Colour Image Encryption Based On Multiple Fractional Order Chaotic Systems
Colour Image Encryption Based On Multiple Fractional Order Chaotic Systems
978-1-4799-2044-0/14/$31.00©2014IEEE
Authorized licensed use limited to: Indian Statistical Institute Kolkata. Downloaded on December 12,2022 at 08:34:21 UTC from IEEE Xplore. Restrictions apply.
2014 International Conference on Control, Instrumentation, Energy & Communication(CIEC) 584
Fig. 1. State trajectories for the Lorenz’s system for 50 s. Fig. 4. State trajectories for the Volta’s system for 20 s.
Authorized licensed use limited to: Indian Statistical Institute Kolkata. Downloaded on December 12,2022 at 08:34:21 UTC from IEEE Xplore. Restrictions apply.
2014 International Conference on Control, Instrumentation, Energy & Communication(CIEC) 585
an average, this data type can hold about 14 to 15 digits after Thus the expressions of XR , XG and XB will get altered
the decimal point, the pseudo-random arrays of 8-bit integers for different values of the parameter that controls the selection
are produced by using (11) of states.
Xi = (|xi | − xi ) × 1014 (mod 256). (11) Step–2: Taking the values of Xk (where k = R, G, B) in
order, a key-image [Ki,j,k ]m×n×p is constructed which takes
Where Xi denotes the pseudo-random integer correspond- the principal role in this encryption business. Here an instance
ing to a state value. With the help of above procedure, a has been set up,
very useful set of pseudo-random 8-bit unsigned integers can K0,0,0 = XR (0)
be obtained. These integers vary between 0 and 255 and
follow an almost uniform distribution throughout the range. K0,0,1 = XG (0)
Here, the initial conditions as well as the order of derivatives K0,0,2 = XB (0)
can be selected arbitrarily. As a consequence, a total of six
control parameters (from each chaotic system) is found to Repeat this process as
be available to form the key space. Hence, the key space
becomes as huge as (1014 )4×6 = 10336 . Now, if the control K0,1,0 = XR (h)
parameters are slightly changed, the pseudo-random sequence K0,1,1 = XG (h)
thus generated will be heavily affected just because of the fact K0,1,2 = XB (h)
that the response of fractional order chaotic systems are heavily
dependent on the initial conditions as well as the derivative and so on, continuing until all the elements of the key-image
orders. [Ki,j,k ]m×n×p are loaded. Here, h is the computation step used
to solve (2), (5), (7) and (9).
B. Phase-2: Image Pixel Manipulation Now, by performing bitwise XOR operation between each
Let the original colour image be denoted by [Ti,j,k ]m×n×p original image pixel and the corresponding key image pixel,
which is nothing but an array of 8-bit unsigned integers of the encrypted version of the original colour image which is
order m×n×p, where m = row length, n = column length and indicated by [Ri,j,k ], is produced. Hence, the expression for
p = number of channels of image. In this scheme, the pseudo- [Ri,j,k ] can be written as
random arrays corresponding to the states of four fractional [Ri,j,k ] = [Ti,j,k ] ⊕ [Ki,j,k ]. (12)
order chaotic systems previously discussed are combined, in a
fashion, to generate the cyphering keys for channel-1, channel- C. Image Decryption
2 and channel-3 (henceforth called R, G and B channels
respectively). Here we accomplish the pixel manipulation The decryption procedure follows the principle that
routine through following two steps: (X ⊕ Y ) ⊕ Y = X. (13)
Step–1: At first, we form a table named State Allocation
Table in which the states of the chaotic systems, after convert- Hence, the algorithm can conveniently decrypt the en-
ing them into 8-bit unsigned integers, are distributed under crypted image just by executing bitwise XOR operation be-
different channels. tween the encrypted image and the same key-image.
Here, we apply a trick. Instead of allocating the sates
exactly in the same order every time, some switch-cases are IV. E XPERIMENTAL R ESULTS
created which will jumble up the state selection. The switch- Throughout this work, Python 2.7 (along with NumPy,
cases will be controlled by another control parameter. This Matplotlib and Cython) is used as the experimental platform.
increases the key space further. An instance of such a modified However, the numerical solution of even a very simple one di-
allocation table is presented in Table I. mensional fractional order homogeneous differential equation
like Dq y(t) + b y(t) = 0 becomes as complicated as [9]
TABLE I. A N INSTANCE OF THE S TATE A LLOCATION TABLE
r
j q
Chaotic States allocated to different Channels y(rh) = −bhq y(rh − h) − (−1) y(rh − jh), (14)
System R-Channel G-Channel B-Channel
j=1
j
Lorenz X1a X2a X3a
X3b X1b X2b
Chen
Liu X2c X1c X3c
for r = n, n + 1, · · · . So, it is quite obvious that, if t goes
Volta X3d X2d X1d on increasing, more and more number of terms will have to
be calculated to find the solution. To avoid this problem, some
may prefer to use the short memory principle based on the
Let the pseudo-random 8-bit unsigned integers for R- fact that distant past of the variable y have little effect on the
Channel, G-Channel and B-Channel are denoted by XR , XG G-L derivative. But nevertheless, truncating the summation in
and XB respectively. Then in the above case, XR , XG and XB (14) will introduce error in the solution.
are generated as follows Again, any interpreted language like Python or Matlab is
XR = X1a ⊕ X3b ⊕ X2c ⊕ X3d , inefficient in running loops. So, instead of implementing the
XG = X2a ⊕ X1b ⊕ X1c ⊕ X2d , solution of (2), (5), (7) and (9) directly in Python, the costly
loops are implemented in C using Cython. This proved to be
XB = X3a ⊕ X2b ⊕ X3c ⊕ X1d . a great deal in increasing the speed of the solver.
Authorized licensed use limited to: Indian Statistical Institute Kolkata. Downloaded on December 12,2022 at 08:34:21 UTC from IEEE Xplore. Restrictions apply.
2014 International Conference on Control, Instrumentation, Energy & Communication(CIEC) 586
(a) (b)
Fig. 7. Histogram of the original image.
Fig. 5. (a) Original image, and (b) Encrypted image
Authorized licensed use limited to: Indian Statistical Institute Kolkata. Downloaded on December 12,2022 at 08:34:21 UTC from IEEE Xplore. Restrictions apply.
2014 International Conference on Control, Instrumentation, Energy & Communication(CIEC) 587
250
VI. C ONCLUSIONS
200 The use of multiple fractional order systems for image
Intensity of adjacent pixel encryption significantly increases the key-space and the key
150
sensitivity. The speed, and invulnerability of the algorithm
against brute-force attacks, make it useful for many practical
100
applications. Although the programme is optimised to run as
fast as possible, it will still seem sluggish for images of very
large size. Moreover, it should be kept in mind that, although
50
the derivative orders in the differential equations are considered
to be a part of the control parameters (the password), improper
0 choice of values for them may not satisfy the necessary
0 50 100 150 200 250
Pixel intensity
condition of the existence of double scroll attractors [11]. This
Fig. 10. Autocorrelation diagram of the encrypted image few randomly might fail the algorithm. So, proper restrictions on them must
chosen points. be made before executing the programmes.
R EFERENCES
can be gathered without knowing the exact keys.
[1] R. A. J. Matthews, “On the derivation of a chaotic encryption algorithm,”
Neural Computation, vol. 12, pp. 2519-2535, 2000.
C. Image Entropy [2] F. Y. Sun, S. T. Liu, Z. Q. Li, et al, A novel image encryption scheme
based on spatial chaos map, Chaos, Solitons, Fractals, Vol. 38, pp. 631-
Entropy of a single-channel image is expressed as [10] 640, 2008.
255
[3] X. J. Tong, M. G. Cui, “Image encryption with compound chaotic
H=− p(l) log2 p(l), (15) sequence cipher shifting dynamically”, Image and Vision Computing ,
Vol. 26, pp. 843-850, 2008.
l=0
[4] H. H. Nien, W. T. Huang, C. M. Hung, S. C. Chen, S. Y. Wu, C. K. Huang
where, l stands for the intensity-levels varying between 0 and Y. H. Hsu, “Hybrid Image Encryption Using Multi-Chaos-System,”
and 255 and p(l) denotes the number of pixels for a certain in IEEE Conf. Information, Communications and Signal Processing, pp.
1-5, 2009.
intensity level l. Now, the entropy value of an image is zero
when it only incorporates pixels of an invariable intensity-level, [5] Ming Yin and Liwei Wang, “A new study in encryption base on fractional
order chaotic system ,” in Int. Conf. on Communications, Circuits and
and H has a maximum value of 8 when for any pixel location, Systems, 2008, pp. 637-640.
all the possible intensity levels are equally probable. Hence it is [6] A. G. Radwan, S. K. Abd-El-Hafiz and S. H. AbdElHaleem, “Image
crystal clear that a low entropy value refers to an inferior level encryption in the fractional-order domain ,” in Int. Conf. on Engineering
of ‘confusion’. For the original and the encrypted image, the and Technology, 2012, pp. 1-6.
following entropy levels for different channels are found. Thus, [7] I. Petráš, Fractional-Order Nonlinear Systems: Modeling, Analysis and
Simulation, Berlin Heidelberg: Springer-Verlag, 2011, pp. 103-184.
TABLE II. I MAGE E NTROPY [8] D. Valério and J. Sà da Costa, “Introduction to single-input, single-output
fractional control,” IET Control Theory Appl., Vol. 5, pp. 1033-1057,
Image under Channels
2011.
consideration R-Channel G-Channel B-Channel
Original Lena image 7.2596 7.5890 6.9734 [9] C. A. Monje, Y-Q Chen, B. M. Vinagre, D. Xue and V. Feliu, Fractional-
Encrypted image 7.6985 7.7213 7.6745 order Systems and Controls: Fundamentals and Applications, London:
Springer-Verlag, 2010, pp. 12-16.
[10] R. C. Gonzalez and R. E. Woods, Digital Image Processing, 3rd ed.
it can easily be seen that the encryption process significantly New Jersey: Prentice Hall, 2007, pp. 531-533.
increases the entropy levels for different channels. So, the [11] M. S. Tavazoei, and M. Haeri, “A necessary condition for double scroll
encrypted image is ‘more confusing’ than the original one. attractor existence in fractional - order systems,” Physics Letters A, Vol.
367, pp. 102-113, 2007.
This is also an indication that the algorithm is of sufficiently
good quality.
Authorized licensed use limited to: Indian Statistical Institute Kolkata. Downloaded on December 12,2022 at 08:34:21 UTC from IEEE Xplore. Restrictions apply.