Previous |  Up |  Next

Article

Keywords:
image encryption; Vasicek process; logistic map; diffusion; confusion
Summary:
We propose a novel image encryption algorithm based on the stochastic Vasicek process and a modified chaotic logistic map. The proposed algorithm relies on the Fridrich confusion-diffusion structure. In the initialization step, we generate process parameters and an initialization state from a secret key of arbitrary length. Then the Vasicek process performs several iterations, where the number of iterations is generated at each step by the secret key. The floating point numbers generated by the process are discretized to generate the permutation for pixel confusion, and then generate pseudo-random sequences to diffuse the pixel values. The confusion-diffusion process can be applied for several rounds to improve the encryption performance. Experimental results and security analysis show that our model has good performance. The algorithm has a large key space, passes statistical analysis and has a strong resistance to differential attacks, which confirms that our algorithm is safe and efficient.
References:
[1] Akhshani, A., Akhavan, A., Lim, S.-C., Hassan, Z.: An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 17 (2012), 4653-4661. DOI 
[2] Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos 16 (2006), 2129-2151. DOI 
[3] Alvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of an ergodic chaotic cipher. Phys. Lett. A 311 (2003), 172-179. DOI 
[4] Bertoni, G., Daemen, J., Peeters, M., Assche, G. Van: Sponge-based pseudo-random number generators. In: Cryptographic Hardware and Embedded Systems (CHES), Springer, Berlin 2010, pp. 33-47.
[5] Björk, T.: Arbitrage Theory in Continuous Time. Oxford Univ. Press, Oxford 2009.
[6] Charif, K., Drissi, A., Guennoun, Z. E. A.: A pseudo random number generator based on chaotic billiards. A. A. 3 (2017), 2.
[7] Charif, K., Guennoun, Z. E. A.: A novel image encryption algorithm based on chaotic billiards. J. Discrete Math. Sci. Cryptogr. 24 (2021), 129-154. DOI 10.1080/09720529.2019.1675302
[8] Chen, S., Lü, J.: Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A 299 (2002), 353-358. DOI 
[9] Deepthi, P. P., Nithin, V. S., Sathidevi, P. S.: Implementation and analysis of stream ciphers based on elliptic curves. Comput. Electr. Eng. 35 (2009), 300-314. DOI 
[10] Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8 (1998), 1259-1284. DOI 10.1142/S021812749800098X
[11] Fu, C., Chen, J. J., Zou, H., Meng, W. H., Zhan, Y. F., Yu, Y. W.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20 (2012), 2363-2378. DOI 
[12] Hamdi, M., Rhouma, R., Belghith, S.: Selective compression-encryption of images based on SPIHT coding and Chirikov standard map. Signal Process. 131 (2017), 514-526. DOI 
[13] Higham, D. J.: An algorithmic introduction to numerical simulation of stochastic differential equations. SIAM Rev. 43 (2001), 525-546. DOI 
[14] Indrakanti, S. P., Avadhani, P. S.: Permutation based image encryption technique. Int. J. Comput. Appl. 28 (2011), 45-47. DOI 
[15] Jolfaei, A., Wu, X.-W., Muthukkumarasamy, V.: On the security of permutation-only image encryption schemes. IEEE Trans. Inf. Forensics Security 11 (2015), 235-246. DOI 
[16] Joshi, M., Shakher, C., Singh, K.: Image encryption and decryption using fractional Fourier transform and radial Hilbert transform. Opt. Laser Eng. 46 (2008), 522-526. DOI 10.1016/j.optlaseng.2008.03.001
[17] Khan, J., Ahmad, J., Hwang, S. O.: An efficient image encryption scheme based on Henon map, skew tent map and S-Box. In: ICMSAO 2015, IEEE, pp. 1-6.
[18] Kocarev, L., Jakimoski, G., Stojanovski, T., Parlitz, U.: From chaotic maps to encryption schemes. In: ISCAS (1998), IEEE, pp. 514-517.
[19] Krishna, P. R., Teja, C. V S., Thanikaiselvan, V.: A chaos-based image encryption using Tinkerbell map functions. In: ICECA (2018), IEEE, pp. 578-582.
[20] Langevin, P.: Sur la théorie du mouvement Brownien. C. R. Acad. Sci. Paris 146 (1908), 530-533.
[21] Li, C., Arroyo, D., Lo, K.-T.: Breaking a chaotic cryptographic scheme based on composition maps. Int. J. Bifurcation Chaos 20 (2010), 2561-2568. DOI 
[22] Li, C., Liu, Y., Zhang, L. Y., Chen, M. Z. Q.: Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int. J. Bifurcation Chaos 23 (2013), 1350075. DOI 
[23] Li, S., Li, Q., Li, W., Mou, X., Cai, Y.: Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. In: Cryptography and Coding (IMA), Springer, Berlin (2001), pp. 205-221.
[24] Mandal, M. K., Banik, G. D., Chattopadhyay, D., Nandi, D.: An image encryption process based on chaotic logistic map. IETE Tech. Rev. 29 (2012), 395-404. DOI 
[25] Mitra, A., Rao, Y. V. S., Prasanna, S. R. M.: A new image encryption approach using combinational permutation techniques. Int. J. Comput. Sci. 1 (2006), 127-131.
[26] Nouar, C., Guennoun, Z. E. A.: A pseudo-random number generator using double pendulum. Appl. Math. 14 (2020), 977-984. DOI 
[27] Omary, F.: Application des algorithmes évolutionnistes à la cryptographie. Univ. Mohammed V-Agdal, Rabat 2006.
[28] Pandey, D., Rawat, U. S., Kumar, A.: Robust progressive block based visual cryptography with chaotic map. J. Discrete Math. Sci. Cryptogr. 19 (2016), 1025-1040. DOI 
[29] Papadopoulos, H. E., Wornell, G. W.: Maximum-likelihood estimation of a class of chaotic signals. IEEE Trans. Inf. Theory 41 (1995), 312-317. DOI 
[30] Pareek, N. K., Patidar, V., Sud, K. K.: Image encryption using chaotic logistic map. Image Vision Comput. 24 (2006), 926-934. DOI 
[31] Schindler, W.: Random number generators for cryptographic applications. In: Cryptographic Engineering, Springer, Berlin (2009), pp. 5-23.
[32] Shannon, C. E.: A mathematical theory of communication. Bell Syst. Tech. J. 27 (1948), 379-423. DOI  | Zbl 1154.94303
[33] Shannon, C. E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28 (1949), 656-715. DOI 
[34] Sharma, M., Kowar, M., Sharma, M.: An improved evolutionary algorithm for secured image using adaptive genetic algorithm. J. Discrete Math. Sci. Cryptogr. 11 (2008), 673-683. DOI 
[35] Skrobek, A.: Cryptanalysis of chaotic stream cipher. Phys. Lett. A 363 (2007), 84-90. DOI 
[36] Skrobek, A.: Approximation of a chaotic orbit as a cryptanalytical method on Baptista’s cipher. Phys. Lett. A 372 (2008), 849-859. DOI 
[37] Uhlenbeck, G. E., Ornstein, L. S.: On the theory of the Brownian motion. Phys. Rev. 36 (1930), 823. DOI 
[38] Vasicek, O.: An equilibrium characterization of the term structure. J. Financ. Econ. 5 (1977), 177-188. DOI 10.1016/0304-405X(77)90016-2
[39] Wang, X., Xu, D.: A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 75 (2014), 345-353. DOI 
[40] Wu, X., Hu, H., Zhang, B.: Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22 (2004), 359-366. DOI 
[41] Wu, Y., Zhou, Y., Agaian, S., Noonan, J. P.: A symmetric image cipher using wave perturbations. Signal Process. 102 (2014), 122-131. DOI 
[42] Xiao, G., Lu, M., Qin, L., Lai, X.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51 (2006), 1413-1420. DOI 
[43] Xiaofu, W., Songgeng, S.: A general efficient method for chaotic signal estimation. IEEE Trans. Signal Process. 47 (1999), 1424-1428. DOI 
[44] Zhen, W., Xia, H., Yu-Xia, L., Xiao-Na, S.: A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system. Chin. Phys. B 22 (2013), 010504. DOI 
[45] Zhu, C., Xu, S., Hu, Y., Sun, K.: Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn. 79 (2015), 1511-1518. DOI 
Partner of
EuDML logo