2014 A ICSIP Chaos Survey
2014 A ICSIP Chaos Survey
net/publication/261960045
CITATIONS READS
70 4,270
2 authors:
All content following this page was uploaded by Priya Sankpal on 21 February 2019.
Abstract— As the exchange of data over the open networks and be used to encrypt images, but it is not a good idea as image
Internet is rapidly growing, security of the data becomes a size is always much greater than the textual data. Also the
major concern. One possible solution to this problem is to decrypted text should be equal to the original text, whereas
encrypt the data. The data can be text, image, audio, video etc.. this requirement is not necessary for image data. An image
In today’s world most of the multimedia applications involve when decrypted contains small distortion and is usually
images. Earlier image encryption techniques like AES,DES,RSA
acceptable because of the characteristic of human perception.
etc. exhibit low levels of security and also weak anti attack
ability. This problem was overcome by using chaos based II. IMAGE ENCRYPTION TECHNIQUES
cryptography. The chaotic systems are very sensitive to initial
conditions and control parameters which make them suitable Image encryption techniques can be divided into two groups
for image encryption. Many works have been done in the field of based on the approach used to construct the encryption
chaos based image encryption. In this survey paper an attempt scheme: chaos based methods and non chaos based methods.
has been made to review the aspects and approaches of the Image encryption can also be classified according to the
design used for image encryption. percentage of the data that is encrypted as full encryption and
partial encryption. Several reviews have been published on
Keywords — Image, cryptography, chaotic maps, encryption, image and video encryption including selective methods,
security, analysis. thereby providing a fairly complete overview of the
techniques developed till date [2] – [5].
I. INTRODUCTION
III. CHAOS THEORY FOR CRYPTOGRAPHY
As the data exchange in electronic way is rapidly increasing,
it is also equally important to protect the confidentiality of A chaotic dynamical system is a deterministic system that
data from unauthorized access. The breaches in security exhibits seemingly random behavior as a result of its
affect user’s privacy and reputation. The data exchanged can sensitive dependence on its initial conditions and can never
be text, image, audio, video etc. Each type of data has its own be specified with infinite precision. The chaotic system
features different techniques are used to protect confidential behavior is unpredictable; thereby it resembles noise. The
image data from unauthorized access. Hence encryption of close relationship between cryptography and chaos makes a
data is done to confirm security in open networks such as the chaos based cryptographic algorithm a natural candidate for
internet where the multimedia applications are ever growing. secure communication and cryptography. Cryptographic
Cryptography is the study of techniques for secure algorithms and chaotic maps have similar properties such as
communication in the presence of an adversary. It deals with sensitivity to changes in the initial conditions and control
problems like encryption, authentication, and key distribution parameters, pseudorandom behavior and unstable periodic
to name a few. Image encryption is a technique that provides orbits with long periods. The basic principle of image
security to images by converting the original image into an encryption using chaos is based on the ability of some
image which is difficult to understand. Applications of image dynamic systems to produce sequence of numbers that are
encryption can extended to military communication, random in nature. Messages are encrypted using these
multimedia systems, medical science, telemedicine, internet sequences [5]. Because of the pseudorandom behavior, the
communication etc. Generally images are different from output of the system seems random in the attacker’s view
textual data. The idea for encryption of image is to consider a whereas it appears as defined in the receiver’s view and
2D image as a 1D data stream and this stream is encrypted decryption is possible [6]. An important difference between
with any textual based cryptosystem. This approach is called cryptography and chaos maps is that encryption
nave approach [1]. For text, small bit rate audio, image and transformations are defined on finite sets whereas chaos maps
video files that can be sent over a fast dedicated channel, this have meaning only for real numbers [5]. Each chaos map has
approach is suitable. Unfortunately these encryption parameters that are equivalent to encryption key in
algorithms may not satisfy for different image data types like cryptography. The similarities and differences between these
JPEG, PNG, BMP, etc... i.e. Traditional cryptosystems can two are listed as shown in Table I.
103
pseudorandom number generator to build a permutation In their paper, Chong Fu et.al. proposed a novel bidirectional
matrix. Now After pixel permutation, W7 algorithm is diffusion strategy which can significantly accelerate the
applied. The W7 algorithm generates a pseudorandom cipher spreading process to promote the efficiency of chaos –based
bit stream called the key stream whose length is equal to image encryption. Also to enhance the security of the system,
shuffled image binary sequence. The cipher image is a plain-text related chaotic orbit turbulence mechanism is
obtained by XORing the shuffled image binary sequence introduced in the diffusion stage by disturbing control
with the key stream. For decryption, the received cipher parameters of the employed chaotic system according to the
image is XORed with key stream and reverse shuffling cipher pixel. The image shuffling is done by Chirikov map.
operation is done via the inverse permutation [6]. The shuffled image histogram is same as that of the plain
image since the permutation operation shuffles only the pixel
In the paper by Hazem Mohammad Al-Najjar and Asem positions without changing its value. As a result of this, the
Mohammad AL-Najjar, an image encryption based on shuffled image is weak against statistical attack and known
logistic map chaotic function is discussed. The encryption plain text attack. To overcome this, a diffusion procedure
system can be divided into 2 approaches as pixel replacement based on chebyshev map is employed. In the diffusion stage,
approach and pixel scrambling approach. In pixel to confuse the relationship between cipher and plain image,
replacement approach, the pixel values are changed where as the pixel values are modified sequentially. The chaotic
in pixel scrambling the pixel positions are changed. This chebyshev map is used to generate the key stream for the
algorithm consists of 2 replacement approaches to change the diffusion. In general diffusion process is a time consuming
value of the pixel without shuffling the image itself. To procedure. For conventional chaos cipher images, overall 3-4
achieve this, two pixel mapping tables that are created by rounds are needed usually to achieve a satisfactory diffusion
using the logistic map are used. The pixel mapping table performance. This kind of computational complexity greatly
(PMT) contains the pixel values from 0 to 255 in the shuffled downgrades its efficiency. Hence to improve the efficiency of
order with the size 256x1. The algorithm uses only the chaos based image encryption, a bidirectional diffusion
replacement approaches to encrypt the image. The 2 different scheme which accelerates the spreading process is used. The
replacement approaches are: in the first approach, the pixels proposed diffusion module consists of 2 independent
are shifted by suing a random value and mapping it by using diffusion stages with different spreading direction where as
PMT. In the second approach, replacement is done by using the permutation module is kept unchanged. In the first stage,
the XORing operation with specific random vector generated the difference is spread out to all pixels by modifying the
by using the logistic map. The process of decryption is done pixel values sequentially left to right, top to bottom. In the
in the reverse order [9]. second stage, right to left, a bottom to top sequential
modification is carried out rather than starting the next round
This proposed scheme uses the composite of the chaotic of permutation-diffusion as in the conventional diffusion
coupled map lattices to achieve the goal of image encryption. schemes. As a result of this, the diffused pixels are spread out
A gray scale image of size mxn (I mxn) is considered for the to the cipher image instead of wider range of the cipher
purpose. The image is transformed into a matrix of I mxn x 1. image. Hence the overall encryption round are reduced
Using the chaotic logistic map the strength of the coupling is without downgrading the security level [12].
generated which in turn is used for finding the chaotic
trigonometric maps. The 2D dynamical coupled resulting In this algorithm, the image is represented in the matrix form
sequences from this operation are again bitwise XORed to wherein the gray levels are in the range 0 to 1. This pixel
get the final cipher image. The decryption process is same as matrix is converted into an array. The pixel values are
the encryption but with reverse steps [10]. converted to unsigned integer in the range of 0 to 255 using
mod operation. Generation of chaotic sequence in the range 0
In this paper presented by kamlesh Gupta and Sanjay to 1 using circle map with initial condition and control
Silakari, the main image of size MxN is divided into 3 parameters is done. By XORing the pixel array and the
separate images as Red, Green and Blue images. While the chaotic sequence an intermediate cipher is generated. This
red and green images are transformed into vertical and intermediate cipher image is shuffled to get the final cipher
horizontal planes respectively, the blue image is retained as it array. The resultant cipher array is transformed to get the
is. From the Transformed/rotated image, one row is read final cipher image. The initial conditions and map parameters
from each of planes to create a plane of these 3 image planes. are secret keys. The decryption process is reverse operation
First level of confusion is done by the 2D cat map. The final of encryption [13].
confusion stage is performed by a cascade of 2 maps i.e. first
by cat map and then by standard map. The confusion stage is In this paper, Shima Ramesh Maniyath1 and Supriya M,
followed by the diffusion stage and cipher image is obtained propose a secure and computationally feasible image and
by XORing each pixels of confused image with the diffused video encryption/decryption algorithm based on DNA
image. Decryption process is the reverse operation of the sequences. The main aim was to reduce the big image
encryption procedure [11]. encryption time. A plain image ‘Á’ of size MxN is
considered for encryption process. A new image A1 is
obtained by confusing the input plain image with a
104
scrambling sequence generated by the DNA sequence. The from the chaotic map are uniformly distributed like white-
scrambling of image is done with the help of Arnold cat map. noise. The Histograms of the discussed schemes consists of
Next another image A2 is obtained by XORing the image A1 spikes that are almost uniformly distributed and significantly
with DNA template B1 which is generated by the second different from those of the original images and therefore bear
DNA sequence. This process is repeated for 2 rounds and at no statistical resemblance to the plain-image. Hence they do
the end of 2 rounds, a cipher image is obtained. In this paper not provide any clue to employ any statistical attack on the
for generating the DNA template/sequence DNA digital image encryption technique discussed.
coding technology is used. For any pixel, the range of its gray
value is 0 – 255. Instead of using gray value, four bases i.e. D. Correlation co-efficient analysis
00, 01, 10 and 11 are replaced by A, T, C and G [14]. In addition to the histogram analysis, study of the correlation
between two horizontal, vertical and diagonal diagonally
VI. SECURITY ANALYSIS OF THE ENCRYPTION adjacent pixels of the plain image and the encrypted image is
SCHEMES used. In case of plain image each pixel is usually highly
correlated with its adjacent pixels either in horizontal,
Security analysis can be referred as the art of finding the vertical or diagonal directions where as for encrypted image
weakness of a cryptosystem and retrieval of either the whole these correlation will be very small. A high correlation value
or a part of a ciphered image or finding the secret key without implies the best match between the plain and cipher images.
knowing the decryption key of the algorithm. There are many This means that if the correlation coefficient of the plain
techniques available for applying analysis, depending on image and the deciphered image is large, then there is
what access the analyst has to the plaintext, cipher text, or maximum similarity between the two images. The correlation
other aspects of the cryptosystem. Some of the most common coefficients of the adjacent pixels of the ciphered image
types of attacks to encrypted images are discussed as below obviate that the discussed algorithm has a good ability of
[1], [13]: diffusion and confusion and hence are highly resistive against
A. Key Space Analysis the statistical attack
The number of try’s to find the decryption key by checking
all possible keys refers to key space of the cryptosystem that E. Information entropy analysis
grows exponentially with increasing key size. That is For testing the robustness of the encryption algorithm, the
doubling the key size for an algorithm does not simply concept of entropy is also used. Theoretically, a true random
double the required number of operations, but rather squares system should generate 28 symbols with equal probability,
them. For example an algorithm with a 128 bit in key size i.e., m = {m1, m2, m3, …. , m28} for 8 bit depth. The entropy of
defines a key space of 2128, which takes about 1021 years to the plain images and the ciphered images are compared.
check all the possible keys, with nowadays high performance From this analysis it is clear that the entropy of the ciphered
computers. Hence a cryptosystem with large key size looks image is approximately equal to 8, which proves the ability
computationally robust against a brute force attack. of the encryption technique against the entropy attack.
105
VII. COMPAIRSON OF CHAOTIC MAPS Key space - 2302
Correlation coefficient
All the encryption algorithms discussed here employed Plain Cipher
Coefficient
different security analysis as mentioned in the previous, to image image
Chaotic coupled
validate the good performance and evaluate the robustness of map lattices, Horizontal 0.9341 0.0014
[10]
a cryptosystem. All the security analysis details are Chaotic
concluded in the form of table as shown in Table II. From the trigonometric map Vertical 0.9634 0.0036
table an analysis can be made of each method used for image
Diagonal 0.9402 0.0027
encryption using chaos theory.
TABLE II. COMPAIRSON OF VARIOUS CHAOS BASED NPCR – 0.25% & UACI – 0.19%
CRYPTOGRAPHY TECHNIQUES Key space – 2148
Key Sensitivity – High
Correlation coefficient
Plain Cipher
Coefficient
image image
106
encryption. Also there are many more chaotic maps that need
to be explored. To name few we have Duffling map,
Horseshoe map, Ikeda map, Gauss map etc. Hence
encryption that can be referred as a scientific art which is
ever changing and fast growing should always exhibit high
rate of security.
REFERENCES
[1] Ali Soleymani, Zulkarnain Md Ali, and Md Jan Nordin,” A
Survey on Principal Aspects of Secure Image Transmission”,
World Academy of Science, Engineering and Technology 66
2012, pp 247 – 254.
[2] Monisha Sharma, Manoj Kumar Kowar” Image Encryption
Techniques using Chaotic Schemes: A Review”, International
Journal of Engineering Science and Technology Vol. 2(6), 2010,
pp 2359-2363.
[3] Abhinav Srivastava,” A survey report on Different Techniques of
Image Encryption”, International Journal of Emerging
Technology and Advanced Engineering, ISSN 2250-2459,
Volume 2, Issue 6, June 2012.
[4] Pooja Mishra, Biju Thankachan,” A Survey on Various
Encryption and Key Selection Techniques”, International Journal
of Engineering and Innovative Technology (IJEIT) Volume 2,
Issue 7, January 2013, ISSN: 2277-3754.
[5] Alireza Jolfaei, Abdolrasoul Mirghadri,” An Image Encryption
Approach using Chaos and Stream Cipher”, Journal of
Theoretical and Applied Information Technology, pp 117 – 123
[6] Somaya Al-Maadeed, Afnan Al-Ali, and Turki Abdalla, A New
Chaos-Based Image-Encryption and Compression Algorithm”,
Hindawi Publishing Corporation, Journal of Electrical and
Computer Engineering, Volume 2012, Article ID 179693.
[7] K.Sakthidasan Sankaran and B.V.Santhosh Krishna,” A New
Chaotic Algorithm for Image Encryption and Decryption of
Digital Color Images”, International Journal of information and
Education Technology, Vol. 1, No. 2, June 2011.
[8] A. Anto Steffi, Dipesh Sharma,” Modified Algorithm of
Encryption and Decryption of Images using Chaotic Mapping”,
International Journal of Science and Research (IJSR), India
Online ISSN: 2319-7064, Volume 2 Issue 2, February 2013.
[9] Hazem Mohammad Al-Najjar, Asem Mohammad AL-Najjar,”
Image Encryption Algorithm Based on Logistic Map and Pixel
Mapping Table”.
[10] Sodeif Ahadpour, Yaser Sadra,” A Chaos-based Image
Encryption Scheme using Chaotic Coupled Map Lattices.
[11] Kamlesh Gupta1, Sanjay Silakari,” New Approach for Fast
Color Image Encryption Using Chaotic Map”, Journal of
Information Security, 2011, 2, 139-150
[12] Chong Fu, Jun-jie Chen, Hao Zou, Wei-hong Meng, Yong-feng
Zhan, and Ya-wen,” A chaos-based digital image encryption
scheme with an improved diffusion strategy”, Optical Society of
America, 30 January 2012 / Vol. 20, No. 3 /pp 2363 – 2378.
[13] D. Chattopadhyay1, M. K. Mandal1 and D. Nandi,” Symmetric
key chaotic image encryption using circle map”, Indian Journal of
Science and Technology, Vol. 4 No. 5 (May 2011) ISSN: 0974-
6846, pp 593 – 599.
[14] Shima Ramesh Maniyath1 and Supriya M,” An Uncompressed
Image Encryption Algorithm Based on DNA Sequences,
Computer Science & Information Technology (CS & IT),
CCSEA 2011, CS & IT 02, pp. 258–270
107