An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives

With the spread of digital images, the security of these data has become a serious problem. In this study, an image encryption algorithm is designed to ensure the confidentiality of digital images. The original aspect of the proposed algorithm is that it has an architecture that combines unpredictable and random-like features of chaotic systems and cryptographic primitives that have been proven as a result of many years of research. By making use of the advantages of chaotic systems, it has provided the design of an image encryption algorithm that is more resistant to application attacks than mathematical designs. Analysis results and security evaluations have shown that the proposed method can be used successfully in many applications related to security of digital image.

[1]  Fatih Özkaynak,et al.  Cryptographically secure random number generator with chaotic additional input , 2014 .

[2]  Yingqian Zhang,et al.  An Image Encryption Algorithm Based on Josephus Traversing and Mixed Chaotic Map , 2018, IEEE Access.

[3]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[4]  Mihir Bellare,et al.  Practice-Oriented Provable-Security , 1997, ISW.

[5]  R. Povinelli,et al.  Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .

[6]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[7]  Zilan Pan,et al.  Optical Cryptography-Based Temporal Ghost Imaging With Chaotic Laser , 2017, IEEE Photonics Technology Letters.

[8]  Zheng Zhou,et al.  An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding , 2018, IEEE Photonics Journal.

[9]  Matthew J. B. Robshaw,et al.  The Block Cipher Companion , 2011, Information Security and Cryptography.

[10]  Fatih Özkaynak,et al.  Security Problems of Chaotic Image Encryption Algorithms Based on Cryptanalysis Driven Design Technique , 2019, IEEE Access.

[11]  Fatih Ozkaynak,et al.  A Provable Secure Image Encryption Schema Based on Fractional Order Chaotic Systems , 2019, 2019 23rd International Conference Electronics.

[12]  Fatih Özkaynak,et al.  Side-Channel Analysis of Chaos-Based Substitution Box Structures , 2019, IEEE Access.

[13]  Jun Wang,et al.  Image Encryption Using Compressive Sensing and Detour Cylindrical Diffraction , 2018, IEEE Photonics Journal.

[14]  Fatih Özkaynak,et al.  Role of NPCR and UACI tests in security problems of chaos based image encryption algorithms and possible solution proposals , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[15]  Carlos Sánchez-Azqueta,et al.  Chaotic Encryption for 10-Gb Ethernet Optical Links , 2019, IEEE Transactions on Circuits and Systems I: Regular Papers.

[16]  Mihir Bellare,et al.  Lecture Notes on Cryptography , 2001 .

[17]  Shuliang Sun,et al.  A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling , 2018, IEEE Photonics Journal.

[18]  Feng Xu,et al.  A Chaos Based Image Encryption Scheme Using Digit-Level Permutation and Block Diffusion , 2018, IEEE Access.

[19]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[20]  Xing Liu,et al.  Secure Internet of Things (IoT)-Based Smart-World Critical Infrastructures: Survey, Case Study and Research Opportunities , 2019, IEEE Access.

[21]  Fatih Özkaynak A novel method to improve the performance of chaos based evolutionary algorithms , 2015 .

[22]  Fatih Özkaynak,et al.  Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.

[23]  Dengguo Feng,et al.  Boolean Functions and Their Applications in Cryptography , 2016, Advances in Computer Science and Technology.

[24]  Erkan Tanyildizi,et al.  A New Chaotic S-Box Generation Method Using Parameter Optimization of One Dimensional Chaotic Maps , 2019, IEEE Access.

[25]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[26]  Wenhong Wang,et al.  A Novel Image Compression-Encryption Scheme Based on Chaos and Compression Sensing , 2018, IEEE Access.

[27]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[28]  Wei Li,et al.  Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos , 2018, IEEE Photonics Journal.

[29]  Werner Schindler,et al.  Random Number Generators for Cryptographic Applications , 2009, Cryptographic Engineering.

[30]  Feng Le,et al.  Spatiotemporal Chaos in Coupled Logistic Map Lattice With Dynamic Coupling Coefficient and its Application in Image Encryption , 2018, IEEE Access.

[31]  Hossam Diab,et al.  An Efficient Chaotic Image Cryptosystem Based on Simultaneous Permutation and Diffusion Operations , 2018, IEEE Access.

[32]  Kwok-Wo Wong,et al.  On the Security of a Class of Diffusion Mechanisms for Image Encryption , 2015, IEEE Transactions on Cybernetics.

[33]  Fatih Özkaynak,et al.  A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).

[34]  Ming Li,et al.  Cryptanalysis and Improvement of a Chaotic Image Encryption by First-Order Time-Delay System , 2018, IEEE MultiMedia.