Shannon Entropy based Randomness Measurement and Test for Image Encryption

The quality of image encryption is commonly measured by the Shannon entropy over the ciphertext image. However, this measurement does not consider to the randomness of local image blocks and is inappropriate for scrambling based image encryption methods. In this paper, a new information entropy-based randomness measurement for image encryption is introduced which, for the first time, answers the question of whether a given ciphertext image is sufficiently random-like. It measures the randomness over the ciphertext in a fairer way by calculating the averaged entropy of a series of small image blocks within the entire test image. In order to fulfill both quantitative and qualitative measurement, the expectation and the variance of this averaged block entropy for a true-random image are strictly derived and corresponding numerical reference tables are also provided. Moreover, a hypothesis test at significance α-level is given to help accept or reject the hypothesis that the test image is ideally encrypted/random-like. Simulation results show that the proposed test is able to give both effectively quantitative and qualitative results for image encryption. The same idea can also be applied to measure other digital data, like audio and video.

[1]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[2]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[3]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[4]  Maliha S. Nash,et al.  Handbook of Parametric and Nonparametric Statistical Procedures , 2001, Technometrics.

[5]  L. Afflerbach,et al.  Criteria for the assessment of random number generators , 1990 .

[6]  Chun-Liang Lin,et al.  Personalized information encryption using ECG signals with chaotic functions , 2012, Inf. Sci..

[7]  N. Bourbakis,et al.  SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..

[8]  A. Rukhin,et al.  Statistical Testing of Random Number Generators , 1999 .

[9]  Anil Kumar,et al.  Extended substitution–diffusion based image cipher using chaotic standard map , 2011 .

[10]  Qing Zhou,et al.  A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..

[11]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[12]  Bengt J Allen,et al.  Statistics: Concepts and Applications for Science.ByDavid LeBlanc.Sudbury (Massachusetts): Jones and Bartlett Publishers. $89.95 (two‐volume set). xvii + 382 p; ill.; index. ISBN: 0–7637–4699–1. 2004.Workbook to AccompanyStatistics: Concepts and Applications for Science.ByDavid LeBlanc.Sudbury (Mass , 2004 .

[13]  Ross Ihaka,et al.  Cryptographic Randomness from Air Turbulence in Disk Drives , 1994, CRYPTO.

[14]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[15]  Samarjit Kar,et al.  Cross-entropy measure of uncertain variables , 2012, Inf. Sci..

[16]  Qiang Zhang,et al.  Image encryption using DNA addition combining with chaotic maps , 2010, Math. Comput. Model..

[17]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[18]  J. E. Glynn,et al.  Numerical Recipes: The Art of Scientific Computing , 1989 .

[19]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[20]  W. Tang,et al.  A fast image encryption system based on chaotic maps with finite precision representation , 2007 .

[21]  Vasilios Katos A randomness test for block ciphers , 2005, Appl. Math. Comput..

[22]  Du Zhang,et al.  Image Encryption and Chaotic Cellular Neural Network , 2009 .

[23]  Sos S. Agaian,et al.  Image encryption using the Sudoku matrix , 2010, Defense + Commercial Sensing.

[24]  Xiongjun Li,et al.  A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy , 2008, 2008 International Conference on Computational Intelligence and Security.

[25]  Luc Devroye,et al.  The computer generation of poisson random variables , 1981, Computing.

[26]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[27]  Joos Vandewalle,et al.  Cryptanalysis of SOBER-t32 , 2003, FSE.

[28]  Paul C. Kocher,et al.  The intel random number generator , 1999 .

[29]  I. Shevtsova,et al.  An improvement of the Berry–Esseen inequality with applications to Poisson and mixed Poisson random sums , 2009, 0912.2795.

[30]  Albert Y. Zomaya,et al.  Local measures of information storage in complex distributed computation , 2012, Inf. Sci..

[31]  Joseph L. Leva A fast normal random number generator , 1992, TOMS.

[32]  C. S. Davis The computer generation of multinomial random variates , 1993 .

[33]  Sos S. Agaian,et al.  Image encryption using P-Fibonacci transform and decomposition , 2012 .

[34]  Weiwu Fang The characterization of a measure of information discrepancy , 2000, Inf. Sci..

[35]  Moti Yung,et al.  A block cipher based pseudo random number generator secure against side-channel key recovery , 2008, ASIACCS '08.

[36]  Bruce Schneier,et al.  Cryptanalysis of the cellular message encryption algorithm , 1997 .

[37]  F. James A Review of Pseudorandom Number Generators , 1990 .

[38]  X. Liao,et al.  An image encryption approach based on chaotic maps , 2005 .

[39]  LI Luo-luo A New Measurement for Image Encryption Effect , 2005 .

[40]  Andriy V. Miranskyy,et al.  Using entropy measures for comparison of software traces , 2010, Inf. Sci..

[41]  Nikolaos G. Bourbakis,et al.  Picture data encryption using scan patterns , 1992, Pattern Recognit..

[42]  Prem Nath Arora On the Shannon measure of entropy , 1981, Inf. Sci..

[43]  Krzysztof Wesolowski Introduction to Digital Communication Systems , 2009 .

[44]  Bruce Schneier,et al.  The Twofish encryption algorithm: a 128-bit block cipher , 1999 .

[45]  R. C. Kao,et al.  An Identity for the Sum of Multinomial Coefficients , 1957 .

[46]  Chuan Zhou,et al.  A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation , 2005, PCM.

[47]  Rastislav Lukac,et al.  Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..

[48]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[49]  Roger Sauter,et al.  Introduction to Statistics and Data Analysis , 2002, Technometrics.

[50]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[51]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[52]  Benny Pinkas,et al.  Cryptanalysis of the random number generator of the Windows operating system , 2009, TSEC.

[53]  Guanrong Chen,et al.  A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.

[54]  Xiaojun Tong,et al.  Image encryption with compound chaotic sequence cipher shifting dynamically , 2008, Image Vis. Comput..

[55]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[56]  N. Bourbakis,et al.  Data-image-video encryption , 2004, IEEE Potentials.

[57]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[58]  Gonzalo Alvarez,et al.  Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.

[59]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..