Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator

The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved. A new image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and an image pixel permutation, 3D baker scheme is described in detail. In the scheme a new dynamic block dividing of the 3D baker scheme is put forward using the compound chaotic map. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to compound chaos with 2D baker and DES encryption methods, we come to the conclusion that the new image encryption method with speed and high security solves the problem unable to resist chosen plaintext attack and low precision of one-dimensional chaotic function by perturbation.

[1]  Josef Scharinger Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.

[2]  Philip Ogunbona,et al.  Securing wavelet compression with random permutations , 2000 .

[3]  Guanrong Chen,et al.  A stream cipher based on a spatiotemporal chaotic system , 2007 .

[4]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[5]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[6]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[7]  L. Kocarev,et al.  Chaos-based random number generators-part I: analysis [cryptography] , 2001 .

[8]  M. Gotz,et al.  Discrete-time chaotic encryption systems. I. Statistical design approach , 1997 .

[9]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[10]  Z. Kotulski,et al.  APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD , 1999 .

[11]  Steven C. Wheelwright,et al.  Forecasting methods and applications. , 1979 .

[12]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[13]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[14]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[15]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[16]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[17]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[18]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[19]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[20]  Xiaogang Wu,et al.  Parameter estimation only from the symbolic sequences generated by chaos system , 2004 .

[21]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[22]  Chin-Chen Chang,et al.  A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..

[23]  Wolfgang A. Halang,et al.  Analysis of a Multiple-Output Pseudo-Random-Bit Generator Based on a Spatiotemporal Chaotic System , 2006, Int. J. Bifurc. Chaos.

[24]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[25]  C. Mira,et al.  Chaotic Dynamics: From the One-Dimensional Endomorphism to the Two-Dimensional Diffeomorphism , 1987 .

[26]  Kevin M. Short,et al.  Steps Toward Unmasking Secure Communications , 1994 .

[27]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[28]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[29]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[30]  Xiaojun Tong,et al.  Image encryption with compound chaotic sequence cipher shifting dynamically , 2008, Image Vis. Comput..

[31]  Daniel D. Wheeler,et al.  Supercomputer Investigations of a Chaotic Encryption Algorithm , 1991, Cryptologia.