A fractal-based image encryption system

This study introduces a novel image encryption system based on diffusion and confusion processes in which the image information is hidden inside the complex details of fractal images. A simplified encryption technique is, first, presented using a single-fractal image and statistical analysis is performed. A general encryption system utilising multiple fractal images is, then, introduced to improve the performance and increase the encryption key up to hundreds of bits. This improvement is achieved through several parameters: feedback delay, multiplexing and independent horizontal or vertical shifts. The effect of each parameter is studied separately and, then, they are combined to illustrate their influence on the encryption quality. The encryption quality is evaluated using different analysis techniques such as correlation coefficients, differential attack measures, histogram distributions, key sensitivity analysis and the National Institute of Standards and Technology (NIST) statistical test suite. The obtained results show great potential compared to other techniques.

[1]  Sos S. Agaian,et al.  Fractal steganography using artificially generated images , 2008, SPIE Defense + Commercial Sensing.

[2]  Xing-yuan Wang,et al.  A new compound mode of confusion and diffusion for block encryption of image based on chaos , 2010 .

[3]  Ahmed G. Radwan,et al.  Generalized Hardware Post‐processing Technique for Chaos‐Based Pseudorandom Number Generators , 2013 .

[4]  A. Radwan,et al.  Image encryption in the fractional-order domain , 2012, 2012 International Conference on Engineering and Technology (ICET).

[5]  Chin-Chen Chang,et al.  A DCT-domain system for hiding fractal compressed images , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[6]  Yu Zhang,et al.  A Steganography Scheme Based on Fractal Images , 2011, 2011 Second International Conference on Networking and Distributed Computing.

[7]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[8]  Hongjun Liu,et al.  Triple-image encryption scheme based on one-time key stream generated by chaos and plain images , 2013, J. Syst. Softw..

[9]  Bulusu Rama,et al.  Game-enabling the 3D-Mandelbulb Fractal by adding Velocity-induced Support Vectors , 2012 .

[10]  Xingyuan Wang,et al.  A novel image encryption algorithm using chaos and reversible cellular automata , 2013, Commun. Nonlinear Sci. Numer. Simul..

[11]  Yuan-yuan Sun,et al.  An Image Encryption Algorithm Utilizing Mandelbrot Set , 2010, 2010 International Workshop on Chaos-Fractal Theories and Applications.

[12]  Salwa K. Abd-El-Hafiz Efficient Detection of Function Clones in Software Systems using the Fractal Dimension and Metrics , 2011 .

[13]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[14]  Zhenfeng Zhang,et al.  Chaotic encryption algorithm based on alternant of stream cipher and block cipher , 2011 .

[15]  Ahmed A. Abd El-Latif,et al.  A chaotic block cipher algorithm for image cryptosystems , 2010 .

[16]  M. Keyvanpour,et al.  A new encryption method for secure embedding in image watermarking , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[17]  Guanrong Chen,et al.  Chaos-Based Image Encryption , 2005 .

[18]  Mamta Juneja,et al.  Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[19]  Claudia Feregrino Uribe,et al.  Watermarking Based on Iterated Function Systems , 2009, 2009 Mexican International Conference on Computer Science.

[20]  A. Radwan,et al.  MOS realization of the modified Lorenz chaotic system , 2004 .

[21]  Ahmed S. Elwakil,et al.  1-d digitally-Controlled multiscroll Chaos Generator , 2007, Int. J. Bifurc. Chaos.

[22]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[23]  Xiaoling Huang,et al.  Image encryption algorithm using chaotic Chebyshev generator , 2011, Nonlinear Dynamics.

[24]  Mohammed Affan Zidan,et al.  Random number generation based on digital differential chaos , 2011, 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).

[25]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[26]  Paul S. Addison,et al.  Fractals and Chaos: An Illustrated Course , 1997 .

[27]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[28]  Donald M. Monro,et al.  Rendering algorithms for deterministic fractals , 1995, IEEE Computer Graphics and Applications.

[29]  M. Khedr,et al.  A hybrid fractal-wavelet data hiding technique , 2008, 2008 National Radio Science Conference.

[30]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[31]  Azman Samsudin,et al.  Compression-Encryption Based on Fractal Geometric , 2010, 2010 Second International Conference on Computer Research and Development.

[32]  J. Hoffstein,et al.  An introduction to mathematical cryptography , 2008 .

[33]  Nadia M. G. Al-Saidi,et al.  Using IFS as an Encryption Method , 2009, 2009 International Conference on Education Technology and Computer.

[34]  C. King Exploding the Dark Heart of Chaos: Part III , 2012 .

[35]  Salwa K. Abd-El-Hafiz,et al.  A Metrics-Based Data Mining Approach for Software Clone Detection , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.