Image Encryption Using Hyper Chaos and Symmetric Cryptography
Image Encryption Using Hyper Chaos and Symmetric Cryptography
+
=
(
+
+
(1)
where
) , (
n n
y x
is the pixel position in the N M image so that :
{ ; 1 .., , 2 , 1 , 0 e N x
n
(2)
{ ; 1 .., , 2 , 1 , 0 e M y
n
and
) , (
1 1 + + n n
y x
is the transformed position after cat map; a and b are two control parameters and are positive
integers. Cat map has two typical factors, which bring chaotic movement: tension (multiply matrix in order to
enlarge x, y) and fold (taking mod in order to bring x, y in unit matrix). In fact, cat map is a chaotic map. Image
position is scrambled via the iteration of cat map, consequently realizing the image encryption. The result of
scrambling is different for difference of the iteration times. For a 256 256gray image, it is hard to find out the
trace of original image after iterating 30 times, reaching the effect of scrambling; the image after iterating 64
times is the same as the original image, so cat map has the periodicity. With the differences of the parameter and
the images size, the periodicity is different. Image can be scrambled via keeping the value of a and b secret,
but the periodicity will bring some insecure factors, so applying cat map solely cannot meet the demands of
encryption; and cat map only transforms the original images position, however the pixels values have not been
changed [4].
I. CHAOTIC AES
The next, but somehow more important part of our proposed scheme is encryption part. Since high speed for
encryption/decryption is a feature of interest in online secure image transmission, we have to apply
encryption/decryption scheme which has satisfactory speed in practical implementation.
Besides security level of this block is of great importance as diffusion of the image information is provided
with this block. Many renowned block ciphers, such as DES, AES, MISTY etc, can be used based on required
level of security, size of the key, speed of implementation and other related design metrics. Some previous
works, such as [34], are of this family. That is they utilize block ciphers in conjunction with scrambling for
image encryption. It applies cat map for scrambling of pixel contents and simplified AES for encryption. Our
approach differs with previous works in the sense that we use chaos to provide both diffusion and confusion.
That is, we also make use of chaos in encryption process by utilizing it in S-box design procedure [3, 4].
Here, we briefly overview chaotic S-box design. Security of block ciphers mainly relies on the S-boxes,
since they are the only nonlinear element in block cipher algorithm. So designing S-boxes to maintain
cryptographic requirements is actually the heart of block cipher design. S-box design criterion of the most
famous block cipher, DES, have been mysterious for decades, after its adaptation as a federal standard in 1977
and have not been published till now. On the other hand, new block cipher designers often clarify their assumed
criterion for picking up an S-box. For, S-box of AES, new selected block cipher in replacement of DES has been
chosen mathematically. Due to lack of space, we cannot review this subject anymore and just comes up to our
used scheme. Some papers employ chaos for S-box design. We use the presented approach in [32] and produce
chaotic-based S-box for S-AES. S-AES is simplified version of AES algorithm [33]. It operates on 16-bit
plaintexts and generates 16-bit cipher texts, using the expanded key k
0
,.., k
47
.
For more information about S-AES, we recommend taking a look at [33]. In order to produce an S-box with
chaos, it is necessary to choose a chaotic mapping with good level of unpredictability and irregularity. Then one
of the outputs should be selected, quantized and sampled. Numbers of quantization levels are equal to the S-box
size. We make use of hyper-chaotic mapping [18], in the procedure of S-box design
The first and most necessary characteristic to check is that the obtained S-box should be reversible. The
other essential cryptographic characteristics and requirements for obtaining good S-box have been check and S-
box with satisfactory level of them has been chosen. It must be noted that some parameters of the chaotic
(IJIRSE) International Journal of Innovative Research in Science & Engineering
ISSN (Online) 2347-3207
mapping and sampling rate should be tuned well in order to reach acceptable S-box. This S-box then replaced
with the S-box of S-AES to attain chaos-based block cipher, which we name it chaotic-S-AES hereafter. That
the chaos is also used in the design of encryption algorithm is the main prominence of our work in comparison
with the formers [3, 4].
II. HYPER CHAOTIC KEY SPACE
While classical encryption algorithms are sensitive to keys, so some elaborated constructions are need to
achieve satisfying and safer chaos-based encryption. It is well known that a good encryption algorithm should
be sensitive to the cipher keys, and the key space should be large enough to make brute-force attacks infeasible
[12].
The difference between hyper-chaos and chaos is that the further is unstable in at least two directions, while
the latter only diffuses in one certain direction. In other words, the hyper-chaos has at least two positive
Lyapunov exponents, while the latter has only one. For security, because hyper chaotic systems have more
complicated phase space than chaotic systems, it is difficult to use those methods based on chaos
synchronization to attack them [9].
