A Novel Image Encryption Scheme Based on Clifford Attractor and Noisy Logistic Map for Secure Transferring Images in Navy

Abstract Cryptography is a science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. Today, many algorithms have been proposed for image encryption, but the chaotic encryption methods have a good combination of speed and high security. In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. In the chaotic confusion stage, a combination of the chaotic maps is used to realize the confusion of all pixels. In this paper, we first give a brief introduction into chaotic image encryption and then we investigate some important properties and behaviour of the logistic map. The logistic map, aperiodic trajectory, or random-like fluctuation, could not be obtained with some choice of initial condition. Therefore, a noisy logistic map with an additive system noise is introduced. The proposed scheme is based on the extended map of the Clifford strange attractor, where each dimension has a specific role in the encryption process. Two dimensions are used for pixel permutation and the third dimension is used for pixel diffusion. In order to optimize the Clifford encryption system we increase the space key by using the noisy logistic map and a novel encryption scheme based on the Clifford attractor and the noisy logistic map for secure transfer images is proposed. This algorithm consists of two parts: the noisy logistic map shuffle of the pixel position and the pixel value. We use times for shuffling the pixel position and value then we generate the new pixel position and value by the Clifford system. To illustrate the efficiency of the proposed scheme, various types of security analysis are tested. It can be concluded that the proposed image encryption system is a suitable choice for practical applications.

[1]  Xiaolin Wu,et al.  Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[2]  Sos S. Agaian,et al.  Shannon Entropy based Randomness Measurement and Test for Image Encryption , 2011, Inf. Sci..

[3]  Kyoung-Joung Lee,et al.  SVM Classifier for the Detection of Ventricular Fibrillation , 2005 .

[4]  Clifford A. Pickover,et al.  A note on rendering 3-D strange-attractors , 1988, Comput. Graph..

[5]  Ivan Zelinka,et al.  Evolutionary Algorithms and Chaotic Systems , 2010, Evolutionary Algorithms and Chaotic Systems.

[6]  Park Sung-Ho,et al.  Ciphering Scheme and Hardware Implementation for MPEG-based Image/Video Security , 2005 .

[7]  Lei Yang,et al.  A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models , 2012 .

[8]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[9]  Sos S. Agaian,et al.  Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..

[10]  Xiao Liu,et al.  A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .

[11]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[12]  N. K. Pareek,et al.  Modified substitution-diffusion image cipher using chaotic standard and logistic maps , 2010 .

[13]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[14]  M. Baptista Cryptography with chaos , 1998 .

[15]  Xing-yuan Wang,et al.  A new image alternate encryption algorithm based on chaotic map , 2014, Nonlinear Dynamics.

[16]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[17]  C. M. Place Dynamical Systems: Differential Equations, Maps, and Chaotic Behaviour , 1992 .

[18]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[19]  Sos S. Agaian,et al.  Design of image cipher using latin squares , 2014, Inf. Sci..

[20]  Julien Clinton Sprott,et al.  How common is chaos , 1993 .

[21]  Brian Dangerfield,et al.  Complex systems in finance and econometrics , 2011 .

[22]  Dong-Wook Kim,et al.  Efficient Encryption Technique of Image using Packetized Discrete Wavelet Transform , 2013 .

[23]  J. Sprott Strange Attractors: Creating Patterns in Chaos , 1993 .

[24]  Stefano Zucca,et al.  Numerical assessment of friction damping at turbine blade root joints by simultaneous calculation of the static and dynamic contact loads , 2012 .

[25]  Andreas Uhl,et al.  Wavelet packet methods for multimedia compression and encryption , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).

[26]  Ghassan Al-Regib,et al.  Improved selective encryption techniques for secure transmission of MPEG video bit-streams , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).