Ahmad 2010
Ahmad 2010
1 Introduction
In recent years, the chaos based cryptographic algorithms have suggested some
new and efficient ways to develop secure image encryption techniques in order
to meet the demand for real-time image transmission over the communication
channels. Chaotic systems are considered good for practical image encryption
and transmission because they have important characteristics such as sensitiv-
ity to initial conditions and system parameters, pseudo-random property and
non-periodicity as the chaotic signals usually noise-like, etc. The characteristics
of chaotic signals make image cryptosystems excellent and robust against any
statistical attacks. Therefore, chaos based image encryption is given much atten-
tion in the research of information security. A lot of image encryption algorithms
S. Ranka et al. (Eds.): IC3 2010, Part I, CCIS 94, pp. 171–182, 2010.
c Springer-Verlag Berlin Heidelberg 2010
172 M. Ahmad and O. Farooq
2 Chaotic Maps
According to the chaos theory, chaotic maps are the nonlinear dynamical systems
whose state evolves with time and are highly sensitive to initial conditions. The
future dynamics of these systems are fully defined by their initial conditions. As a
result, the behavior of these systems appears random. In the proposed MLBS based
image encryption algorithm, the following three distinct chaotic maps are used:
The one-dimensional Logistic map proposed by May [24] is one of the simplest
nonlinear chaotic discrete systems that exhibit chaotic behavior and is defined
by the following equation:
Step 8. [Binary Conversion]: Convert the decimal gray values (0 to 255) of scram-
bled image SL (x, y) and key K(i) to equivalent 8-bit binary numbers as:
Step 11. [Decimal Conversion]: Convert all the binary numbers CB(x, y) to dec-
imal numbers to get resultant Ciphered image C(x, y) as:
4 Experimental Results
The proposed encryption scheme is applied to various plain-images like Lena,
Baboon, Peppers, Cameraman, Barbara, Boat and Airplane of 256 × 256 size.
Among them, the plain-images of Lena, Baboon, Cameraman, Boat and their
respective histograms are shown in Fig. 2. As can be seen in this figure that the
gray value distributions of plain-images are not uniform. The initial conditions
and system parameters taken for experimentation are: x0 = 0.0215, y0 = 0.5734,
z0 = 0.3915, μ1 = 2.93, μ2 = 3.17, γ1 = 0.197, γ2 = 0.139 and λ = 3.9985. The
results of multi-level blocks scrambling (MLBS ) scheme are shown in Fig. 3.
A Multi-Level Blocks Scrambling Based Chaotic Image Cipher 177
800
1000 1000
800
700 900 900
700
800 800
600
600
700 700
500
500 600 600
400 500 500
400
0 0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
The ciphered images of Lena, Baboon, Cameraman and Boat using proposed
encryption algorithm and their histograms are shown in Fig. 4 respectively. It is
clear from the Fig. 4 that the ciphered images are very much indistinguishable
and appears like a noise. Moreover, as seen in Fig. 4 that the distribution of
gray values of the ciphered images is fairly uniform and much different from
the histograms of the plain-images shown in Fig. 2. The statistical property of
the plain-images is changed absolutely in ciphered images in such a manner that
ciphered images have good balance property. To quantify the balance property of
the ciphered images, the mean value of gray values of plain-images and ciphered
images are evaluated and listed in Table 1. It is evident from the mean values
obtained that no matter how gray values of plain-images distributed, the mean
value of ciphered images comes out to about 127. This shows that the ciphered
image doesn’t provide any information regarding the distribution of gray values
to the attacker. Hence, the proposed algorithm can resist any type of histogram
based attacks and strengthen the security of ciphered images significantly.
Fig. 3. Scrambled images of Lena, Baboon, Cameraman and Boat using MLBS scheme
178 M. Ahmad and O. Farooq
0 0 0 0
0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250 0 50 100 150 200 250
Fig. 4. Ciphered images of Lena, Baboon, Cameraman, Boat using proposed scheme
and their histograms
decryption. In the proposed cryptosystem, all the variables are declared as type
double which has a 15-digit precision, the decimal fractions of the variables are
multiplied by 1014 , therefore the key space of proposed image cipher is (1014 )3
i.e. 1042 ≈ 2140 . The initial conditions to parameters μ1 , μ2 , γ1 , γ2 and λ also
increase the size of key space. Thus, the key space of the cipher is extensively
large enough to resist the exhaustive attack.
Where x and y are gray values of two adjacent pixels in an image. Correla-
tion coefficients of 1000 pairs of vertically, horizontally and diagonally adjacent
randomly selected pixels are evaluated. The average of 50 such correlation co-
efficients of adjacent pixels in plain and ciphered images in three directions are
listed in Table 2 and Table 3 respectively. The values of correlation coefficients
show that the two adjacent pixels in the plain-images are highly correlated to
180 M. Ahmad and O. Farooq
each other and correlation coefficients are close to 1, whereas the values obtained
for the ciphered images are close to 0. This means that the proposed algorithm
highly de-correlate the adjacent pixels in the ciphered images.
Where p(si ) represents the probability of symbol si and the entropy is expressed
in bits. If the source S emits 28 symbols with equal probability, i.e. S = { s0 ,
s1 , . . . , s255 }, then the result of entropy is H(S) = 8, which corresponds to a
true random source and represents the ideal value of entropy for message source
S. Information entropy of a ciphered image can show the distribution of gray
value. The more the distribution of gray value is uniform, the greater the infor-
mation entropy. If the information entropy of a ciphered image is significantly
less than the ideal value 8, then, there would be a possibility of predictability
which threatens the image security. The values of information entropy obtained
for plain-images and ciphered images are given in Table 4. The values obtained
for ciphered images are close to the ideal value 8. This implies that the infor-
mation leakage in the proposed encryption process is negligible and the image
encryption system is secure against the entropy attack.
A Multi-Level Blocks Scrambling Based Chaotic Image Cipher 181
5 Conclusion
In this paper, a new algorithm of encryption and decryption of images is pre-
sented. The algorithm is based on the concept of scrambling the pixel’s positions
and changing the gray values of the image pixels. To perform the scrambling of
the plain-image’s pixels, a multi-level blocks based scrambling scheme is sug-
gested. At each level, the image is first decomposed into blocks whose size de-
pends on the level and then the blocks are scrambled through 2D Cat transform.
The control parameters of scrambling are randomly generated using a 2D cou-
pled Logistic map to enforce the secrecy of the images. The encryption of the
scrambled image is done using chaotic sequence generated through 1D Logistic
map. All the simulation and experimental analysis show that the proposed image
encryption system has very large key space, high sensitivity to secret keys, better
diffusion of information in the ciphered images and low correlation coefficients.
Hence, the proposed image encryption algorithm has high level of security with
less computation and is more robust towards cryptanalysis.
References
1. Fridrich, J.: Symmetric Ciphers based on two-dimensional Chaotic maps. Interna-
tional Journal of Bifurcation and Chaos 8(6), 1259–1284 (1998)
2. Yen, J.C., Guo, J.I.: A New Image Encryption Algorithm and Its VLSI Architec-
ture. In: IEEE Workshop on Signal Processing Systems, pp. 430–437 (1999)
3. Yen, J.C., Guo, J.I.: A New Chaotic Key-based Design for Image Encryption and
Decryption. In: IEEE International Symposium on Circuits and Systems, vol. 4,
pp. 49–52 (2000)
4. Zhang, L., Liao, X., Wang, X.: An Image Encryption Approach based on Chaotic
maps. Chaos, Solitons and Fractals 24(3), 759–765 (2005)
5. Pisarchik, A.N., Flores-Carmona, N.J., Carpio-Valadez, M.: Encryption and De-
cryption of Images with Chaotic map lattices. CHAOS Journal, American Institute
of Physics 16(3), 033118-033118-6 (2006)
6. Dongming, C., Zhiliang, Z., Guangming, Y.: An Improved Image Encryption Al-
gorithm Based on Chaos. In: IEEE International Conference for Young Computer
Scientists, pp. 2792–2796 (2008)
7. Pareek, N.K., Patidar, V., Sud, K.K.: Image Encryption using Chaotic Logistic
map. Image and Vision Computing 24(9), 926–934 (2006)
182 M. Ahmad and O. Farooq
8. Lian, S., Sun, J., Wang, Z.: A Block Cipher based on a Suitable use of Chaotic
Standard map. Chaos Solitons and Fractals 26(1), 117–129 (2005)
9. Mao, Y., Lian, S., Chen, G.: A Novel Fast Image Encryption Scheme based on
3D Chaotic Baker maps. International Journal of Bifurcation and Chaos 14(10),
3616–3624 (2004)
10. Salleh, M., Ibrahim, S., Isnin, I.F.: Enhanced Chaotic Image Encryption Algorithm
based on Baker’s map. In: IEEE International Conference on Circuits and Systems,
vol. 2, pp. 508–511 (2003)
11. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavand, A.: A Fast
Chaotic Encryption Scheme based on Piece-wise Nonlinear Chaotic maps. Physics
Letter A 366(4-5), 391–396 (2007)
12. Chen, G.Y., Mao, Y.B., Chui, C.K.: A Symmetric Image Encryption Scheme based
on 3D Chaotic Cat maps. Chaos Solitons and Fractals 21(3), 749–761 (2004)
13. Guan, Z.H., Huang, F., Guan, W.: Chaos-based Image Encryption Algorithm.
Physics Letters A 346(1-3), 153–157 (2005)
14. Hsu, C.T., Wu, J.L.: Hidden Digital watermarks in Image. IEEE Transactions on
Image Processing 8(1), 58–68 (1999)
15. Yang, Y.L., Cai, N., Ni, G.Q.: Digital Image Scrambling Technology Based on
the Symmetry of Arnold Transformation. Journal of Beijing Institute of Technol-
ogy 15(2), 216–220 (2006)
16. Liu, H., Zhu, Z., Jiang, H., Wang, B.: A Novel Image Encryption Algorithm Based
on Improved 3D Chaotic Cat Map. In: 9th IEEE International Conference for
Young Computer Scientists, pp. 3016–3021 (2008)
17. Shang, Z., Ren, H., Zhang, J.: A Block Location Scrambling Algorithm of Digital
Image Based on Arnold Transformation. In: 9th IEEE International Conference for
Young Computer Scientists, pp. 2942–2947 (2008)
18. Liehuang, Z., Wenzhou, L., Lejian, L., Hong, L.: A Novel Image Scrambling Algo-
rithm for Digital Watermarking Based on Chaotic Sequences. International Journal
of Computer Science and Network Security 6(8B), 125–130 (2006)
19. Fu-Yan, S., Shu-Tang, L., Zong-Wang, L.: Image Encryption using high-
dimensional Chaotic System. Chinese Physics 16(12), 3616–3623 (2007)
20. Jian-Liang, M., Hui-jing, P., Wang-qing, G.: New Color Image Encryption Algo-
rithm based on Chaotic Sequence Ranking. In: IEEE International Conference on
Intelligent Information Hiding and Multimedia Signal Processing, pp. 1348–1351
(2008)
21. Fu, C., Zhang, Z., Cao, Y.: An Improved Encryption Algorithm Based on Chaotic
Maps. In: Third IEEE International Conference on Natural Computation, pp. 189–
193 (2007)
22. Li, T., Zhou, S., Zeng, Z., Ou, Q.: A New Scrambling Method Based on Semi-
frequency Domain and Chaotic System. In: IEEE International Conference on
Natural Computation, pp. 607–610 (2005)
23. Wang, X.Y., Shi, Q.J.: New Type Crisis, Hysteresis and Fractal in Coupled Logistic
Map. Chinese Journal of Applied Mechanics, 501–506 (2005)
24. May, R.M.: Simple Mathematical Model with very Complicated Dynamics. Na-
ture 261, 459–467 (1976)
25. Tao, X., Liao, X.F., Tang, G.P.: A Novel Block Cryptosystem based on Iterating
a Chaotic map. Physics Letter A 349(1-4), 109–115 (2006)