Performance Analysis of Image Encryption Methods Using Chaotic, Multiple Chaotic and Hyper-Chaotic Maps

Image Encryption is widely used to construct sensitive hidden information through insecure public networks which could only be accessed by the receiver. The plain image is encrypted using chaotic maps and cipher image is produced thereon. Symmetric keys are used for encrypting and decrypting the image. The challenges involved in the image encryption schemes are one dimensional logistic map having periodic windowing, selection of control parameter values, unsuitable key stream generation, more number of rounds in image encryption and image encryption with limited randomness. These issues are properly addressed and solved by using multiple chaotic maps and multiple hyper-chaotic maps through encryption techniques. Image encryption using multiple chaotic maps enhances correlation and entropy level to establish uniform distribution of histogram and differential attack analysis. The performance analysis metrics such as key space analysis, histogram analysis, correlation coefficient analysis, differential attack analysis information entropy analysis etc., are conducted and compared. The experimental analysis proves that the hyper-chaotic map based encryption method is more resourceful than the chaotic based encryption.

[1]  José María Sierra,et al.  The strict avalanche criterion randomness test , 2005, Math. Comput. Simul..

[2]  Xiangde Zhang,et al.  A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem , 2013, Signal Process. Image Commun..

[3]  Kwok-Wo Wong,et al.  A combined chaotic cryptographic and hashing scheme , 2003 .

[4]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[5]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[6]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[7]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[8]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[9]  X. Liao,et al.  An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps , 2007 .

[10]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[11]  Aloka Sinha,et al.  Chaos based multiple image encryption using multiple canonical transforms , 2010 .

[12]  A. Palacios,et al.  Cryptography with cycling chaos , 2002 .

[13]  Zhenjun Tang,et al.  Multiple-image encryption with bit-plane decomposition and chaotic maps , 2016 .

[14]  Salwa K. Abd-El-Hafiz,et al.  Novel permutation measures for image encryption algorithms , 2016 .

[15]  Mohammad Reza Mosavi,et al.  A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos , 2013, Multimedia Tools and Applications.

[16]  Yicong Zhou,et al.  Image encryption using a new parametric switching chaotic system , 2013, Signal Process..

[17]  Sara Tedmori,et al.  Image cryptographic algorithm based on the Haar wavelet transform , 2014, Inf. Sci..

[18]  Zhongmeng Zhao,et al.  Chaotic image encryption based on circular substitution box and key stream buffer , 2014, Signal Process. Image Commun..

[19]  曹晖,et al.  A new four-dimensional hyperchaotic Lorenz system and its adaptive control , 2011 .

[20]  Réjane Forré,et al.  The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition , 1988, CRYPTO.

[21]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[22]  L. Chua,et al.  A METHOD FOR ENCODING MESSAGES BY TIME TARGETING OF THE TRAJECTORIES OF CHAOTIC SYSTEMS , 1996 .

[23]  René Lozi,et al.  Emergence of Randomness from Chaos , 2012, Int. J. Bifurc. Chaos.

[24]  Shujun Li,et al.  Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding , 2001, IMACC.

[25]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[26]  Yousef Farid,et al.  A robust hybrid method for image encryption based on Hopfield neural network , 2012, Comput. Electr. Eng..

[27]  S. Ramakrishnan,et al.  Chaotic Image Encryption with Hash Keying as Key Generator , 2017 .

[28]  Dominique Barchiesi,et al.  A new image encryption scheme based on a chaotic function , 2012, Signal Process. Image Commun..

[29]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[30]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[31]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[32]  L. Chua,et al.  Chaos: A tutorial for engineers , 1987, Proceedings of the IEEE.

[33]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[34]  Kwok-Wo Wong,et al.  Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.

[35]  M. Baptista Cryptography with chaos , 1998 .

[36]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[37]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[38]  Seong Oun Hwang,et al.  Chaos-based diffusion for highly autocorrelated data in encryption algorithms , 2015, Nonlinear Dynamics.

[39]  Kwok-Wo Wong,et al.  A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..

[40]  Kwok-Wo Wong,et al.  A fast image encryption and authentication scheme based on chaotic maps , 2010 .

[41]  Rached Tourki,et al.  A Modified AES Based Algorithm for Image Encryption , 2007 .

[42]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[43]  Kwok-Wo Wong,et al.  A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.

[44]  Jia Liu,et al.  An image encryption scheme based on the MLNCML system using DNA sequences , 2016 .

[45]  G. Álvarez,et al.  Cryptanalysis of dynamic look-up table based chaotic cryptosystems , 2003, nlin/0311043.

[46]  K. Wong,et al.  A fast chaotic cryptographic scheme with dynamic look-up table , 2002 .

[47]  Safwan El Assad,et al.  A new chaos-based image encryption system , 2016, Signal Process. Image Commun..

[48]  Amit Kumar Singh,et al.  Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.

[49]  Bruce Schneier,et al.  A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS , 2000, Cryptologia.

[50]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[51]  Chang'e Dong,et al.  Color image encryption using one-time keys and coupled chaotic systems , 2014, Signal Process. Image Commun..

[52]  Kwok-wo Wong,et al.  A modified chaotic cryptographic method , 2001 .

[53]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .