CFP last date
21 October 2024
Reseach Article

Security and Performance Analysis of Chaos-based Image Encryption Schemes

by Abdul-Gabbar T. Al-Tamimi, Bushra Abduh Mohammed Aljafary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 32
Year of Publication: 2022
Authors: Abdul-Gabbar T. Al-Tamimi, Bushra Abduh Mohammed Aljafary
10.5120/ijca2022922384

Abdul-Gabbar T. Al-Tamimi, Bushra Abduh Mohammed Aljafary . Security and Performance Analysis of Chaos-based Image Encryption Schemes. International Journal of Computer Applications. 184, 32 ( Oct 2022), 1-20. DOI=10.5120/ijca2022922384

@article{ 10.5120/ijca2022922384,
author = { Abdul-Gabbar T. Al-Tamimi, Bushra Abduh Mohammed Aljafary },
title = { Security and Performance Analysis of Chaos-based Image Encryption Schemes },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2022 },
volume = { 184 },
number = { 32 },
month = { Oct },
year = { 2022 },
issn = { 0975-8887 },
pages = { 1-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number32/32517-2022922384/ },
doi = { 10.5120/ijca2022922384 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:22:56.184766+05:30
%A Abdul-Gabbar T. Al-Tamimi
%A Bushra Abduh Mohammed Aljafary
%T Security and Performance Analysis of Chaos-based Image Encryption Schemes
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 32
%P 1-20
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The widespread of images and their massive daily transmission in cyber society have created excess demand for encryption of image assets to guarantee confidentiality, integrity, and availability. Many researchers have applied chaotic encryption methods due to image cryptography’s high efficiency and quality. This paper is an in-depth performance analysis and comparative study on three recent chaos-based image encryption schemes. The three schemes implement the multiple chaotification method, hybrid chaotification method, and hyper chaotification method, with a singleround design to improve the random behaviors. This research evaluates the schemes’ strengths, weaknesses, vulnerabilities, performance, and robustness. In addition, it assesses the schemes’ performance using a common analytical standard to measure their security. It also explores that choosing the appropriate chaotification method with high security and reasonable computational cost in encryption schemes is insufficient to ensure the security and efficiency of encryption schemes. However, the general structure of the scheme is an essential complement and plays a crucial role in the security and efficiency of the encryption system. Finally, this research explores that several statistical tests are insufficient metrics for security analysis measures for detecting weaknesses even though they pass all tests. Statistical tests can only provide a necessary but not sufficient condition, and cryptanalysis is the only proof of cryptographic schemes’ security. These facts highlight the need for principles for designing robust chaotic ciphers.

References
  1. Hikmat N Abdullah and Hamsa A Abdullah. Image encryption using hybrid chaotic map. In 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), pages 121–125. IEEE, 2017.
  2. Shafali Agarwal. A review of image scrambling technique using chaotic maps. International Journal of Engineering and Technology Innovation, 8(2):77, 2018.
  3. S Alam and Payer Ahmed. Several chaotic analysis of lorenz system. Eur Sci J, 13(9):438–455, 2017.
  4. Gonzalo Alvarez, Jos´e Mar´ıa Amig´o, David Arroyo, and Shujun Li. Lessons learnt from the cryptanalysis of chaosbased ciphers. In Chaos-Based Cryptography, pages 257– 295. Springer, 2011.
  5. Gonzalo Alvarez and Shujun Li. Some basic cryptographic requirements for chaos-based cryptosystems. International journal of bifurcation and chaos, 16(08):2129–2151, 2006.
  6. Xiuli Chai, Yiran Chen, and Lucie Broyde. A novel chaosbased image encryption algorithm using dna sequence operations. Optics and Lasers in engineering, 88:197–213, 2017.
  7. Xiuli Chai, Xiaoyu Zheng, Zhihua Gan, and Yiran Chen. Exploiting plaintext-related mechanism for secure color image encryption. Neural Computing and Applications, 32(12):8065–8088, 2020.
  8. Guanrong Chen and Xinghuo Yu. Chaos control: theory and applications, volume 292. Springer Science & Business Media, 2003.
  9. Hsien-Keng Chen and Ching-I Lee. Anti-control of chaos in rigid body motion. Chaos, Solitons & Fractals, 21(4):957– 965, 2004.
  10. Yashuang Deng, Hanping Hu, Naixue Xiong, Wei Xiong, and Lingfeng Liu. A general hybrid model for chaos robust synchronization and degradation reduction. Information Sciences, 305:146–164, 2015.
  11. NF Elabady, HM Abdalkader, MI Moussa, and So F Sabbeh. Image encryption based on new one-dimensional chaotic map. In 2014 international conference on engineering and technology (ICET), pages 1–6. IEEE, 2014.
  12. Michael Franc¸ois, Thomas Grosges, Dominique Barchiesi, and Robert Erra. Image encryption algorithm based on a chaotic iterative process. 2012.
  13. Jiri Fridrich. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 8(06):1259–1284, 1998.
  14. Chong Fu, Gao-yuan Zhang, Mai Zhu, Zhe Chen, and Weimin Lei. A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Security and Communication Networks, 2018, 2018.
  15. S Geetha, P Punithavathi, A Magnus Infanteena, and S Siva Sivatha Sindhu. A literature review on image encryption techniques. International Journal of Information Security and Privacy (IJISP), 12(3):42–83, 2018.
  16. Mohammad Ghebleh, Ali Kanso, and Hassan Noura. An image encryption scheme based on irregularly decimated chaotic maps. Signal Processing: Image Communication, 29(5):618– 627, 2014.
  17. T Gopalakrishnan and S Ramakrishnan. Performance analysis of image encryption methods using chaotic, multiple chaotic and hyper-chaotic maps. In Handbook of Multimedia Information Security: Techniques and Applications, pages 233– 265. Springer, 2019.
  18. Gururaj Hanchinamani and Linganagouda Kulakarni. Image encryption based on 2-d zaslavskii chaotic map and pseudo hadmard transform. International Journal of Hybrid Information Technology, 7(4):185–200, 2014.
  19. Noha A Hikal and Marwa M Eid. A new approach for palmprint image encryption based on hybrid chaotic maps. Journal of King Saud University-Computer and Information Sciences, 32(7):870–882, 2020.
  20. Zhongyun Hua, Fan Jin, Binxuan Xu, and Hejiao Huang. 2d logistic-sine-coupling map for image encryption. Signal Processing, 149:148–161, 2018.
  21. Zhongyun Hua and Yicong Zhou. Design of image cipher using block-based scrambling and image filtering. Information sciences, 396:97–113, 2017.
  22. Manjit Kaur and Vijay Kumar. A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering, 27(1):15–43, 2020.
  23. Noura Khalil, Amany Sarhan, and Mahmoud AM Alshewimy. An efficient color/grayscale image encryption scheme based on hybrid chaotic maps. Optics & Laser Technology, 143:107326, 2021.
  24. Majid Khan and Fawad Masood. A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications, 78(18):26203– 26222, 2019.
  25. Majid Khan and Tariq Shah. A novel statistical analysis of chaotic s-box in image encryption. 3D Research, 5(3):16, 2014.
  26. Krishna Kumar, Satyabrata Roy, Umashankar Rawat, and Shashwat Malhotra. Iehc: An efficient image encryption technique using hybrid chaotic map. Chaos, Solitons & Fractals, 158:111994, 2022.
  27. Rushi Lan, Jinwen He, Shouhua Wang, Tianlong Gu, and Xiaonan Luo. Integrated chaotic systems for image encryption. Signal Processing, 147:133–145, 2018.
  28. Jun Lang. Image encryption based on the reality-preserving multiple-parameter fractional fourier transform and chaos permutation. Optics and Lasers in Engineering, 50(7):929– 937, 2012.
  29. Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G Bourbakis, and Kwok-Tung Lo. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication, 23(3):212–223, 2008.
  30. Zhen Li, Changgen Peng, Liangrong Li, and Xiaoyan Zhu. A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dynamics, 94(2):1319– 1333, 2018.
  31. Wenhao Liu, Kehui Sun, and Congxu Zhu. A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering, 84:26–36, 2016.
  32. Noura Louzzani, Abdelkrim Boukabou, Halima Bahi, and Ali Boussayoud. A novel chaos based generating function of the chebyshev polynomials and its applications in image encryption. Chaos, Solitons & Fractals, 151:111315, 2021.
  33. Yaobin Mao, Guanrong Chen, and Shiguo Lian. A novel fast image encryption scheme based on 3d chaotic baker maps. International Journal of Bifurcation and chaos, 14(10):3613– 3624, 2004.
  34. Amal Abdulbaqi Maryoosh, Raniah Ali Mustafa, and Zahraa Salah Dhaief. Image encryption techniques based on chaotic map. Int. J. Eng. Res. Adv. Technol IJERAT (ISSN: 2454-6135), 5(9):01–05, 2019.
  35. Robert Matthews. On the derivation of a “chaotic” encryption algorithm. Cryptologia, 13(1):29–42, 1989.
  36. Isha Mehra and Naveen K Nishchal. Optical asymmetric image encryption using gyrator wavelet transform. Optics Communications, 354:344–352, 2015.
  37. Alfred J Menezes, Paul C Van Oorschot, and Scott A Vanstone. Handbook of applied cryptography. CRC press, 2018.
  38. Bhaskar Mondal, Pratap Kumar Behera, and Sugata Gangopadhyay. A secure image encryption scheme based on a novel 2d sine–cosine cross-chaotic (sc3) map. Journal of Real-Time Image Processing, 18(1):1–18, 2021.
  39. MA Murillo-Escobar, MO Meranza-Castill´on, RM L´opez- Guti´errez, and C Cruz-Hern´andez. A chaotic encryption algorithm for image privacy based on two pseudorandomly enhanced logistic. Multimedia Security Using Chaotic Maps: Principles and Methodologies, 884:111, 2020.
  40. Fatih O¨ zkaynak. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dynamics, 92(2):305– 313, 2018.
  41. Chanil Pak and Lilian Huang. A new color image encryption using combination of the 1d chaotic map. Signal Processing, 138:129–137, 2017.
  42. R Parvaz and Mohammad Zarebnia. A combination chaotic system and application in color image encryption. Optics & Laser Technology, 101:30–41, 2018.
  43. Priyadarshini Patil, Prashant Narayankar, DG Narayan, and S Md Meena. A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa and blowfish. Procedia Computer Science, 78:617–624, 2016.
  44. K Abhimanyu Kumar Patro, Bibhudendra Acharya, and Vijay Nath. Secure multilevel permutation-diffusion based image encryption using chaotic and hyper-chaotic maps. Microsystem Technologies, 25(12):4593–4607, 2019.
  45. Noha Ramadan, HossamEldin H Ahmed, Said E El-khamy, Abd El-Samie, and E Fathi. Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain. Journal of Central South University, 24(9):2049–2057, 2017.
  46. Nitin Rawat, Byoungho Kim, and Rajesh Kumar. Fast digital image encryption based on compressive sensing using structurally random matrices and arnold transform technique. Optik, 127(4):2282–2286, 2016.
  47. Jai Ganesh Sekar and C Arun. Comparative performance analysis of chaos based image encryption techniques. J. Crit. Rev, 7(9):1138–1143, 2020.
  48. Claude E Shannon. Communication theory of secrecy systems. The Bell system technical journal, 28(4):656–715, 1949.
  49. Chaowen Shen, Simin Yu, Jinhu L¨u, and Guanrong Chen. A systematic methodology for constructing hyperchaotic systems with multiple positive lyapunov exponents and circuit implementation. IEEE Transactions on Circuits and Systems I: Regular Papers, 61(3):854–864, 2013.
  50. Shuliang Sun, Yongning Guo, and Ruikun Wu. A novel plaintext-related image encryption algorithm based on stochastic signal insertion and block swapping. IEEE Access, 7:123049–123060, 2019.
  51. Yohan Suryanto, MT Suryadi, and Kalamullah Ramli. A secure and robust image encryption based on chaotic permutation multiple circular shrinking and expanding. J. Inf. Hiding Multim. Signal Process., 7(4):697–713, 2016.
  52. DA Trujillo-Toledo, OR L´opez-Bonilla, EE Garc´ıa-Guerrero, E Tlelo-Cuautle, D L´opez-Mancilla, O Guill´en-Fern´andez, and E Inzunza-Gonz´alez. Real-time rgb image encryption for iot applications using enhanced sequences from chaotic maps. Chaos, Solitons & Fractals, 153:111506, 2021.
  53. Bin Wang, Yingjie Xie, Changjun Zhou, Shihua Zhou, and Xuedong Zheng. Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps. Optik, 127(7):3541–3545, 2016.
  54. Hui Wang, Di Xiao, Xin Chen, and Hongyu Huang. Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map. Signal processing, 144:444– 452, 2018.
  55. Xing-YuanWang and Zhi-Ming Li. A color image encryption algorithm based on hopfield chaotic neural network. Optics and Lasers in Engineering, 115:107–118, 2019.
  56. Xingyuan Wang and Xiaohui Du. Pixel-level and bit-level image encryption method based on logistic-chebyshev dynamic coupled map lattices. Chaos, Solitons & Fractals, 155:111629, 2022.
  57. Xingyuan Wang and Hui-li Zhang. A color image encryption with heterogeneous bit-permutation and correlated chaos. Optics Communications, 342:51–60, 2015.
  58. KWWong, WS Yap, BM Goi, and Denis CKWong. Differential cryptanalysis on chaotic based image encryption scheme. In IOP conference series: materials science and engineering, volume 495, page 012041. IOP Publishing, 2019.
  59. Yue Wu, Joseph P Noonan, Sos Agaian, et al. Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2):31–38, 2011.
  60. Lu Xu, Xu Gou, Zhi Li, and Jian Li. A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Optics and Lasers in Engineering, 91:41–52, 2017.
  61. Erdem Yavuz, Rifat Yazıcı, Mustafa Cem Kasapbas¸ı, and Ezgi Yamac¸. A chaos-based image encryption algorithm with simple logical functions. Computers & Electrical Engineering, 54:471–483, 2016.
  62. Guodong Ye, Chen Pan, Xiaoling Huang, and Qixiang Mei. An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dynamics, 94(1):745–756, 2018.
  63. Guodong Ye and Junwei Zhou. A block chaotic image encryption scheme based on self-adaptive modelling. Applied Soft Computing, 22:351–357, 2014.
  64. Sura F Yousif. Grayscale image confusion and diffusion based on multiple chaotic maps. In 2018 1st International scientific conference of engineering sciences-3rd scientific conference of engineering science (ISCES), pages 114–119. IEEE, 2018.
  65. Wei Zhang, Kwok-wo Wong, Hai Yu, and Zhi-liang Zhu. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Communications in Nonlinear Science and Numerical Simulation, 18(8):2066–2080, 2013.
  66. Xuncai Zhang, Lingfei Wang, Zheng Zhou, and Ying Niu. A chaos-based image encryption technique utilizing hilbert curves and h-fractals. IEEE Access, 7:74734–74746, 2019.
  67. Yicong Zhou, Zhongyun Hua, Chi-Man Pun, and CL Philip Chen. Cascade chaotic system with applications. IEEE transactions on cybernetics, 45(9):2001–2012, 2014.
  68. Shuqin Zhu and Congxu Zhu. Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access, 7:147106–147118, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Chaotic Cryptography Chaotic maps Fridrich