A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators

In this work, we proposed a new approach to encrypt color images using two matrices with size of 16 × 16 whose integer values are between 0 and 255 generated randomly, and the bit-shift operators. These matrices are used to perform the first encryption phase. The first value of the first matrix is calculated from the pixels of each channel (red, green and blue) of the original image; the rest of the values are randomly generated; each value must be unique; the values of the second matrix are unique and generated randomly. The first encryption phase of the original image is done by digraph (two-digit sequence). We take the first digit in the first matrix, the second digit in the second matrix; then, we look in these matrices for the numbers that complete the rectangle. In the second encryption phase, we used a right circular shift of bits; the number of bits to shift is calculated according to a function which considers the values of the two matrices as well as their positions (row and column). Therefore, any change in the two keys (two matrices) will completely change the encrypted image. Our encryption system is resistant against brute force attacks, statistical attacks as well as differential attacks. The results are justified by applying several safety criteria, such as correlation coefficient, entropy and peak signal-to-noise ratio (PSNR). In addition, our method is very sensitive to the change made, either in the original image or in the two keys used for the encryption, which was justified by calculating the number of changing pixel rate (NPCR > 99.69) and the unified averaged changed intensity (UACI > 33.54).

[1]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[2]  Xiaogang Wu,et al.  Parameter estimation only from the symbolic sequences generated by chaos system , 2004 .

[3]  Junjie Lu,et al.  A NOVEL FRACTIONAL-ORDER HYPERCHAOTIC SYSTEM AND ITS CIRCUIT REALIZATION , 2010 .

[4]  Mohammad Reza Mosavi,et al.  A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.

[5]  Eun-Soo Kim,et al.  A novel three-dimensional digital watermarking scheme basing on integral imaging , 2007 .

[6]  Narendra Singh,et al.  Optical image encryption using fractional Fourier transform and chaos , 2008 .

[7]  Guanrong Chen,et al.  On the security defects of an image encryption scheme , 2009, Image Vis. Comput..

[8]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[9]  H. Weidenmuller,et al.  Random Matrices and Chaos in Nuclear Physics , 2008, 0807.1070.

[10]  Eun-Soo Kim,et al.  Robust image encryption by combined use of integral imaging and pixel scrambling techniques , 2009 .

[11]  Annick Lesne Chaos in biology. , 2006 .

[12]  Xing-yuan Wang,et al.  A new image alternate encryption algorithm based on chaotic map , 2014, Nonlinear Dynamics.

[13]  X. Tong,et al.  An image encryption algorithm based on the perturbed high-dimensional chaotic map , 2015, Nonlinear Dynamics.

[14]  Xiaogang Wang,et al.  Image encryption based on extended fractional Fourier transform and digital holography technique , 2006 .

[15]  Adrian Skrobek Cryptanalysis of chaotic stream cipher , 2007 .

[16]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[17]  Khalid Satori,et al.  A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher , 2018, BDCA.

[18]  Mohammad Eshghi,et al.  Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.

[19]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[20]  Zhu Wang,et al.  A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator , 2009 .

[21]  Khalid Satori,et al.  Grayscale image encryption using shift bits operations , 2018, 2018 International Conference on Intelligent Systems and Computer Vision (ISCV).

[22]  Ling Lü,et al.  Study on spatiotemporal chaos tracking synchronization of a class of complex network , 2012 .

[23]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[24]  Ling Cong,et al.  A general efficient method for chaotic signal estimation , 1999 .