#PAGE_PARAMS# #ADS_HEAD_SCRIPTS# #MICRODATA#

A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion


Authors: Majid Khan aff001;  Fawad Masood aff001;  Abdullah Alghafis aff004;  Muhammad Amin aff001;  Syeda Iram Batool Naqvi aff001
Authors place of work: Cyber and Information Security Lab (CISL), Institute of Space Technology, Islamabad,Pakistan aff001;  Department of Applied Mathematics and Statistics, Institute of Space Technology, Islamabad, Pakistan aff002;  Department of Electrical Engineering, Institute of Space Technology, Islamabad,Pakistan aff003;  King Abdulaziz City for Science and Technology Riyadh, Saudi Arabia aff004;  Department of Avionics, Institute of Space Technology Islamabad, Pakistan aff005
Published in the journal: PLoS ONE 14(12)
Category: Research Article
doi: https://doi.org/10.1371/journal.pone.0225031

Summary

Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinates. Moreover, chaotic dynamical map has been used to add one more security level to the proposed encryption scheme. The proposed scheme is evaluated on different statistical tests and these results are compared with already existing benchmarks. The results show that the proposed algorithm has better security performances as compared to existing image enciphering schemes.

Keywords:

Algorithms – Imaging techniques – Mathematical functions – Entropy – Signal to noise ratio – Cryptography – Brownian motion – Encryption

1. Introduction

The security of digital information in wireless and wired communication media such as Wi-Fi and Ethernet is one of challenging issues of the contemporary world. Today, advancement in science and technology makes our lives easier as compared to earlier decades and the history is evident that this process of bringing comfort and ease pervades all aspect of human lives. The idea of transforming any analogue information for instance text, image, audio and video into digital bitstreams is one of the grounding breaking discovery by Claude Shannon in 1948. Shannon put forth the idea that once information becomes digital, it could be transmitted without error. This revolutionary concept led directly to digital storage media such as hard disks, CDs and USBs. The privacy of information and copyright protection became critical issue of the digital world. The eavesdropping of the digital information is possible in any part of the communication system from source through the transmitting medium to the sink. These cyber threats of data eavesdropping are developing at fast pace. Data communication has become pervasive in society spanning individuals, groups and state institutions. Many applications like video conferencing, photo album, medical images and databases require quick, reliable, computationally less intensive and robust systems for secure transmission of digital information from one end to another end. Therefore, privacy of data is a crucial factor which must be first choice to looked into to provide secure communication. In video and audio communication real time high data transmission rates at one hand provides seamless communication but on the other hand it requires robust security against interception and eavesdropping and extraction of plain text information. The major principles of cryptography are confidentiality, integrity and authentication that ensure secure communication. The confidentiality of information can be achieved through encryption procedure. The earlier cryptosystem used either substitution or permutation but separately and independently which means these schemes did not utilize confusion and diffusion simultaneously. The separate usage of confusion and diffusion in earlier schemes was vulnerable to different cryptographic attacks. Claude Shannon in 1949, devised a mechanism of confusion and diffusion in order to design secure cryptosystems. The modern information security system named it substitution-permutation network (SP-network). Traditional symmetric ciphers such as advanced encryption standard (AES) and data encryption standard (DES) and all other variants of these cryptosystems are designed with good confusion and diffusion properties [111].

Several encryption algorithms were designed for the confidentiality of digital information which utilized SP-network. A large number of modern ciphers schemes use many aspects of chaos to enhance confusion and diffusion capabilities. The chaos theory is closely related with cryptography. The chaotic systems have characteristic similar to cryptography such as highly sensitive to chaotic parameters, initial conditions, its un-deterministic nature, pseudo-randomness and ergodicity etc., which are fundamental requirements while designing any modern cryptosystems [1216]. The connection between chaos and cryptography introduced a new regime in modern information security. Therefore, chaos theory after 1990’s, was extensively utilized for developing robust cryptosystems [1770]. Our idea here is to use two dimensional chaotic maps along with Brownian motion in order to design a new scheme for the confidentiality of digital images.

Brownian motion is random (zig zag) movement of particles that are suspended in fluid (liquid or gas) resulting due to fast collision of liquid or gas molecules. The term ‘Brownian motion’ is here mathematical term or model use for designing of secure cryptosystem and is use to describe ‘random movement of particles’. In 2014, Wang and Xu [64] considered single particle of Brownian theory as a pixel of image and used Monte Carlo method and encrypt original test image. In 2015, Zhu [65] had cracked the algorithm designed by Wang et al [64] because the system designed was based on permutation and diffusion sequence by Wang et al [64] that was not related to plaintext image thus the method designed by Wang et al [64] was unfeasible to show resistivity against the chosen plain text.

The rest of the paper is organized as follows: Section 3 briefly introduces basic preliminaries used in designing of strong cryptosystem. The succeeding section 4 describes the proposed algorithm. The simulation results and security analysis are shown in section 5 and finally, we summarized our conclusion and results in section 6.

2. Motivation

Information transmission through open public network are vulnerable to assorted type of attacks so designing these hybrid systems emphasized to meet security deficiency for real time multimedia communication. The proposed system is based on Brownian motion of particles along three different directions of X, Y and Z axis and inclusion of certain discrete time chaotic maps is to enhance its security to some more steps. The system helped us in transforming plain information to intelligible form. In first phase Brownian motion of particles are initialized and then stored its position at each iteration. The unique ternary orientation provided some extra layer of security that increased number of conditions to encrypt original information in the form of digital image. The security provider may use single direction to secure their information as well as combined effect of unique three directions in spatial domain. This hybrid system based on chaotic behavior have some unique features i.e. highly sensitive in nature while altering its initial condition this system show highly randomness for different initial condition. The system has another unique feature of strange attractor i.e. for each small change in initial condition will give you complete different attractor which will create difficulty to intruder or advertiser to decipher original image. These properties motivated us to design this cryptosystem.

3. Some basic preliminaries

In this section, we have defined some basic definitions and concepts, which will be quite helpful for subsequent sections.

3.1 Chaotic systems

Chaotic systems have some properties like highly random in nature, strange attractor, aperiodicity, ergodicity and sensitive to its initial conditions which makes it suitable for designing secure cryptosystem [29]. If the value of the initial condition is insignificantly changed, the output of the system will show unexpected change. Many systems in nature around us exhibit chaos [67].

3.1.1 Basin Chaotic Map

Chaotic maps have its intrinsic importance in designing secure cryptosystem. In order to make robust system, we introduced basin chaotic map and examined its desirable characteristics. It is discrete time two-dimensional chaotic map which takes some initial conditions e.g. x0 = −1.5, y0 = 1.5, and some other chaotic factors including k, μ, and ε. The mathematical expression for Basin chaotic map is defined as follow:

3.1.2 Ginger Breadman Chaotic Map

Ginger breadman is two-dimensional discrete time chaotic map which has noteworthy nature of randomness of chaos. The two-dimensional Ginger breadman chaotic map is represented in Eqs 5 and 6:

3.2 Brownian Motion

It is random (zig zag) movement of particles along three different directions namely X, Y and Z axis (see Fig 1). The behavior of particles named after botanist Brown who worked on microscopic particles. The idea he revealed for the first time through pollen grains which fell into river and observed fluctuations and random motion in water though he didn’t find the reason of behavior he observed. Later one of the great scientist Albert Einstein published one of his article in 1905 that explained the exact random motion of particles which Brown had observed through motion of particles by water molecules and this was a very significant contribution to science. He concluded that the kinetic energy of molecules of water was responsible for the zig zag motion of the particles [3031].

Fig. 1. Brownian movement particles in ternary position.
Brownian movement particles in ternary position.

3.3 State of Art of Encryption for Proposed Scheme

Our main intention is designing robust algorithm having exceptional strength of resistivity against cryptanalysis and have negligible vulnerabilities to be cracked against gain of access of encrypted digital contents. In cryptanalysis where hacker study possible breaches and vulnerabilities in order to break down cryptographic algorithm. The robustness of proposed system can be validated using certain statistical tests that ensure the strength of proposed algorithm. The strength of cryptosystem highly depends upon two factors i.e. proposed algorithm for encryption and secrecy of keys used in proposed system to encrypt information. We used hybrid method of Brownian motion of particles and certain discrete dynamical chaotic maps to get maximum random sequence. We assumed and defined certain number of particles with respect to time before using certain chaotic maps. These particles helped us in achieving effect of zig zag motion of initially defined particles with respect to time and assumed number of particles. The assumed particles depend upon number of pixels in test image and the track changes due to changing effect of these particles. These particles are placed in spatial domain of three dimension along X. Y and Z axis where providing security expert has choice of choosing any direction of X, Y and Z axis to propose their cryptosystem. The system can be more secure by combined effect of X, Y and Z axis. Further to get better resistance the sequence generated using particles of zig zag motion is injected to some chaotic maps for instance Basin chaotic map and Gingerbread man chaotic map to get highly randomized sequence. The output sequence of zig zag particles generated at first phase using Brownian motion is multiplied with one dimensional Basic chaotic map for better security. The process is further treated with bitwise XOR with sequence generated using Gingerbread man chaotic map. The sequence generated after third phase showed some exceptional randomness for security of multimedia data.

4. Proposed image encryption scheme

The main emphasis of this section is on the proposed encryption scheme algorithm. The major steps involved in suggested encryption scheme are given below (see Fig 2):

4.1 Steps involved in achieving secure algorithm

  • 1

    Read an image of size 512×512×3 in jpg format

  • 2

    Resizing of image from 512×512×3 to 256×256×3 dimension in same extension

  • 3

    Splitting of image into three layers of Red (R-layer), Green (G-Layer) and Blue (B-layer)

  • 4

    Generation of Brownian motion with initialization of position of particles with respect to time in seconds, number of particles assumed and number of impulses per change in track

  • 5

    Iteration of storing of position of particles for three different position along X, Y, and Z axis

  • 6

    Generation of two-dimensional Basin chaotic map having same length of 256×256

  • 7

    Multiplication of generated Basin chaotic map with three different position of particles generated in step 5

  • 8

    Generation of two-dimension gingerbread man chaotic map having same length of 256×256

  • 9

    Bitwise XOR operation between generated position in step 5 and generated gingerbread man chaotic map sequence having length of 256×256

  • 10

    The output in step 9 is again Bitwise XOR with the generated layers of Red, Green, Blue in step 3

  • 12

    Combining layer of images into 256×256×3 to get encrypted image

Fig. 2. Flow chart of proposed algorithm for secure communication.
Flow chart of proposed algorithm for secure communication.

5. Security performance analysis and experimental results

In this section, we have taken standard images [51,67] to authenticate our proposed algorithm by utilizing the security benchmarks available in literature. The tests include are correlation coefficient, mean absolute error, means square error (MSE), peak signal to noise error (PSNR), information entropy, sensitivity analysis and NIST test for randomness respectively.

5.1 Histogram Analysis

Histogram analysis is one of the momentous examination of pixels of image. Histogram must be different for plain and encrypted image. Plain image pixels are non-uniform and changes at each and every instant which reveals that the data is highly vulnerable to be attacked, while examining pixels of secure images where each pixel is well disciplined and have uniformly order having same length, size to one another. The well-disciplined and uniformity of pixels means that image is secure using proposed cryptosystem. We considered four images of 512×512×3 dimension and convert it into size of 256×256×3. The infrequent histogram and smooth continual is examined in Figs 313 respectively. Fig 3B show nature of non-uniformity as compare to succeeding Fig 13A–13C for three different directions along X, Y and Z axis where each pixel show resemblance to nearby pixel reveals that intruder will unable to decide that where maximum confidential information is available. Fig 4A–4C are layer wise images for pepper standard image having size 256×256×3 while the histogram for the layer wise figures are non-uniform reveals that the information can easily be take out on public network as shown in Fig 5A–5C. Looking into Figs 7, 9, 11 and 13, the Figs 7, 9 and 11 are layer wise different orientation of histogram where each pixel is equally distributed in the range of 0 to 256 and each pixel information is highly secure. Fig 13 is histogram of combined layers for three directions and show good pixels’ uniformity from start to end.

Fig. 3.
(a) Standard pepper image; (b) Histogram of pepper image.
Fig. 4.
(a) R-layer of size 256×256; (b) G-layer of size 256×256; (c) B-layer of size 256×256.
Fig. 5.
(a) R-layer Histogram; (b) G-layer Histogram; (c) B-layer Histogram.
Fig. 6.
(a) X-direction R-layer; (b) X-direction G-layer; (c) X-direction B-layer.
Fig. 7.
(a) X-direction R-layer Histogram; (b) X-direction G-layer Histogram; (c) X-direction B-layer Histogram.
Fig. 8.
(a) Y-direction R-layer; (b) Y-direction G-layer; (c) Y-direction B-layer.
Fig. 9.
(a) Y-direction R-layer Histogram; (b) Y-direction G-layer Histogram; (c) Y-direction B-layer Histogram.
Fig. 10.
(a) Z-direction R-layer; (b) Z-direction G-layer; (c) Z-direction B-layer.
Fig. 11.
(a) Z-direction R-layer Histogram; (b) Z-direction G-layer Histogram; (c) Z-direction B-layer Histogram.
Fig. 12.
(a) X-direction combined-layers; (b) Y-direction combined-layers; (c) Z-direction combined-layers.
Fig. 13.
(a) X-direction combined-layers Histogram; (b) Y-direction combined-layers Histogram; (c) Z-direction combined-layers Histogram.

5.2 Correlation Coefficient

Correlation coefficient analysis show resemblance of nearby image pixels along three different directions namely horizontal, vertical, and diagonal. For plain image the pixel’s value approaches to 1, while for encrypted image the value converges to 0. In Figs 1416, all values are making diagonal line showing that values are highly correlated to each other. The below Eq (5) is use to find out pixel values at two different stages i.e. measuring pixels’ value when image is in the form of plain text and then finding pixels value when the image is in encrypted form. In proposed algorithm, we investigated pixels in three different directions for four types of test images along X-direction of Brownian motion. Figs 1419 are layer wise correlation of red, green and blue channels having size of 256×256 whilst Figs 20 and 21 illustrates combined channels correlation having size of 256×256×3. Figs 1416, are plain red, green, blue channels where each pixel is highly correlated to one another while Figs 1719, where pixels are distributed in all direction in the range of 0 to 255 i.e. pixels gained behavior of dissimilarity after passing it through encryption algorithm. Fig 20 show highly resemblance of pixels in three directions while Fig 21 show pixels became scattered and pixels are no more similar. All analyzed tests are done for image having size of 256×256×3 and 256×256 respectively. Results for each direction of channel is shown in Tables 13. Table 1 has four images of 256×256 dimension while ‘X’ direction of Brownian motion is considered. The results are evaluated for plain and encrypted images. The average value of plain image for pepper is taken and evaluated its average results which are 0.9565, 0.9638, 0.9489 respectively. The value of plain image for pepper is nearly equal to ‘1’ show highly similarity. Same as, average values for cipher red, green and blue channels along ‘X’ direction are 0.0014, 0.0012, 0.0014 reveals that system is highly secure. The succeeding Table 2 with four standard channels of pepper, airplane, splash and tiffany having dimension of 256×256×3 with three distinct orientation of horizontal, vertical and diagonal is shown. The average value of plain for pepper image is 0.9573 and cipher value -0.0003 i.e. plain image value is nearly equal to one and cipher image is nearly equal to zero. In the very next Table 3 we have compared our proposed correlation values with some existing scheme values which validated our proposed system robustness. Correlation coefficient can be defined by using the following mathematical expression:

where σxy is covariance and σx, σy are standard deviations of random variables x and y respectively. The correlation coefficient for layer wise of Brownian motion into X direction is presented in Figs 1421 respectively.

Fig. 14.
(a) Plain red layer horizontal correlation; (b) Plain red layer diagonal correlation; (c) Plain red-layer vertical correlation.
Fig. 15.
(a) Plain green layer horizontal correlation; (b) Plain green layer diagonal correlation; (c) Plain green layer vertical correlation.
Fig. 16.
(a) Plain blue layer horizontal correlation; (b) Plain blue layer diagonal correlation; (c) Plain blue layer vertical correlation.
Fig. 17.
(a) Ciphered red layer horizontal correlation; (b) Ciphered red layer diagonal correlation; (c) Ciphered red layer vertical correlation.
Fig. 18.
(a) Ciphered green layer horizontal correlation; (b) Ciphered green layer diagonal correlation; (c) Ciphered green layer vertical correlation.
Fig. 19.
(a) Ciphered blue layer horizontal correlation; (b) Ciphered blue layer diagonal correlation; (b) Ciphered blue layer vertical correlation.
Fig. 20.
(a) Plain pepper image having size 256×256×3 horizontal correlation; (b) Plain pepper image having size 256×256×3 diagonal correlation; (c) Plain pepper image having size 256×256×3 vertical correlations.
Fig. 21.
(a) Ciphered pepper image having size 256×256×3 horizontal correlation; (b) Ciphered pepper image having size 256×256×3 diagonal correlation; (c) Ciphered pepper image having size 256×256×3 vertical correlations.
Tab. 1. Correlation coefficient for layer wise into three different directions.
Correlation coefficient for layer wise into three different directions.
Tab. 2. Correlation coefficient values for several standard test images.
Correlation coefficient values for several standard test images.
Tab. 3. Comparison of correlation coefficient values with existing techniques.
Comparison of correlation coefficient values with existing techniques.

5.3 Mean square error

To compute accuracy of system, mean square error is to be measure. Mean square error can be computed from plain and cipher image using Eq 8 as shown:

Bigger mean square error (MSE) value show the system is more secure against differential attacks. The calculated mean square error values are shown in Table 4.

Tab. 4. MSE and PSNR tests for various standard images.
MSE and PSNR tests for various standard images.

5.4 Peak signal to noise ratio

To evaluate image quality of cipher image, peak to signal noise ratio (PSNR) is to be measure which can be illustrated using Eq 9 as shown:

The peak signal to noise ratio (PSNR) must be minimum to ensure good security. The two criterions are conflicting in nature. Mean square error must be approaching to maximum and peak to signal noise ratio must be approaching to minimum to complete security requirements that needed to design algorithm. PSNR calculated values using proposed algorithm are shown in Table 4. We evaluated tests for four standard images of pepper, airplane, splash and tiffany of having size 256×256×3. The average value for MSE that must be near to 10000 while for better peak to signal noise ratio the average value must be near to 8.50. Looking into Tables 4 and 5 for pepper as a test image for three respective channels. Average value of MSE for all three channels are 10943.37 while average PSNR value is almost equal to 7.74. The very next standard image is airplane having same length of 256×256 calculates MSE value which is greater than 10000 and PSNR value less than 8.50. The succeeding image splash having average MSE value with 11181.96 is exceptional after tiffany image having value of 12672.98 for the same size with average PSNR is less than 8.50. The final image tiffany having same size of 256×256×3 gained MSE output result equal to 12672.98 with peak to signal noise ratio having 7.40. PSNR and MSE average for different four standard images authenticated robustness of proposed cryptosystem. Table 6 show comparison of MSE and PSNR with existing algorithms.

Tab. 5. Average MSE and PSNR values for certain test images.
Average MSE and PSNR values for certain test images.
Tab. 6. Comparison of existing MSE values with proposed cryptosystem output values.
Comparison of existing MSE values with proposed cryptosystem output values.

5.5 Mean Absolute Error

Mean absolute error is criterion use to examine security of the system. Higher the value of mean absolute error, the stronger the system is designed. Suppose two images, the one plain image 'Pi,j' and another encrypted image 'Ei,j' be grey level of pixels at ith row and jth column having M×N size of plain and cipher image respectively. The Mean absolute error between two images of plain and encrypted images can be calculated using simple equation:

By investigating Table 7 for mean absolute error values for four standard test images having same length of 256×256×3. The average value for mean absolute error is approximately equal to 70 ~ 75. The larger the value is achieved; the more reliable and secure cryptosystem is designed. In Table 7 values for all four standard test images have shown. In the same table we compared the proposed cryptosystem values with already existing algorithm for same standard images having same size.

Tab. 7. MAE values for certain standard images and its comparison.
MAE values for certain standard images and its comparison.

5.6 Information Entropy

Randomness test theory was put forward by Shannon in 1949 and estimated randomness and unpredictability of information [44]. Information entropy analysis is one of the familiar methods of finding randomness of secure sequence. The ideal value for maximum entropy is always 8 for 8-bit system. We calculated entropy against each layer for different standard test images with different dimensions. The value examined using proposed algorithm is 7.999 which is very close to ideal value of 8 which validated our proposed cryptosystem and ensured its high security against any linear and differential attack. The comparison of computed layer as well combined form is shown in Tables 811 respectively. Information entropy can be computed using equation:

where p(mi) is probability of massages ‘m’, 2K means all possible outcomes where ‘K ’is number of bits included for each massage and ‘logb’ in equation is logarithm with logarithmic base. Looking into Tables 811. Table 8 are calculated values of entropy for different layers having length of 256×256×3 and 512×512×3 image with channel wise having length of 256×256 and 512×512 respectively. The ideal entropy value is always 8 for 8-bit system. The evaluated values of channel wise pepper image have some exceptional outputs of 7.997, 7.997, 7996 which approximates to ideal value, further the values are evaluated for number of standard test images for different channels are shown in Table 8. In Table 9 we compared our evaluated value of proposed cryptosystem with already existing values. The proposed value of 7.999 is almost equal to ideal value of maximum randomness of 8 for 8-bit system which validated robustness of our proposed cryptosystem. In Table 10 we compared results of proposed algorithm of 256×256×3 with several existing algorithms. In Table 11 images having size of 256×256×3 and 512×512×3 is shown. This concluded that system show some extra behavior of robustness to be breakdown against linear and differential passwords.

Tab. 8. Information entropy analysis for certain standard images of dimension 256×256 and 512×512.
Information entropy analysis for certain standard images of dimension 256×256 and 512×512.
Tab. 9. Comparison of proposed image entropy value with existing algorithm entropy.
Comparison of proposed image entropy value with existing algorithm entropy.
Tab. 10. Comparison of proposed layer wise entropy values with existing values of certain algorithms.
Comparison of proposed layer wise entropy values with existing values of certain algorithms.
Tab. 11. Entropy values for certain standard images with dimension of 256×256×3 and 512×512×3.
Entropy values for certain standard images with dimension of 256×256×3 and 512×512×3.

5.7 Sensitivity analysis

The number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI) are two standardized tests use to examine plain image sensitivity against external differential attack. This test elaborates one effect on another i.e. making very small change in plain image will cause immense difference in the corresponding encrypted images. Higher the value of NPCR is achieved, the more effective cryptosystem is designed and will highly oppose differential and linear attacks. The ideal value for NPCR is always 100. The values calculated using proposed cryptosystem is around to 99.64 which is too close to 100 shows the system is strong enough against attack. UACI test calculates average intensity change between plain and cipher image. The value must be near to 33. The examined values for the proposed image of pepper is around to 33 which is higher than expected value ensure robustness of cryptosystem.

5.7.1 Number of changing pixel rate

In this test we analyzed difference in cipher images with change in single pixel of source image. The test evaluated values are shown in Table 12. We represented first cipher image as E1(i,j) and second cipher E2(i,j) image as respectively.

where Fi,j = 0 for E1(i,j) = E2(i,j) and Fi,j = 1 for E1(i,j)E2(i,j).

Tab. 12. Layer wise NPCR and UACI values of standard images.
Layer wise NPCR and UACI values of standard images.

5.7.2 Unified averaged changed intensity

It is one of the important examinations for ensuring whether the proposed system is robust against differential attack or not. This examination is based on intensity of difference between two images. UACI can be computed using formula given:

Table 12 show UACI test is applied for different test images having size of 256×256×3 and investigated its result for layer wise respectively. We evaluated results for the same standard images with dimension of 256×256 in layer wise. The standard value of NPCR is approximately equal to 9.60 whilst the achieved values are more than 9.60 ensure proposed algorithm is secure. The UACI average values of 33.51, 32.48, 33.87 and 36.11 also confirmed security of proposed algorithm is remarkable (see Table 13).

Tab. 13. Comparison of Proposed algorithms for NPCR and UACI test with various existing algorithms.
Comparison of Proposed algorithms for NPCR and UACI test with various existing algorithms.

5.8 Time complexity analysis

Time complexity is one of the most important analysis use to find out efficiency of certain cryptographic algorithms. This test describes actual time taken in execution of encryption using proposed algorithm. The proposed system is very much efficient then already existing schemes. The efficiency of system depends upon computational cost and resources which must be minimum to ensure that system is much efficient then already existing schemes. We investigated our proposed encryption algorithm using windows 10 pro operating system with system specification that includes CPU core i3 3227U, 1.9 GHZ with 8 GB ram and MATLAB 2017(a) version. Table. 14 demonstrates the time taken during encryption of proposed scheme. The test is done for several standard images and compared to already existing cryptosystem encryption time complexity. The encryption and decryption time are almost same for unique cryptosystem. The projected technique in Table. 14 show that the proposed hybrid system of Brownian movement of particles with certain chaotic dynamical system is highly efficient. This test validated our proposed cryptosystem and ensured the efficiency of system.

Tab. 14. Time complexity analysis for certain images.
Time complexity analysis for certain images.

5.9 Investigation of NIST test

NIST test examination is one the most notable approved standard use to find randomness. This test involves number of autonomous statistical tests. We have investigated NIST tests for our proposed encryption algorithm in order to authenticate the randomness. The probabilities of passing each test must be greater than 0.01. In case of our anticipated scheme, the number values for NIST are all greater than 0.01 which qualify the suggested scheme for true random cipher (See Table 15).

Tab. 15. NIST test analysis for different layers of encrypted image.
NIST test analysis for different layers of encrypted image.

5.10 Software and system specifications

In this section we conducted tests for several standard test images having size of 256×256×3 and layer wise having size of 256×256 and OS of CPU core i3 3227U, 1.9 GHZ with 8 GB ram and MATLAB 2017(a) version.

6 Conclusion

We have proposed a digital confidentiality preserving scheme which is based on Brownian motion and chaotic iterative maps. The suggested scheme is authenticated against various standard benchmarks available in literature. Our proposed scheme is quite competent of providing secrecy to digital contents and prevent eavesdropper to steals the secret information. The proposed algorithm is designed for security of images though it can be extended to the encryption of some other types of data such as audio and video information. The system designed can be implemented for real time communication.


Zdroje

1. Shannon C.E., 1949. Communication theory of secrecy systems. Bell system technical journal, 28(4), pp.656–715.

2. Shannon C.E., 1948. A mathematical theory of communication. Bell system technical journal, 27(3), pp.379–423.

3. Rafiq A. and Khan M., 2018. Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimedia Tools and Applications, pp.1–18.

4. Younas I. and Khan M., 2018. A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy, 20(12), p.913.

5. Khan M. and Waseem H.M., 2018. A novel image encryption scheme based on quantum dynamical spinning and rotations. PloS one, 13(11), p.e0206460. doi: 10.1371/journal.pone.0206460 30452455

6. Waseem H.M., Khan M. and Shah T., 2018. Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging, 27(6), p.063022.

7. Waseem H.M. and Khan M., 2018. Information Confidentiality Using Quantum Spinning, Rotation and Finite State Machine. International Journal of Theoretical Physics, 57(11), pp.3584–3594.

8. Munir, N. and Khan, M., 2018, September. A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE.

9. Khan M. and Asghar Z., 2018. A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Computing and Applications, 29(4), pp.993–999.

10. Belazi A., Khan M., El-Latif A.A.A. and Belghith S., 2017. Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynamics, 87(1), pp.337–361.

11. Khan M., Shah T. and Batool S.I., 2017. A new approach for image encryption and watermarking based on substitution box over the classes of chain rings. Multimedia Tools and Applications, 76(22), pp.24027–24062.

12. Özkaynak F., Çelik V. and Özer A.B., 2017. A new S-box construction method based on the fractional-order chaotic Chen system. Signal, Image and Video Processing, 11(4), pp.659–664.

13. Özkaynak F., 2018. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dynamics, 92(2), pp.305–313.

14. Özkaynak, F. and Muhamad, M.I., 2018, March. Alternative substitutional box structures for DES. In Digital Forensic and Security (ISDFS), 2018 6th International Symposium on (pp. 1–4). IEEE.

15. Özkaynak F., 2017. Construction of robust substitution boxes based on chaotic systems. Neural Computing and Applications, pp.1–10.

16. Özkaynak F., 2018. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dynamics, 92(2), pp.305–313.

17. Ahmad M., Khurana S., Singh S. and AlSharari H.D., 2017. A simple secure hash function scheme using multiple chaotic maps. 3D Research, 8(2), p.13.

18. Al Solami E., Ahmad M., Volos C., Doja M. and Beg M., 2018. A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy, 20(7), p.525.

19. Ahmad M., Al Solami E., Wang X.Y., Doja M., Beg M. and Alzaidi A., 2018. Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos. Symmetry, 10(7), p.266.

20. Ahmad M., Seeru F., Siddiqi A.M. and Masood S., 2018. Dynamic 9× 9 Substitution-Boxes Using Chaos-Based Heuristic Search. In Soft Computing: Theories and Applications (pp. 839–851). Springer, Singapore.

21. Ahmed H.A., Zolkipli M.F. and Ahmad M., A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Computing and Applications, pp.1–10.

22. Al Solami E., Ahmad M., Volos C., Doja M. and Beg M., 2018. A new hyperchaotic system-based design for efficient bijective substitution-boxes. Entropy, 20(7), p.525.

23. Ahmad M., Alam M.Z., Umayya Z., Khan S. and Ahmad F., 2018. An image encryption approach using particle swarm optimization and chaotic map. International Journal of Information Technology, 10(3), pp.247–255.

24. Alzaidi A.A., Ahmad M., Ahmed H.S. and Solami E.A., 2018. Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map. Complexity, 2018. doi: 10.1155/2018/5094179

25. Vaidyanathan S., Akgul A., Kaçar S. and Çavuşoğlu U., 2018. A new 4-D chaotic hyperjerk system, its synchronization, circuit design and applications in RNG, image encryption and chaos-based steganography. The European Physical Journal Plus, 133(2), p.46.

26. Akgul A., Kacar S., Pehlivan I. and Aricioglu B., 2018. Chaos‐based encryption of multimedia data and design of security analysis interface as an educational tool. Computer Applications in Engineering Education, 26(5), pp.1336–1349.

27. Wang X., Akgul A., Cavusoglu U., Pham V.T., Vo Hoang D. and Nguyen X., 2018. A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application. Applied Sciences, 8(11), p.2132.

28. Lai Q., Akgul A., Varan M., Kengne J. and Erguzel A.T., 2018. Dynamic analysis and synchronization control of an unusual chaotic system with exponential term and coexisting attractors. Chinese Journal of Physics.

29. Lian S., A Block Cipher Based on Chaotic Neural Networks, Neurocomputing, vol. 72, pp. 1296–1301, 2009.

30. Brown R., 1828. XXVII. A brief account of microscopical observations made in the months of June, July and August 1827, on the particles contained in the pollen of plants; and on the general existence of active molecules in organic and inorganic bodies. The Philosophical Magazine, 4(21), pp.161–173.

31. Chaudesaigues M., 1908. Le mouvement brownien et la formule d'Einstein. Comptes Rendus, 147, pp.1044–1046.

32. Niyat A.Y., Moattar M.H. and Torshiz M.N., 2017. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optics and Lasers in Engineering, 90, pp.225–237.

33. Huang C.K. and Nien H.H., 2009. Multi chaotic systems based pixel shuffle for image encryption. Optics Communications, 282(11), pp.2123–2127.

34. Rhouma R., Meherzi S. and Belghith S., 2009. OCML-based colour image encryption. Chaos, Solitons & Fractals, 40(1), pp.309–318.

35. Liu H., Wang X., Kadir A.: Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik 124, 3527–3533 (2013).

36. Norouzi B., Seyedzadeh S.M., Mirzakuchaki S., Mosavi M.R.: A novel image encryption based on hash function with only two-round diffusion process. Multimed. Syst. 20, 45–64 (2013)

37. Zhang Q., Guo L., Wei X.: Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 52, 2028–2035 (2010).

38. Wei X., Guo L., Zhang Q., Zhang J., Lian S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85, 290–299 (2012).

39. Zhang Q., Guo L., Wei X.: A novel image fusion encryption algorithm based on DNA sequence operation and hyperchaotic system. Optik 124, 3596–3600 (2013).

40. Zhang Q., Wei X.: A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system. Optik 124, 6276–6281 (2013).

41. Zhang Q., Liu L., Wei X.: Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. Int. J. Electron. Commun. (AEÜ) 68, 186–192 (2014).

42. Enayatifar R., Abdullah A.H., Isnin I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83–93 (2014).

43. Zhen P., Zhao G., Min L., Jin X.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimed. Tools Appl. 75, 6303–6319 (2016).

44. Rhouma R, Meherzi S, Belghith S., 2009, “OCML-based color image encryption”, Chaos, Solitons and Fractals 40, pp. 309–318.

45. Hongjun L, Xingyuan W., 2010, “Color image encryption based on one-time keys and robust chaotic maps”, Computer and Mathematics with Applications 59, pp. 3320–7.

46. Huang C K, Nien H H., 2009, “Multi chaotic systems based pixel shuffle for image encryption”, Optics Communications 282, pp. 2123–2127.

47. Borujeni S.E. and Eshghi M., 2013. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems, 52(2), pp.525–537.

48. Singh N. and Sinha A., 2008. Optical image encryption using fractional Fourier transform and chaos. Optics and Lasers in Engineering, 46(2), pp.117–123.

49. Wang X., Zhao D. and Chen L., 2006. Image encryption based on extended fractional Fourier transform and digital holography technique. Optics Communications, 260(2), pp.449–453.

50. Prasanna S.R.M., Rao Y.S. and Mitra A., 2006. An image encryption method with magnitude and phase manipulation using carrier images. International Journal of Computer Science, 1(2), pp.132–137

51. Khan Majid & Shah Tariq. (2015). An efficient chaotic image encryption scheme. Neural Computing and Applications. 26. doi: 10.1007/s00521-014-1800-0

52. Zhi-liang Z., Wei Z., Wong K., & Hai Y. (2011). A chaos based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181, 1171–1186.

53. Wang X., & Lei Y. (2012). A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Optics Communications, 285, 4033–4042.

54. Zhang G., & Liu Q. (2011). A novel image encryption method based on total shuffling scheme. Optics Communications, 284, 2775–2780.

55. Yue W., Yicong Z., Joseph P., et al. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317–339.

56. Wang X., Zhang Y., & Bao X. (2015). A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering, 73, 53–61.

57. Huang C.K. and Nien H.H., 2009. Multi chaotic systems based pixel shuffle for image encryption. Optics Communications, 282(11), pp.2123–2127.

58. Rhouma R., Meherzi S., Belghith S.: OCML-based colour image encryption.Chaos Soliton. Fract. 40,309–318(2009).

59. Gupta K., Silakari S.: Novel approach for fast compressed hybrid color image cryptosystem. Adv. Eng. Softw. 49, 29–42 (2012).

60. Kadir A., Hamdulla A., Guo W.: Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125, 1671–1675 (2014).

61. Liu H., Wang X., Kadir A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12, 1457–1466 (2012).

62. Wei X., Guo L., Zhang Q., Zhang J. and Lian S., 2012. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. Journal of Systems and Software, 85(2), pp.290–299.

63. Liu L., Zhang Q. and Wei X., 2012. A RGB image encryption algorithm based on DNA encoding and chaos map. Computers & Electrical Engineering, 38(5), pp.1240–1248.

64. Wang X. and Xu D., 2014. A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear dynamics, 75(1–2), pp.345–353.

65. Zhu C., Xu S., Hu Y. and Sun K., 2015. Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dynamics, 79(2), pp.1511–1518.

66. Norouzi B., Mirzakuchaki S., Seyedzadeh S.M. and Mosavi M.R., 2014. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia tools and applications, 71(3), pp.1469–1497.

67. Khan M. and Masood F., 2019. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications, pp.1–20.

68. Ahmad J. and Hwang S.O., 2016. A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), pp.13951–13976.

69. Ahmed F., Anees A., Abbas V.U. and Siyal M.Y., 2014. A noisy channel tolerant image encryption scheme. Wireless personal communications, 77(4), pp.2771–2791

70. Zhou Zhili, Yang Chingnung, Cao Yi, Sun Xingming. Secret Image Sharing based on Encrypted Pixels. IEEE Access. 2018. 6: 15021–15025.


Článok vyšiel v časopise

PLOS One


2019 Číslo 12
Najčítanejšie tento týždeň
Najčítanejšie v tomto čísle
Kurzy

Zvýšte si kvalifikáciu online z pohodlia domova

Aktuální možnosti diagnostiky a léčby litiáz
nový kurz
Autori: MUDr. Tomáš Ürge, PhD.

Všetky kurzy
Prihlásenie
Zabudnuté heslo

Zadajte e-mailovú adresu, s ktorou ste vytvárali účet. Budú Vám na ňu zasielané informácie k nastaveniu nového hesla.

Prihlásenie

Nemáte účet?  Registrujte sa

#ADS_BOTTOM_SCRIPTS#