Reduction of Dynamical Degradation in Chaotic Image Encryption System by Coupling Multiple Chaotic Maps and Perturbation

Secure multimedia communication presents new challenges that are difficult to handle by using the currently adopted encryption methods. Chaotic encryption is a new direction of cryptography. It uses chaotic system properties such as sensitivity to initial condition and loss of information. In order to reach higher performance, these methods take advantage of the more and more complex behavior of chaos. Since digital computers deal with finite precision, when chaos is realized in digital computers, generation of pure random numbers (true chaotic sequence) is almost impossible. In this paper, real numbers have been generated from a chaotic map and are then converted into 8 bit and 32 bit numbers to accomplish image encryption and decryption. It is reported that encryption security becomes system specific and if an 8 bit encryption system is designed with increased security level and minimised dynamical degradation, the algorithm will get a wide area of application (e.g. 8 bit systems). The proposed 8 bit algorithm uses two tent maps to enhance the security level. It is also shown that the new algorithm increases the cryptanalytic complexity to the known plaintext attack. A comparison in terms of some well defined metrics is also done.

[1]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[2]  Gonzalo Alvarez,et al.  Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[3]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[4]  Kwok-Wo Wong,et al.  A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.

[5]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[6]  Osama S. Faragallah,et al.  An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.

[7]  J. Yorke,et al.  Period Three Implies Chaos , 1975 .

[8]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[9]  O. Rössler An equation for continuous chaos , 1976 .

[10]  G. Álvarez,et al.  Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.

[11]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[12]  M. Hénon,et al.  A two-dimensional mapping with a strange attractor , 1976 .

[13]  L. Horwitz,et al.  BE A STRANGE ATTRACTOR ? , 2004 .

[14]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[15]  M. Gotz,et al.  Discrete-time chaotic encryption systems. I. Statistical design approach , 1997 .

[16]  Guanrong Chen,et al.  Chaos-Based Image Encryption , 2005 .

[17]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[18]  Long Min,et al.  An image encryption algorithm based on mixed chaotic dynamic systems and external keys , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..

[19]  Ljupco Kocarev,et al.  From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[20]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[21]  M. Feigenbaum Quantitative universality for a class of nonlinear transformations , 1978 .

[22]  A. N. Sharkovskiĭ COEXISTENCE OF CYCLES OF A CONTINUOUS MAP OF THE LINE INTO ITSELF , 1995 .

[23]  D. Chattopadhyay,et al.  Robust Chaotic Image Encryption based on Perturbation Technique , 2011 .

[24]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[25]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[26]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[27]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[28]  Henri Poincaré,et al.  New methods of celestial mechanics , 1967 .

[29]  Shujun Li,et al.  Analyses and New Designs of Digital Chaotic Ciphers , 2003 .

[30]  L. Chua,et al.  CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .