Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption

Abstract —Recently, a pixel-chaotic-shuffling (PCS) method has been proposed by Huang et al. for encrypting color images using multiple chaotic systems like the Henon, the Lorenz, the Chua, and the Rossler systems. All of which have great encryption performance. The authors claimed that their pixel-chaotic-shuffle (PCS) encryption method has high confidential security. However, the security analysis of the PCS method against the chosen-plaintext attack (CPA) and known-plaintext attack (KPA) performed by Solak et al. successfully breaks the PCS encryption scheme without knowing the secret key. In this paper we present an improved shuffling pattern for the plaintext image bits to make the cryptosystem proposed by Huang et al. resistant to chosen-plaintext attack and known-plaintext attack. The modifications in the existing PCS encryption method are proposed to improve its security performance against the potential attacks described above. The Number of Pixel Change Rate (NPCR), Unified Average Changed Intensity (UACI), information entropy, and correlation coefficient analysis are performed to evaluate the statistical performance of the modified PCS method. The simulation analysis reveals that the modified PCS method has better statistical features and is more resistant to attacks than Huang et al.’s PCS method.

[1]  H. H. Nien,et al.  Digital color image encoding and decoding using a novel chaotic random generator , 2007 .

[2]  K.Sakthidasan Sankaran,et al.  A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images , 2011 .

[3]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[4]  Ennio Gambi,et al.  A new chaotic algorithm for video encryption , 2002, IEEE Trans. Consumer Electron..

[5]  Chen Juan,et al.  An image encryption algorithm based on spatiotemporal chaos in DCT domain , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.

[6]  Khaled A. Al-Utaibi,et al.  An Encryption Scheme for Color Images Based on Chaotic Maps and Genetic Operators , 2011, ICNS 2011.

[7]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[8]  S. Lian,et al.  Efficient image or video encryption based on spatiotemporal chaos system , 2009 .

[9]  M. Baptista Cryptography with chaos , 1998 .

[10]  Nenghai Yu,et al.  A robust chaos-based image encryption scheme , 2009, 2009 IEEE International Conference on Multimedia and Expo.

[11]  Chong Fu,et al.  An Improved Image Encryption Algorithm Based on Chaotic Maps , 2007, Third International Conference on Natural Computation (ICNC 2007).

[12]  Shuguo Yang,et al.  A video encryption method based on chaotic maps in DCT domain , 2008 .

[13]  Rhouma Rhouma,et al.  Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .

[14]  Yikui Zhai,et al.  Improving Image Encryption Using Multi-Chaotic Map , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.

[15]  L. P. L. D. Oliveira,et al.  Cryptography with chaotic mixing , 2008 .

[16]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[17]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[18]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[19]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[20]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[21]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[22]  Musheer Ahmad,et al.  A Multi-Level Blocks Scrambling Based Chaotic Image Cipher , 2010, IC3.

[23]  Safya Belghith,et al.  Cryptanalysis of a multi-chaotic systems based image cryptosystem , 2010 .

[24]  Kai Wang,et al.  On the security of 3D Cat map based symmetric image encryption scheme , 2005 .

[25]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .