Spatial image encryption algorithm based on chaotic map and pixel frequency

Images, as a multimedia resource, for example, medical, education, sensing, and military images, have been playing an important role in digital information communications. To prevent unauthorized access and protect the security of an image, a direct approach is to encrypt the image [1, 2] to hide its information. Chaotic maps (systems) have some excellent inherent properties [3,4], such as nonlinearity, sensitivity to initial conditions, and ergodicity. Therefore, they have received increasing attention and have been widely used in image encryption schemes. Tong et al. [5] proposed a hyper-chaotic system-based image encryption scheme together with data compression. A discrete cosine transformation dictionary was used to sparsely represent the plain-image, followed by a diffusion operation, to implement the encryption. In this scheme, however, the plain-image cannot be fully recovered due to the compression of data. To balance security and efficiency in designing a chaos-based image encryption algorithm, the image encryption scheme presented in [6] simulates a one-time pad design. In this scheme, with a key of 256 fixed bits and 128 random bits, a chaotic map was iterated to generate four chaotic sequences. Then, pixels with scrambling and value transformation were used to encrypt the plainimage. However, the keystreams were produced independent of the plain-image. Aiming to enhance security, many algorithms have also been proposed with the help of chaotic maps or systems, for example, DNA and SHA3. Unfortunately, many algorithms, such as [3], have been found to be insecure. Main reasons include: (1) only one round of permutation, (2) only one round of diffusion, (3) keystream generated independent of the plain-image, and (4) small key space. Higher-dimensional chaotic maps or systems, and quantum maps for generating random sequences have been proposed to resolve the small key space problem by using more initial conditions as inputs. Using two or more rounds of encryption, and making the keystreams dependent on the plain-images, seem to show higher security. Yet, most of these algorithms suffer from unsatisfactory sensitivity to the plain-image [7] due to the invariance of the pixel summation. Moreover, some need extra information transmissions [8]. In this article, considering the aforementioned technical issues, the use of random confusion for the plain-image is suggested, with the help of pixel frequency, followed by double diffusion operations to change the pixel distribution. The keystreams used in both stages of confusion and diffusion are produced in dependence on the plain-image. The pixel frequency is introduced to produce a random sequence in the confusion stage and select a chaotic sequence in the diffusion stage, with respect to different plain-images. As a result, the knownplaintext and chosen-plaintext attacks are infea-

[1]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[2]  Fenlin Liu,et al.  An Image Encryption Algorithm Based on Information Hiding , 2016, Int. J. Bifurc. Chaos.

[3]  Zhu Wang,et al.  A joint color image encryption and compression scheme based on hyper-chaotic system , 2016, Nonlinear Dynamics.

[4]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[5]  Ali Emre Pusane,et al.  An Integrated Dual Entropy Core True Random Number Generator , 2017, IEEE Transactions on Circuits and Systems II: Express Briefs.

[6]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[7]  Yang Lu,et al.  A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system , 2016 .

[8]  Tao Xiang,et al.  Multi-focus image fusion and robust encryption algorithm based on compressive sensing , 2017 .

[9]  Ziba Eslami,et al.  An improvement over an image encryption method based on total shuffling , 2013 .

[10]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[11]  Zhiliang Zhu,et al.  Reusing the permutation matrix dynamically for efficient image cryptographic algorithm , 2015, Signal Process..

[12]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[13]  Xiaojun Tong,et al.  Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation , 2010, Science in China Series F: Information Sciences.

[14]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[15]  Xiaoling Huang,et al.  An Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2016, IEEE MultiMedia.

[16]  Yueping Li,et al.  A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation , 2017 .

[17]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[18]  Xin-Wen Wu,et al.  On the Security of Permutation-Only Image Encryption Schemes , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Mariusz Dzwonkowski,et al.  A New Quaternion-Based Encryption Method for DICOM Images , 2015, IEEE Transactions on Image Processing.

[20]  Abdennaceur Kachouri,et al.  Hash key-based image encryption using crossover operator and chaos , 2015, Multimedia Tools and Applications.

[21]  Xing-yuan Wang,et al.  Image encryption scheme using chaos and simulated annealing algorithm , 2016 .