Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system

This paper introduces a six-dimensional discrete chaotic systems (SDDCS) with some simple sine functions and a chaotic pseudorandom number generator (CPRNG) that is designed based on the SDDCS. A encryption scheme with both key avalanche effect and plaintext avalanche effect (SESKPAE) is proposed by using the random sequence generated by the CPRNG. The algorithm has three advantages: First, the initial values of the chaotic system are calculated by using the SHA-256 hash value of the plain image and the given values, there are different initial values for different plain images. Thus, our algorithm can resist against the chosen-plaintext and known-plaintext attacks effectively. Second, the new algorithm adopts ciphertext feedback mechanism to further strengthen the safety. Third, our new algorithm has an “avalanche effect”, in other words, the decrypted ciphertext will become a “white” image with a few “black spots” rather than a random chaotic image as a result of the wrong key. The experimental results and security analysis show that the algorithm has the advantages of large key space, no obvious statistical characteristics of ciphertext, sensitive to plaintext and keys, and able to resist chosen-plaintext attack and active attacks.

[1]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[2]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[3]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[4]  Rafik Hamza,et al.  A novel pseudo random sequence generator for image-cryptographic applications , 2017, J. Inf. Secur. Appl..

[5]  Julien Clinton Sprott,et al.  Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system , 2012 .

[6]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[7]  S. Mitra,et al.  Multi-objective optimization of hole characteristics during pulsed Nd:YAG laser microdrilling of gamma-titanium aluminide alloy sheet , 2014 .

[8]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .

[9]  Zhongmeng Zhao,et al.  Chaotic image encryption based on circular substitution box and key stream buffer , 2014, Signal Process. Image Commun..

[10]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[11]  Dragan Lambić,et al.  Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2017 .

[12]  Navin Rajpal,et al.  A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps , 2015, Multimedia Tools and Applications.

[13]  Lequan Min,et al.  Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption , 2017, Int. J. Bifurc. Chaos.

[14]  L. Cardoza-Avendaño,et al.  A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.

[15]  Richard J. Spillman,et al.  Classical and Contemporary Cryptology , 2004 .

[16]  Yuansheng Liu,et al.  Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map , 2013, 1307.4279.

[17]  Qiang Lai,et al.  Research on a new 3D autonomous chaotic system with coexisting attractors , 2016 .

[18]  Mahmoud Al-Ayyoub,et al.  Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2017, Multimedia Tools and Applications.

[19]  G. Lakpathi,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .

[20]  Bin Zhu,et al.  A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps , 2017, IEEE Access.

[21]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[22]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[23]  H. Feistel Cryptography and Computer Privacy , 1973 .

[24]  Julien Clinton Sprott,et al.  Coexistence of Point, periodic and Strange attractors , 2013, Int. J. Bifurc. Chaos.

[25]  J. Sprott Chaos and time-series analysis , 2001 .

[26]  Yicong Zhou,et al.  $n$ -Dimensional Discrete Cat Map Generation Using Laplace Expansions , 2016, IEEE Transactions on Cybernetics.

[27]  Kehui Sun,et al.  Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps , 2018, IEEE Access.

[28]  Jie Wu,et al.  Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..

[29]  Zhongmeng Zhao,et al.  An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.

[30]  Amin Zarei,et al.  Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors , 2015 .

[31]  Lequan Min,et al.  A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption. , 2015, Chaos.

[32]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[33]  Xiaoling Huang,et al.  An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.

[34]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[35]  Guanrong Chen,et al.  A four-wing chaotic attractor generated from a new 3-D quadratic autonomous system , 2008 .

[36]  Qiang Zhang,et al.  A RGB image encryption algorithm based on DNA encoding and chaos map , 2009, Comput. Electr. Eng..

[37]  Yongjian Liu,et al.  A new hyperchaotic system from the Lü system and its control , 2011, J. Comput. Appl. Math..

[38]  Wanlei Zhou,et al.  Modeling malicious activities in cyber space , 2015, IEEE Network.

[39]  Lequan Min,et al.  A novel stream encryption scheme with avalanche effect , 2013 .

[40]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[41]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..