Compared with one-dimensional chaotic map, for example, logistic mp and skew tent map, 4D hyper chaotic
system defined as (1) has more control parameters and initial conditions. It can enlarge the key space when it is
combined in the image encryption algorithm.
In the proposed encryption scheme, this 4D hyper-chaotic system generated from Chens chaotic system [30] is
used in key scheming, which is modeled by:
+ = '
= '
+ + = '
= '
k x w
dz xy z
w cy bx xz y
x y a x ) (
(3)
Where when a = 36, b = 16, c = 28, d = 3, and k [0.7, 0.7], the system can be in chaos phenomena (Figure
2, 3 and 4), and its Lyapunov exponents are
54 . 10 , 0 , 019 . 0 , 499 . 1
4 3 2 1
= = = =
. More details can be seen
and studied in [5] with some other properties.
With randomly chosen initial conditions
0 0 0
, , z y x and
0
w , if the system (1) is iterated after many rounds, we
can get a chaotic sequence { ; ,... , , , , , , ,
1 1 1 1 0 0 0 0
w z y x w z y x s = .
This chaotic system selects four control parameters for the key, four initial values change with encryption
process, so the key space is large enough. We can divide image into many sections, and each section is
encrypted with a different key, the key is produced through four dimensional map and AES algorithm, and it is
more secure. Due to the randomness of four-dimensional map and the security of AES, it is hard to get internal
control parameters even if someone knows the key generator. The probability of obtaining the encryption keys is
very low [9].
As the hyper-chaos has two positive Lyapunov exponents, so the prediction time of a hyper chaotic system is
shorter than that of a chaotic system [21], as a result, it is safer than chaos in security algorithm. For more
detailed analysis of the complex dynamics of the system, please see relative references [30, 9].
Figure 2. Hyper chotic system (y-x plane) Figure 3. Hyper chotic system (z-y plane) Figure 4. Hyper chotic system (w-x plane)
(IJIRSE) International Journal of Innovative Research in Science & Engineering
ISSN (Online) 2347-3207
V. EXPRIMENTAL RESULT
A. Correlation Analysis
To test the correlation between two adjacent pixels (vertically and horizontally) in an encrypted image, some
simulations are carried out. Firstly, randomly select 4096 pairs of two adjacent pixels from the image, then
calculate the correlation coefficient of each pair by using the following formulas [14]:
=
=
n
i
i
x
N
x E
1
1
) (
(4)
=
=
n
i
i i
x E x
N
x D
1
2
)) ( (
1
) (
(5)
=
=
n
i
i i i i
y E y x E x
N
y x
1
)) ( ))( ( (
1
) , cov(
(6)
) ( ) (
) , cov(
Y D x D
y x
r
xy
=
(7)
where x and y are grey values of two adjacent pixels in the image. From Table I, it can be seen that the proposed
image encryption algorithm based on image total shuffling matrix have better performance compared with
algorithm proposed by Ref. [18], which used the same grey image as that in this Letter. In the meantime, as
hyper-chaos has larger key spaces than that of chaos used in some literatures [2,3,20], and the image shuffling
algorithm proposed here is more secure than that using Arnold cat map transformation, which is periodic [3], so
hyper-chaos has some potential application in image encryption algorithms.
TABLE I. CORRELATION OF TWO ADJACENT PIXELS
Original image Encrypted image
Horizontal 0.9842 0.0098
Vertical 0.9762 0.0003
B. Histogram
The Lena image of size 512512 and 256 gray levels is employed for experimentation. The original image is
shown in figure 5, its histogram is given in figure 8. Figure 6 is the image obtained after confusion process on
the plain image. The corresponding histogram is shown in figure 9. It was observed from figure 8 and figure 9
that both histograms are same. It means that the corresponding statistical information depicted in Fig.6 after
confusion process is exactly the same as that of the original image. It is due to the fact that cat map does not
change the pixel values of the Lena image. The result shown in figure 7 is encrypted image obtained after
chaotic S-AES process. The corresponding histogram is shown in Fig.10. From the figure, one can see that the
histogram of the ciphered image is fairly uniform and is significantly different from that of the original image.
It was observed that this histogram is entirely different from one shown in figure 8.
Figure 5. Original image Figure 6. Scrambled image Figure 7. Encrypted image
Figure 8. Histogram of original image Figure 9. Histogram of scrambled image Figure 10. Histogram of encrypted image
(IJIRSE) International Journal of Innovative Research in Science & Engineering
ISSN (Online) 2347-3207
C. Key Space Analysis
In our algorithm, the initial values of Logistic map and hyper-chaotic system are used as secret keys, if the
precision is
14
10