity between the images and , where the higher the value of PSNR, the lesser error or greater similarity between them [7,15,16]. Table 17 shows the results of the PSNR between the original images with their respective images at the scrambling and encryption stages, and , respectively, when two operations are considered at the scrambling stage. It is observed that the obtained values of PSNR are low for all the encrypted images, hence they also show that our proposals are good.
Table 17

PNSR values in considering the complete scrambling.

PSNR Values
Image IS IC
E1 E2 E3 E4 E1 E2 E3 E4
113.146215.723113.012613.04807.86237.41277.98277.4568
212.159613.069012.505612.15968.39178.48188.65788.2682
312.432613.271513.267011.20218.81768.80868.85268.8264
413.339812.450412.481213.51207.90427.98277.81297.6559
511.331311.440111.041911.47578.92718.85978.80458.7528
613.814913.737613.612213.33569.45229.47829.45299.2740

4.7. 2D-DFA Metric

To carry out the scaling analysis of the different encryption systems, we apply the 2D-DFA to the , , and images when the scrambling stage considers one or two operations. Table 18 and Table 19 provide the scaling exponents when the standard or improved version of the ZigZag operation or an S-box is applied to images, respectively. For this metric, the scaling exponents present similar values for and versions, where the scaling exponent has a lower value compared to the obtained of the images, and some information of the original image may be revealed.
Table 18

The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the , , and images, when the standard ZigZag (S-ZZ) and improved ZigZag (I-ZZ) transformation are applied to images in the scrambling stage.

α Exponents
Image IS IC
IO S-ZZ I-ZZ S-ZZ I-ZZ
12.19901.95041.76661.89561.8603
22.21211.81301.62321.88451.8556
32.28511.81301.63891.63291.8594
42.19701.88081.54211.54211.8063
52.56591.84951.81521.78811.6562
61.92181.73361.80911.93231.8921
Table 19

The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the and images, when the S-box of the , , and systems is applied to images in the scrambling stage.

α Exponents
Image IS IC
E2 E3 E4 E2 E3 E4
11.56641.63561.57371.77541.79411.7881
21.42231.57461.49291.56671.46511.6956
31.36691.50021.44161.67961.75341.7598
41.54221.56271.33731.69881.67931.7018
51.51521.65661.51561.55831.58681.6039
61.18911.26091.26551.56241.56171.6117
On the other hand, Table 20 shows the results of the scaling analysis for all encryption systems considered in this work with a scrambling stage with two operations. For this metric, the values of the scaling exponents of the images are lower than the obtained for the images. Even more, the scaling exponent values of the encrypted images are close to 1, which means that the analyzed information presents a persistent behavior, and according to the work in [15], the encrypted images do not reveal any piece of information that can allow to distinguish the original images.
Table 20

The comparison of information of the scaling exponents obtained from applying the 2D-DFA scheme to the and images when the complete scrambling stage is applied to images .

α Exponents
Image IS IC
E1 E2 E3 E4 E1 E2 E3 E4
11.53511.54641.63561.57371.14260.99991.00181.0481
21.54441.42231.57461.49291.15451.00281.00721.0556
31.55281.36691.50021.44161.13941.00301.00161.0380
41.56521.54221.56271.33731.13461.02240.99481.0648
51.54381.51521.65661.51561.13860.99551.03181.0393
61.56161.18911.26091.26651.12220.99261.01411.0631
As an example, Figure 10 shows the results of the performance of the 2D-DFA of the Lena test image. In Figure 10a are the image and its respective scaling exponent ; Figure 10b,c corresponds to and when the S-box of is considered in the scrambling stage with scaling exponents and , respectively. In this case, we can observe acceptable levels of confusion in the visual form of the encrypted image, but we cannot achieve a complete unintelligible form. On the other hand, Figure 10d,e corresponds to and when the complete scrambling stage in the system with scaling exponents and , respectively. For this case, we notice that the scaling exponent is close to unity, and the encrypted image does not reveal information. Therefore, we consider that this 2D-DFA method is an efficient tool to describe this kind of image in terms of the scaling exponent values, which are in agreement with those obtained in [15].
Figure 10

(a) The Lena test image and its respective scaling analysis. (b,c) The and images with their respective scaling analysis, where the S-box of the system is considered in the scrambling stage. (d,e) The and images with their respective scaling analysis, where the complete scrambling stage in the system is considered.

5. Discussion

Despite that the main architecture of the encryption system as well as the main operations that we consider are well known from literature, only a few attempts have been made to establish how many operations or transformations are required in an image encryption system, or if an evaluation of internal stages of the complete encryption process may be helpful in the design of image encryption systems. There are some missing tests to assess the performance of our proposals, and with the aim to carry out a performance comparison of some existing works with our proposals, we apply the encryption system for a color Lena image (). In Figure 11, we illustrate the histograms for the Lena test image, its encrypted version, and their respective histograms for each color intensity level. From the figures, one can see that the histograms of the encrypted versions are uniformly distributed and significantly different from the respective histograms of the original image, which indicates that it would be difficult for the attacker to decipher the image content.
Figure 11

Histogram analysis for the color Lena test image. (a) The plain-image . (b–d) Histograms for red, green and blue channels, respectively. (e) The encrypted Lena image considering the image encryption system . (f–h) The corresponding histograms for red, green and blue channels of the encrypted image (e).

In Figure 12, the distribution of adjacent pixels at the horizontal, vertical and diagonal directions for the color Lena image (top row) and its encrypted version (bottom row) is shown. Figure 12a–c illustrate a strong correlation between adjacent pixels along the three directions, whereas there is no correlation among the pixels for the encrypted version, see Figure 12d–f.
Figure 12

Correlation plot of two adjacent pixels for the color Lena test image (top) and its encrypted version (bottom), using , at the horizontal (first column), vertical (second column), and diagonal (third column) direction.

Figure 13 shows the scaling results when the 2D-DFA is applied to the color Lena image in the system. The results are very similar to the case of the grayscale Lena image presented in Figure 10, as the scaling exponent is closer to unity, the encrypted image does not reveal information.
Figure 13

(a) The color Lena test image, (b) the , and (c) images, with their respective scaling analysis when the complete scrambling stage in the system is considered.

Furthermore, Table 21 contains the results of the comparison of our proposals with other methods proposed by Li et al. [11], Ahmad et al. [12], and Ramasamy et al. [7], where the correlation analysis, entropy, NPCR, UACI, and PSNR were considered. The bold values shown in Table 21 indicate that our results are quite comparable with the other methods. Moreover, Table 22 shows a speed analysis test, where the algorithms in [7,13,28,29] were considered. The results show that our proposals are computationally efficient.
Table 21

Performance evaluation and comparison with other methods considering as original image the Lena color image.

Measure[11][12][7]Proposed
E1 [3] E2 E3
Horizontal correlation0.0327 0.0026 −0.02370.0219−0.00370.0091
Vertical correlation0.0219−0.0038−0.01780.0128−0.0278 0.0029
Diagonal correlation0.0180−0.0062−0.0284−0.0059 0.0041 −0.0158
Entropy7.99937.9832 7.9995 7.99907.99907.9990
NPCRn/a 0.9966 0.99620.9961 0.9966 0.9960
UACIn/a0.3362 0.3358 0.33450.33460.3346
PSNRn/a8.36566.7494 4.7465 4.79614.8101
Table 22

Comparison of computational time for the proposed algorithms.

Algorithms
[28] [29] [13] [7] Proposed
E1 [3] E2 E3 E4
Time (seconds)2.4142.1692.3862.0872.0551.9131.9251.992
In this context, it is observed that through certain tests we analyzed the impact of considering two operations in the scrambling block in some image encryption systems that are based on hyperchaotic systems. Our main observations are as follows: (a) To consider more than one operation or transformation in the scrambling stage present an increment in security; (b) the use of a hyperchaotic dynamical system to remove pixel correlation and the key generation is desirable to exploit the chaotic characteristics in image encryption algorithms; and (c) although some standard tests make a good evaluation, the scaling analysis outperforms as an objective metric. However, we still cannot establish how many operations are optimal in the scrambling stage without affect substantially the execution time; which operations will provide a better performance, or which is the best hyperchaotic system. In addition, a larger number of images must be considered in the analysis.

6. Conclusions

In this work, we have used some statistical tests and some quality metrics to analyze a known encryption system and some variants, which are based on hyperchaotic dynamical systems. In those variants, such hyperchaotic systems are used to generate S-boxes as well as the key generation in the encryption systems. Although many similar encryption systems have been proposed, little attention has been paid to evaluate some internal encryption stages or processes. Our results show that the encryption systems improve the performance when the scrambling block includes two operations or transformations. This could help in the design or implementation of this kind of encryption system. In addition, the 2D-DFA method seems to be more sensitive than some statistical tests to characterize images in different stages of the encryption process. In our opinion, this is an efficient metric to indicate if the encrypted images may reveal or not any image information. Thus, it is suggested that such a scaling exponent can be used as an objective metric of the quality in different encryption schemes. In fact, a good image encryption method should obtain a scaling exponent close to unity independently of what encryption system is used. As is pointed out in [15], one cannot fully guarantee so far that an encrypted image with such values of the scaling exponent is absolutely immune to any type of attack, but we consider that this tool with the help of other metrics can provide enhanced security to encryption systems. Although many image encryption algorithms based on chaotic dynamical systems have been proposed, we believe that our approach can be helpful in the design and analysis of such systems, as it shows a performance that is comparable with other similar systems. From the security point of view, the results show that the scaling analysis used here can be an appropriate measure to assess the quality of encryption methods. In the future, we aim to evaluate different kinds of operations in the scrambling stage to increase the security without affecting drastically the processing time. We are also considering to carry out an extensive examination of which chaotic or hyperchaotic dynamical systems may improve the protection of the image content, as well as to make a better assessment based on a larger set of images.
  5 in total

1.  Detrended fluctuation analysis for fractals and multifractals in higher dimensions.

Authors:  Gao-Feng Gu; Wei-Xing Zhou
Journal:  Phys Rev E Stat Nonlin Soft Matter Phys       Date:  2006-12-07

2.  An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps.

Authors:  Sameh S Askar; Abdel A Karawia; Abdulrahman Al-Khedhairi; Fatemah S Al-Ammar
Journal:  Entropy (Basel)       Date:  2019-01-09       Impact factor: 2.524

3.  An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map.

Authors:  Priya Ramasamy; Vidhyapriya Ranganathan; Seifedine Kadry; Robertas Damaševičius; Tomas Blažauskas
Journal:  Entropy (Basel)       Date:  2019-07-03       Impact factor: 2.524

4.  Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map.

Authors:  A A Karawia
Journal:  Entropy (Basel)       Date:  2018-10-18       Impact factor: 2.524

5.  Hyper-Chaotic Color Image Encryption Based on Transformed Zigzag Diffusion and RNA Operation.

Authors:  Duzhong Zhang; Lexing Chen; Taiyong Li
Journal:  Entropy (Basel)       Date:  2021-03-17       Impact factor: 2.524

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.