Next Article in Journal
Novel Applications of Microbial Fuel Cells in Sensors and Biosensors
Next Article in Special Issue
Effects of Crop Leaf Angle on LAI-Sensitive Narrow-Band Vegetation Indices Derived from Imaging Spectroscopy
Previous Article in Journal
Experimental Investigation of the Shear Strength of RC Beams Extracted from an Old Structure and Strengthened by Carbon FRP U-Strips
Previous Article in Special Issue
Measuring Identification and Quantification Errors in Spectral CT Material Decomposition
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Parallel Crossed Chaotic Encryption for Hyperspectral Images

by
Carlos Villaseñor
,
Eric F. Gutierrez-Frias
,
Nancy Arana-Daniel
*,
Alma Y. Alanis
and
Carlos Lopez-Franco
Centro Universitario de Ciencias Exactas e Ingenierías, Universidad de Guadalajara, Blvd Marcelino García Barragán 1421, 44430 Guadalajara, México
*
Author to whom correspondence should be addressed.
Appl. Sci. 2018, 8(7), 1183; https://doi.org/10.3390/app8071183
Submission received: 29 June 2018 / Revised: 16 July 2018 / Accepted: 17 July 2018 / Published: 20 July 2018
(This article belongs to the Special Issue Hyper- and Multi-Spectral Imaging)

Abstract

:

Featured Application

This work presents a time-efficient and parallel encryption algorithm that is suitable for encrypting a significant amount of data, and that could be used to encrypt Hyperspectral Images and Hyperspectral video in real-time for remote sensing, classification, object recognition, earth monitoring, security and medical applications.

Abstract

Hyperspectral images (HI) collect information from across the electromagnetic spectrum, and they are an essential tool for identifying materials, recognizing processes and finding objects. However, the information on an HI could be sensitive and must to be protected. Although there are many encryption schemes for images and raw data, there are not specific schemes for HI. In this paper, we introduce the idea of crossed chaotic systems and we present an ad hoc parallel crossed chaotic encryption algorithm for HI, in which we take advantage of the multidimensionality nature of the HI. Consequently, we obtain a faster encryption algorithm and with a higher entropy result than others state of the art chaotic schemes.

1. Introduction

Nowadays Hyperspectral Images (HI) [1] are an essential tool for many research topics like Remote sensing [2], classification and object recognition [3] and Earth monitoring [4]. HI cameras collect information from across the electromagnetic spectrum retrieving more information than RGB cameras.
The HI is a three-dimensional arrange of numbers of size ( n , m , l ) , as is shown in Figure 1, where n is the numbers of rows, m the numbers of columns, and l the number of layers which every layer represents a range of light-waves.
In some HI applications, the information contained is sensitive, for example, in military or medical applications; then, it is essential to protect the information. There already exist many various algorithms for secure encrypting [5,6], like Advanced Encryption Standard (AES) [7,8,9,10] based on irreducible polynomials in Galois fields or the Rivest-Shamir- Adleman (RSA) algorithm [11] based on large prime number factorization. These algorithms offer a secure way to protect sensitive data, and they work with raw data, that is to say, they work at the binary level of data then they can deal with all kind of data structures like images, videos, and documents.
However, algorithms like AES and RSA have a high computational cost; consecutively they are not suitable for encrypting a significant amount of data, or for real-time. For this reason, in recent years a new trend of encryption algorithms has been developed specifically for image and video [12]. In [12], we can find the following topics to consider in visual data encryption:
  • Security: The required level of security of encrypting passwords or other structured data could differ than the one required for visual data. A more secure algorithm could impact with a high computational cost.
  • Speed: A significant difference between visual data encryption and text-based encryption is that visual data is usually much larger. If we consider a time constraint or real-time execution requirements, the speed of encryption is an important issue.
  • Bitstream compliance: Visual data could have a specific data format. Algorithms for raw data such as AES do not take data format into account and this could cause unexpected crashes in the image decoding.
Then, for image encryption algorithms it is highly desirable to obtain a good balance between security and speed. In the last decade, chaotic ciphers [13] have been very used algorithms for image encryption [14]. In [15], a comparison between chaotic and non-chaotic image encryption indicates that chaotic-based schemes are better because of chaos is nonlinear, deterministic and highly sensitive to initial conditions. This conclusion is based on a comparison of a correlation coefficient, information entropy analysis, compression friendliness, maximum derivation, uncertain derivation, avalanche effect, Number of Changing Pixel Rate (NPCR), Unified Average Changed Intensity (UACI) [16], and key space analysis. However, in nowadays chaotic image encryption schemes are specific for gray-scale images or RGB, and there is not an ad hoc encryption algorithm for HI. In the present paper, we propose a new chaotic encryption algorithm for HI which take advantage for designing a fast and high-entropy-valued algorithm. We also introduce the idea of crossed chaotic encryption (CCE), and we empirically show how CCE obtains better entropy results. Finally, we offer a comparison between serial and parallel implementations. The proposed algorithm obtain high-speed results in the parallel version, and high entropy compared with another state of the art algorithms.
The paper is structured as follows: In Section 2, we briefly review the basic properties of chaotic systems and chaotic encryption. In Section 3, we develop the idea of crossed chaotic encryption and the proposed scheme for HI. In Section 4, we show the results and comparison, and we also discuss the cryptanalytic features of the proposed algorithm. Finally, in Section 5 the conclusions are shown.

2. Chaotic Systems and Chaotic Encryption

In this section, we introduce some concepts of chaotic system and chaotic encryption.

2.1. Chaotic Systems

Chaotic systems are dynamical systems that exhibit the following features:
  • Deterministic: There is no randomness involved in the system evolution, then if we know the initial condition and parameters, we will be able to predict the system.
  • Sensitive to initial conditions: A chaotic system is exponentially sensitive to an initial condition, in other words, a small change in the initial condition provokes a big difference in the evolution of the system.
  • Aperiodic: There is no periodicity in a chaotic system.
  • Bounded: The state of a chaotic system is bounded, and it maintains chaotic inside this bounded limits.
The mentioned features make chaotic systems a suitable mathematical tool for encryption. Various chaotic systems have been used for encryption, such as the Lorenz system [17], Ikeda chaotic map [18] and others. Chaotic encryption has been used for electroencephalogram signal encryption [19], video encryption [20,21,22]. Chaotic systems, are also useful for designing bio-inspired optimization algorithms [23] or embed secret data with in the image [24].

2.2. Chaotic Encryption

We can distinguish between two types of chaotic encryption. The first one is based on the synchronization phenomena [25], where a chaotic system is combined with the on-line data stream and it is received with another chaotic system that synchronizes and enables us to filter the original data stream. Although this is a secure scheme, it only works for continuous data stream (e.g., airplanes telemetry), and not for static data because we could lose data during the system synchronization.
On the other hand, the second type where a chaotic signal is simulated and used to diffuse and confuse the plaintext information. In this paper, we focus on this second kind of encryption. Chaotic systems have been broadly used in image encryption, e.g., the logistic map is used in [26], 2D Arnolds Cat Map is compared to 3D logistic map for RGB image encryption [27], also 3D chaotic maps are used in general multimedia data [28].
Using different chaotic maps could increase the information entropy as is evidenced in [29]. In [14], a survey of image encryption is offered, and in [15] a comparison of different chaotic maps is shown.

2.3. Chaotic Image Encryption Performance

To measure the performance of the image chaotic encryption algorithms is common to use the information entropy defined in (1), where s i is the intensity of the pixel i of the image, P ( s i ) is the probability of s i intensity to appear. The 2 b 1 is the larger number represented in the data (255 for image intensity values), then the maximum theoretical value of entropy for the image of 256 intensity values is 8. Encrypted data that have a value of entropy close to the theoretical maximum is difficult to differentiate from random data, consequently it is secure against cypher-text-only attacks.
H ( s ) = i = 0 2 b 1 P ( s i ) log 2 [ P ( s i ) ]
The idea of chaotic encryption is that using the chaotic behavior no algorithm could differentiate between an encrypted image and image full of random pixel values. A common technique in cryptanalysis is the differential attack, where we encrypt two different images with the same cipher. If the encrypted images are statistically different, then we could infer information about the cipher secret key or parameters. In [16], two statistical measures are proposed to verify if cipher algorithm is weak against differential attack. The Number of Changing Pixel Rate (NPCR) is defined in Equation (3), where T is the total of pixels in the images and D ( i , j , k ) is defined in (2), where I 1 and I 2 are two different images and c is a cipher algorithm.
D ( i , j , k ) = 0 if c ( I 1 ( i , j , k ) ) = c ( I 2 ( i , j , k ) ) 1 if c ( I 1 ( i , j , k ) ) c ( I 2 ( i , j , k ) )
N P C R ( I 1 , I 2 , c ) = i , j , k D ( i , j , k ) T × 100 %
The Unified Average Changed Intensity (UACI) is defined in (4), where F is the maximum intensity value allowed. To ensure that the encrypted image is not differentiable of a image full of random pixel values, the expected values of NPCR and UACI are N P C R e = 99.6094 % and U A C I e = 33.4634 % .
U A C I ( I 1 , I 2 , c ) = i , j , k | c ( I 1 ( i , j , k ) ) c ( I 2 ( i , j , k ) ) | F · T × 100 %

2.4. Piecewise Linear Chaotic Map

The algorithm proposed in this paper, is based on the Piecewise Linear Chaotic Map (PLCM), but it can be implemented with any other chaotic map. The PLCM is defined in (5), where x n is the state of the system and q is a parameter. The PLCM shows a chaotic behaviour when the parameter q ( 0 , 0.5 ) and the state x n is bounded inside the interval ( 0 , 1 ) .
x n + 1 = c ( x n , q ) = x n q if x [ 0 , q ) x n q 0.5 q if x [ q , 0.5 ) c ( 1 x n , q ) if x [ 0.5 , 1 )
The authors in [30] propose an improved version of the PLCM, called Modified Piecewise Chaotic Map (MPLCM). They report an information entropy of 7.9972–7.9976. This result overcomes the 7.8472–7.9413 reported in [29]. The MLPCM is defined in (6) and a simulation is shown in Figure 2.
x n + 1 = c ( x n , q ) = x n x n q q q

3. Encryption for Hyperspectral Images

One of the main disadvantages of using chaotic encryption is that we have to simulate the chaotic system until we have the same amount of information than the one to be encrypted. For this reason, the chaotic systems are commonly used as a stream cipher. To overcome this problem, we propose to use a crossed scheme, where a p-dimensional chaotic signal is generated through the XOR of 1-dimensional systems, this is denoted in (7).
C p ( i 1 , i 2 , , i p ) = c 1 ( i 1 ) c 1 ( i 2 ) c p ( i p )
In Figure 3, we present how two chaotic systems can generate a chaotic two-dimensional signal.
Therefore using crossed chaotic signals we can generate a multi-dimensional chaotic signal without simulating a chaotic system for the dimension of the data to be encrypted. Based in crossed chaotic signal, we propose the following encryption scheme in Figure 4.
We propose to use four chaotic systems. The first three systems form a three-dimensional crossed chaotic signal, and they are used to introduce diffusion in the result. They are simulated for m a x ( n , m , l ) iterations. The forth chaotic system is used to creating a Substitution Box (S-Box) [31], we use the generation algorithm proposed in [32]. S-boxes are used for introducing confusion in the encryption and is a common technique applied in AES and other block ciphers [33].
It is important to note that the proposed scheme is a transformation that is made pixel by pixel, this is because we are looking for a high parallelizable algorithm. Then the encryption of the pixel ( i , j , k ) is applied with (8) and the decrypted pixel is recover with (9). In the Algorithm 1, we present the parallel version of this algorithm.
I c ( i , j , k ) = S b o x c 3 ( k ) c 2 ( j ) c 1 ( i ) I ( i , j , k )
I ( i , j , k ) = c 1 ( i ) c 2 ( j ) c 3 ( k ) S b o x 1 I c ( i , j , k )
Algorithm 1: Parallel Crossed Chaotic Encryption.
Data: Hyperspectral Image I
Result: Encrypted Image I c
 Simulate all chaotic systems { c 1 , c 2 , c 3 , c s } in parallel for m a x ( n , m , l ) iterations;
 Generate S-box with c s ;
 Upload I to GPU memory;
 In parallel apply I c ( i , j , k ) = S b o x c 3 ( k ) c 2 ( j ) c 1 ( i ) I ( i , j , k ) ;
 Download I c to CPU memory;

4. Results

To demonstrate the performance of the proposed algorithm, we offer the following results. These experiments were carried out in an Intel Xeon® E31225 3.10 GHz, with a 16 GB of RAM and a GTX 1050Ti. The algorithm was implemented in Matlab® programming language and with GPU computing support for Nvidia CUDA®. The GTX 1050Ti have 768 cores and 4 GB of memory.
In Figure 5, we present an encryption over “San Francisco with Polarizing filter” HI, from the Scene Database 4 of ImageVal Consulting® (Database from http://www.imageval.com). The image size is 702 × 1000 × 148 (we show in Figure 5 the layer 50) and the light-wave is 415–915 nm. The entropy of the original image is 6.1057 and the encrypted entropy is 7.99997, very close to the theoretical maximum entropy.
We also show in Figure 6, the normalized hyperhistogram where we calculate the histogram of every layer. Please note that the encrypted image has a hyperhistogram approximately uniform.
In this way, to show the time advantage of using an ad hoc encryption technique for HI, consider the data set shown in Table 1, where the sizes of 24 HI of women and men faces (this data set is taken from Hyperspectral High-Resolution Faces of the Scene Database of ImageVal Consulting® (Taken from http://www.imageval.com/scene-database/)). The dataset consists of 12 portraits of women and 12 of men with a light-wave spectrum of 415–915 nm. We show the file size and the image size.
In Table 2 and Table 3, we present the results of the encryption of the female and male faces datasets, respectively. We show the serial time and the parallel time. In the parallel time, we also include the upload to GPU and the download to CPU times, such time is achieve thanks to the high parallelism of the scheme. We also show the original and encrypted entropy. In Figure 7, we show an example of the Female06 image with the respective hyperhistograms. In the same way, and Figure 8 shows an example of the Male03 image with the respective hyperhistograms.
Please note that the time in parallel is minimal compared with the serial time, this is due to the high parallelism in the cipher scheme. Furthermore, the information entropy is very close to the theoretical maximum entropy. This results overcome the results reported in [29,30], for gray-scale and RGB images.
The key of the proposed cipher is the parameters and the initial conditions of the chaotic systems, this can be improved with key establishment protocols [34] and chaotic-based hash functions [35].
In this manner, to test the strength against cryptanalytic differential attacks [36], we apply the NPCR, and UACI tests [16]. As we need two images of the same size, we trim the Female09 image to the Female10 image size. Then, we encrypt the two images with the same cipher and the same key and run NPCR and UACI test with the results displayed in Table 4. Please note that the result values approximate the expected values of a random image, then we can claim that the cipher is protected against differential attacks.

5. Conclusions

In this paper, we present a new chaotic encryption algorithm specifically designed for hyperspectral images. We also present the new idea of crossed chaotic signals that solve the problem of simulating a system for many iterations, using a family of 1-dimensional chaotic maps instead. The proposed algorithm is fast in its parallel version, and it achieves high information entropy (very close to the theoretical maximum) and an approximately uniform hyperhistogram. High entropy and uniform histogram make it safe against Ciphertext-only attacks and their statistical tools. Furthermore, we applied the NPCR and the UACI tests to the cipher, and we show strength against cryptanalytic differential attacks.

Author Contributions

Conceptualization, C.V. and N.A.-D.; Formal analysis, C.V. and E.F.G.-F.; Funding acquisition, A.Y.A. and C.L.-F.; Investigation, C.V., N.A.-D.; Methodology, C.V.; Project administration, N.A.-D.; Software, C.V.; Supervision, N.A.-D. and C.L.-F.; Validation, E.F.G.-F.; Writing—original draft, C.V.; Writing—review and editing, N.A.-D. and A.Y.A.

Funding

This work has been supported by CONACYT Mexico, through Projects CB256769 and CB258068 (“Project supported by Fondo Sectorial de Investigación para la Educación”).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chang, C.I. Hyperspectral Imaging: Techniques for Spectral Detection and Classification; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2003; Volume 1. [Google Scholar]
  2. Melgani, F.; Bruzzone, L. Classification of hyperspectral remote sensing images with support vector machines. IEEE Trans. Geosci. Remote Sens. 2004, 42, 1778–1790. [Google Scholar] [CrossRef] [Green Version]
  3. Camps-Valls, G.; Bruzzone, L. Kernel-based methods for hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 2005, 43, 1351–1362. [Google Scholar] [CrossRef] [Green Version]
  4. Camps-Valls, G.; Tuia, D.; Bruzzone, L.; Benediktsson, J.A. Advances in hyperspectral image classification: Earth monitoring with statistical learning methods. IEEE Signal Process. Mag. 2014, 31, 45–54. [Google Scholar] [CrossRef]
  5. Paar, C.; Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2009. [Google Scholar]
  6. Buchmann, J. Introduction to Cryptography; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2013. [Google Scholar]
  7. Thulasimani, L.; Madheswaran, M. A single chip design and implementation of aes-128/192/256 encryption algorithms. Int. J. Eng. Sci. Technol. 2010, 2, 1052–1059. [Google Scholar]
  8. Moh’d, A.; Jararweh, Y.; Tawalbeh, L. AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. In Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS), Melaka, Malaysia, 5–8 December 2011; pp. 292–297. [Google Scholar]
  9. Guo, G.l.; Qian, Q.; Zhang, R. Different implementations of aes cryptographic algorithm. In Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 24–26 August 2015; pp. 1848–1853. [Google Scholar]
  10. Zhu, Y.; Zhang, H.; Bao, Y. Study of the AES realization method on the reconfigurable hardware. In Proceedings of the 2013 International Conference on Computer Sciences and Applications, Wuhan, China, 14–15 December 2013; pp. 72–76. [Google Scholar]
  11. Coutinho, S.C. The Mathematics of Ciphers: Number Theory and RSA Cryptography; AK Peters/CRC Press: Boca Raton, FL, USA, 1999. [Google Scholar]
  12. Uhl, A.; Pommer, A. Image and Video Encryption: From Digital Rights Management to Secured Personal Communication; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2004; Volume 15. [Google Scholar]
  13. Kocarev, L.; Lian, S. Chaos-Based Cryptography: Theory, Algorithms and Applications; Springer: Heidelberg/Berlin, Germany, 2011; Volume 354. [Google Scholar]
  14. Sankpal, P.R.; Vijaya, P. Image encryption using chaotic maps: A survey. In Proceedings of the 2014 Fifth International Conference on Signal and Image Processing, Bangalore, India, 8–10 January 2014; pp. 102–107. [Google Scholar]
  15. Bansal, R.; Chawla, R.; Gupta, S. A comparison of image encryption techniques based on chaotic maps. In Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016; pp. 933–938. [Google Scholar]
  16. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
  17. Zhang, L.; Zhang, Y. Research on lorenz chaotic stream cipher. In Proceedings of the 2005 IEEE International Workshop on VLSI Design and Video Technology, Suzhou, China, 28–30 May 2005; pp. 431–434. [Google Scholar]
  18. Jia, X. Image Encryption using the Ikeda map. In Proceedings of the 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, 22–23 June 2010; pp. 455–458. [Google Scholar]
  19. Lin, C.F.; Wang, B.S. 2D Chaos-Based Visual Encryption Mechanism in EEG Signals. In Proceedings of the 2010 International Symposium on Parallel and Distributed Processing with Applications (ISPA), Taipei, Taiwan, 6–9 September 2010; pp. 470–473. [Google Scholar]
  20. Lian, S.; Sun, J.; Wang, Z.; Dai, Y. A fast video encryption scheme based-on chaos. In Proceedings of the Control, Automation, Robotics and Vision Conference, Kunming, China, 6–9 December 2004; Volume 1, pp. 126–131. [Google Scholar]
  21. Shang, F.; Sun, K.; Cai, Y. An efficient MPEG video encryption scheme based on chaotic cipher. In Proceedings of the Image and Signal Processing, Sanya, China, 27–30 May 2008; Volume 3, pp. 12–16. [Google Scholar]
  22. Su, Z.; Lian, S.; Zhang, G.; Jiang, J. Chaos-based video encryption algorithms. In Chaos-Based Cryptography; Springer: Heidelberg/Berlin, Germany, 2011; pp. 205–226. [Google Scholar]
  23. Mhatre, R.M.; Bhardwaj, D. Classifying Iris Image Based on Feature Extraction and Encryption Using Bio-Chaotic Algorithm (BCA). In Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 12–14 December 2015; pp. 1068–1073. [Google Scholar]
  24. Muhammad, N.; Bibi, N.; Mahmood, Z.; Akram, T.; Naqvi, S.R. Reversible integer wavelet transform for blind image hiding method. PLoS ONE 2017, 12, e0176979. [Google Scholar] [CrossRef] [PubMed]
  25. Parlitz, U.; Junge, L. Synchronization of chaotic systems. In Proceedings of the Control Conference (ECC), Karlsruhe, Germany, 31 August–3 September 1999; pp. 4637–4642. [Google Scholar]
  26. Fu, C.; Zhang, Z.C.; Chen, Y.; Wang, X.W. An Improved Chaos-Based Image Encryption Scheme; Springer: Heidelberg/Berlin, Germany, 2007; pp. 575–582. [Google Scholar]
  27. Khade, P.N.; Narnaware, M. 3D chaotic functions for image encryption. IJCSI Int. J. Comput. Sci. Issues 2012, 9, 323–328. [Google Scholar]
  28. Hossain, M.B.; Rahman, M.T.; Rahman, A.S.; Islam, S. A new approach of image encryption using 3D chaotic map to enhance security of multimedia component. In Proceedings of the 2014 International Conference on Informatics, Electronics & Vision (ICIEV), Dhaka, Bangladesh, 23–24 May 2014; pp. 1–6. [Google Scholar]
  29. Sathishkumar, G.; Bagan, K.B.; Sriraam, N. Image encryption based on diffusion and multiple chaotic maps. arXiv, 2011; arXiv:1103.3792. [Google Scholar]
  30. Hu, Y.; Zhu, C.; Wang, Z. An improved piecewise linear chaotic map based image encryption algorithm. Sci. World J. 2014, 2014. [Google Scholar] [CrossRef] [PubMed]
  31. Wolkerstorfer, J.; Oswald, E.; Lamberger, M. An ASIC Implementation of the AES SBoxes; Springer: Heidelberg/Berlin, Germany, 2002; pp. 67–78. [Google Scholar]
  32. Mroczkowski, P. Generating Pseudorandom S-Boxes-a Method of Improving the Security of Cryptosystems Based on Block Ciphers. J. Telecommun. Inf. Technol. 2009, 2, 74–79. [Google Scholar]
  33. Kazmi, S.; Ikram, N. Chaos based key expansion function for block ciphers. Multimed. Tools Appl. 2013, 66, 267–281. [Google Scholar] [CrossRef]
  34. Das, M.L.; Narasimhan, V.L. A simple and secure authentication and key establishment protocol. In Proceedings of the Emerging Trends in Engineering and Technology, Maharashtra, India, 16–18 July 2008; pp. 844–849. [Google Scholar]
  35. Gao, L.; Wang, X.; Zhang, W. Chaotic hash function based on Tandem-DM construction. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, China, 16–18 November 2011; pp. 1745–1749. [Google Scholar]
  36. Solak, E. Cryptanalysis of chaotic ciphers. In Chaos-Based Cryptography; Springer: Heidelberg/Berlin, Germany, 2011; pp. 227–256. [Google Scholar]
Figure 1. Hyperspectral Image.
Figure 1. Hyperspectral Image.
Applsci 08 01183 g001
Figure 2. MPLCM simulation.
Figure 2. MPLCM simulation.
Applsci 08 01183 g002
Figure 3. 2D Crossed Chaotic Signal.
Figure 3. 2D Crossed Chaotic Signal.
Applsci 08 01183 g003
Figure 4. Chaotic Encryption Scheme.
Figure 4. Chaotic Encryption Scheme.
Applsci 08 01183 g004
Figure 5. Experiment 1. Original and encrypted images.
Figure 5. Experiment 1. Original and encrypted images.
Applsci 08 01183 g005
Figure 6. Experiment 1. Hyperhistogram of original an encrypted images.
Figure 6. Experiment 1. Hyperhistogram of original an encrypted images.
Applsci 08 01183 g006
Figure 7. Original and encrypted image (layer one) of Female06 HI.
Figure 7. Original and encrypted image (layer one) of Female06 HI.
Applsci 08 01183 g007aApplsci 08 01183 g007b
Figure 8. Original and encrypted image (layer one) of Male03 HI.
Figure 8. Original and encrypted image (layer one) of Male03 HI.
Applsci 08 01183 g008
Table 1. HI face images dataset.
Table 1. HI face images dataset.
Female DatasetMale Dataset
NameSize (MB)DimensionsNameSize (MB)Dimensions
nmlnml
Female01922140397529Male01993134996541
Female02820116991242Male02974129496943
Female03993134693546Male03949133794839
Female04906127991243Male04927132298135
Female05802126090433Male05851137996924
Female06651123785521Male068941317106624
Female071014136894245Male079861447104426
Female08883132295533Male0810131423105930
Female099521323104331Male09920136693835
Female10763119797027Male1010851271103850
Female11867121392942Male111105141497547
Female12771121491432Male12937131798136
Table 2. Female dataset encryption results.
Table 2. Female dataset encryption results.
NameSerial Time (s)Parallel Time(s)Entropy
UploadEncryptDownloadTotalOriginalEncrypted
Female0112.46710.01940.0033380.02310.0458387.64787.99995
Female0214.55770.02200.0035020.02590.0514826.96857.99994
Female0318.08010.02890.0041600.03230.0653607.72177.99994
Female0415.39950.02490.0037450.02900.0576457.48507.99994
Female0511.42690.01880.0031770.02250.0444776.90847.99994
Female066.63320.01290.0021350.01390.0289357.50437.99996
Female0717.88490.02860.0041580.03320.0659587.73507.99997
Female0812.87540.02080.0034070.02490.0491077.50387.99994
Female0913.54880.02300.0051200.04200.0701206.02177.99995
Female1010.57630.01640.0033240.01860.0383247.01427.99996
Female1114.71640.02150.0038040.02430.0496046.91707.99994
Female1211.47620.01450.0025450.01940.0364457.26367.99994
Table 3. Male data set encryption results.
Table 3. Male data set encryption results.
NameSerial Time (s)Parallel Time(s)Entropy
UploadEncryptDownloadTotalOriginalEncrypted
Male0116.64170.02530.003530.03040.059237.61707.99994
Male0216.99020.02490.003560.03010.058567.24917.99994
Male0315.07680.02430.003460.02980.057567.46297.99994
Male0414.80450.02390.003510.03010.057517.46627.99995
Male0510.41750.01860.002950.02750.049057.38697.99995
Male069.88520.01870.003340.02560.047647.71917.99996
Male0711.86050.02250.004210.02610.052817.05077.99995
Male0814.74490.02460.003940.03110.059647.27397.99995
Male0913.24840.02250.002840.02940.054747.23227.99994
Male1022.140.03510.003530.03950.078137.46037.99996
Male1120.95370.03460.004670.04810.087377.39247.99995
Male1213.9390.02530.003470.03310.061877.35247.99995
Table 4. NPCR and UACI analysis.
Table 4. NPCR and UACI analysis.
Input ImagesNPCRUACI
Female09 and Female1099.618633.4595

Share and Cite

MDPI and ACS Style

Villaseñor, C.; Gutierrez-Frias, E.F.; Arana-Daniel, N.; Alanis, A.Y.; Lopez-Franco, C. Parallel Crossed Chaotic Encryption for Hyperspectral Images. Appl. Sci. 2018, 8, 1183. https://doi.org/10.3390/app8071183

AMA Style

Villaseñor C, Gutierrez-Frias EF, Arana-Daniel N, Alanis AY, Lopez-Franco C. Parallel Crossed Chaotic Encryption for Hyperspectral Images. Applied Sciences. 2018; 8(7):1183. https://doi.org/10.3390/app8071183

Chicago/Turabian Style

Villaseñor, Carlos, Eric F. Gutierrez-Frias, Nancy Arana-Daniel, Alma Y. Alanis, and Carlos Lopez-Franco. 2018. "Parallel Crossed Chaotic Encryption for Hyperspectral Images" Applied Sciences 8, no. 7: 1183. https://doi.org/10.3390/app8071183

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop