Next Article in Journal
Recent Advances in Loop Heat Pipes with Flat Evaporator
Previous Article in Journal
Application of Generalized Composite Multiscale Lempel–Ziv Complexity in Identifying Wind Turbine Gearbox Faults
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values

Department of Electronics and Multimedia Communications, Technical University of Kosice, Nemcovej 32, 040 01 Kosice, Slovakia
*
Author to whom correspondence should be addressed.
Submission received: 17 September 2021 / Revised: 4 October 2021 / Accepted: 18 October 2021 / Published: 20 October 2021

Abstract

:
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter values used by the logistic map according to plain image pixel intensities. The parameter values are altered in a row-wise manner, which enables the usage of the same procedure also during the decryption. Furthermore, the parameter modification technique takes into account knowledge about the logistic map, its fixed points and possible periodic cycles. Since the resulting interval of parameter values achieves high positive values of Lyapunov exponents, the chaotic behavior of the logistic map should be most pronounced. These assumptions are verified by a set of experiments and the obtained numerical values are compared with those reported in relevant papers. It is found that the proposed design that uses a simpler, but well-studied, chaotic map with mitigated issues obtains results comparable with algorithms that use more complex chaotic systems. Moreover, the proposed solution is much faster than other approaches with a similar purpose.

1. Introduction

The extension of various communication networks and the increasing amount of transmitted data in the late 1970s caused the need for modern encryption algorithms. These algorithms were designed for operations with character strings, which allowed a wide spectrum of possible applications. For a long time, most of the research was related only to these algorithms and, since various alternatives were proposed much later, the first group of algorithms could be considered conventional algorithms.
The amount of applications for conventional encryption algorithms was further enlarged by introducing new modes of operation for them. However, in certain cases, even these tools could not make conventional encryption algorithms useful. Therefore, the research into dedicated encryption algorithms that could be utilized for some specific applications started.
The earliest image encryption algorithms from the late 1990s perceived the whole process of image encryption as the rearrangement of pixel intensities followed by some rather simple diffusion techniques [1,2]. These approaches exploited the properties of chaotic maps, which, in general, are dynamical systems that show unexpected and hardly predictable behavior [3]. After some time, researchers started to focus on the analysis of the image encryption algorithms and newly acquired knowledge led to significant changes in the design of image encryption algorithms. Probably the most important paper dealing with the analysis was published by Solak et al. in 2010 [4]. An attack described in [4] illustrated how several similar plain images could be used to reveal the architecture of the used image encryption algorithm or even parts of the used key. After the proposal of Solak’s attack, the majority of the newly designed image encryption algorithms employed more complex techniques that mitigated some vulnerabilities of previous approaches. At this point, some of the dedicated image encryption algorithms started to show better performance in certain applications than the conventional encryption algorithms such as the Advanced Encryption Standard (AES) [5]. These applications include the encryption of secret messages in image steganography systems [6,7,8] and securing medical images [9] or some biometric features [10]. The findings reported in [4] were later extended by Xie et al. in 2017 [11] and Preishuber et al. in 2018 [12].
Probably the largest issue with the usage of conventional encryption algorithms for image encryption is caused by the properties of uncompressed image data. While data stored in character strings are usually quite compact and individual characters are not related to each other, the number of image pixels could be large (to the extent that some of them are redundant) and their intensities are closely correlated [13,14]. This situation is shown in Figure 1, where a plain image with a resolution of 512 × 256 pixels and a color depth of 8 bits per pixel is encrypted by AES in its simplest mode of operation, being Electronic CodeBook (ECB) [15]. This example used password 0 × C9 0F DA A2 21 68 C2 34 C4 C6 62 8B 80 DC 1C D1, which was acquired from the first 128 bits of the binary expansion of number π .
Figure 1 shows the how AES works in ECB mode—it creates a codebook of encrypted data blocks that correspond to plain data blocks according to the used password. If a data block is present multiple times in the plain image, it will be reflected by one block of encrypted data on the same places in the encrypted image. This situation is visible mainly in monotonous areas of plain images, where the intensity changes between adjacent image pixels are very small or even absent.
The remedy for this problem could be the usage of another mode of operation for AES [15]. However, many other modes require more complex computations, which may raise the computational complexity of encryption. This is pronounced mainly on platforms that do not fully support hardware acceleration [16]. Another solution is the usage of a dedicated image encryption algorithm that is designed according to the specific properties of image data, such as the redundancy of image pixels and correlation of their intensities.
The newest generation of dedicated image encryption algorithms respond to the concerns raised by Solak et al. in [4] by so-called plaintext-related techniques. These include a broad spectrum of solutions; some of them will be briefly described in the following section. An important condition for every plaintext-related approach is that it has to utilize at least one step that depends on values obtained from plain images. In this case, the resulting encrypted image should be significantly different from images acquired from various plain images and the possibility of successful differential attacks (such as Solak’s attack) should be suppressed.
In this paper, we would like to propose a new approach to the plaintext-related image encryption. While the previous techniques focused on introducing plaintext-related steps mainly in the confusion and diffusion stages, the presented algorithm uses plain image pixel intensities to affect parameter values during the generation of a pseudo-random sequence. While some theoretical foundations were already laid out by Liu and Miao in 2016 [17] and some algorithms were even proposed, e.g., those by Chai et al. in 2020 [18] or Zheng and Hu in 2021 [19], all of these have significantly higher computational complexity than other plaintext-related techniques. The algorithm presented in this paper should provide a solution that has the benefits of a plaintext-related pseudo-random sequence combined with the favorable computational complexity of approaches that use a plaintext-related step during the confusion or diffusion stage.
There are also some other interesting papers dealing with the mentioned issues but, due to inappropriate choices of experimental images or a lack of reported numerical values, these approaches could not be effectively compared with other solutions. Some examples of these papers include [20,21,22,23,24].
The main contributions of this proposal are clearly described in a bullet-point list in Section 3.
The rest of the paper is organized as follows: Section 2 describes some of the recent work in the area of plaintext-related image encryption. Section 3 explains the proposed solution and also fundamental techniques that are used. Section 4 presents and discusses the experimental results. The last section, Section 5, concludes the paper with a brief overview of the properties of the proposed solution and some ideas for future work.

2. Related Work

One of the first image encryption algorithms that took into account Solak’s attack was designed by Kanso and Ghebleh in 2012 [25]. Their proposal changes the amount of chaotic map iterations according to plain image pixel intensities. While this design is beneficial against differential attacks, it increases the possibility of successful side-channel attacks as operations with brighter images require more time.
Another technique was presented by Fu et al. in 2013 [26]. In this case, the pixel intensities are converted to bits that are later rearranged by circular shifts with sizes determined by the intensities of previous image pixels. However, since there are only eight possible sizes of circular shifts corresponding to 256 possible pixel intensities, the same shift could be achieved by multiple pixel intensities.
A solution with a plaintext-related confusion stage was proposed by Zhang in 2014 [27]. The fact that plain image pixel intensities affect only the rearrangement of pixels together with the used architecture significantly decreases the performance of this approach, mainly for images with large monotonous areas.
Norouzi et al. presented a one-stage algorithm in 2014 [28] where the plain image pixel intensities are directly added to the processed intensity values. However, the drawbacks of this solution were reported by Zhang et al. already in 2014 [29] when Norouzi’s algorithm was declared as broken.
A plaintext-related algorithm designed by Murillo-Escobar et al. in 2015 [30] uses a sum of pixel intensities to modify some initial conditions of the utilized chaotic maps. There are two issues with this proposal—the same sum could be obtained from various images and this sum could not be computed from the encrypted image. Therefore, the decryption algorithm requires an additional parameter that is embedded into the encrypted image by means of steganography. The presence of this value is so obvious that the whole algorithm was broken by Fan et al. in 2018 [31].
Chai et al. proposed a technique employing a hash function in 2017 [32]. Since the hash digests from plain and encrypted images are significantly different, the decryption algorithm could not use the same key. This makes Chai’s algorithm asymmetric. Moreover, the usage of such complex tools as hash functions significantly increases the encryption and decryption times.
A similar solution with the hash functions was proposed by Wang et al. in 2018 [33]. In this case, even the authors admitted that the used architecture is complicated and the reported encryption speed of approx. 0.055 MB/s is quite low.
Since 2018, several authors have designed image encryption algorithms that use complex chaotic systems with five or more dimensions. While the computations of iterates take much more time, the performance is not always as good as in simpler and more finely tuned chaotic systems. The proposals with complex chaotic systems include two papers by Li et al. from 2018 and 2020 [34,35], where hash digests are computed multiple times and they are later used as inputs for other complex systems (Lorenz’s hyperchaotic system and piecewise linear chaotic map).
Sun’s algorithm from 2019 [36] is slowed down by a seven-dimensional chaotic system that is used to compute iterates only for three sequences. A solution by Chai et al. from 2020 [18] combines three simpler chaotic maps together with the Latin squares technique; however, the authors do not sufficiently analyze the potential drawbacks of the resulting system, such as fixed points or periodic cycles. An approach by Zhang and Han from 2021 [37] uses a six-dimensional system together with a technique of DNA coding, which results in very slow encryption speeds.
A proposal by Zheng and Hu from 2021 [19] utilizes Chen’s chaotic system and plain image pixel intensities to perturb the parameters of another chaotic system. This solution does not use hash functions and the properties of the resulting combined chaotic system are clearly described.
In our previous work, we focused on several topics regarding plaintext-related image encryption. A paper from 2018 [38] described how a two-dimensional chaotic map could be used for introducing dependencies between plain images and the steps of an image encryption algorithm. In a work from 2019 [39], an analysis of the one-way characteristics of the logistic map (LM) was given together with an algorithm that uses reported knowledge. A plaintext-related technique using the Mojette transform was presented in a paper from 2019 [40]. The most significant drawbacks of LM and their solutions were discussed in a publication from 2020 [41]. Our experience in the field of plaintext-related image encryption was used in a paper presented in 2021 [42] that describes a way to introduce relations between plain image pixel intensities and an encryption algorithm during the quantization of pseudo-random sequences.

3. Proposed Solution

The technique presented in this paper utilizes plain image pixel intensities for the modification of a parameter used by LM during the generation of one of the pseudo-random sequences. While similar techniques have been already investigated [17] and also experimentally tested [18,19], our proposal should be more effective—it should achieve comparable results with these, but with higher encryption speeds of older and simpler algorithms that utilize plaintext-related steps in the confusion or diffusion stage. The values of the commonly used numerical parameters of our proposal should be comparable with more complex approaches that use hash functions [32,33,34,35,36,37].
The main novelties of this proposal include:
  • the usage of a novel plaintext-related parameter modification scheme for LM;
  • the whole encryption/decryption scheme is symmetric—these operations are able to extract the required values from either plain or encrypted images;
  • it takes into account the knowledge about LM—previously reported drawbacks such as fixed points or periodic cycles [39,41] are suppressed by careful choice of parameter value intervals and alternation of parameter values during the generation of pseudo-random sequences. This could be viewed as a novelty since it is not common even for new proposals.
The presented approach can be applied on images with arbitrary resolution and color depths of 8 bits per pixel (grayscale images) or 24 bits per pixel (true color images). The key length is 128 bits and it is represented in a hexadecimal notation. A simplified block scheme of the proposed solution is shown in Figure 2.
Each stage presented in Figure 2 has its specific purpose. The image rearrangement stages prepare pixel intensities for processing (into two-dimensional matrices) or for encoding and saving the results (into images with color planes). The key processing stage divides the entered key into eight parts and converts them from hexadecimal notation to parameter values for the LM. Encryption continues by the plaintext-related stage, where the parameters of the generated sequence are changed according to the plain image pixel intensities. Then, the correlation of pixel intensities is suppressed by pixel rearrangement. New dependencies between their intensities are created during the diffusion stage. In the event that some of the pixel intensities are different, this stage spreads the differences across the whole image. A key whitening stage is especially important for providing better robustness against attacks, as it is the first stage that needs to be broken. In this stage, the processed image is combined with a pseudo-random sequence that depends on the used key. Since the sequence needs to be generated prior to the combination, this stage has to happen after the key processing stage, both during encryption and decryption. The whole concept of key whitening comes from conventional encryption algorithms; it is used also in AES [43].
Decryption uses a slightly different order of the mentioned stages. The first, second and the last stage are the same as during the encryption. The other decryption stages, which could be numbered 3 to 6, correspond to encryption stages, but their order is reversed—the combination with a pseudo-random sequence is followed by inverse diffusion and confusion stages and row-wise combination with plaintext-related sequences.

3.1. Logistic Map and Its Properties

LM can be considered an example of a chaotic system with a simple definition but rather complicated behavior [44]. LM is a one-dimensional map, so each iteration of the map generates one value, called an iterate. The computations of LM utilize one parameter r ( 0 , 4 ) and an initial value x 0 ( 0 , 1 ) . Iterate values x n ( 0 , 1 ) are computed by (1):
x n + 1 = r · x n ( 1 x n ) ,
where n { 1 , 2 , 3 , , N } is the sequential number of iterates and N is the total number of iterates.
The desired unpredictable behavior of the LM is achieved after some iterations that are used only to shift from the initial value x 0 . These iterates that are not used for the generation of pseudo-random sequences belong to the so-called transient period. Its length is usually 1000 iterates [44].
The properties of the LM regarding various values of parameter r could be illustrated by a bifurcation diagram. An example of the bifurcation diagram, constructed from a sequence with x 0 = 0.5 and a transient period of 1000 iterates is shown in Figure 3.
The bifurcation diagram shows that the behavior of the LM is predictable until r 3 , when the first bifurcation occurs [3,44]. After several other bifurcations, the number of possible iterate value trajectories greatly increases and it becomes challenging to determine on which one the next iterate value would lie. There are still some areas with suppressed chaotic behavior, such as that around r 3.85 ; however, the area close to r = 4 displays the most unpredictable behavior. This could be illustrated also by a plot of estimated Lyapunov exponents (LEs) λ that quantify divergences between two trajectories with a small initial difference [3,41,44]. LEs for the LM could be estimated by (2) [41]:
λ lim i t 1 I t i t = 0 I t 1 ln | r ( 1 2 x i t ) | ,
where i t = 1 , 2 , 3 , , I t is the sequential number of iterates computed for one parameter value r, I t is the total number of these iterates, ln ( a ) is a natural logarithm of a and brackets | b | compute the absolute value of b.
A plot of LEs estimated for a sequence of iterates generated by the LM (1) with x 0 = 0.5 , parameter values of r ( 3 , 4 ) , a transient period of 1000 iterates and I t = 1000 is shown in Figure 4. This plot has 10 6 samples for the mentioned interval of r.
Positive values of λ indicate that the behavior of the LM at these values of r is considered chaotic. Negative spikes may be a sign that the LM has a periodic cycle or even a fixed point at corresponding values of r [41,44,45]. These situations are undesirable and, if they are not mitigated, image encryption algorithms could be susceptible to some of the attacks or they could be broken [46].
Locations of fixed points for the LM could be obtained by substitution and the solving of (1) [41,46]. If the interval of the used values of r for the LM is ( 0 , 4 ) , the only fixed point is located at 1 1 r . This fixed point can be suppressed by modification of r during the computation of new iterates. Multiple parameter values also suppress the occurrence of possible periodic cycles [41,45].
Another issue with the usage of the LM as a generator of pseudo-random sequences is dependencies between pairs of successive iterates and their unequal distribution. Both problems are caused by the nature of (1), which is an iterative function as x n = f ( x n 1 ) . These two problems could be fixed by the usage of a suitable quantization technique [39,41].
While all mentioned issues with the LM have already published solutions, some of them are not very effective. In our previous work, we focused on the design of combined solutions that help to suppress several issues in one stage of the image encryption algorithm [41,42]. In this proposal, we would like to alter the parameter values of r according to the plain image pixel intensities. Moreover, the resulting values of r should achieve positive values of λ so that the generated sequences do not have any undesired statistical properties.

3.2. Encryption

The encryption algorithm uses a plain image P with arbitrary resolution and color depths of 8 or 24 bits per pixel. In addition to this, it needs also a 128-bit-long key K, inserted in a hexadecimal notation. The encryption produces an encrypted image E.
Step 1: Image rearrangement. This step is used for the reshaping of both grayscale and true color images into a two-dimensional matrix P . The grayscale plain images are simply copied to matrix P . The color planes of true color images are decomposed into columns of pixels and these are rearranged as triplets consisting of columns from the red, green and blue color plane. This process is shown in Figure 5.
When a processed image is stored in matrix P , its width and height are passed to variables w and h. The total number of image pixels is computed as n u m p x = w · h and the number of color planes is saved as n u m c p .
Step 2: Key processing. Used key K is divided into eight parts K 1 to K 8 . The hexadecimal characters from K are assigned to key parts according to (3):
K i ( j ) = K 2 · ( i 1 ) + j ,
where i = 1 , 2 , 3 , , 8 is the sequential number of key parts and j = 1 , 2 is used as the sequential number of hexadecimal symbols.
The key parts K 1 to K 8 are then converted from hexadecimal to decimal notation with the usage of the big endian ordering scheme [47] and later used for the computation of parameter values r 1 to r 8 via (4):
r i = 4 10 15 ( 9 i ) · 256 · 65,536 K i ,
where constants of 256 and 65,536 represent the amount of possible plain image pixel intensities and key values.
Step 3: Row-wise combination with plaintext-related sequences. This step creates a lookup table L T with values of parameter r that are later modified by plain image pixel intensities and then used for combination with other pixel intensities. The lookup table L T has h rows and w columns, being the same size as the matrix with processed image P . This step effectively doubles the memory consumption of the proposed solution, which is generally not an issue, but it greatly improves the speed of the whole algorithm. The lookup table L T is filled by repeating sequences of values r 1 , r 2 , r 3 , , r 8 using a row-major order (at first, the values are passed to the top row from its left side to the right side, then to other rows) [47,48]. An example of a matrix filled by this technique is shown in Figure 6.
The values in the lookup table L T are then rearranged by two circular shifts that utilize two pseudo-random sequences s e q 1 and s e q 2 . These are generated by the LM (1) with an initial value x 0 = 0.5 and a transient period of 1000 iterates. The key schedule used during the computation of all sequences, their length and maximal possible element values are shown in Table 1. The same parameter value patterns are used during the transient period and also after it.
Patterns of parameter values from Table 1 were not chosen with any specific intent. Operations with these parameter value patterns should result in similar values of numerical parameters for various plain images. The longest sequences, s e q 3 and s e q 6 , use patterns from r 1 to r 8 and from r 8 to r 1 , respectively. Sequences s e q 4 and s e q 5 used for the rearrangement of pixel intensities switch values in pairs of parameter values from s e q 3 and s e q 6 . Finally, sequences s e q 1 and s e q 2 use patterns that start with either r 4 or r 5 and then increment or decrement their index by 4 (one half of the total parameter amount).
Elements of generated sequences s e q 1 and s e q 2 are quantized by (5) and resulting sequences are denoted as s e q 1 and s e q 2 .
s e q i = Q i · 10 4 · s e q i ( mod 1 ) .
It should be noted that the quantization by (5) removes the first four decimal places of iterates. This is helpful for obtaining a balanced distribution of element values and also for the suppression of dependencies between successive sequence elements [39,41].
The first group of circular shifts rearranges the parameter values in the individual columns of the lookup table L T . The shift sizes are determined by values of sequence s e q 1 . Then, the second group of shifts is done in the rows of L T , with the sizes of shifts set by sequence s e q 2 . An illustration of the described rearrangement scheme is displayed in Figure 7.
Then, a sequence s e q 3 is generated by LM (1), but this time in a different way. It uses x 0 = 0.5 , but after its transient period of 1000 iterates, only one iterate x 1001 is stored. This iterate is used as a starting point for multiple sequences utilized for individual rows of the matrix with processed image P .
Now, this step works individually with each row of pixel intensities from matrix P . The rows are scanned from the top to the bottom, with their indexes being l = 1 , 2 , 3 , , h . For each of these rows, a sequence s e q p l r with w elements is generated by the LM (1) without any other transient periods and with an initial value of x 1001 . LM uses parameter values from row l of lookup table L T that are modified by plain image pixel intensities from row l 1 of P by (6):
L T ( l , : ) = L T ( l , : ) + 10 15 · 65,536 · P ( l 1 , : ) ,
where the colon : stands for all indexes in a row of image pixels, the constant of 65,536 represents the amount of possible key values and index l 1 is substituted with h for the first row of P ( 1 , : ) .
The resulting modified parameter values r in lookup table L T belong to interval 3.999999865833743 , 4 10 15 in a double precision data type [49]. Since the minimal value of LEs estimated with x 0 = 0.5 for this interval with a transient period of 1000 iterates and I t = 1000 is still positive at approx. 0.6645 for r = 3.9999999629572112, the sequences generated with these parameter values are considered chaotic [3,41,44].
The sequence s e q p l r generated with plaintext-related parameters from lookup table L T is quantized by (5), stored as s e q p l r and then it is combined with the currently scanned row of pixel intensities in P by (7):
P ( l , : ) = P ( l , : ) s e q p l r ,
where ⊕ represents an operation of binary eXclusive OR (XOR) [50,51].
The procedures dealing with the lookup table L T —modification of values according to the intensities of P , generation and quantization of the sequences and their combination with processed image P —are repeated for all other rows. The scanning order from the top to the bottom of the P is important, as it could be reversed during decryption ( l = h , h 1 , h 2 , , 1 ). Hence, the decryption algorithm is able to obtain the required pixel intensities from P ( l 1 , : ) that affect the parameter values in L T .
Step 4: Column-wise and row-wise confusion stage. Any traces of pixel intensity correlation that could be left in matrix P after Step 3 are suppressed by rearrangement of its pixels. This step is done similarly as the shuffling of parameter values r 1 to r 8 in the lookup table L T . At first, two sequences s e q 4 and s e q 5 are generated by the LM (1) with initial values x 0 = 0.5 and other parameters given by Table 1. These sequences are then quantized by (5) and stored as s e q 4 and s e q 5 .
After this, the circular shifts in the individual columns and individual rows of matrix P are done. The sizes of the shifts are determined by the element values of sequences s e q 4 and s e q 5 . This technique is shown also in Figure 7.
Step 5: Four-dimensional diffusion stage. This step introduces dependencies between pixel intensities from matrix P , which are useful when two similar plain images are encrypted. The dependencies are created in four directions so all pixel intensities of P are affected even by small differences between plain images. During each of the four scans, the actually processed vector of pixel intensities from P is combined with two other vectors—one is added by modulo 256 addition and the second one is XORed with the actually processed vector. Indexes of all vectors used during the four scanning directions are described in Table 2.
If row index l + 1 or column index k + 1 is greater than h or w , a value of 1 is used instead. Furthermore, if indexes l 1 or k 1 are less than 1, values of h or w are utilized.
Step 6: Combination with a pseudo-random sequence. This step helps to protect all previous steps as any successful attacks need to break this step at first. A sequence s e q 6 is generated by the LM (1) with an initial value x 0 = 0.5 , a transient period of 1000 iterates and other parameters given by Table 1. This sequence is quantized by (5), stored in a variable s e q 6 and later rearranged to a matrix s e q 6 m with h rows and w columns by the row-major order shown in Figure 6. The matrix s e q 6 m is then combined with matrix P by (8):
P = P s e q 6 m .
Step 7: Image rearrangement. In this step, the matrix with processed image pixel intensities P is transferred into encrypted image E, which is the sole output of the encryption algorithm. The rearrangement scheme is inverse to that presented in Step 1—if the value of n u m c p points out that the plain image P was true color, three color planes are reconstructed from triplets of columns from P . Otherwise, if the plain image P was grayscale, it is directly copied from matrix P to image E.

3.3. Decryption

The decryption algorithm uses an encrypted image E and 128-bit-long key K to produce a decrypted image D. As already shown in Figure 2, the decryption algorithm stages are almost the same as those used during encryption; however, the order of some is reversed. The first two steps are the same. The third decryption step is an inverse of the sixth encryption step—the processed image matrix is combined with a sequence generated by the LM (the sequence that is not plaintext-related). After this, next step of the decryption algorithm removes dependencies created during the four-dimensional diffusion stage. At this step, the order of scanning directions is reversed and the signs for addition modulo 256 are changed from “+” to “−” and vice versa.
After this, the pixel intensities are rearranged back in the fifth decryption step by two groups of circular shifts. Their order is reversed—the first group of shifts takes place in rows of matrix P and the second group deals with shifts in the columns of P . The sizes of shifts determined by sequences s e q 5 and s e q 4 are multiplied by a factor of −1. Then, in the sixth decryption step, the plaintext-related sequence is generated, processed and used for combination with P . Since the operation is row-wise and it could start at the bottom of the image and continue to its top, the decryption algorithm is able to revert the effects of the third encryption step without any additional information.
The decrypted image D is created from the matrix P in the last step of the decryption algorithm by the same procedure as in the last encryption step.

4. Experimental Results

Experiments with the proposed solution were performed on a PC with 2.5 GHz CPU, 12 GBs of RAM running MATLAB R2015a on Windows 10 OS. A set of images from the USC-SIPI database [52] used for the experiments is shown in Figure 8. All these images have a resolution of 512 × 512 pixels. Images l e n a and p e p p e r s have color depths of 24 bits per pixel; other images have color depths of 8 bits per pixel. Utilized keys are included in Table 3. The value of key K 1 was obtained from the first 128 bits of the binary expansion of number π . Please note the minimal difference between keys K 1 and K 2 .

4.1. Key Space Size and Key Sensitivity

The proposed image encryption algorithm utilizes 128-bit-long keys. Therefore, the size of key space is 2 128 . Considering that the decryption of a grayscale image with a resolution of 512 × 512 pixels takes approx. 140 ms (see Section 4.6 for details), the brute force attack requires approx. 1.5106 × 10 30 years. Hence, the proposed image encryption algorithm can be considered robust enough against brute force attacks.
The effects caused by the usage of incorrect keys are shown in Figure 9. Even the smallest possible difference between keys K 1 and K 2 results in major differences between two encrypted or decrypted images. This means that the proposed image encryption algorithm is sensitive to the used keys.

4.2. Robustness against Image Modification

The proposed image encryption algorithm was designed to be sensitive to even slight differences between plain images. In the event that two plain images differ in the intensities of one of more image pixels, the encryption by the proposed image encryption algorithm leads to significantly different encrypted images. An example of this feature is shown in Figure 10, where two similar plain images with a resolution of 32 × 16 pixels and color depth of 24 bits per pixel were encrypted with key K 1 . All pixel intensities of the original plain image were equal to zero; the modified plain image had one pixel with an intensity level of 1 in the top left corner of the red color plane.
The mentioned property of the proposed image encryption algorithm means that it is not robust to any modification of plain or encrypted images. Each change would affect the resulting image.

4.3. Statistical Properties of the Plaintext-Related Sequence

Since one of the sequences generated by the LM (1) is modified by plain image pixel intensities, we supposed that it might be interesting to investigate the statistical properties of this sequence. For this purpose, the NIST 800-22 test suite [53] was utilized. The same set of statistical tests was used during the AES candidate selection process.
The NIST 800-22 suite runs 15 statistical tests over a set of binary sequences. In our case, we followed the recommendations given in [53] and used 100 sequences with a length of 10 6 bits. Therefore, the required length of the plaintext-related sequence was 10 8 bits. This sequence was obtained from the encryption of a zero-intensity image (intensities of all pixels are equal to 0) with a resolution of 3000 × 2000 pixels and color depth of 24 bits per pixel. The first 10 8 element values of sequences s e q p l r were converted to binary notation by the big endian ordering scheme [47] and stored in a vector that was later tested by the NIST 800-22 test suite. Encryption used key K 3 , which is a zero key (all elements are 0)—this combination of plain image and key is practically the worst-case scenario for the image encryption algorithm as both the plain image and key are very monotonous.
The results in Table 4 show that the analyzed sequence displays suitable statistical properties even after its modification according to the plain image pixel intensities. The analyzed sequence passed all 15 tests, and borderline results were obtained in the runs, overlapping template matching and approximate entropy tests.

4.4. Properties Regarding Statistical Attacks

The robustness of encrypted images against statistical attacks could be evaluated by several measures. The first of them is the suppression of peaks in the histograms of encrypted images. A histogram comparison for plain image l e n a G and its version encrypted with key K 1 is shown in Figure 11. It is clearly visible that the proposed image encryption algorithm flattens the histogram; therefore, it is more difficult to extract some useful statistical information from the encrypted image.
Histogram comparison could be done also in an objective way by computing values of histogram variance v a r by (9). Higher values of v a r mean that the histogram has significant peaks and smaller values of v a r point out that it is more balanced. Values of v a r for the set of experimental images and keys are included in the third column of Table 5.
v a r = 1 2 2 · L i = 1 2 L j = 1 2 L h g ( i ) h g ( j ) 2 2 [ - ] ,
where L is the color depth of a color plane or grayscale image, i and j are histogram bin indexes and h g denotes a histogram of the analyzed image.
Another means of evaluating the robustness against statistical attacks is through correlation diagrams. These plots generally use a set of randomly chosen 1000 pixel pairs. Each pair contains the intensities of two pixels that are adjacent either horizontally, vertically or diagonally. Then, the two intensities from each pixel pair are used as coordinates on two axes. If the intensities are close to each other, the resulting plotted point is close to line y = x . Otherwise, if the intensities differ a lot, the plotted point could be located anywhere in the plot. An example of a correlation diagram for 1000 randomly chosen diagonally adjacent pixel pairs from plain image l e n a G and its version encrypted with key K 1 is shown in Figure 12. It can be clearly seen that the encryption breaks the correlation between the intensities of adjacent pixels.
The correlation between two adjacent pixel intensities could be assessed also by an objective measure—the value of correlation coefficients ρ . These are calculated separately for each color plane and in three different directions—horizontally ( ρ h ), vertically ( ρ v ) and diagonally ( ρ d )—by (10). Resulting values of ρ h , ρ v and ρ d obtained from computations with 1000 randomly chosen pixel pairs are presented in columns 4 to 6 of Table 5. The interval of ρ is 1 , 1 , and lower absolute values of ρ mean that the image pixel intensities are less correlated.
ρ = p p = 1 n u m p p i n 1 ( p p ) i n 1 ¯ · i n 2 ( p p ) i n 2 ¯ p p = 1 n u m p p i n 1 ( p p ) i n 1 ¯ 2 · p p = 1 n u m p p i n 2 ( p p ) i n 2 ¯ 2 [ - ] ,
where p p = 1 , 2 , 3 , , n u m p p is the pixel pair index, n u m p p denotes the number of pixel pairs, sequences i n 1 and i n 2 store intensities from the pixel pairs and i n 1 ¯ stands for the arithmetic mean of sequence i n 1 .
The next objective measure is a value of entropy H, which is computed separately for each color plane of the analyzed image by (11). Values obtained for the sets of experimental images and keys are included in the seventh column of Table 5. The theoretical boundary of H is the same as the color depth of the investigated color plane or grayscale image. The higher values of entropy mean that the color plane or grayscale image is closer to an ideal source of random information [54].
H = i n = 0 2 L 1 p ( i n ) · log 2 p ( i n ) [ bits / px ] ,
where i n is a vector of image pixel intensities and p ( i n ) stands for the probability of the occurrence of a pixel with intensity i n .

4.5. Properties Regarding Differential Attacks

In general, differential attacks use a pair of similar plain images P 1 and P 2 , encrypt them with the same key and compare the resulting encrypted images E 1 and E 2 . The difference between plain images is usually minimal—one pixel intensity is either incremented or decremented. There are two numerical parameters that assess robustness against differential attacks—the Number of Pixel Change Ratio (NPCR) and the Unified Average Changing Intensity (UACI). Since the location of the difference between plain images P 1 and P 2 could affect the resulting values of NPCR and UACI, both of these measures are computed as arithmetic means of 100 measurements with different locations of the pixel intensity difference.
NPCR sums up the amount of differences between two encrypted images E 1 and E 2 . Its values are computed separately for each color plane or grayscale image by (12):
N P C R = 100 h · w l = 1 h k = 1 w D i f f ( l , k ) [ % ] D i f f ( l , k ) = { 0 if E 1 ( l , k ) = E 2 ( l , k ) 1 if E 1 ( l , k ) E 2 ( l , k ) ,
where h and w are the height and width of images, and l and k are line and column indexes.
On the other hand, UACI also takes into account the sizes of pixel intensity differences. The values of UACI are calculated separately for each color plane or grayscale image via (13):
U A C I = 100 h · w l = 1 h k = 1 w | E 1 ( l , k ) E 2 ( l , k ) | 2 L 1 [ % ] ,
where brackets | a | represent the absolute value of number a.
Computed values of NPCR and UACI are presented in the last two columns of Table 5. Please note that the values for plain images are not included as the computation of NPCR and UACI could be done only for encrypted images.
The robustness of the analyzed image encryption algorithm against differential attacks can be considered sufficient if the computed values of the NPCR and UACI fall into intervals of expected values proposed by Wu et al. [55]. For images with a resolution of 512 × 512 pixels and a color depth of 8 bits per pixel, the intervals of 99.6094 % , 100 % ) for NPCR and ( 33.3115 % , 33.6156 % for UACI mean that the analyzed image encryption algorithm is robust against differential attacks in 999 of 1000 cases.

4.6. Measurement of Computational Complexity

The computational complexity of image encryption algorithms could be estimated by two methods. The first one examines the complexity of each operation used to encrypt or decrypt images by means of a big O notation [47]. However, it is challenging to apply this approach on image encryption algorithms as it is difficult to break complex operations such as matrix rearrangement, circular shifts or conversion from hexadecimal to binary notation into fundamental ones such as addition, subtraction or multiplication.
Therefore, image encryption algorithms are usually compared by the arithmetic means of repeated measurements of encryption times t e n c and decryption times t d e c . The most common size of a measurement set is 100 times for encryption and 100 times for decryption. The effects of different image resolutions and color depths could be mitigated by the computation of encryption speeds v e n c and decryption speeds v d e c by (14):
v o p e r = h · w · n u m c p 2 20 · t o p e r [ MB / s ] ,
where h, w and n u m c p denote the height, width and number of color planes of the analyzed image, the constant of 2 20 stands for the number of bytes in a megabyte and t o p e r is the measured encryption time ( t e n c ) or measured decryption time ( t d e c ). The measurements use seconds as units.
One of the most important hardware parameters, the processor clock frequency, is taken into account in calculations of the numbers of processor cycles necessary for an encryption ( c y c e n c ) or a decryption ( c y c d e c ) of one byte by (15):
c y c o p e r = f C P U · t o p e r h · w · n u m c p [ cycles / B ] ,
where f C P U is the processor clock frequency in Hertz.
The arithmetic means of 100 repeated measurements of encryption and decryption times are presented as t e n c and t d e c in Table 6. These values were used for the computation of encryption speeds v e n c , decryption speeds v d e c and also the numbers of processor cycles necessary for an encryption c y c e n c or a decryption c y c d e c of one byte. All these values are included in Table 6.

4.7. Discussion

The values presented in Table 5 lead to several conclusions. Encryption of all combinations of plain images and keys resulted in a significant decrease in histogram variance v a r . This fact is valid for both true color and grayscale images. The differences between the individual color planes of true color images are barely noticeable and they do not form any kind of pattern.
Correlation coefficients ρ h , ρ v and ρ d are also visibly decreased after the encryption. None of the used keys obtains significantly better values. The results are balanced also for different plain images. This means that the proposed image encryption algorithm obtains very good results even after encryption with a monotonous key such as K 3 .
Computed values of entropy H are close to the theoretical boundary of 8 bits per pixel. All presented values fall into a rather small interval of 7.9992 , 7.9994 .
All values of NPCR and UACI belong to intervals of expected values for images with this resolution and color depth [55]. Different color planes of true color images have similar values of NPCR or UACI. The presented values are not affected by the value of the used key since results for all three experimental keys are very similar.
Comparison of encryption and decryption times t e n c and t d e c from Table 6 shows that they are slightly different—the decryption seems to be faster. The maximal differences between t e n c and t d e c for true color and grayscale images are similar at approx. 5.5 ms and approx. 6 ms, which means that this difference is not produced by the amount of processed data. This difference is caused by the reversed order of certain stages during decryption (see Figure 2 for details) as the processed image does not need to be saved to a matrix and loaded from it as many times as during encryption.
The encryption speeds v e n c and decryption speeds v d e c demonstrate that the speed of the proposed solution decreases with the increasing amount of processed data. This is caused by the linear complexity of the plaintext-related stage—the more sequence elements are generated and modified according to the plain image, the more time it takes. While this stage does not use hash functions or any similar tools, it is still the most complex among other stages used in the proposed algorithm. This issue is visible also from the values of measures c y c e n c and c y c d e c .

4.8. Comparison with Similar Work

Numerical values achieved by the proposed solution were compared with values reported in several papers dealing with similar plaintext-related image encryption algorithms. Older approaches use simpler plaintext-related stages that may obtain insufficient values of some numerical parameters [25,27] or whole algorithms may be already broken [30]. Some of the newer proposals utilize complex chaotic systems and do not focus on the fine-tuning of their performance [32,33,34,35,37]. The values of numerical parameters obtained for the red color plane of true color image l e n a or grayscale image l e n a G with resolutions of 512 × 512 pixels are included in Table 7.
The proposed solution achieves the best values of correlation coefficients ρ and entropy H among algorithms reporting results for the red color plane of true color image l e n a . Values of NPCR and UACI are comparable with the best approach [25] in this category. The number of processor cycles necessary for the encryption of one byte c y c e n c is higher than that achieved by [30]; however, this scheme was broken [31].
A comparison of algorithms that report numerical values for grayscale image l e n a shows that the values of ρ achieved by the proposed solution are close to the best values obtained by [35]. However, the proposed algorithm has much more balanced results. The highest value of H is achieved by [37], closely followed by the proposed algorithm and almost all other solutions. Obtained values of NPCR and UACI are also among the best as the proposed algorithm ranks second behind [35] for NPCR and third behind [33,35] for UACI. The most significant advantage of the proposed solution is its computational complexity, which is by far the lowest. The second-fastest algorithm [19] is almost three-times slower.
The reported numerical parameters show that the proposed solution is able to reach values of numerical parameters that are comparable with those achieved by more complex approaches that use either hash functions [32,33,34,35] or special coding techniques [18,37]. As our proposal is the fastest one, and considering that the presented values of numerical parameters are close to the best, the proposed algorithm can be viewed as effective and our initial assumptions about its properties are proven to be correct.

5. Conclusions

This paper dealt with the topic of plaintext-related image encryption algorithms. After a brief introduction to the area and a survey of relevant approaches, a novel solution was proposed. It merges the latest knowledge about the LM and its properties from our previous work, a new plaintext-related parameter modification technique and a rather uncommon row-wise approach of pixel intensity processing that enables the extraction of all required values during both encryption and decryption. Experimental results showed that the proposed algorithm is sensitive even to small differences between various plain images or keys and the sequence modified according to the plain image pixel intensities passed all statistical tests from the NIST 800-22 test suite. The numerical results were compared with those reported in similar work and it was found that, although our proposal uses a simpler chaotic map, it can obtain the same results as algorithms utilizing complex chaotic systems. Furthermore, the computational complexity of the proposed scheme is much lower that that of other algorithms.
The presented results confirm an idea from our previous research—finely tuned, simpler chaotic systems can manifest similar behavior to some inappropriate implementations of more complex chaotic systems. Moreover, the simpler chaotic maps were popularized much sooner and they have been analyzed more precisely. In our future work, we would like to investigate other methods of utilizing the full potential of simple chaotic maps such as the LM in the area of plaintext-related image encryption. These may include modifications of Equation (1) for the enhancement of its chaotic behavior, the usage of different quantization techniques that may obtain multiple sequence elements from one iterate or more efficient parameter value patterns.

Author Contributions

Conceptualization, J.O. and L.O.; methodology, J.O.; software, J.O.; validation, J.O., L.O. and J.P.; formal analysis, J.O.; investigation, J.O.; resources, L.O. and J.P.; data curation, J.O.; writing—original draft preparation, J.O.; writing—review and editing, J.O., L.O. and J.P.; visualization, J.O.; supervision, L.O. and J.P.; project administration, L.O.; funding acquisition, J.P. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Slovak Research and Development Agency, research grant no. APVV-17-0208.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AESAdvanced Encryption Standard
CPUCentral Processing Unit
ECBElectronic CodeBook
LELyapunov Exponent
LMLogistic Map
NPCRNumber of Pixel Change Ratio
OSOperating System
RAMRandom Access Memory
UACIUnified Average Changing Intensity
XOReXclusive OR

References

  1. Pichler, F.; Scharinger, J. Finite dimensional generalized baker dynamical systems for cryptographic applications. In Proceedings of the International Conference on EUROCAST 1995, Innsbruck, Austria, 22–26 May 1995; Springer: Berlin, Germany, 1995; pp. 465–476. [Google Scholar]
  2. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  3. Gleick, J. Chaos: Making a New Science; Vintage Books: London, UK, 1998; 380p. [Google Scholar]
  4. Solak, E.; Cokal, C.; Yildiz, O.T.; Biyikoglu, T. Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 2010, 20, 1405–1413. [Google Scholar] [CrossRef] [Green Version]
  5. FIPS 197: ‘Advanced Encryption Standard (AES)’. Available online: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf (accessed on 3 September 2021).
  6. Hajduk, V.; Broda, M.; Kovac, O.; Levicky, D. Image steganography with using QR code and cryptography. In Proceedings of the International Conference Radioelektronika 2016, Kosice, Slovakia, 19–20 April 2016; IEEE: Danvers, MA, USA, 2016; pp. 350–353. [Google Scholar]
  7. Oravec, J.; Turan, J. Substitution steganography with security improved by chaotic image encryption. In Proceedings of the International Conference Informatics 2017, Poprad, Slovakia, 14–16 November 2017; IEEE: Danvers, MA, USA, 2017; pp. 284–288. [Google Scholar]
  8. Fang, D.; Sun, S. A new scheme for image steganography based on hyper-chaotic map and DNA sequence. J. Inf. Hiding Multim. Signal Process. 2018, 9, 392–399. [Google Scholar]
  9. Chen, X.; Hu, C.-J. Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 2017, 24, 1821–1827. [Google Scholar] [CrossRef]
  10. Abundiz-Perez, F.; Cruz-Hernandez, C.; Murillo-Escobar, M.A.; Lopez-Gutierrez, R.M.; Arellano-Delgado, A. A fingerprint image encryption scheme based on hyperchaotic Rossler map. Math. Probl. Eng. 2016, 2016, 2670494. [Google Scholar] [CrossRef] [Green Version]
  11. Xie, E.Y.; Li, C.; Yu, S.; Lu, J. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 2017, 132, 150–154. [Google Scholar] [CrossRef] [Green Version]
  12. Preishuber, M.; Hutter, T.; Katzenbeisser, S.; Uhl, A. Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2137–2150. [Google Scholar] [CrossRef]
  13. Kovac, O.; Lukacs, P.; Gladisova, I. Textures classification based on DWT. In Proceedings of the International Conference Radioelektronika 2018, Prague, Czech Republic, 19–20 April 2018; IEEE: Danvers, MA, USA, 2018; pp. 1–5. [Google Scholar]
  14. Mihalik, J.; Gladisova, I. Color content descriptors of images by vector quantization. Adv. Electr. Electron. Eng. 2020, 18, 264–273. [Google Scholar]
  15. NIST SP 800-38A: ‘Recommendation for Block Cipher Modes of Operation: Methods and Techniques’. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf (accessed on 3 September 2021).
  16. Gueron, S. Intel® Advanced Encryption Standard (AES) New Instructions Set. Available online: https://www.intel.com/content/dam/doc/white-paper/advanced-encryption-standard-new-instructions-set-paper.pdf (accessed on 3 September 2021).
  17. Liu, L.; Miao, S. A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 2016, 5, 289–300. [Google Scholar] [CrossRef] [Green Version]
  18. Chai, X.; Zheng, X.; Gan, Z.; Chen, Y. Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput. Appl. 2020, 32, 8065–8088. [Google Scholar] [CrossRef]
  19. Zheng, J.; Hu, H. A symmetric image encryption scheme based on hybrid analog-digital chaotic system and parameter selection mechanism. Multimed. Tools Appl. 2021, 80, 20883–20905. [Google Scholar] [CrossRef]
  20. Masood, F.; Ahmad, J.; Syed, A.S.; Jamal, S.S.; Hussain, I. A novel hybrid secure image encryption based on Julia set of fractals and 3D Lorenz chaotic map. Entropy 2020, 22, 274. [Google Scholar] [CrossRef] [Green Version]
  21. Masood, F.; Driss, M.; Boulila, W.; Ahmad, J.; Rehman, S.U.; Jan, S.U.; Qayyum, A.; Buchanan, W.J.A. lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wirel. Pers. Commun. 2021, 23, 1–28. [Google Scholar]
  22. Wu, Z.; Pan, P.; Sun, C.; Zhao, B. Plaintext-related dynamic key chaotic image encryption algorithm. Entropy 2021, 23, 1159. [Google Scholar] [CrossRef]
  23. Moussa, K.H.; El Naggary, A.I.; Mohamed, H.G. Non-linear hopped chaos parameters-based image encryption algorithm using histogram equalization. Entropy 2021, 23, 535. [Google Scholar] [CrossRef]
  24. Pourasad, Y.; Ranjbarzadeh, R.; Mardani, A. A new algorithm for digital image encryption based on chaos theory. Entropy 2021, 23, 341. [Google Scholar] [CrossRef]
  25. Kanso, A.; Ghebleh, M. A novel image encryption algorithm based on a 3D chaotic map. Commun. Nonlinear Sci. 2012, 17, 2943–2959. [Google Scholar] [CrossRef]
  26. Fu, C.; Hou, S.; Zhou, W.; Liu, W.; Wang, D. A chaos-based image encryption scheme with a plaintext related diffusion. In Proceedings of the 2013 9th International Conference on Information, Communications & Signal Processing, Tainan, Taiwan, 10–13 December 2013; IEEE: Danvers, MA, USA, 2013; pp. 1–5. [Google Scholar]
  27. Zhang, Y. A chaotic system based image encryption algorithm using plaintext-related confusion. Indones. J. Electr. Eng. Comput. Sci. 2014, 12, 7952–7962. [Google Scholar] [CrossRef]
  28. Norouzi, B.; Mirzakuchaki, S.; Seyedzadeh, S.M.; Mosavi, M.R. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 2014, 71, 1469–1497. [Google Scholar] [CrossRef]
  29. Zhang, Y.; Xiao, D.; Wen, W.; Li, M. Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Nonlinear Dyn. 2014, 76, 1645–1650. [Google Scholar] [CrossRef]
  30. Murillo-Escobar, M.A.; Cruz-Hernandez, C.; Abundiz-Perez, F.; Lopez-Gutierrez, R.M.; Acosta Del Campo, O.R. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process. 2015, 109, 119–131. [Google Scholar] [CrossRef]
  31. Fan, H.; Li, M.; Liu, D.; An, K. Cryptanalysis of a plaintext-related chaotic RGB image encryption scheme using total plain image characteristics. Multimed. Tools Appl. 2018, 77, 20103–20127. [Google Scholar] [CrossRef]
  32. Chai, X.; Gan, Z.; Zhang, M. A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed. Tools Appl. 2017, 76, 15561–15585. [Google Scholar] [CrossRef]
  33. Wang, X.; Zhu, X.; Wu, X.; Zhang, Y. Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt. Lasers Eng. 2018, 107, 370–379. [Google Scholar] [CrossRef]
  34. Li, Z.; Peng, C.; Li, L.; Zhu, X. A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlinear Dyn. 2018, 94, 1319–1333. [Google Scholar] [CrossRef]
  35. Li, Z.; Peng, C.; Tan, W.; Li, L. A novel chaos-based image encryption scheme by using randomly DNA encode and plaintext related permutation. Appl. Sci. 2020, 10, 7469. [Google Scholar] [CrossRef]
  36. Sun, S.; Guo, Y.; Wu, R. A novel image encryption scheme based on 7D hyperchaotic system and row-column simultaneous swapping. IEEE Access 2019, 7, 28539–28547. [Google Scholar] [CrossRef]
  37. Zhang, Q.; Han, J. A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimed. Tools Appl. 2021, 80, 13841–13864. [Google Scholar] [CrossRef]
  38. Oravec, J.; Turan, J.; Ovsenik, L.; Ivaniga, T.; Solus, D.; Marton, M. Asymmetric image encryption approach with plaintext-related diffusion. Radioengineering 2018, 27, 281–288. [Google Scholar] [CrossRef]
  39. Oravec, J.; Turan, J.; Ovsenik, L.; Huszanik, T. A chaotic image encryption algorithm robust against the phase space reconstruction attacks. Acta Polytech. Hung. 2019, 16, 37–57. [Google Scholar]
  40. Ovsenik, L.; Turan, J.; Huszanik, T.; Oravec, J.; Kovac, O.; Oravec, M. Image encryption algorithm with plaintext related chaining. Comput. Inform. 2019, 38, 647–678. [Google Scholar] [CrossRef]
  41. Oravec, J.; Ovsenik, L.; Turan, J.; Huszanik, T. Mitigating drawbacks of logistic map for image encryption algorithms. Comput. Inform. 2020, 39, 1250–1281. [Google Scholar] [CrossRef]
  42. Oravec, J.; Ovsenik, L.; Papaj, J. An image encryption algorithm with a plaintext-related quantisation scheme. IET Image Process 2021, 15, 2039–2055. [Google Scholar] [CrossRef]
  43. Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C; Wiley: New York, NY, USA, 1996; 1027p. [Google Scholar]
  44. May, R.R. Simple mathematical models with very complicated dynamics. Nature 2004, 261, 459–467. [Google Scholar] [CrossRef]
  45. Persohn, K.J.; Povinelli, R.J. Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons Fractals 2012, 45, 238–245. [Google Scholar] [CrossRef]
  46. Arroyo, D.; Alvarez, G.; Fernandez, V. On the inadequacy of the logistic map for cryptographic applications. In Proceedings of the 10th Spanish Meeting on Cryptology and Information Security, Salamanca, Spain, 2–5 September 2008; Universidad de Salamanca: Salamanca, Spain, 2008; pp. 77–82. [Google Scholar]
  47. Knuth, D.E. The Art of Computer Programming; Addison-Wesley: Boston, MA, USA, 2005; 1872p. [Google Scholar]
  48. Steingartner, W.; Eldojali, M.A.; Radakovic, D.; Dostal, J. Software support for course in semantics of programming languages. In Proceedings of the International Scientific Conference on Informatics 2017, Poprad, Slovakia, 14–16 November 2017; IEEE: Danvers, MA, USA, 2017; pp. 359–364. [Google Scholar]
  49. IEEE 754-2019: ‘IEEE Standard for Floating-Point Arithmetic’. Available online: https://ieeexplore.ieee.org/servlet/opac?punumber=8766227 (accessed on 3 September 2021).
  50. Steingartner, W.; Galinec, D. The role of categorical structures in infinitesimal calculus. J. Appl. Math. Comput. Mech. 2013, 12, 107–119. [Google Scholar] [CrossRef]
  51. Steingartner, W.; Polakova, A.; Praznak, P.; Novitzka, V. Linear logic in computer science. J. Appl. Math. Comput. Mech. 2015, 14, 91–100. [Google Scholar] [CrossRef] [Green Version]
  52. The USC-SIPI Image Database. Available online: http://sipi.usc.edu/database/ (accessed on 3 September 2021).
  53. NIST SP 800-22 Rev. 1a: ‘A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications’. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf (accessed on 3 September 2021).
  54. Broda, M.; Hajduk, V.; Levicky, D. Universal statistical steganalytic method. J. Electr. Eng. 2017, 68, 117–124. [Google Scholar] [CrossRef] [Green Version]
  55. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. J. Sel. Areas Telecommun. 2011, 1, 31–38. [Google Scholar]
Figure 1. Effect of image encryption performed by AES in ECB mode.
Figure 1. Effect of image encryption performed by AES in ECB mode.
Entropy 23 01373 g001
Figure 2. A block scheme describing stages of the proposed solution.
Figure 2. A block scheme describing stages of the proposed solution.
Entropy 23 01373 g002
Figure 3. A bifurcation diagram for the LM.
Figure 3. A bifurcation diagram for the LM.
Entropy 23 01373 g003
Figure 4. A plot of estimated LEs for the LM with r ( 3 , 4 ) .
Figure 4. A plot of estimated LEs for the LM with r ( 3 , 4 ) .
Entropy 23 01373 g004
Figure 5. A rearrangement scheme for true color images.
Figure 5. A rearrangement scheme for true color images.
Entropy 23 01373 g005
Figure 6. An illustration of a lookup table filled by row-major order.
Figure 6. An illustration of a lookup table filled by row-major order.
Entropy 23 01373 g006
Figure 7. A matrix rearrangement technique.
Figure 7. A matrix rearrangement technique.
Entropy 23 01373 g007
Figure 8. A set of experimental images.
Figure 8. A set of experimental images.
Entropy 23 01373 g008
Figure 9. An illustration of key sensitivity of the proposed solution.
Figure 9. An illustration of key sensitivity of the proposed solution.
Entropy 23 01373 g009
Figure 10. Effect of even slight modification on encrypted images.
Figure 10. Effect of even slight modification on encrypted images.
Entropy 23 01373 g010
Figure 11. A comparison of histograms of plain and encrypted images.
Figure 11. A comparison of histograms of plain and encrypted images.
Entropy 23 01373 g011
Figure 12. A comparison of correlation diagrams for plain and encrypted images.
Figure 12. A comparison of correlation diagrams for plain and encrypted images.
Entropy 23 01373 g012
Table 1. Key schedule, sequence lengths and maximal element values for all generated sequences.
Table 1. Key schedule, sequence lengths and maximal element values for all generated sequences.
Generated
Sequence
Parameter Values
Pattern
Sequence
Length
Maximal Element
Value Q
s e q 1 r 4 r 8 r 3 r 7 r 2 r 6 r 1 r 5 w h 1
s e q 2 r 5 r 1 r 6 r 2 r 7 r 3 r 8 r 4 h w 1
s e q 3 r 1 r 2 r 3 r 4 r 5 r 6 r 7 r 8 h × w 255
s e q 4 r 2 r 1 r 4 r 3 r 6 r 5 r 8 r 7 w h 1
s e q 5 r 7 r 8 r 5 r 6 r 3 r 4 r 1 r 2 h w 1
s e q 6 r 8 r 7 r 6 r 5 r 4 r 3 r 2 r 1 n u m p x 255
Table 2. Combinations used during four scanning directions.
Table 2. Combinations used during four scanning directions.
Scanning
Direction
Scanning OrderAddition
(Mod 256)
XOR
Rows lColumns k
top to bottom 1 , 2 , 3 , , h : l 1 l + 1
left to right: 1 , 2 , 3 , , w k 1 k + 1
bottom to top h , h 1 , h 2 , , 1 : l + 1 l 1
right to left: w , w 1 , w 2 , , 1 k + 1 k 1
Note: A colon : stands for all possible row or column indexes.
Table 3. A set of experimental keys.
Table 3. A set of experimental keys.
KeyValue
K 1 0× C9 0F DA A2 21 68 C2 34 C4 C6 62 8B 80 DC 1C D1
K 2 0× C9 0F DA A2 21 68 C2 34 C5 C6 62 8B 80 DC 1C D1
K 3 0× 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Table 4. Results of the tests from NIST 800-22 suite obtained by the plaintext-related sequence.
Table 4. Results of the tests from NIST 800-22 suite obtained by the plaintext-related sequence.
TestRequired
Pass Rate
Obtained
Successful Results
Frequency (monobit)96/10099/100
Frequency within a block (M = 128 bits)96/10098/100
Runs96/10096/100
Longest run of ones in a block96/10097/100
Binary matrix rank96/10098/100
Discrete Fourier transform (spectral)96/10098/100
Non-overlapping template matching
(m = 9 bits, first p-value)
96/10097/100
Overlapping template matching (m = 9 bits)96/10096/100
Maurer’s universal statistic96/10098/100
Linear complexity (M = 500 bits)96/10098/100
Serial (m = 16 bits, first p-value)96/10098/100
Approximate entropy (m = 10 bits)96/10096/100
Cumulative sums (first p-value)96/10099/100
Random excursions (first p-value)60/6362/63
Random excursions variant (first p-value)60/6363/63
Table 5. Achieved values of numerical parameters.
Table 5. Achieved values of numerical parameters.
Image,
Color Plane
and Key
var
[-]
ρ h
[-]
ρ v
[-]
ρ d
[-]
H
[bits/px]
NPCR
[%]
UACI
[%]
l e n a R510,3710.97230.97310.95357.5889not reported
G1,290,2860.97340.97090.95317.106
B1,908,5340.97020.97330.95286.8147
K 1 R1094−0.00190.002−0.00127.999299.614333.4857
G1003−0.0005−0.0018−0.00017.999399.613433.4805
B929−0.0014−0.001−0.00227.999499.614433.4811
K 2 R10640.00170.0008−0.00167.999399.613533.4816
G1046−0.0010.00240.00217.999399.614233.4839
B11370.00020.0004−0.00147.999299.614533.4822
K 3 R1024−0.00290.00170.00117.999399.615133.486
G1007−0.00150.0012−0.00187.999399.613833.4823
B909−0.0027−0.00030.00077.999499.615733.4855
p e p p e r s R852,7490.95770.9650.94777.3388not reported
G1,273,5320.96090.96810.95587.4963
B1,965,7130.9630.9650.95237.0583
K 1 R10120.0024−0.0004−0.00137.999399.61433.4816
G988−0.00060.00170.00127.999399.616433.4832
B1099−0.00030.0028−0.0017.999299.615433.4818
K 2 R8780.00060.0014−0.00237.999499.614633.4818
G9090.0014−0.00050.00077.999499.613233.4808
B841−0.0007−0.0010.00257.999499.616633.4846
K 3 R10700.00170.0022−0.00047.999399.615833.4864
G9470.00110.001−0.00097.999399.615733.4874
B1036−0.0006−0.00030.00237.999399.614733.483
b a b o o n G -750,7640.84350.71290.67587.3579not reported
K 1 11230.00130.00140.00017.999299.615333.4807
K 2 1102−0.0009−0.00270.00147.999299.614233.4808
K 3 1046−0.0019−0.0013−0.00047.999399.614933.4856
l e n a G -1,039,1260.97090.97650.95617.2344not reported
K 1 9930.0006−0.0015−0.00087.999399.612733.483
K 2 1046−0.00090.00290.00227.999399.613833.4836
K 3 995−0.00130.00260.00187.999399.614433.4847
p e p p e r s G -478,9000.96980.97670.96287.5943not reported
K 1 11080.0013−0.0006−0.00127.999299.61433.484
K 2 1075−0.002−0.0007−0.00167.999399.613233.4847
K 3 9350.0007−0.00260.00047.999499.613733.4806
s a i l b o a t G -718,8750.97480.96570.95387.4847not reported
K 1 9180.0011−0.0004−0.00167.999499.613533.4844
K 2 1042−0.0003−0.0020.00147.999399.615433.4824
K 3 9060.0019−0.0019−0.00037.999499.614833.4855
Note: A dash—means that plain image is grayscale.
Table 6. Measured and computed values of computational complexity.
Table 6. Measured and computed values of computational complexity.
Image and Key t enc
[ms]
t dec
[ms]
v enc
[MB/s]
v dec
[MB/s]
cyc enc
[cycles/B]
cyc dec
[cycles/B]
l e n a K 1 493.0626487.94691.52111.53711567.41551.14
K 2 490.6985488.03881.52841.53681559.891551.43
K 3 493.014487.43621.52111.53711567.251549.52
p e p p e r s K 1 491.7683488.24731.52511.53611563.291552.1
K 2 492.1848490.52681.52381.5291564.611559.34
K 3 491.2771488.70791.52661.53471561.731553.56
b a b o o n G K 1 149.4431143.8121.67291.73841425.21371.5
K 2 149.4405143.49851.67291.74221425.181368.51
K 3 149.2358143.4091.67521.74331423.221367.65
l e n a G K 1 149.4753143.45111.67251.74281425.511368.06
K 2 149.3001143.72271.67451.73951423.841370.65
K 3 149.5298144.34341.67191.7321426.031376.52
p e p p e r s G K 1 149.5122143.7681.67211.73891425.861371.08
K 2 149.4405143.49851.67291.74221425.181368.51
K 3 149.2358143.4091.67521.74331423.221367.65
s a i l b o a t G K 1 149.2376143.72041.67521.73951423.241370.62
K 2 149.1357143.36981.67631.74371422.271367.28
K 3 149.1004143.44111.67671.74291421.931367.96
Table 7. Comparison of obtained numerical results with similar work.
Table 7. Comparison of obtained numerical results with similar work.
Approach ρ h
[-]
ρ v
[-]
ρ d
[-]
H
[bits/px]
NPCR
[%]
UACI
[%]
cyc enc
[cycles/B]
Red color plane of true color image l e n a
proposed−0.00190.002−0.00127.999299.614333.48571567.4
[25]−0.0029−0.0150.01297.99799.6233.51∼2270
[30]0.0135-7.997499.6333.31648.53
Grayscale image l e n a G
proposed0.0006−0.0015−0.00087.999399.612733.4831425.51
[19]0.00770.00530.00037.999399.60633.47144205.32
[27]−0.0046−0.0511−0.01687.999399.610133.46798230.32
[32]0.00440.01510.00127.999399.6233.4515,120.97
[33]−0.0037−0.00290.00477.997599.595633.551243,151.97
[34]0.00130.00080.00667.999399.610733.4365185.19
[35]0.00030.00190.00037.999399.615933.48464945.37
[37]−0.0003−0.0024−0.00227.999499.609633.459972,452.57
Note: A dash-stands for non-reported data.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Oravec, J.; Ovsenik, L.; Papaj, J. An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values. Entropy 2021, 23, 1373. https://doi.org/10.3390/e23111373

AMA Style

Oravec J, Ovsenik L, Papaj J. An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values. Entropy. 2021; 23(11):1373. https://doi.org/10.3390/e23111373

Chicago/Turabian Style

Oravec, Jakub, Lubos Ovsenik, and Jan Papaj. 2021. "An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values" Entropy 23, no. 11: 1373. https://doi.org/10.3390/e23111373

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop