1. Introduction
In the past few years, the use of digital technology has increased. Due to the frequent flow of digital data transmission over electronic media, the security of data is ultimate. Several functions, such as an armed forces database, secret cinematographic conferencing, health systems, digital payments, etc., require a fast, reliable security system to transmit data. Considering some characteristic highlights of pictures, such as mass information limit and high information repetition, the encryption of pictures is not quite the same as that of writings; consequently, it is hard to deal with them by conventional encryption strategies. Traditional ciphers such as AES [
1] and DES [
2] are not suitable for fast image encryption, as the ciphers consume huge computing power and high processing time. To fulfill the requirements of security of data and fast computation, many encryption techniques have been developed. Among all encryption techniques, chaotic theory-based encryption techniques are most suitable for image encryption, as they specify high speed, high security, the complexity of the process, and high computational power. Chaotic maps have several properties, including non-periodicity, sensitivity to initial conditions, and property of randomness. These are used for the confusion and diffusion process of data in image encryption. Chaotic maps boost the sanctuary of information.
Numerous encryption schemes of images have been proposed in the past years that used chaotic maps. Matthews in 1989 [
3] proposed a non-linear iterative expression that tends to generate a chaotic sequence. He developed an encryption technique using chaotic logistic maps. Bourbakis and Alexopoulos [
4] introduced an image encryption scheme that uses the language of SCAN for encryption in 1992. The symmetric image encryption technique was introduced in [
5] by using a two-dimensional standard baker map. Scharinger [
6] developed a Kolmogorov flow-based chaotic image encryption scheme that uses a register shift pseudo-random generator, in which permutation is performed through a controlled key chaotic system by taking the whole image as a single block. Yen and Guo [
7] introduced an encryption technique named BRIE that is based on the chaotic logistic map. The encryption technique BRIE works by recirculating the pixels bitwise. The BRIE secret key contains an initial condition of the chaotic logistic map and two integers. Yen and Guo [
8] introduced an encryption technique named CKBA (Chaotic Key Based Algorithm) that works in a way in which a binary sequence is considered as a key that is generated by using a chaotic system. The image pixels are rearranged according to the created parallel arrangement and afterward XORed and XNORed with the chosen key. Recently, Li [
9] has introduced a video encryption scheme known as CVES (Chaotic Video Encryption Scheme) based on multiple digital chaotic systems. Pseudo-random signals are generated from 2
n chaotic maps to cover the video and to execute pseudo-random permutation of the hidden video.
The current work is encouraged by the theme and functions used in the existing literature. A novel image encryption technique has been introduced in this work by combining Henon map and tent logistic maps with Hill cipher which exhibits tight security. The proposed scheme uses chaotic maps to generate a sequence for permutations and bitwise XOR and Hill cipher for the substitution phase. For higher security levels, the key for Hill cipher is generated by the orthogonal matrix from the equation of a plane. The proposed scheme is executed and experimented with considering color images. Security tests such as information entropy, UACI, PSNR, correlation factors analysis, and NPCR are used to assess and evaluate the performance of the proposed approach. The proposed approach is compared with the state-of-the-art approaches.
The rest of the paper is outlined as follows:
Section 2 consists of the mathematical preliminaries.
Section 3 describes the process of image encryption and decryption algorithms.
Section 4 gives the specification of implementation results and performance evaluation of encryption and decryption algorithms.
Section 5 summarizes the whole work of the presented scheme.
2. Mathematical Preliminaries
Our proposed scheme is composed of the following mathematical concepts: Henon map, orthogonal matrix, and chaotic tent map. Chaotic maps are simple maps that are sensitive to their starting conditions. A minor change in the values of starting conditions can alter the results at a large scale.
2.1. Henon Map
The Henon map was introduced by Michel Henon in 1969. It is a discrete dynamic map that exhibits chaotic behavior, as it is sensitive to its initial conditions. It is defined as:
The vigorous behavior of a chaotic system is dependent on the values of parameters that are called control parameters. The parameters and conditions of the Henon map are as follows:
, where is the initial value.
, where is the control parameters.
is the secret key of the permutation phase
It contains many effective properties, such as Lyapunov exponent, randomness of behavior, and uniform non-variation of density variable. Due to these characteristics, the Henon map is strongly recommended for applications in the field of cryptography.
This structure is chaotic for . Eventually, a small change in the values of parameters can lead to the different behavior of a system.
2.2. Chaotic Tent Map (CTM)
The chaotic tent map is a dynamic map with
as a real valued function. It is a piece-wise linear and continuous map having a unique maximum in the chaotic region for analyzing density and power spectrum. A chaotic tent map is defined as:
The conditions and the parameter of CTM are
, which is the initial condition, and
, where
is the control bifurcation parameter. We have used the values
and
.
Figure 1 shows the bifurcation diagram of a chaotic tent map.
As shown in
Figure 1, by analyzing the dynamic behavior of CTM, it is noted that it has a good enough range of chaos. When the bifurcation phenomenon occurs, the system is indeed chaotic. Due to its sensitivity to initial value, intrinsic randomness, and a good chaotic parameter interval, the CTM is used for developing chaotic image encryption algorithms.
2.3. Orthogonal Matrix
A matrix
is said to be orthogonal if
has the following property:
where
is the transpose of
, and
is the identity matrix.
3. Image Encryption and Decryption Algorithms
The whole scheme of image encryption consists of three phases. The first phase uses the Henon map to generate a sequence for permuting the pixels of an image. In the second phase, the permuted pixels are multiplied with the key invertible matrix, which is produced by a secret orthogonal matrix. The last phase consists of a process of confusion in such a way that a new sequence which is generated from a new chaotic tent map is XORed with previously generated results. The complexity of the scheme helps in resisting attacks from the attackers.
Figure 2 depicts the workflow of our proposed encryption technique.
3.1. Permutation Process
The permutation phase of our proposed cryptosystem consists of permuting the positions of the pixels of an original image as shown in Algorithm 1. In the first phase of our scheme, to permute the pixels’ positions, the Henon map is used with the key
. By using
, the Henon map is reiterated to produce a sequence. The produced chaotic sequence is arranged in ascending order. The permuted sequence is obtained by comparing the arrangements of chaotic and sorted sequences. The one-dimensional array of the original image is obtained by using the permuted sequence.
Algorithm 1. Pixel Permutation |
Input: Secret key Henon map (1), Color image . Output: Array L of permuted pixels of an image .
- 1.
Take the original image I, which is stored in an array Y with size M = P × Q × 3, where P indicates the number of rows and Q indicates the number of columns of the image matrix I.
- 2.
. - 3.
- 4.
.
|
For the image selection, the general consideration is to take any size of pixels colored image, where and are the height and width, respectively. The size of the encrypted image would be the same as that of the original image.
3.2. Substitution Phase Using Hill Cipher with Orthogonal Matrix
The second phase is the substitution phase as shown in Algorithm 2. In this phase, the secret key is generated by the orthogonal matrix generated by an equation of a plane. The secret key is used for Hill cipher in the substitution algorithm given I Algorithm 3. The permuted image is divided into sub-blocks. These sub-blocks are one-by-one multiplied by the generated orthogonal matrix. The result is arranged in one-dimensional array E.
Algorithm 2 presents the generation of a key orthogonal matrix from the equation of plane [
10].
Algorithm 2. Key Generation of Permutation Process |
Input: Output:
- 1.
. - 2.
are
- 3.
will be
|
Algorithm 3. Hill Cipher with Orthogonal Matrix |
Input: Permuted image array Output: An array of order .
- 1.
. - 2.
- (i)
, where - (ii)
Hill cipher is implemented by using the following formula
- (iii)
in one-dimensional array again such that
|
3.3. Diffusion Phase
In the last phase, the diffusion of pixels take place as shown in Algorithm 4. In this phase, by using K
3 key, a sequence is produced by iterating a chaotic tent map (CTM) (3), and then the values of the sequence are transformed into an integer sequence by using Equation (4). The one-dimensional array is correspondingly XORed bitwise with the integer sequence. A matrix of order
is obtained by rearranging the one-dimensional array and from the matrix of cipher image.
Algorithm 4. Pixel Diffusion |
Input:, CTM (3) Output:.
- 1.
and CTM (3). - 2.
A sequence is transformed into an integer sequence by the given Equation (4) - 3.
and a bitwise XORing is performed to make an array - 4.
of the size of
|
3.4. Image Decryption Process
The process of image decryption is carried out to obtain the original image by using the reverse encryption algorithm. The proposed decryption procedure also includes three phases as shown in Algorithm 5. In the first phase, the sequence generated from the chaotic tent map (CTM) is XORed with the key
. The Hill cipher is used with the invertible matrix by using
. A random sequence is generated from the Henon map and by using key
inverse permutation is obtained. To converse the permutation, the inverse permutation is employed. The subsequent array is transformed into an image form to obtain the original image.
Algorithm 5. Pixel Decryption Process |
Input: Cipher image , Secret keys , Henon Map (1), CTM (3). Output: Colored image - 1.
. - 2.
and XOR it with the integer sequence generated from the relation (4). - 3.
is pre-decrypted as: - 4.
as in Algorithm 2. - 5.
. - 6.
Hill cipher is executed by using the formula - 7.
. - 8.
in ascending order. - 9.
. - 10.
- 11.
|
4. Analytical Results and Performance Evaluation
In this section, proposed algorithms are assessed by examining the statistical and differential parameters of the tests. In order to implement and evaluate our proposed encryption scheme, we have used Matlab 2018a. The sample images are downloaded from the USC-SIPI database [
11]. The algorithms of permutation of pixels, mixing of the key orthogonal matrix with Hill cipher, and diffusion of a pixel are implemented to obtain the encrypted image and the original image back by using decryption algorithm. The standard colored images of Lena with pixel values of length (256 × 256), are chosen for evaluating our proposed scheme. We performed the encryption using
. The sample image of Lena is chosen to compare our performance of our proposed scheme against the other chosen schemes. The input and output of the sample image Lena obtained from encryption and decryption algorithms are shown in
Figure 3.
4.1. Statistical Analysis of Histogram
Analysis of histogram is the groundbreaking assessment of image pixels. It should be distinctive from the original and encoded picture. The pixels of the plain image are non-uniform and variant at every single moment. It is clearly visible that the histogram of the cipher image is fairly uniform. It is evident that no information is leaked from the cipher image of the dispersal of pixels in the original image.
Figure 4 shows the three components, red, green, and blue histogram, of the coded cipher image. The histogram of cipher images is moderately uniform, as seen in
Figure 4. There is no evidence about the distribution of pixels in the original image.
4.2. Histogram Variance Analysis
The variances of the first and encrypted picture histograms are estimated to decide the picture pixel consistency. The pictures have more noteworthy pixel consistency when the changes are more modest. It is estimated by
where
,
and
signify the grayscale pixel esteems and
and
signify the number of pixels for every one of the grayscale pixel esteems
and
, individually. The suggested technique exhibits less average variance than the compared approach of [
12,
13], as shown in
Table 1.
4.3. Chi-Square Test Analysis
The consistency in the histograms of the encoded pictures can likewise be advocated through chi-square test investigation. The low chi-square worth demonstrates high consistency in encoded picture histograms. It is estimated by
where the observed frequency of
j is
and the expected frequency of
j is
; expected frequency is expressed as
Table 2 illustrates that the hypothesis is accepted at both 5% and 1% levels of significance for the proposed technique. In addition, there exists uniformity of the grayscale in the histograms of encrypted images of the proposed and Refs. [
12,
13] algorithms. It is also depicted that the proposed scheme has a low chi-square value as compared to the Refs. [
12,
13] techniques, which exhibits the efficiency of our suggested method.
4.4. Correlation Analysis of Adjacent Pixels
The correlation coefficient shows resemblance along the horizontal, vertical, and diagonal direction of nearby pixels. Correlation
is used to test the confusion and diffusion process between the plain image and the coded image. It can be calculated by using the formula given in the Equation (7).
where
is the total pixel value chosen to calculate the coefficient and
and
are the values of two neighboring pixels. The highest correlation factor value is 1, which shows the existence of a high correlation coefficient among the adjacent pixels. The proposed encryption technique must encrypt with low correlation coefficients which are approximately equal to zero, such that the attacker could not be able to acquire the useful data.
Figure 5 and
Figure 6 illustrate the distribution of the original and encrypted image pixels in RGB components.
Table 3 show the values of correlation distribution in three directions for the original and cipher image. The values show that in the cipher image the adjacent pixels are almost uncorrelated, as it is closer to zero. The number of random pixels is 16,430 pairs of pixels, and the comparison is carried out on 4500 pairs of neighboring pixels at random.
4.5. Mean Square Error Analysis
The mean square error (MSE) is used to measure the accuracy and variation among two images. A high value of MSE corresponds to a large difference between the ciphered and plain images. The MSE values are determined by the formulas given in expressions (8).
where
represents the number of rows and
represents the number of columns of the image.
and
represent the plain image and the cipher image, respectively. The MSE of the proposed encryption scheme of the image and its comparison with some schemes are illustrated in
Table 4. It can be seen from the results that the proposed scheme has a larger MSE value than the methods suggested in Refs. [
12,
13]. We conclude that there is an extensive difference between plain and ciphered images in the proposed algorithm as compared to the Refs. [
12,
13] techniques.
4.6. Peak Signal to Noise Ratio Analysis
The analysis of PSNR is used to determine the quality of the ciphered image against the plain image. A low value of PSNR corresponds to a large difference between ciphered and plain image. It is analyzed by the formulas given in Equation (9).
The value of PSNR for the proposed scheme is 8.6940.
Another sample-colored image of Onion (198 × 135 pixels) has been chosen to apply on our proposed cryptosystem. The entropy value of the onion image is calculated as 7.9975.
Figure 7 shows the results of encryption and decryption of sample images.
Figure 8 and
Figure 9 show the histogram and correlation coefficient of plain and cipher images, respectively.
Table 5 illustrates the correlation coefficient values of the sample image of the onion.
4.7. Sensitivity Analysis
In cryptography, plain-text sensitivity analysis is also known as differential evaluation. Two standardized tests of the number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI) are used to observe the original plain image sensitivity against external attacks. The test shows the impact whereby small variation in the plain image causes high alteration in the encrypted images. The more effective cryptosystem is designed when the higher value of NPCR is achieved and will provide security against different attacks. Both indicators can be calculated by using the formulas in Equations (10) and (11) as follows:
In Equation (11),
and
represent the width and height of the cipher image, respectively.
denotes cipher image, while
denotes the change of one pixel in plain image. If
,
. It can only be resistant to differential attacks when the values of NPCR and UACI should approach their ideal values. The ideal values of NPCR are 99.61 and UACI is 33.46. We compare the values of NPCR and UACI for the encrypted Lena image in
Table 6.
It is shown that the present scheme attains peak performance for both values. In this case, the present scheme provides good resistance against “Known plain-text attack” and “Chosen plain-text attack”.
4.8. Information Entropy Analysis
Entropy is the measurement of an irregularity of the pixel concentrations in the cipher image. It is used to determine the entropy of information in order to measure the randomness in the cipher image. In the proposed technique, information entropy for the encrypted image
g, which is
H(
g), is evaluated. The measured value of entropy of encrypted image
g is given in Equation (12).
where
is discrete pixel values and
is the probability of these values. In our example of the proposed technique of encrypted image
with
as 255, the entropy value is calculated as 7.9992.
Table 7 illustrates the comparison of entropy values of different encryption techniques. The calculation of entropy value illustrates that the value of entropy of our encryption algorithm is close to the standard value of entropy that is calculated with Equation (12). It confirms that no information has been lost in our proposed cryptosystem.
4.9. Key Space Analysis
Key space analysis is basically analysis of all the possibilities of keys used in the encryption process. The size of the key must be large enough to oppose brute force attacks. With the modern computational techniques, an algorithm can resist exhaustive attacks if the size of key space is larger than
[
18]. Our proposed image encryption algorithm consists of three different keys. The keys
and
consist of control parameters of Henon and tent maps. By observing the precision of the parameters to be
, the total amount of possibilities to choose the keys could be
. As the size of the key of two algorithms is up to 60, our proposed permutation and confusion process is strong enough to be protected from brute force attack. Since the second key
for substitution phase is generated by an equation of plane
, there are infinite possibilities for choosing the four coefficients of
. Consequently, the size of key space for
is also infinite.
4.10. Computational Time Analysis
Consider that the quickest computer can calculate computations in a single second. Thus, in a single year, the wide variety of computations accomplished through the computer is As a result, the entirety of years is required. This time duration is enough to secure the whole cryptosystem. To face up to the brute force attack in opposition to this encryption algorithm, this computational load is large enough.
4.11. Key Sensitivity Analysis
The secret keys of the scheme are significant for its encryption algorithm. Our proposed encryption algorithm has three keys. In this present technique, the result of the decryption algorithm entirely changes even for a very small variation in any part of the secret key. This means that if we add 0.0000000000000001 to the first key , we will not obtain the original image after decryption by using that key. It is clearly observed that any clue or gesture about the original image is not found in the encrypted image. The algorithms of our proposed cryptosystem are highly sensitive to secret keys.
4.12. Cryptanalysis
The cryptanalysts usually mount the chosen-plaintext attack and the chosen-ciphertext attack on a cryptographic technique to break it. By employing these types of attacks, many cryptographic techniques are cracked. We implement these types of attacks and show the resistance of our proposal against them.
4.12.1. Chosen-Plaintext Attack
In this scenario of attack, the cryptanalyst has a ciphered image, but the encryption key is unknown. However, he has a plain image
of all-zero (or all-one) and its corresponding ciphered image
obtained with the same unknown key. The cryptanalyst develops the following sub-key extraction for pixel encryption [
19].
where
is a null image in terms of grey values,
is its corresponding encrypted variant, and
is the two-dimensional pixel position. Equation (13) gives a key stream
. In trying to obtain the plain image
of the ciphered one
, the cryptanalyst makes use of the key stream
as follows.
In
Figure 10a, it can be seen that the chosen-plaintext attack on the Lena encrypted image using a null image has failed. The corresponding histograms are given in
Figure 10b. It is evident that the chosen-plaintext cannot be mounted in this proposed image encryption procedure. The reason for this failure is that pixel permutation and pixel diffusion phases rely on the techniques which are highly sensitive to insignificant change of a grey value. Therefore, the proposed technique demonstrates a strong resistance to the chosen-plaintext attack.
4.12.2. Chosen-Ciphertext Attack
This is another type of attack having no information about the key. Knowing a ciphertext
of all-one (or all-zero), and its corresponding decrypted variant
, the cryptanalyst tries to determine the key stream
using Equation (13). Then, the plaintext
would be acquired by Equation (14) [
19].
In
Figure 11, the chosen-ciphertext attack on the Lena encrypted image with the null-images (all-zero pixel values) is shown. By observing the chosen-ciphertext attack of the Lena image and its corresponding histograms, it is evident that the chosen-ciphertext cannot be mounted in this proposed image encryption procedure.
5. Conclusions
In our paper, we proposed a novel image encryption technique using chaotic maps. The proposed technique first uses a Henon chaotic map to create a permutation phase. For substitution purposes, a Hill cipher is used whose key is generated from an orthogonal matrix by considering the equation of a plane. Then, in the next diffusion phase, a tent chaotic map is employed to obtain a sequence, and each pixel value is bitwise XORed with the values of the obtained sequence. The proposed algorithm works in two phases that are: the confusion phase is carried by Henon map and the diffusion phase is carried by chaotic tent map. The proposed algorithm has offered resistance to many cryptographic attacks, such as brute force attack. Security analysis is also conducted by using key space analysis, key sensitivity analysis, and entropy analysis. Security analysis tests of the method showed ascendancy on the security and authenticity of the Lena and onion images.