A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption
Abstract
:1. Introduction
2. New Five-Dimensional Chaotic System
2.1. Dissipative Analysis
2.2. Balance Point Analysis
2.3. Time Series Chart
2.4. Phase Diagram Analysis
2.5. Bifurcation Diagram
2.6. Power Spectrum Analysis
3. Circuit Design and Experimental Results
4. Related Information
4.1. Convolution Operation
4.2. “Same OR” Operation
5. Algorithm Descriptions
5.1. Encryption Algorithm Description
5.2. Decryption Algorithm Description
6. Experimental Results and Analysis
6.1. Experiment Platform
6.2. Experimental Result
6.3. Key Space Analysis
6.4. Convolution Nuclear Sensitivity Analysis
6.5. Key Sensitivity Analysis
6.6. Information Entropy Analysis
6.7. Histogram Analysis
6.8. Histogram Statistics
6.9. Correlation Analysis of Adjacent Pixels
6.10. Robustness Analysis
6.10.1. Quality Metrics Analysis
6.10.2. Occlusion Attack Analysis
6.10.3. Noise Attack Analysis
7. Conclusions
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Peng, Z.P.; Wang, C.H.; Yuan, L.; Luo, X.W. A novel four-dimensional multi-wing hyper-chaotic attractor and its application in image encryption. Acta Phys. Sin. Chin. Ed. 2014, 63, 506. [Google Scholar] [CrossRef]
- Liu, Y. Study on Chaos Based Pseudorandom Sequence Algorithm and Image Encryption Technique. Ph.D. Thesis, Harbin Institute of Technology, Harbin, China, 2015. [Google Scholar]
- Rui, L. New Algorithm for Color Image Encryption Using Improved 1D Logistic Chaotic Map. Open Cybern. Syst. J. 2015, 9, 210–216. [Google Scholar] [CrossRef]
- Sun, S. A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling. IEEE Photonics J. 2018, 10, 1–14. [Google Scholar] [CrossRef]
- Chai, X.; Gan, Z.; Zhang, M. A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed. Tools Appl. 2016, 76, 15561–15585. [Google Scholar] [CrossRef]
- Ahmad, J.; Khan, M.A.; Ahmed, F.; Khan, J.S. A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput. Appl. 2017, 30, 3847–3857. [Google Scholar] [CrossRef]
- Ahmad, J.; Hwang, S.O. Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn. 2015, 82, 1839–1850. [Google Scholar] [CrossRef]
- Gao, T.; Chen, Z. Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 2018, 38, 213–220. [Google Scholar] [CrossRef]
- Pareek, N.K.; Patidar, V.; Sud, K.K. Image encryption using chaotic logistic map. Image Vis. Comput. 2006, 24, 926–934. [Google Scholar] [CrossRef]
- Li, Y.; Tang, W.K.S.; Chen, G. Generating hyperchaos via state feedback control. Int. J. Bifurc. Chaos 2005, 15, 3367–3375. [Google Scholar] [CrossRef]
- Li, Y.; Wang, C.; Chen, H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 2017, 90, 238–246. [Google Scholar] [CrossRef]
- Zhang, X.; Feng, H.; Ying, N. Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Comput. Intell. Neurosci. 2017, 2017. [Google Scholar] [CrossRef]
- Liu, J.; Yang, D.; Zhou, H.; Chen, S. A digital image encryption algorithm based on bit-planes and an improved logistic map. Multimed. Tools Appl. 2017, 77, 10217–10233. [Google Scholar] [CrossRef]
- Qi, Y.; Wang, C. A New Chaotic Image Encryption Scheme Using Breadth-First Search and Dynamic Diffusion. Int. J. Bifurc. Chaos 2018, 28, 475. [Google Scholar] [CrossRef]
- Assad, S.E.; Farajallah, M. A new chaos-based image encryption system. Signal Process. Image Commun. 2015, 41, 144–157. [Google Scholar] [CrossRef]
- Çavuşoğlu, Ü.; Panahi, S.; Akgül, A.; Jafari, S.; Kaçar, S. A new chaotic system with hidden attractor and its engineering applications: Analog circuit realization and image encryption. Analog Integr. Circuits Signal Process. 2019, 98, 85–99. [Google Scholar] [CrossRef]
- Enayatifar, R.; Abdullah, A.H.; Isnin, I.F.; Altameem, A.; Lee, M. Image encryption using a synchronous permutation-diffusion technique. Opt. Lasers Eng. 2017, 90, 146–154. [Google Scholar] [CrossRef]
- Chen, J.X.; Zhu, Z.-L.; Fu, C.; Zhang, L.-B.; Zhang, Y. An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun. Nonlinear Sci. Numer. Simul. 2015, 23, 294–310. [Google Scholar] [CrossRef]
- Zhang, Y.; Li, C.; Li, Q.; Zhang, D.; Shu, S. Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2012, 69, 1091–1096. [Google Scholar] [CrossRef]
- Sprott, J. Some simple chaotic flows. Phys. Rev. E 1994, 50, 647–650. [Google Scholar] [CrossRef]
- Alvarez, G.; Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 2006, 16, 2129–2151. [Google Scholar] [CrossRef] [Green Version]
- Ravichandran, D.; Praveenkumar, P.; Rayappan, J.B.B.; Amirtharajan, R. DNA Chaos Blend to Secure Medical Privacy. IEEE Trans. Nanobiosci. 2017, 16, 850–858. [Google Scholar] [CrossRef] [PubMed]
- Murillo-Escobar, M.A.; Meranza-Castillón, M.O.; López-Gutiérrez, R.M.; Cruz-Hernández, C. Suggested Integral Analysis for Chaos-Based Image Cryptosystems. Entropy 2019, 21, 815. [Google Scholar] [CrossRef] [Green Version]
- Li, S.; Ding, W.; Yin, B.; Zhang, T.; Ma, Y. A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption. Entropy 2018, 20, 463. [Google Scholar] [CrossRef] [Green Version]
A(Input) | B(Input) | F(Result) |
---|---|---|
0 | 0 | 1 |
0 | 1 | 0 |
1 | 0 | 0 |
1 | 1 | 1 |
Lena Image | ||||||
---|---|---|---|---|---|---|
Index | Pixel Change Rate (NPCR) | 0.9716 | 0.9962 | 0.9962 | 0.9963 | 0.996 |
Normalized Mean Change Intensity (UACI) | 0.2271 | 0.3341 | 0.3335 | 0.3352 | 0.3346 |
Images | Lena | Baboon | Boat | Peppers | ||||
---|---|---|---|---|---|---|---|---|
Index | Pixel Change Rate (NPCR) | Normalized Mean Change Intensity (UACI) | NPCR | UACI | NPCR | UACI | NPCR | UACI |
Test value | 0.9961 | 0.3356 | 0.9962 | 0.3344 | 0.996 | 0.3363 | 0.9962 | 0.3357 |
Reference [4] | 0.9961 | 0.3346 | - | - | - | - | - | - |
Reference [14] | 0.9961 | 0.3346 | - | - | - | - | 0.9962 | 0.3341 |
Reference [17] | 0.9952 | 0.3359 | 0.991 | 0.3325 | 0.9925 | 0.3339 | 0.985 | 0.3295 |
Image | Lena | Baboon | Boat | Peppers | Couple |
---|---|---|---|---|---|
Original Image | 7.4832 | 7.3713 | 7.1267 | 7.5715 | 7.2369 |
Encrypted Image | 7.9978 | 7.9977 | 7.997 | 7.9974 | 7.9974 |
Image | Original Image Information Entropy | Encrypted Image Information Entropy | |||||
---|---|---|---|---|---|---|---|
Algorithm | Reference [4] | Reference [11] | Reference [12] | Reference [13] | Reference [17] | ||
Lena | 7.4832 | 7.9978 | 7.9967 | 7.9972 | 7.9900 | 7.9959 | 7.9975 |
Image | Global Entropy | Local Entropy No. of Blocks = 20 (Block Size = 44 × 44) | Local Entropy Critical Values | ||
---|---|---|---|---|---|
hl*0.05left = 7.9019 hl*0.05right = 7.9030 | hl*0.01left = 7.9017; hl*0.01right = 7.9032 | hl*0.001left = 7.9015l hl*0.001right = 7.9034 | |||
Lena | 7.9978 | 7.9028 | Pass | Pass | Pass |
Baboon | 7.9977 | 7.9023 | Pass | Pass | Pass |
Boat | 7.997 | 7.9027 | Pass | Pass | Pass |
Couple | 7.9974 | 7.9022 | Pass | Pass | Pass |
Plain Image | Scale | ||
Lena | gray | 37,963 | 195 |
Reference [22] (lena ) | gray | 38,451 | 196 |
Boat | gray | 103,380 | 321.5 |
Baboon | gray | 58,542 | 241.9 |
Couple | gray | 79,457 | 281.9 |
Encrypted Image | Scale | ||
Lena | gray | 230 | 15 |
Reference [22] (lena ) | gray | 414 | 20 |
Boat | gray | 250 | 15.8 |
Baboon | gray | 260 | 16.1 |
Couple | gray | 242 | 15.6 |
Images | Horizontal Correlation Coefficient | Vertical Correlation Coefficient | Diagonal Direction Correlation Coefficient | |||
---|---|---|---|---|---|---|
Clear Image | Ciphertext Image | Clear Image | Ciphertext Image | Clear Image | Ciphertext Image | |
Lena | 0.971 | 0.012 | 0.9402 | 0.002 | 0.9121 | −0.0083 |
Baboon | 0.8343 | −0.0109 | 0.8712 | 0.0043 | 0.794 | −0.0074 |
Boat | 0.9574 | −0.0076 | 0.9533 | −0.0137 | 0.915 | 0.0036 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, T.; Song, L.; Wang, M.; Chen, S.; Zhuang, Z. A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption. Entropy 2020, 22, 243. https://doi.org/10.3390/e22020243
Wang T, Song L, Wang M, Chen S, Zhuang Z. A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption. Entropy. 2020; 22(2):243. https://doi.org/10.3390/e22020243
Chicago/Turabian StyleWang, Tao, Liwen Song, Minghui Wang, Shiqiang Chen, and Zhiben Zhuang. 2020. "A Novel Five-Dimensional Three-Leaf Chaotic Attractor and Its Application in Image Encryption" Entropy 22, no. 2: 243. https://doi.org/10.3390/e22020243