Chih-Hsueh Lin1, Guo-Hsin Hu1,2, Jie-Sheng Chen3, Jun-Juh Yan3, Kuang-Hui Tang3. 1. Department of Electronic Engineering, National Kaohsiung University of Science and Technology, Kaohsiung, 80778 Taiwan. 2. Department of Industrial Upgrading Service, Metal Industries Research and Development Centre, Kaohsiung, 81160 Taiwan. 3. Department of Electronic Engineering, National Chin-Yi University of Technology, Taichung, 41107 Taiwan.
Abstract
In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication security of video/audio streaming in the network environment. Firstly, by the proposed synchronization controller for the master and slave chaotic systems, respectively, embedded in the transmitter and receiver, the cryptosystem can generate the synchronized and dynamic chaotic random numbers at the transmitter and receiver simultaneously. Then integrating the chaotic random numbers with SHA3-256 (Secure hash algorithm 3), the design of synchronized dynamic key generators (SDKGs) is completed. Continuously, we can apply the SDKGs to encrypt/decrypt streaming audio/video data. In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback) encryption algorithm with SDKGs to encrypt the video/audio streaming. Then the cipher-text is transmitted to the receiver via the network public channel and it can be fully decrypted with the dynamic random keys synchronously generated at the receiver. A duplex audio/video cryptosystem is realized to illustrate the performance and feasibility of this proposed research. Finally, many tests and comparisons are performed to stress the quality of random sequences generated by proposed SDKGs.
In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication security of video/audio streaming in the network environment. Firstly, by the proposed synchronization controller for the master and slave chaotic systems, respectively, embedded in the transmitter and receiver, the cryptosystem can generate the synchronized and dynamic chaotic random numbers at the transmitter and receiver simultaneously. Then integrating the chaotic random numbers with SHA3-256 (Secure hash algorithm 3), the design of synchronized dynamic key generators (SDKGs) is completed. Continuously, we can apply the SDKGs to encrypt/decrypt streaming audio/video data. In our design, we introduce the AES CFB (Advanced encryption standard cipher feedback) encryption algorithm with SDKGs to encrypt the video/audio streaming. Then the cipher-text is transmitted to the receiver via the network public channel and it can be fully decrypted with the dynamic random keys synchronously generated at the receiver. A duplex audio/video cryptosystem is realized to illustrate the performance and feasibility of this proposed research. Finally, many tests and comparisons are performed to stress the quality of random sequences generated by proposed SDKGs.
Due to the impact of COVID-19, to reduce the risk of infection caused by conversation contact, people are accustomed to using the wireless network for communication from chats to high-secret video conferences. Therefore, how to ensure the security of data exchange in the network environment is a very important issue. In traditional encryption algorithms, such as RSA, AES, ECC, etc., they all rely on the complexity of static keys and encryption algorithms to strengthen the confusion of cipher-text to protect private information [1]. In such a symmetric encryption method, a static key is used. However, when the static key is cracked, information will be fully exposed. Furthermore, due to the ultra-high computing speed of IBM's quantum computer with 53 qubits, the time required for brute-force attack is greatly reduced. This has become a major concern of secure communication in the near future [2]. On the other hand, a chaotic system can generate a large number of random signals in a very short period, and these random signals are dynamic and unpredictable. These chaos-based dynamic random keys, combined with traditional symmetric encryption, will make it difficult to crack. In addition, the chaos-based cryptosystem has not the problem of key storage, because the random keys are dynamically generated and updated by the chaotic systems. A chaotic system is a non-periodic dynamical system with random state responses. The state responses have the characteristics of nonlinear, unpredictable trajectory, sensitivity to initial values, butterfly effect and strange attractors. The concept of hyper-chaotic systems was first proposed by Rössler in 1979 [3]. Hyper-chaotic systems have multiple strange attractors with positive Lapunov exponents. The unpredictable property is useful for secure communication and the application of communication security has attracted many researchers to invest in the literature [4, 5]. Among the reports [4, 5] on the encryption application, the design of a random number generator is very important. Generally speaking, random number generators have two types, namely true random number generators (TRNGs) and pseudo-random number generators (PRNGs) [6, 7]. True random numbers are unpredictable signals that usually exist in nature, such as electromagnetic noise and thermal noise. However, to extract true random numbers from the natural environment, additional sensing circuits must be used to obtain and convert signals, which is inconvenient and high in cost. Therefore, to reduce the cost, different artificial methods are proposed to generate pseudo-random numbers with the random property as the TRN as possible [8-10]. However, due to the difficulty of modeling, the real random number is very difficult to achieve synchronization control and apply to communication security. On the contrary, with the deterministic mathematical model of chaotic systems, it becomes possible to apply the chaos-based random numbers to the design of cryptosystems through synchronization controller design. In 1990, OGY (Ott, Grebogi and Yorke) [11] proposed the related research on controlling chaos. Then, Pecora and Carroll [12] tried to synchronize two chaotic systems with different initial values to have the same random state responses. Since then, there have been many studies focusing on the synchronization of chaotic systems [13, 14] and various control methods had been introduced for synchronization, such as sliding mode control [15, 16], optimal control [17], adaptive control [18], discrete sliding mode control [19] and fuzzy control [20], etc. The synchronization control can be utilized to generate the synchronized dynamic keys and then further design a high secure cryptosystem to guarantee communication security.Motivated by the aforesaid, this study aims to develop a novel chaos-based cryptosystem to ensure the communication security of video/audio streaming in the network environment. To obtain high-quality random numbers, we use the generalized 4-dimensional Lorenz-Stenflo (4D LS) hyper-chaotic system to design the random number generator. The generalized 4D LS hyper-chaotic system is an advanced system based on the 3-dimensional continuous Lorenz system, which can dynamically generate four unpredictable random numbers [21, 22]. We firstly discretize the 4D LS hyper-chaotic system as a discrete model [23] such that it becomes easy to implement with microcontroller, and then design a discrete synchronization controller such that we can synchronize the master and slave chaotic systems to obtain the same random numbers simultaneously at both transmitter and receiver. It is worth mentioning that, in our design, the chaotic states and control signals are not necessary to fully expose in the public channel, so the security of the system can be promoted. After obtaining the synchronized chaotic random numbers, to promote the randomness quality of random numbers, we further integrate with the SHA3-256 algorithm [24] to complete the design of synchronized dynamic key generators (SDKGs) with a fixed length of 256 bits, which can be used for communication encryption. With the proposed SDKGs, we can complete the design of the dynamic cryptosystem for video/audio streaming. In this dynamic cryptosystem, audio/video signals are captured from the local microphone and camera, and then the proposed SDKGs are used to replace the static key of the traditional symmetric encryption algorithm AES CFB [25], to dynamically encrypt the data, and then send the ciphertext through the public channel. When the receiver receives the ciphertext, it will use the synchronized dynamic random keys of SDKGs with the AES CFB to decrypt the ciphertext, and finally recover the original audio/video data. The statistical analysis, histogram, connected component analysis [26, 27], information entropy [28], keyspace analysis and correlation indexes were calculated and analyzed through simulation experiments and comparisons to highlight the capability and feasibility of this design method.This paper is organized as follows. Section 2 formulates chaos synchronization of 4D LS systems and the SDKGs implementation in the network environment. The chaos-based cryptosystem with SDKGs is realized in Sect. 3. Section 4 evaluates the security of the proposed chaos-based random key generator and chaos-based cryptosystem. Finally, we give brief conclusions in Sect. 5.
Synchronization of master–slave 4D LS hyper-chaotic systems and design of SDKGs
In this research, the design of a dynamic random key generator and its synchronization control are important core technologies. Therefore, we first discuss the synchronization controller design and implementation of the master–slave chaotic systems. Simultaneously, to facilitate the low-cost realization with digital microcontrollers, discrete chaotic systems will be considered. In the following, we will introduce the 4D LS hyper-chaotic system to discuss, of course, the technology developed in this paper can be extended and applied to different chaotic systems. The state equation of the generalized 4D LS system can be described as follows:where and are parameters of the system (1). and are the state variables. To facilitate the realization with the digital devices or components, we discretize the continuous system to obtain a corresponding discrete system. The following describes the method of system discretization. For a continuous-time chaotic system described bywhere is the state vector; is the nonlinear function of systems. Matrices and are controllable. Then the discrete system corresponding to the system (2) can be obtained bywhere and [23], T is the sampling time. Obviously the 4D LS hyperchaotic system (1) can be rearranged aswhere and , and are obtained asAccording to [23], the continuous-time 4D LS hyper-chaotic system (1) can be discretized as:where and can be calculated by and . is the state vector of the discrete system (6).Now we utilize the discretized 4D LS system (6) to design the 4D LS RNGs which can be synchronized by the synchronization controller. First, master and slave 4D LS systems are given, respectively, as (6) and (7).where is the state vector of master system (7) embedded in the transmitter; is the state vector of slave system (8) embedded in the receiver; and are the control inputs designed later to ensure synchronization (i.e. ) between master and slave systems. By using matrices in (5) with parameters , sampling time, and the formulas of and [23], matrices and can be calculated asObviously, the matrix pair is controllable. Then we define the error state aswhere , Then from (6), (7), (9), we have the error dynamics aswhere 。The control input in the slave system (8) is designed aswhere , is the designed gain matrix.Substituting (11) into (10), we haveSince is controllable, we can arbitrarily assign the eigenvalues of the matrix . Thus, we can apply the pole assignment technology to design the matrix such that and the error dynamics (12) is asymptotically stable. Obviously, from (12), the convergence speed of can be assigned and predicted with the eigenvalues of matrix .From the above discussion, it reveals that the controller (11) can asymptotically synchronize the master and slave chaotic systems. However, in the realization of the controller, to avoid the control information being exposed in the network environment, we disassemble the controller (11) into two parts, which are calculated separately at the transmitter and receiver, and then the complete control input signal is assembled at the receiver to achieve synchronization. The design is given as followswhere and are calculated, respectively, at the transmitter and receiver. In the following, we utilize the simulation tool of MATLAB to verify the control design discussed above. In this simulation, we first assign the eigenvalues of and the corresponding gain matrix K can be easily obtained using the pole assignment method with the command of ‘Place’ in the Matlab toolbox.In this simulation, the initial conditions were selected as , , , , , , and . Figures 1, 2, 3, 4, 5 show the simulation results. Figure 1 shows the strange attractor of the discrete version corresponding to the continuous 4D LS hyper-chaotic system in the transmitter. It confirms that the continuous hyper-chaotic system can be simulated by the corresponding discrete version. Figure 2 shows the state responses of the slave system in the receiver. Figure 2 also shows that the state of the hyper-chaotic system is random and cannot be predicted. Figure 3 shows the synchronization error between the master and slave systems. Figures 4 and 5 show, respectively, the control inputs and the state responses of master–slave hyper-chaotic systems. We can see that the synchronization errors converge to zero due to the control input. It means that we can obtain the same chaotic random number simultaneously at both transmitter and receiver.
Fig. 1
Strange attractor of the discrete 4D LS hyper-chaotic system
Fig. 2
State responses of the slave discrete 4D LS hyper-chaotic system
Fig. 3
The time responses of synchronization errors
Fig. 4
The time responses of control inputs
Fig. 5
State responses of the master–slave discrete 4D LS systems
Strange attractor of the discrete 4D LS hyper-chaotic systemState responses of the slave discrete 4D LS hyper-chaotic systemThe time responses of synchronization errorsThe time responses of control inputsState responses of the master–slave discrete 4D LS systemsAfter verifying the synchronization, the design of chaos-based SDKGs is shown in Fig. 6.
Fig. 6
The structure of SDKGs
The structure of SDKGsIn Fig. 6, and are firstly calculated at the transmitter (Master systems) and transmitted to the receiver through the public channel. At the same time, and are also obtained at the receiver (Slave systems). And then the receiver integrates the received and with the local signals and to obtain the synchronization controller in (14) and achieve synchronization of master and slave chaotic systems embedded in the transmitter and receiver, respectively. Finally, the synchronized chaotic random numbers are inputted to the SHA3-256 algorithm to generate synchronized random number sequence with a fixed length of 256 bits, respectively, at the transmitter and receiver. Such SDKGs will be applied for data encryption applications.
Cryptosystems for video/audio streaming via SDKGs
In the previous discussion, due to the synchronization controller, the master and slave hyper-chaotic systems at the transmitter and receiver can be synchronized. Then, through the avalanche effect of the SHA3-256 algorithm, a SDKG can be established. After obtaining the synchronized dynamic keys, we can apply them to the communication security of video/audio streaming data. The structure of the cryptosystem is shown in Fig. 7, which includes Lorenz-Stenflo SDKGs and encryption/decryption mechanisms. After the hyper-chaotic system of User A is synchronized with that of user B, both users can send the data of captured images and sounds to the encryption/decryption mechanisms. The modified AES CFB algorithm with synchronized dynamic keys is used for encryption /decryption calculations, and then the ciphertext is sent to the receiver through the network for decryption and finally the original plaintexts of streaming video/audio are obtained at the receiver. The images are pre-converted to JPEG format to reduce the load of network transmission.
Fig. 7
The structure of cryptosystem
The structure of cryptosystemThe realization of the system is shown in Fig. 8. We use the Raspberry Pi and the computer as the platforms for User A and User B, respectively. Then use the network camera to capture audio and video, as shown in Fig. 7, and transmit the real-time video and audio of both users through the TCP (Transmission Control Protocol) protocol with the Internet channel. The data is encrypted/decrypted through the synchronous dynamic keys and the AES CFB algorithm designed in this paper to achieve real-time video/audio data secure transmission.
Fig. 8
The realization of the cryptosystem for video/audio streaming
The realization of the cryptosystem for video/audio streamingIn this cryptosystem as shown in Fig. 8, we further design a user interface. Users can build or join the streaming video conference room with their name and password as shown in Figs. 9 and 10, respectively. After confirming, users enter the window of the meeting room as shown in Fig. 11. The left image is the other user's image, and the upper right image is the user’s image. The bottom right is a list of all the users in this meeting room. Users can click ‘Leave’ in the upper left option to leave this meeting room. In addition, we also design the developer window to observe the system information. As shown in Figs. 12, 13, 14, 15, the dynamic keys, encrypted video, original audio signal and encrypted audio signal are displayed, respectively. The latest five dynamic random keys generated by SDKGs are shown in Fig. 12, and we can click ‘Pause’ or ‘Continue’ to update the dynamic key display; Fig. 13 shows the received encrypted image on the receiver, and it can be found that we cannot extract any information about original video image; the upper figure in Fig. 14 shows the received original audio data and the lower figure shows the Fourier spectrum of the audio data; the upper in Fig. 15 shows the un-decrypted audio signal, and the lower shows the Fourier spectrum of the un-decrypted sound signal, it can be observed that if it has not been decrypted, the sound is chaotic, and the Fourier spectrum is broad. Finally, in Figs. 16 and 17, we can have the actual video windows of the encryption/decryption in this system. The above results demonstrate that the proposed system with a synchronized 4D LS dynamic key generator can successfully perform dynamic encryption/decryption for video/audio stream data.
Fig. 9
Creating a meeting room
Fig. 10
Joining a meeting room
Fig. 11
Window of the meeting room
Fig. 12
Random dynamic keys
Fig. 13
Encrypted image
Fig. 14
The original audio signal
Fig. 15
The encrypted audio signal
Fig. 16
Window of user A
Fig. 17
Window of user B
Creating a meeting roomJoining a meeting roomWindow of the meeting roomRandom dynamic keysEncrypted imageThe original audio signalThe encrypted audio signalWindow of user AWindow of user B
Security analysis of SDKGs and chaos-based cryptosystem
This article integrates synchronized master–slave hyper-chaotic systems with the SHA3-256 algorithm to generate dynamic random keys. Then the dynamic keys are combined with the AES CFB encryption algorithm to complete the cryptosystem for the real-time video/audio stream. To ensure the security of this encryption technology, the statistical analysis, histogram, connected component analysis(CCA), information entropy (IE), and key spaces are calculated in the following. To test the randomness quality of the encrypted streaming video, a 512 × 512 picture is prepared as shown in Fig. 18a. In actual application, to reduce the network transmission, the image will be converted from the pixel array to the JPEG format. After the format conversion, the file size is reduced from 786,432 bytes to 54,236 bytes. It can reduce the processing time for encryption/decryption. Then the JPEG file is encrypted by AES CFB with dynamic keys. The results are shown in Fig. 18b, c with one static key and five dynamic keys, respectively. It can be found that the encrypted images have no obvious features, and finally, it is decrypted and converted back to a pixel array as shown in Fig. 18d. Furthermore, to test the security of the actual video streaming, we continuously capture 12 pictures as shown in Fig. 19 from the video streaming. Figures 19a and b are the first and last captured pictures, respectively. All pictures are with a size of 819,234 Bytes. Also, a pre-recorded audio file with the size of 819,234 Bytes is used to test the randomness.
Fig. 18
Picture files (a) original image (b) encrypted image by one key (c) encrypted image by five keys (d) decrypted image
Fig. 19
Real-time 12 images captured (a) The first one captured; b The last one captured
Picture files (a) original image (b) encrypted image by one key (c) encrypted image by five keys (d) decrypted imageReal-time 12 images captured (a) The first one captured; b The last one captured
NIST analysis
In this section, we introduce the National Institute of Standards and Technology (NIST) test suite [8] to evaluate the randomness of the dynamic random keys and encrypted data. This evaluation standard contains 15 items and the test result for every test item is called the p value. When the p value > 0.01, it means that the test item has passed. With a larger p value, it means the better randomness of the test data. We select the dynamic keys generated with the state of the chaotic system. The test results in Table 1 were obtained with a stream length of 6,553,872 bits and a bitstream count of 30. The captured pictures in Fig. 19 and pre-recorded sound file are encrypted with AES CFB and five dynamic keys. Obviously, all the test results shown in Table 1 pass the tests. The performance results of the traditional AES CFB only using a static key are shown in Table 2. According to the results in Tables 1 and 2, it shows that under the same conditions, the test results of the sound file and images using the dynamic keys are about 1.25 and 1.91 times, respectively, better than those with the static key. Furthermore, in Table 3, we compare the test results in this paper with those of other random number generators proposed in [29, 30]. The average score is as high as 7.31865, which is much higher than those obtained in [29, 30].
Table 1
NIST SP 800-22 test results of dynamic random keys and pre-recorded file
NIST SP 800-22 test results of dynamic random keys and pre-recorded fileNIST SP 800-22 test results of encrypted images and audio file with a static keyNIST SP 800–22 test results in [29, 30]
Histogram analysis
For an image, the histogram is an important statistical feature. A good cryptosystem can encrypt an image and the histogram of the cipher image is evenly distributed such that attackers could not analyze statistical features of the original image from its cipher image. Each pixel in the picture is between 0 and 255. Use the image as shown in Fig. 18a for the test. First, the histogram analysis for the grayscale image of the original image is shown in Fig. 20a. Figure 20b shows the histogram analysis for the image in JPEG format. It is observed that both Figs. 20a and b have obvious differences in some specific pixel values. The histogram of the cipher image by one static key and five dynamics keys are shown in Figs. 20c and d. From Figs. 20c and d, it demonstrates that the encryption could effectively eliminate the differences between the histogram information.
Fig. 20
Histogram analysis (a) the original image(b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five dynamic keys
Histogram analysis (a) the original image(b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five dynamic keysTo evaluate the uniform distribution of histograms, we calculate the variance of histogram [31] defined bywhere, and , are the number of pixel values i, j, respectively.Table 4 shows the variance of histograms in (15). The variance of the original image in Fig. 20a is extremely large, and it is reduced to 17,383 after being converted into JPEG format. When the traditional fixed key (static key) is used for the AES CFB encryption algorithm, it can be found that the variance is reduced to 232. However, with our encryption approach, the variance has been reduced to 202. The comparisons show that the proposed encryption method is effective to reduce the deviation of the picture and make it difficult to identify any features of the picture. Under the same conditions, compared with other proposed papers [32], we can find that our proposed encryption effect is very effective.
Table 4
The variance of histogram
The original image
The original image with JPEG format the cipher image
The cipher image by one key (static key)
The cipher image by five dynamic keys
[32]
Variance of histogram
6,443,335.6875
17,383.8787
232.2302
202.7537
1052.4
The variance of histogram
Connected component analysis(CCA)
Generally, for a plain image, there always exists a high correlation between adjacent pixels. Therefore, good encryption algorithms can result in smaller correlation values between adjacent pixels. We randomly select 3000 pixels from the information of plaint and encrypted images of image 1 in Figs. 18a–c. The correlation coefficients for the horizontal, vertical, and diagonal directions were calculated by using the following equations [33]:where, and denote the pixel values of the two adjacent pixels and N is the number of pair .In Fig. 21, it can be seen that the original picture is highly correlated; while the picture converted to JPEG format has a more even distribution, but there are still clusters on the upper right. However, the encrypted images with one key and five keys, respectively, are distributed randomly and uniformly. Detailed reports of the connected component analysis are given in Tables 5 and 6. According to Tables 5 and 6, it could be seen that the encrypted image with the proposed five dynamic keys had the lowest pixel correlation which is superior to the results in the previous reports [32, 34, 35].
Fig. 21
Connected component analysis (a) the original image (b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five keys
Table 5
Connected component analysis (N = 3000)
N
3000
Test image
The original image
The original image with JPEG format
The cipher image by one key (static key)
The cipher image by five keys
[32]
Horizontal
0.9699
− 0.0564
0.0085
0.0061
− 0.0685
Vertical
0.9864
0.0130
0.0033
0.0021
0.0857
Diagonal
0.9567
− 0.0157
− 0.0279
− 0.0045
0.0059
Absolute sum
2.913
0.0851
0.0397
0.0127
0.1601
Table 6
Connected component analysis (N = 10,000, 15,000)
N
10,000
15,000
Test image
The cipher image by five keys
[34]
The cipher image by five dynamic keys
[35]
Horizontal
0.0031
0.0067
0.0033
0.0846
Vertical
0.0077
0.0172
-0.0044
0.0583
Diagonal
0.0004
0.0147
-0.0083
0.0931
Absolute sum
0.0112
0.0386
0.0160
0.236
Connected component analysis (a) the original image (b) the original image with JPEG format (c) the cipher image by one key (static key) (d) the cipher image by five keysConnected component analysis (N = 3000)Connected component analysis (N = 10,000, 15,000)
Information entropy analysis
Information entropy is a measure of uncertainty. We can judge the randomness degree of an event by calculating the entropy value. For the encrypted image, a large entropy value implies a better encryption effect. The calculation method is given as follows [36]:where is the frequency of each greyscale For a grayscale image, the pixel has a data field of [0, 255] and the maximum value of IE will be 8. We use the pictures in Fig. 18a-c for analysis. The calculation results are shown in Table 7. The results indicate that the original image has the smallest entropy and the encrypted image is with the maximum value of 7.9911 by five keys which means that the encryption effect is good. Therefore, it could be concluded that the encrypted image possessed true random signal property and the proposed algorithm could resist entropy attacks.
Table 7
Information entropy analysis
The original image
The original image with JPEG format
The cipher image by one key (static key)
The cipher image by five dynamics keys
Entropy of picture
7.0004
7.7969
7.9906
7.9911
s
Information entropy analysiss
Keyspace analysis
In this paper, we introduce the discrete 4D LS hyper-chaotic system with four initial state variables. Therefore, the keyspace is when the calculation accuracy is . Furthermore, Since the dynamic key generator is integrated with the SHA3-256 algorithm with keyspace , the keyspace of dynamic keys generated with our method is which is large enough to resist the brute-force attack.
NPCR and UACI analysis
NPCR (Number of pixels change rate) and UACI (Unified average changing intensity) are often used to analyze the sensitivity of a plain image so that differential attacks can be resisted [37]. The formulas are defined as follows:where M and N are the width and height of encrypted images. and are, respectively, the pixels with the location of two ciphered images and . To perform NPCR and UACI tests, we continuously captured 12 images as shown in Fig. 19. After converting to JPEG format, each image randomly selected a pixel to increase or decrease by 1 and the original images and the slightly changed images can be encrypted with 5 dynamic keys proposed in the paper for testing. The results are shown in Table 8. According to the test results in Table 8, the average NPCR test is 99.6138%, while the UACI is 33.4700%. Furthermore, a comparison of NPCR and UACI tests of the proposed method and the others is given in Table 9. The comparison results reveal that the method proposed in this paper has better results in NPCR and UACI tests.
Table 8
NPCR and UACI analysis of Real-time captured images
Real-time captured images
NPCR (%)
UACI (%)
Image 1
99.6178
33.4323
Image 2
99.6123
33.4789
Image 3
99.6021
33.4996
Image 4
99.6160
33.5292
Image 5
99.6160
33.3588
Image 6
99.6177
33.6297
Image 7
99.6059
33.5444
Image 8
99.6121
33.2078
Image 9
99.6032
33.3816
Image 10
99.5968
33.4566
Image 11
99.6672
33.5706
Image 12
99.5979
33.5512
Total average
99.6138
33.4700
Table 9
Comparison of NPCR and UACI criteria of proposed method and the others
Test methods
NPCR (%)
UACI (%)
Proposed method
99.6138
33.4700
Ferdus et.al. [37]
99.5499
26.5199
Lin and Wu [38]
99.6096
33.4673
Gupta et al. [39]
99.5899
28.4899
Liu et al. [40]
99.6097
33.4557
Zheng et al. [41]
99.5969
33.4599
Patro et al. [42]
99.6091
33.4914
Bisht et al. [43]
99.7024
27.9796
NPCR and UACI analysis of Real-time captured imagesComparison of NPCR and UACI criteria of proposed method and the others
Conclusions
In this paper, a novel design of random number generators has been firstly proposed by integrating the chaos random property and the avalanche effect of SHA3-256. Then by the design of the synchronization controller of master–slave hyper-chaotic systems, the dynamic random keys can simultaneously be generated at both transmitter and receiver. Continuously, an improved AES CFB encryption algorithm with dynamic random keys is realized to encrypt /decrypt streaming audio/video data. In addition, several tests and analyses, such as visual effect, statistical analysis, histogram, information entropy analysis, keyspace analysis were all performed to show the capability and security of the improved chaos-based AES CFB algorithm.
Authors: Frank Arute; Kunal Arya; Ryan Babbush; Dave Bacon; Joseph C Bardin; Rami Barends; Rupak Biswas; Sergio Boixo; Fernando G S L Brandao; David A Buell; Brian Burkett; Yu Chen; Zijun Chen; Ben Chiaro; Roberto Collins; William Courtney; Andrew Dunsworth; Edward Farhi; Brooks Foxen; Austin Fowler; Craig Gidney; Marissa Giustina; Rob Graff; Keith Guerin; Steve Habegger; Matthew P Harrigan; Michael J Hartmann; Alan Ho; Markus Hoffmann; Trent Huang; Travis S Humble; Sergei V Isakov; Evan Jeffrey; Zhang Jiang; Dvir Kafri; Kostyantyn Kechedzhi; Julian Kelly; Paul V Klimov; Sergey Knysh; Alexander Korotkov; Fedor Kostritsa; David Landhuis; Mike Lindmark; Erik Lucero; Dmitry Lyakh; Salvatore Mandrà; Jarrod R McClean; Matthew McEwen; Anthony Megrant; Xiao Mi; Kristel Michielsen; Masoud Mohseni; Josh Mutus; Ofer Naaman; Matthew Neeley; Charles Neill; Murphy Yuezhen Niu; Eric Ostby; Andre Petukhov; John C Platt; Chris Quintana; Eleanor G Rieffel; Pedram Roushan; Nicholas C Rubin; Daniel Sank; Kevin J Satzinger; Vadim Smelyanskiy; Kevin J Sung; Matthew D Trevithick; Amit Vainsencher; Benjamin Villalonga; Theodore White; Z Jamie Yao; Ping Yeh; Adam Zalcman; Hartmut Neven; John M Martinis Journal: Nature Date: 2019-10-23 Impact factor: 49.962