Literature DB >> 35615102

Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys.

Chih-Hsueh Lin1, Guo-Hsin Hu1,2, Jie-Sheng Chen3, Jun-Juh Yan3, Kuang-Hui Tang3.   

Abstract

In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication security of video/audio streaming in the network environment. Firstly, by the proposed synchronization controller for the master and slave chaotic systems, respectively, embedded in the transmitter and receiver, the cryptosystem can generate the synchronized and dynamic chaotic random numbers at the transmitter and receiver simultaneously. Then integrating the chaotic random numbers with SHA3-256 (Secure hash algorithm 3), the design of synchronized dynamic key generators (SDKGs) is completed. Continuously, we can apply the SDKGs to encrypt/decrypt streaming audio/video data. In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback) encryption algorithm with SDKGs to encrypt the video/audio streaming. Then the cipher-text is transmitted to the receiver via the network public channel and it can be fully decrypted with the dynamic random keys synchronously generated at the receiver. A duplex audio/video cryptosystem is realized to illustrate the performance and feasibility of this proposed research. Finally, many tests and comparisons are performed to stress the quality of random sequences generated by proposed SDKGs.
© The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature 2022.

Entities:  

Keywords:  AES CFB; Chaos synchronization; Dynamic key generator; Secure communication; Video/audio streaming

Year:  2022        PMID: 35615102      PMCID: PMC9123879          DOI: 10.1007/s00530-022-00950-6

Source DB:  PubMed          Journal:  Multimed Syst        ISSN: 0942-4962            Impact factor:   2.603


Introduction

Due to the impact of COVID-19, to reduce the risk of infection caused by conversation contact, people are accustomed to using the wireless network for communication from chats to high-secret video conferences. Therefore, how to ensure the security of data exchange in the network environment is a very important issue. In traditional encryption algorithms, such as RSA, AES, ECC, etc., they all rely on the complexity of static keys and encryption algorithms to strengthen the confusion of cipher-text to protect private information [1]. In such a symmetric encryption method, a static key is used. However, when the static key is cracked, information will be fully exposed. Furthermore, due to the ultra-high computing speed of IBM's quantum computer with 53 qubits, the time required for brute-force attack is greatly reduced. This has become a major concern of secure communication in the near future [2]. On the other hand, a chaotic system can generate a large number of random signals in a very short period, and these random signals are dynamic and unpredictable. These chaos-based dynamic random keys, combined with traditional symmetric encryption, will make it difficult to crack. In addition, the chaos-based cryptosystem has not the problem of key storage, because the random keys are dynamically generated and updated by the chaotic systems. A chaotic system is a non-periodic dynamical system with random state responses. The state responses have the characteristics of nonlinear, unpredictable trajectory, sensitivity to initial values, butterfly effect and strange attractors. The concept of hyper-chaotic systems was first proposed by Rössler in 1979 [3]. Hyper-chaotic systems have multiple strange attractors with positive Lapunov exponents. The unpredictable property is useful for secure communication and the application of communication security has attracted many researchers to invest in the literature [4, 5]. Among the reports [4, 5] on the encryption application, the design of a random number generator is very important. Generally speaking, random number generators have two types, namely true random number generators (TRNGs) and pseudo-random number generators (PRNGs) [6, 7]. True random numbers are unpredictable signals that usually exist in nature, such as electromagnetic noise and thermal noise. However, to extract true random numbers from the natural environment, additional sensing circuits must be used to obtain and convert signals, which is inconvenient and high in cost. Therefore, to reduce the cost, different artificial methods are proposed to generate pseudo-random numbers with the random property as the TRN as possible [8-10]. However, due to the difficulty of modeling, the real random number is very difficult to achieve synchronization control and apply to communication security. On the contrary, with the deterministic mathematical model of chaotic systems, it becomes possible to apply the chaos-based random numbers to the design of cryptosystems through synchronization controller design. In 1990, OGY (Ott, Grebogi and Yorke) [11] proposed the related research on controlling chaos. Then, Pecora and Carroll [12] tried to synchronize two chaotic systems with different initial values to have the same random state responses. Since then, there have been many studies focusing on the synchronization of chaotic systems [13, 14] and various control methods had been introduced for synchronization, such as sliding mode control [15, 16], optimal control [17], adaptive control [18], discrete sliding mode control [19] and fuzzy control [20], etc. The synchronization control can be utilized to generate the synchronized dynamic keys and then further design a high secure cryptosystem to guarantee communication security. Motivated by the aforesaid, this study aims to develop a novel chaos-based cryptosystem to ensure the communication security of video/audio streaming in the network environment. To obtain high-quality random numbers, we use the generalized 4-dimensional Lorenz-Stenflo (4D LS) hyper-chaotic system to design the random number generator. The generalized 4D LS hyper-chaotic system is an advanced system based on the 3-dimensional continuous Lorenz system, which can dynamically generate four unpredictable random numbers [21, 22]. We firstly discretize the 4D LS hyper-chaotic system as a discrete model [23] such that it becomes easy to implement with microcontroller, and then design a discrete synchronization controller such that we can synchronize the master and slave chaotic systems to obtain the same random numbers simultaneously at both transmitter and receiver. It is worth mentioning that, in our design, the chaotic states and control signals are not necessary to fully expose in the public channel, so the security of the system can be promoted. After obtaining the synchronized chaotic random numbers, to promote the randomness quality of random numbers, we further integrate with the SHA3-256 algorithm [24] to complete the design of synchronized dynamic key generators (SDKGs) with a fixed length of 256 bits, which can be used for communication encryption. With the proposed SDKGs, we can complete the design of the dynamic cryptosystem for video/audio streaming. In this dynamic cryptosystem, audio/video signals are captured from the local microphone and camera, and then the proposed SDKGs are used to replace the static key of the traditional symmetric encryption algorithm AES CFB [25], to dynamically encrypt the data, and then send the ciphertext through the public channel. When the receiver receives the ciphertext, it will use the synchronized dynamic random keys of SDKGs with the AES CFB to decrypt the ciphertext, and finally recover the original audio/video data. The statistical analysis, histogram, connected component analysis [26, 27], information entropy [28], keyspace analysis and correlation indexes were calculated and analyzed through simulation experiments and comparisons to highlight the capability and feasibility of this design method. This paper is organized as follows. Section 2 formulates chaos synchronization of 4D LS systems and the SDKGs implementation in the network environment. The chaos-based cryptosystem with SDKGs is realized in Sect. 3. Section 4 evaluates the security of the proposed chaos-based random key generator and chaos-based cryptosystem. Finally, we give brief conclusions in Sect. 5.

Synchronization of master–slave 4D LS hyper-chaotic systems and design of SDKGs

In this research, the design of a dynamic random key generator and its synchronization control are important core technologies. Therefore, we first discuss the synchronization controller design and implementation of the master–slave chaotic systems. Simultaneously, to facilitate the low-cost realization with digital microcontrollers, discrete chaotic systems will be considered. In the following, we will introduce the 4D LS hyper-chaotic system to discuss, of course, the technology developed in this paper can be extended and applied to different chaotic systems. The state equation of the generalized 4D LS system can be described as follows:where and are parameters of the system (1). and are the state variables. To facilitate the realization with the digital devices or components, we discretize the continuous system to obtain a corresponding discrete system. The following describes the method of system discretization. For a continuous-time chaotic system described bywhere is the state vector; is the nonlinear function of systems. Matrices and are controllable. Then the discrete system corresponding to the system (2) can be obtained bywhere and [23], T is the sampling time. Obviously the 4D LS hyperchaotic system (1) can be rearranged aswhere and , and are obtained as According to [23], the continuous-time 4D LS hyper-chaotic system (1) can be discretized as:where and can be calculated by and . is the state vector of the discrete system (6). Now we utilize the discretized 4D LS system (6) to design the 4D LS RNGs which can be synchronized by the synchronization controller. First, master and slave 4D LS systems are given, respectively, as (6) and (7).where is the state vector of master system (7) embedded in the transmitter; is the state vector of slave system (8) embedded in the receiver; and are the control inputs designed later to ensure synchronization (i.e. ) between master and slave systems. By using matrices in (5) with parameters , sampling time, and the formulas of and [23], matrices and can be calculated as Obviously, the matrix pair is controllable. Then we define the error state aswhere , Then from (6), (7), (9), we have the error dynamics aswhere 。 The control input in the slave system (8) is designed aswhere , is the designed gain matrix. Substituting (11) into (10), we have Since is controllable, we can arbitrarily assign the eigenvalues of the matrix . Thus, we can apply the pole assignment technology to design the matrix such that and the error dynamics (12) is asymptotically stable. Obviously, from (12), the convergence speed of can be assigned and predicted with the eigenvalues of matrix . From the above discussion, it reveals that the controller (11) can asymptotically synchronize the master and slave chaotic systems. However, in the realization of the controller, to avoid the control information being exposed in the network environment, we disassemble the controller (11) into two parts, which are calculated separately at the transmitter and receiver, and then the complete control input signal is assembled at the receiver to achieve synchronization. The design is given as followswhere and are calculated, respectively, at the transmitter and receiver. In the following, we utilize the simulation tool of MATLAB to verify the control design discussed above. In this simulation, we first assign the eigenvalues of and the corresponding gain matrix K can be easily obtained using the pole assignment method with the command of ‘Place’ in the Matlab toolbox. In this simulation, the initial conditions were selected as , , , , , , and . Figures 1, 2, 3, 4, 5 show the simulation results. Figure 1 shows the strange attractor of the discrete version corresponding to the continuous 4D LS hyper-chaotic system in the transmitter. It confirms that the continuous hyper-chaotic system can be simulated by the corresponding discrete version. Figure 2 shows the state responses of the slave system in the receiver. Figure 2 also shows that the state of the hyper-chaotic system is random and cannot be predicted. Figure 3 shows the synchronization error between the master and slave systems. Figures 4 and 5 show, respectively, the control inputs and the state responses of master–slave hyper-chaotic systems. We can see that the synchronization errors converge to zero due to the control input. It means that we can obtain the same chaotic random number simultaneously at both transmitter and receiver.
Fig. 1

Strange attractor of the discrete 4D LS hyper-chaotic system

Fig. 2

State responses of the slave discrete 4D LS hyper-chaotic system

Fig. 3

The time responses of synchronization errors

Fig. 4

The time responses of control inputs

Fig. 5

State responses of the master–slave discrete 4D LS systems

Strange attractor of the discrete 4D LS hyper-chaotic system State responses of the slave discrete 4D LS hyper-chaotic system The time responses of synchronization errors The time responses of control inputs State responses of the master–slave discrete 4D LS systems After verifying the synchronization, the design of chaos-based SDKGs is shown in Fig. 6.
Fig. 6

The structure of SDKGs

The structure of SDKGs In Fig. 6, and are firstly calculated at the transmitter (Master systems) and transmitted to the receiver through the public channel. At the same time, and are also obtained at the receiver (Slave systems). And then the receiver integrates the received and with the local signals and to obtain the synchronization controller in (14) and achieve synchronization of master and slave chaotic systems embedded in the transmitter and receiver, respectively. Finally, the synchronized chaotic random numbers are inputted to the SHA3-256 algorithm to generate synchronized random number sequence with a fixed length of 256 bits, respectively, at the transmitter and receiver. Such SDKGs will be applied for data encryption applications.

Cryptosystems for video/audio streaming via SDKGs

In the previous discussion, due to the synchronization controller, the master and slave hyper-chaotic systems at the transmitter and receiver can be synchronized. Then, through the avalanche effect of the SHA3-256 algorithm, a SDKG can be established. After obtaining the synchronized dynamic keys, we can apply them to the communication security of video/audio streaming data. The structure of the cryptosystem is shown in Fig. 7, which includes Lorenz-Stenflo SDKGs and encryption/decryption mechanisms. After the hyper-chaotic system of User A is synchronized with that of user B, both users can send the data of captured images and sounds to the encryption/decryption mechanisms. The modified AES CFB algorithm with synchronized dynamic keys is used for encryption /decryption calculations, and then the ciphertext is sent to the receiver through the network for decryption and finally the original plaintexts of streaming video/audio are obtained at the receiver. The images are pre-converted to JPEG format to reduce the load of network transmission.
Fig. 7

The structure of cryptosystem

The structure of cryptosystem The realization of the system is shown in Fig. 8. We use the Raspberry Pi and the computer as the platforms for User A and User B, respectively. Then use the network camera to capture audio and video, as shown in Fig. 7, and transmit the real-time video and audio of both users through the TCP (Transmission Control Protocol) protocol with the Internet channel. The data is encrypted/decrypted through the synchronous dynamic keys and the AES CFB algorithm designed in this paper to achieve real-time video/audio data secure transmission.
Fig. 8

The realization of the cryptosystem for video/audio streaming

The realization of the cryptosystem for video/audio streaming In this cryptosystem as shown in Fig. 8, we further design a user interface. Users can build or join the streaming video conference room with their name and password as shown in Figs. 9 and 10, respectively. After confirming, users enter the window of the meeting room as shown in Fig. 11. The left image is the other user's image, and the upper right image is the user’s image. The bottom right is a list of all the users in this meeting room. Users can click ‘Leave’ in the upper left option to leave this meeting room. In addition, we also design the developer window to observe the system information. As shown in Figs. 12, 13, 14, 15, the dynamic keys, encrypted video, original audio signal and encrypted audio signal are displayed, respectively. The latest five dynamic random keys generated by SDKGs are shown in Fig. 12, and we can click ‘Pause’ or ‘Continue’ to update the dynamic key display; Fig. 13 shows the received encrypted image on the receiver, and it can be found that we cannot extract any information about original video image; the upper figure in Fig. 14 shows the received original audio data and the lower figure shows the Fourier spectrum of the audio data; the upper in Fig. 15 shows the un-decrypted audio signal, and the lower shows the Fourier spectrum of the un-decrypted sound signal, it can be observed that if it has not been decrypted, the sound is chaotic, and the Fourier spectrum is broad. Finally, in Figs. 16 and 17, we can have the actual video windows of the encryption/decryption in this system. The above results demonstrate that the proposed system with a synchronized 4D LS dynamic key generator can successfully perform dynamic encryption/decryption for video/audio stream data.
Fig. 9

Creating a meeting room

Fig. 10

Joining a meeting room

Fig. 11

Window of the meeting room

Fig. 12

Random dynamic keys

Fig. 13

Encrypted image

Fig. 14

The original audio signal

Fig. 15

The encrypted audio signal

Fig. 16

Window of user A

Fig. 17

Window of user B

Creating a meeting room Joining a meeting room Window of the meeting room Random dynamic keys Encrypted image The original audio signal The encrypted audio signal Window of user A Window of user B

Security analysis of SDKGs and chaos-based cryptosystem

This article integrates synchronized master–slave hyper-chaotic systems with the SHA3-256 algorithm to generate dynamic random keys. Then the dynamic keys are combined with the AES CFB encryption algorithm to complete the cryptosystem for the real-time video/audio stream. To ensure the security of this encryption technology, the statistical analysis, histogram, connected component analysis(CCA), information entropy (IE), and key spaces are calculated in the following. To test the randomness quality of the encrypted streaming video, a 512 × 512 picture is prepared as shown in Fig. 18a. In actual application, to reduce the network transmission, the image will be converted from the pixel array to the JPEG format. After the format conversion, the file size is reduced from 786,432 bytes to 54,236 bytes. It can reduce the processing time for encryption/decryption. Then the JPEG file is encrypted by AES CFB with dynamic keys. The results are shown in Fig. 18b, c with one static key and five dynamic keys, respectively. It can be found that the encrypted images have no obvious features, and finally, it is decrypted and converted back to a pixel array as shown in Fig. 18d. Furthermore, to test the security of the actual video streaming, we continuously capture 12 pictures as shown in Fig. 19 from the video streaming. Figures 19a and b are the first and last captured pictures, respectively. All pictures are with a size of 819,234 Bytes. Also, a pre-recorded audio file with the size of 819,234 Bytes is used to test the randomness.
Fig. 18

Picture files (a) original image (b) encrypted image by one key (c) encrypted image by five keys (d) decrypted image

Fig. 19

Real-time 12 images captured (a) The first one captured; b The last one captured

Picture files (a) original image (b) encrypted image by one key (c) encrypted image by five keys (d) decrypted image Real-time 12 images captured (a) The first one captured; b The last one captured

NIST analysis

In this section, we introduce the National Institute of Standards and Technology (NIST) test suite [8] to evaluate the randomness of the dynamic random keys and encrypted data. This evaluation standard contains 15 items and the test result for every test item is called the p value. When the p value > 0.01, it means that the test item has passed. With a larger p value, it means the better randomness of the test data. We select the dynamic keys generated with the state of the chaotic system. The test results in Table 1 were obtained with a stream length of 6,553,872 bits and a bitstream count of 30. The captured pictures in Fig. 19 and pre-recorded sound file are encrypted with AES CFB and five dynamic keys. Obviously, all the test results shown in Table 1 pass the tests. The performance results of the traditional AES CFB only using a static key are shown in Table 2. According to the results in Tables 1 and 2, it shows that under the same conditions, the test results of the sound file and images using the dynamic keys are about 1.25 and 1.91 times, respectively, better than those with the static key. Furthermore, in Table 3, we compare the test results in this paper with those of other random number generators proposed in [29, 30]. The average score is as high as 7.31865, which is much higher than those obtained in [29, 30].
Table 1

NIST SP 800-22 test results of dynamic random keys and pre-recorded file

Statistical testsp value (N = 6553872bits)
Lorenz-Stenflo dynamic random keys \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{d1}$$\end{document}xd1-SHA3Real picture encryption by five dynamic keysAudio encryption by five dynamic keys
Frequency0.757041168321815PASS0.6110444100161085PASS0.6589255483728064PASS
Block frequency0.7383177081052352PASS0.92991215444075PASS0.7335514974228903PASS
Runs0.9066837727254307PASS0.8263184775182874PASS0.9545818671524448PASS
Longest run0.6163610211186337PASS0.4678881971400057PASS0.0581213714768202PASS
Rank0.3945721752108433PASS0.7715368176931643PASS0.0963522177689812PASS
FFT0.6062331649869583PASS0.8825927007306478PASS0.8600113743965508PASS
Non overlapping template0.9565908225403975PASS0.9999308432701147PASS0.9986014615967732PASS
Overlapping template0.9487989226049403PASS0.9304215198760762PASS0.3240886750671797PASS
Universal0.7722149324488802PASS0.6436355479448661PASS0.7049263631799445PASS
Linear complexity0.1696575433616641PASS0.3781427543370102PASS0.776556111067934PASS
Serial0.6910811818465875PASS0.1568080639957803PASS0.7143062057384221PASS
Approximate entropy0.9235856474055549PASS0.4145752284146443PASS0.9678361050026599PASS
Cumulative sums0.8947265993023332PASS0.8230982564174816PASS0.7978793460461064PASS
Random excursions0.3441260237052815PASS0.1946342832910313PASS0.1125067188907348PASS
Random excursions variant0.2007686602112634PASS0.1002631331664804PASS0.1546203954515068PASS
Total9.9207593438958199.1308023882524488.912865258631756
Table 2

NIST SP 800-22 test results of encrypted images and audio file with a static key

Statistical testsp value (N = 6553872bits)
Real picture encryption by one key (static key)Audio encryption by one key (static key)
Frequency0.3291829148792813PASS0.4627295044790676PASS
Block frequency0.179264082869327PASS0.0963946278914413PASS
Runs0.0887672235857227PASS0.8400973273103713PASS
Longest run0.0620643443370354PASS0.2385709527832993PASS
Rank0.0283940348765471PASS0.5184402120053612PASS
FFT0.0000000000000000FAIL0.1129466953768003PASS
Non overlapping template0.9986483686566213PASS0.999980532401379PASS
Overlapping template0.7500930774379598PASS0.0657528921760780PASS
Universal0.8847786315112955PASS0.9055389220828538PASS
Linear complexity0.1760571799544020PASS0.3333733165763285PASS
Serial0.3040378078712666PASS0.7774485821850803PASS
Approximate entropy0.3114147932459213PASS0.7854697563072572PASS
Cumulative sums0.2869884170400594PASS0.6725861672529172PASS
Random excursions0.1276420264525448PASS0.1719450981187654PASS
Random excursions variant0.2624940429188451PASS0.1239030211557741PASS
Total4.7898269456368297.105177608103776
Table 3

NIST SP 800–22 test results in [29, 30]

Statistical testsp value (N=\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${10}^{6}$$\end{document}106 bits)
Lorenz-Stenflo RNGRNG [29]RNG [30]
\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{d1}$$\end{document}xd1-SHA3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{d2}$$\end{document}xd2-SHA3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{d3}$$\end{document}xd3-SHA3\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${x}_{d4}$$\end{document}xd4-SHA3z-4bitx-8bity-8bitz-8bitu-8bit
Frequency0.49420.43240.82990.12470.54450.21450.48790.88720.7455
Block frequency0.63500.37860.96800.52510.44040.49780.37970.67980.8452
Runs0.69790.37070.84520.97850.05140.29780.48790.09870.1879
Longest run0.25350.46530.15440.11330.18960.79450.66170.37980.5579
Rank0.33660.82650.52190.45310.37050.87980.49750.26480.3279
FFT0.03040.41280.14810.96140.24380.04560.45210.12780.6159
Non overlapping template1.00001.00000.99941.00000.07420.97850.01740.12450.0345
Overlapping template0.82370.81350.64960.27350.65430.28980.64280.28950.1895
Universal0.44910.89560.64010.50900.42790.80270.37880.46250.2985
Linear complexity0.50890.82080.69560.62070.71170.27800.34700.67820.3722
Serial0.03780.32900.72660.33820.36970.87960.21740.28790.7954
Approximate entropy0.08180.32980.72710.33560.73800.53120.37890.40250.1820
Cumulative sums0.26870.40340.51570.13890.83580.37980.29870.87490.6745
Random excursions0.44060.02970.02250.15110.27000.30480.27890.17890.7924
Random excursions variant0.23690.04870.27290.18260.57000.42780.37890.28790.1952
Total6.29517.55688.71706.70576.49187.60225.90566.02496.8145
Total average7.318656.49186.5868
NIST SP 800-22 test results of dynamic random keys and pre-recorded file NIST SP 800-22 test results of encrypted images and audio file with a static key NIST SP 800–22 test results in [29, 30]

Histogram analysis

For an image, the histogram is an important statistical feature. A good cryptosystem can encrypt an image and the histogram of the cipher image is evenly distributed such that attackers could not analyze statistical features of the original image from its cipher image. Each pixel in the picture is between 0 and 255. Use the image as shown in Fig. 18a for the test. First, the histogram analysis for the grayscale image of the original image is shown in Fig. 20a. Figure 20b shows the histogram analysis for the image in JPEG format. It is observed that both Figs. 20a and b have obvious differences in some specific pixel values. The histogram of the cipher image by one static key and five dynamics keys are shown in Figs. 20c and d. From Figs. 20c and d, it demonstrates that the encryption could effectively eliminate the differences between the histogram information.
Fig. 20

Histogram analysis (a) the original image(b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five dynamic keys

Histogram analysis (a) the original image(b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five dynamic keys To evaluate the uniform distribution of histograms, we calculate the variance of histogram [31] defined bywhere, and , are the number of pixel values i, j, respectively. Table 4 shows the variance of histograms in (15). The variance of the original image in Fig. 20a is extremely large, and it is reduced to 17,383 after being converted into JPEG format. When the traditional fixed key (static key) is used for the AES CFB encryption algorithm, it can be found that the variance is reduced to 232. However, with our encryption approach, the variance has been reduced to 202. The comparisons show that the proposed encryption method is effective to reduce the deviation of the picture and make it difficult to identify any features of the picture. Under the same conditions, compared with other proposed papers [32], we can find that our proposed encryption effect is very effective.
Table 4

The variance of histogram

The original imageThe original image with JPEG format the cipher imageThe cipher image by one key (static key)The cipher image by five dynamic keys[32]
Variance of histogram6,443,335.687517,383.8787232.2302202.75371052.4
The variance of histogram

Connected component analysis(CCA)

Generally, for a plain image, there always exists a high correlation between adjacent pixels. Therefore, good encryption algorithms can result in smaller correlation values between adjacent pixels. We randomly select 3000 pixels from the information of plaint and encrypted images of image 1 in Figs. 18a–c. The correlation coefficients for the horizontal, vertical, and diagonal directions were calculated by using the following equations [33]:where, and denote the pixel values of the two adjacent pixels and N is the number of pair . In Fig. 21, it can be seen that the original picture is highly correlated; while the picture converted to JPEG format has a more even distribution, but there are still clusters on the upper right. However, the encrypted images with one key and five keys, respectively, are distributed randomly and uniformly. Detailed reports of the connected component analysis are given in Tables 5 and 6. According to Tables 5 and 6, it could be seen that the encrypted image with the proposed five dynamic keys had the lowest pixel correlation which is superior to the results in the previous reports [32, 34, 35].
Fig. 21

Connected component analysis (a) the original image (b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five keys

Table 5

Connected component analysis (N = 3000)

N3000
Test imageThe original imageThe original image with JPEG formatThe cipher image by one key (static key)The cipher image by five keys[32]
Horizontal0.9699 − 0.05640.00850.0061 − 0.0685
Vertical0.98640.01300.00330.00210.0857
Diagonal0.9567 − 0.0157 − 0.0279 − 0.00450.0059
Absolute sum2.9130.08510.03970.01270.1601
Table 6

Connected component analysis (N = 10,000, 15,000)

N10,00015,000
Test imageThe cipher image by five keys[34]The cipher image by five dynamic keys[35]
Horizontal0.00310.00670.00330.0846
Vertical0.00770.0172-0.00440.0583
Diagonal0.00040.0147-0.00830.0931
Absolute sum0.01120.03860.01600.236
Connected component analysis (a) the original image (b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five keys Connected component analysis (N = 3000) Connected component analysis (N = 10,000, 15,000)

Information entropy analysis

Information entropy is a measure of uncertainty. We can judge the randomness degree of an event by calculating the entropy value. For the encrypted image, a large entropy value implies a better encryption effect. The calculation method is given as follows [36]:where is the frequency of each greyscale For a grayscale image, the pixel has a data field of [0, 255] and the maximum value of IE will be 8. We use the pictures in Fig. 18a-c for analysis. The calculation results are shown in Table 7. The results indicate that the original image has the smallest entropy and the encrypted image is with the maximum value of 7.9911 by five keys which means that the encryption effect is good. Therefore, it could be concluded that the encrypted image possessed true random signal property and the proposed algorithm could resist entropy attacks.
Table 7

Information entropy analysis

The original imageThe original image with JPEG formatThe cipher image by one key (static key)The cipher image by five dynamics keys
Entropy of picture7.00047.79697.99067.9911

s

Information entropy analysis s

Keyspace analysis

In this paper, we introduce the discrete 4D LS hyper-chaotic system with four initial state variables. Therefore, the keyspace is when the calculation accuracy is . Furthermore, Since the dynamic key generator is integrated with the SHA3-256 algorithm with keyspace , the keyspace of dynamic keys generated with our method is which is large enough to resist the brute-force attack.

NPCR and UACI analysis

NPCR (Number of pixels change rate) and UACI (Unified average changing intensity) are often used to analyze the sensitivity of a plain image so that differential attacks can be resisted [37]. The formulas are defined as follows:where M and N are the width and height of encrypted images. and are, respectively, the pixels with the location of two ciphered images and . To perform NPCR and UACI tests, we continuously captured 12 images as shown in Fig. 19. After converting to JPEG format, each image randomly selected a pixel to increase or decrease by 1 and the original images and the slightly changed images can be encrypted with 5 dynamic keys proposed in the paper for testing. The results are shown in Table 8. According to the test results in Table 8, the average NPCR test is 99.6138%, while the UACI is 33.4700%. Furthermore, a comparison of NPCR and UACI tests of the proposed method and the others is given in Table 9. The comparison results reveal that the method proposed in this paper has better results in NPCR and UACI tests.
Table 8

NPCR and UACI analysis of Real-time captured images

Real-time captured imagesNPCR (%)UACI (%)
Image 199.617833.4323
Image 299.612333.4789
Image 399.602133.4996
Image 499.616033.5292
Image 599.616033.3588
Image 699.617733.6297
Image 799.605933.5444
Image 899.612133.2078
Image 999.603233.3816
Image 1099.596833.4566
Image 1199.667233.5706
Image 1299.597933.5512
Total average99.613833.4700
Table 9

Comparison of NPCR and UACI criteria of proposed method and the others

Test methodsNPCR (%)UACI (%)
Proposed method99.613833.4700
Ferdus et.al. [37]99.549926.5199
Lin and Wu [38]99.609633.4673
Gupta et al. [39]99.589928.4899
Liu et al. [40]99.609733.4557
Zheng et al. [41]99.596933.4599
Patro et al. [42]99.609133.4914
Bisht et al. [43]99.702427.9796
NPCR and UACI analysis of Real-time captured images Comparison of NPCR and UACI criteria of proposed method and the others

Conclusions

In this paper, a novel design of random number generators has been firstly proposed by integrating the chaos random property and the avalanche effect of SHA3-256. Then by the design of the synchronization controller of master–slave hyper-chaotic systems, the dynamic random keys can simultaneously be generated at both transmitter and receiver. Continuously, an improved AES CFB encryption algorithm with dynamic random keys is realized to encrypt /decrypt streaming audio/video data. In addition, several tests and analyses, such as visual effect, statistical analysis, histogram, information entropy analysis, keyspace analysis were all performed to show the capability and security of the improved chaos-based AES CFB algorithm.
  6 in total

1.  Controlling chaos.

Authors: 
Journal:  Phys Rev Lett       Date:  1990-03-12       Impact factor: 9.161

2.  Synchronization in chaotic systems.

Authors: 
Journal:  Phys Rev Lett       Date:  1990-02-19       Impact factor: 9.161

3.  Information entropy measure for evaluation of image quality.

Authors:  Du-Yih Tsai; Yongbum Lee; Eri Matsuyama
Journal:  J Digit Imaging       Date:  2008-09       Impact factor: 4.056

4.  Report on the Development of the Advanced Encryption Standard (AES).

Authors:  J Nechvatal; E Barker; L Bassham; W Burr; M Dworkin; J Foti; E Roback
Journal:  J Res Natl Inst Stand Technol       Date:  2001-06-01

5.  Quantum supremacy using a programmable superconducting processor.

Authors:  Frank Arute; Kunal Arya; Ryan Babbush; Dave Bacon; Joseph C Bardin; Rami Barends; Rupak Biswas; Sergio Boixo; Fernando G S L Brandao; David A Buell; Brian Burkett; Yu Chen; Zijun Chen; Ben Chiaro; Roberto Collins; William Courtney; Andrew Dunsworth; Edward Farhi; Brooks Foxen; Austin Fowler; Craig Gidney; Marissa Giustina; Rob Graff; Keith Guerin; Steve Habegger; Matthew P Harrigan; Michael J Hartmann; Alan Ho; Markus Hoffmann; Trent Huang; Travis S Humble; Sergei V Isakov; Evan Jeffrey; Zhang Jiang; Dvir Kafri; Kostyantyn Kechedzhi; Julian Kelly; Paul V Klimov; Sergey Knysh; Alexander Korotkov; Fedor Kostritsa; David Landhuis; Mike Lindmark; Erik Lucero; Dmitry Lyakh; Salvatore Mandrà; Jarrod R McClean; Matthew McEwen; Anthony Megrant; Xiao Mi; Kristel Michielsen; Masoud Mohseni; Josh Mutus; Ofer Naaman; Matthew Neeley; Charles Neill; Murphy Yuezhen Niu; Eric Ostby; Andre Petukhov; John C Platt; Chris Quintana; Eleanor G Rieffel; Pedram Roushan; Nicholas C Rubin; Daniel Sank; Kevin J Satzinger; Vadim Smelyanskiy; Kevin J Sung; Matthew D Trevithick; Amit Vainsencher; Benjamin Villalonga; Theodore White; Z Jamie Yao; Ping Yeh; Adam Zalcman; Hartmut Neven; John M Martinis
Journal:  Nature       Date:  2019-10-23       Impact factor: 49.962

6.  Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion.

Authors:  Cheng-Yi Lin; Ja-Ling Wu
Journal:  Entropy (Basel)       Date:  2020-05-24       Impact factor: 2.524

  6 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.