Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher

In this paper, an algorithm is proposed for real-time image encryption. This scheme employs a dual chaotic generator based on a three-dimensional discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the image data are injected into the dynamics of a master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the image data can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the encrypted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the image data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.

[1]  Julyan H. E. Cartwright,et al.  THE DYNAMICS OF RUNGE–KUTTA METHODS , 1992 .

[2]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[3]  Samrat L. Sabat,et al.  A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..

[4]  Gonzalo Álvarez,et al.  Cryptanalysis of a chaotic block cipher with external key and its improved version , 2006, ArXiv.

[5]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[6]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[7]  A. Kanso,et al.  A novel image encryption algorithm based on a 3D chaotic map , 2012 .

[8]  Lequan Min,et al.  A Generalized Synchronization Theorem for an Array of Differential Equations with Application to Secure Communication , 2005, Int. J. Bifurc. Chaos.

[9]  Zhongmeng Zhao,et al.  An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.

[10]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[11]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[12]  F. Christiansen,et al.  Computing Lyapunov spectra with continuous Gram - Schmidt orthonormalization , 1996, chao-dyn/9611014.

[13]  Hanping Hu,et al.  Analyzing and improving a chaotic encryption method , 2004 .

[14]  R. Eykholt,et al.  Estimating the Lyapunov-exponent spectrum from short time series of low precision. , 1991, Physical review letters.

[15]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[16]  Michael Peter Kennedy,et al.  Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .

[17]  X. Niu,et al.  A hybrid chaotic system and cyclic elliptic curve for image encryption , 2013 .

[18]  Brown,et al.  Computing the Lyapunov spectrum of a dynamical system from an observed time series. , 1991, Physical review. A, Atomic, molecular, and optical physics.

[19]  A. Wolf,et al.  Determining Lyapunov exponents from a time series , 1985 .

[20]  Xiaoling Huang,et al.  An efficient self-adaptive model for chaotic image encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[21]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[22]  John C. Butcher,et al.  A history of Runge-Kutta methods , 1996 .

[23]  Louis M. Pecora,et al.  Synchronizing chaotic circuits , 1991 .

[24]  T. Aaron Gulliver,et al.  A new 3D chaotic cipher for encrypting two data streams simultaneously , 2015, Nonlinear Dynamics.

[25]  Chun-Mei Yang,et al.  Cryptanalyzing chaotic secure communications using return maps , 1998 .

[26]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[27]  Shujun Li,et al.  Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .

[28]  Kazuyuki Aihara,et al.  Dynamical Characteristics of Discretized Chaotic Permutations , 2002, Int. J. Bifurc. Chaos.

[29]  Sattar Mirzakuchaki,et al.  A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..

[30]  Ljupco Kocarev,et al.  General approach for chaotic synchronization with applications to communication. , 1995, Physical review letters.

[31]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[32]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[33]  Mohamed I. Sobhy,et al.  Secure Computer Communication using Chaotic Algorithms , 2000, Int. J. Bifurc. Chaos.

[34]  Gonzalo Alvarez,et al.  A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis , 2010, Communications in Nonlinear Science and Numerical Simulation.

[35]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[36]  Guanrong Chen,et al.  On the security defects of an image encryption scheme , 2009, Image Vis. Comput..

[37]  Hassan N. Noura,et al.  An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..

[38]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[39]  Mohammad Reza Mosavi,et al.  A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process , 2012, Multimedia Tools and Applications.

[40]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[41]  Kwok-Wo Wong,et al.  A chaotic image encryption scheme owning temp-value feedback , 2013, Commun. Nonlinear Sci. Numer. Simul..

[42]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.