Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application

Abstract In this paper, a digital image encryption algorithm is proposed based on the generalized model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo-random number generator (PRNG) in the proposed encryption algorithm. The foundation of the chaos game is based on basic points and its distance ratio that determine the basis of how they distribute random values in 2D or 3D space. These basic points are entered by the user interface and are the result of an encrypted image with a fractal structure. The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems. In the proposed method, the region of interest is determined by a number of Bases, and the fractal mechanism of chaos game for the encryption process is performed on the image. This process is very sensitive to any changes in keys and refers to confusion. The evaluation results of security and performance analysis on standard images confirm the efficiency of the proposed method and demonstrate that the proposed method is robust against attacks.

[1]  Peyman Ayubi,et al.  High secure digital image steganography based on 3D chaotic map , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[2]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[3]  Kehui Sun,et al.  A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map , 2018, Signal Process..

[4]  Azman Samsudin,et al.  A new hybrid digital chaotic system with applications in image encryption , 2019, Signal Process..

[5]  S. Strogatz Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry and Engineering , 1995 .

[6]  Sodeif Ahadpour,et al.  Design and implementation of coupled chaotic maps in watermarking , 2014, Appl. Soft Comput..

[7]  X. Tong,et al.  A new algorithm of the combination of image compression and encryption technology based on cross chaotic map , 2013 .

[8]  David P. Feldman,et al.  Chaos and Fractals: An Elementary Introduction , 2012 .

[9]  Hung-I Hsiao,et al.  Color image encryption using chaotic nonlinear adaptive filter , 2015, Signal Process..

[10]  Musheer Ahmad,et al.  A New Chaotic Map Based Secure and Efficient Pseudo-Random Bit Sequence Generation , 2018, SSCC.

[11]  A. Akhavan,et al.  An image encryption scheme based on quantum logistic map , 2012 .

[12]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[13]  Hongjun Liu,et al.  Asymmetric color image encryption scheme using 2D discrete-time map , 2015, Signal Process..

[14]  Ronald T. Kneusel,et al.  Random Numbers and Computers , 2018, Springer International Publishing.

[15]  Amir Akhavan,et al.  Pseudo random number generator based on quantum chaotic map , 2014, Commun. Nonlinear Sci. Numer. Simul..

[16]  Guanrong Chen,et al.  Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[17]  P. Ayubi,et al.  Blind digital image watermarking based on CT-SVD and chaotic cellular automata , 2012, 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE).

[18]  Li Guo,et al.  Joint image compression–encryption scheme using entropy coding and compressive sensing , 2018, Nonlinear Dynamics.

[19]  Peyman Ayubi,et al.  A fast color image encryption technique based on three dimensional chaotic map , 2019, Optik.

[20]  Benoit B. Mandelbrot,et al.  Fractal Geometry of Nature , 1984 .

[21]  Peyman Ayubi,et al.  A secure watermark embedding approach based on chaotic map for image tamper detection , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).

[22]  Peyman Ayubi,et al.  An integer wavelet transform image steganography method based on 3D sine chaotic map , 2018, Multim. Tools Appl..

[23]  Peyman Ayubi,et al.  A SVD-Chaos Digital Image Watermarking Scheme Based on Multiple Chaotic System , 2012, SPIT.

[24]  Dongdong Lin,et al.  Cryptanalyzing an Image Encryption Algorithm Based on Autoblocking and Electrocardiography , 2017, IEEE MultiMedia.

[25]  Musheer Ahmad,et al.  Security analysis and enhancements of an image cryptosystem based on hyperchaotic system , 2018, J. King Saud Univ. Comput. Inf. Sci..

[26]  Michael F. Barnsley,et al.  Fractals everywhere , 1988 .

[27]  Peyman Ayubi,et al.  A new colour image watermarking scheme using Cellular Automata Transform and Schur decomposition , 2013, 2013 21st Iranian Conference on Electrical Engineering (ICEE).

[28]  Peyman Ayubi,et al.  Image forgery detection in contourlet transform domain based on new chaotic cellular automata , 2015, Secur. Commun. Networks.

[29]  Peyman Ayubi,et al.  Digital image scrambling based on a new one-dimensional coupled Sine map , 2019, Nonlinear Dynamics.

[30]  Peyman Ayubi,et al.  A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map , 2019, Optik.

[31]  Kenneth Falconer,et al.  Fractal Geometry: Mathematical Foundations and Applications , 1990 .

[32]  Walter Tuchman,et al.  A brief history of the data encryption standard , 1997 .

[33]  Shailender Gupta,et al.  A Survey of Image Encryption Algorithms , 2017 .

[34]  R. M. López-Gutiérrez,et al.  A RGB image encryption algorithm based on total plain image characteristics and chaos , 2015, Signal Process..

[35]  Hejiao Huang,et al.  Image Encryption Using Josephus Problem and Filtering Diffusion , 2019, IEEE Access.

[36]  Musheer Ahmad,et al.  A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design , 2014, 2014 Fourth International Conference on Advanced Computing & Communication Technologies.

[37]  Hui Wang,et al.  Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map , 2018, Signal Process..

[38]  Xiaofeng Liao,et al.  Color image encryption based on chaotic systems and elliptic curve ElGamal scheme , 2017, Signal Process..

[39]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[40]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[41]  Fatih Özkaynak,et al.  Brief review on application of nonlinear dynamics in image encryption , 2018, Nonlinear Dynamics.

[42]  Mohammad-Reza Feizi-Derakhshi,et al.  A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation , 2019, Signal Process..

[43]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[44]  S. Behnia,et al.  Multiple-watermarking scheme based on improved chaotic maps , 2010 .

[45]  Musheer Ahmad,et al.  Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys , 2014, Int. J. Commun. Networks Distributed Syst..

[46]  Musheer Ahmad,et al.  Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series , 2017 .

[47]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[48]  Peyman Ayubi,et al.  A blind and robust video watermarking based on IWT and new 3D generalized chaotic sine map , 2018 .

[49]  Xiaofeng Liao,et al.  Image encryption using 2D Hénon-Sine map and DNA approach , 2018, Signal Process..

[50]  Nikolay N. Ponomarenko,et al.  Image database TID2013: Peculiarities, results and perspectives , 2015, Signal Process. Image Commun..

[51]  Yiran Chen,et al.  A color image cryptosystem based on dynamic DNA encryption and chaos , 2019, Signal Process..

[52]  Musheer Ahmad,et al.  Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption , 2018, J. Electron. Test..

[53]  Fathi E. Abd El-Samie,et al.  Image Encryption: A Communication Perspective , 2013 .

[54]  Raveendran Paramesran,et al.  Image encryption method based on chaotic fuzzy cellular neural networks , 2017, Signal Process..

[55]  Kais Bouallegue,et al.  Gallery of Chaotic Attractors Generated by Fractal Network , 2015, Int. J. Bifurc. Chaos.

[56]  Xiaonan Luo,et al.  Integrated chaotic systems for image encryption , 2018, Signal Process..

[57]  S. Behnia,et al.  Image encryption based on quantum chaotic map and FSM transforms , 2012, 2012 15th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).

[58]  Chengqing Li,et al.  When an attacker meets a cipher-image in 2018: A Year in Review , 2019, J. Inf. Secur. Appl..

[59]  Manjit Kaur,et al.  A Comprehensive Review on Image Encryption Techniques , 2018, Archives of Computational Methods in Engineering.

[60]  Musheer Ahmad,et al.  A New 1D Chaotic Map and $\beta$ -Hill Climbing for Generating Substitution-Boxes , 2018, IEEE Access.

[61]  Musheer Ahmad,et al.  Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos , 2018, Symmetry.

[62]  Peyman Ayubi,et al.  A new transform domain steganography based on modified logistic chaotic map for color images , 2017, J. Inf. Secur. Appl..

[63]  Musheer Ahmad,et al.  An enhanced modulo-based image encryption using chaotic and fractal keys , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.

[64]  Zhiliang Zhu,et al.  Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption , 2018, Signal Process..

[65]  Lilian Huang,et al.  A new color image encryption using combination of the 1D chaotic map , 2017, Signal Process..

[66]  Behzad Aliahmad,et al.  Fractals: Applications in Biological Signalling and Image Processing , 2016 .

[67]  Musheer Ahmad,et al.  Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption , 2013, J. Inf. Process. Syst..

[68]  Musheer Ahmad,et al.  An image encryption approach using particle swarm optimization and chaotic map , 2018 .

[69]  Musheer Ahmad,et al.  Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map , 2018, Complex..

[70]  Musheer Ahmad,et al.  Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network , 2018, J. Intell. Fuzzy Syst..