Parallel Crossed Chaotic Encryption for Hyperspectral Images
Abstract
:Featured Application
Abstract
1. Introduction
- Security: The required level of security of encrypting passwords or other structured data could differ than the one required for visual data. A more secure algorithm could impact with a high computational cost.
- Speed: A significant difference between visual data encryption and text-based encryption is that visual data is usually much larger. If we consider a time constraint or real-time execution requirements, the speed of encryption is an important issue.
- Bitstream compliance: Visual data could have a specific data format. Algorithms for raw data such as AES do not take data format into account and this could cause unexpected crashes in the image decoding.
2. Chaotic Systems and Chaotic Encryption
2.1. Chaotic Systems
- Deterministic: There is no randomness involved in the system evolution, then if we know the initial condition and parameters, we will be able to predict the system.
- Sensitive to initial conditions: A chaotic system is exponentially sensitive to an initial condition, in other words, a small change in the initial condition provokes a big difference in the evolution of the system.
- Aperiodic: There is no periodicity in a chaotic system.
- Bounded: The state of a chaotic system is bounded, and it maintains chaotic inside this bounded limits.
2.2. Chaotic Encryption
2.3. Chaotic Image Encryption Performance
2.4. Piecewise Linear Chaotic Map
3. Encryption for Hyperspectral Images
Algorithm 1: Parallel Crossed Chaotic Encryption. |
Data: Hyperspectral Image I |
Result: Encrypted Image |
Simulate all chaotic systems in parallel for iterations; |
Generate S-box with ; |
Upload I to GPU memory; |
In parallel apply ; |
Download to CPU memory; |
4. Results
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Chang, C.I. Hyperspectral Imaging: Techniques for Spectral Detection and Classification; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2003; Volume 1. [Google Scholar]
- Melgani, F.; Bruzzone, L. Classification of hyperspectral remote sensing images with support vector machines. IEEE Trans. Geosci. Remote Sens. 2004, 42, 1778–1790. [Google Scholar] [CrossRef] [Green Version]
- Camps-Valls, G.; Bruzzone, L. Kernel-based methods for hyperspectral image classification. IEEE Trans. Geosci. Remote Sens. 2005, 43, 1351–1362. [Google Scholar] [CrossRef] [Green Version]
- Camps-Valls, G.; Tuia, D.; Bruzzone, L.; Benediktsson, J.A. Advances in hyperspectral image classification: Earth monitoring with statistical learning methods. IEEE Signal Process. Mag. 2014, 31, 45–54. [Google Scholar] [CrossRef]
- Paar, C.; Pelzl, J. Understanding Cryptography: A Textbook for Students and Practitioners; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2009. [Google Scholar]
- Buchmann, J. Introduction to Cryptography; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2013. [Google Scholar]
- Thulasimani, L.; Madheswaran, M. A single chip design and implementation of aes-128/192/256 encryption algorithms. Int. J. Eng. Sci. Technol. 2010, 2, 1052–1059. [Google Scholar]
- Moh’d, A.; Jararweh, Y.; Tawalbeh, L. AES-512: 512-bit Advanced Encryption Standard algorithm design and evaluation. In Proceedings of the 2011 7th International Conference on Information Assurance and Security (IAS), Melaka, Malaysia, 5–8 December 2011; pp. 292–297. [Google Scholar]
- Guo, G.l.; Qian, Q.; Zhang, R. Different implementations of aes cryptographic algorithm. In Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, New York, NY, USA, 24–26 August 2015; pp. 1848–1853. [Google Scholar]
- Zhu, Y.; Zhang, H.; Bao, Y. Study of the AES realization method on the reconfigurable hardware. In Proceedings of the 2013 International Conference on Computer Sciences and Applications, Wuhan, China, 14–15 December 2013; pp. 72–76. [Google Scholar]
- Coutinho, S.C. The Mathematics of Ciphers: Number Theory and RSA Cryptography; AK Peters/CRC Press: Boca Raton, FL, USA, 1999. [Google Scholar]
- Uhl, A.; Pommer, A. Image and Video Encryption: From Digital Rights Management to Secured Personal Communication; Springer Science & Business Media: Heidelberg/Berlin, Germany, 2004; Volume 15. [Google Scholar]
- Kocarev, L.; Lian, S. Chaos-Based Cryptography: Theory, Algorithms and Applications; Springer: Heidelberg/Berlin, Germany, 2011; Volume 354. [Google Scholar]
- Sankpal, P.R.; Vijaya, P. Image encryption using chaotic maps: A survey. In Proceedings of the 2014 Fifth International Conference on Signal and Image Processing, Bangalore, India, 8–10 January 2014; pp. 102–107. [Google Scholar]
- Bansal, R.; Chawla, R.; Gupta, S. A comparison of image encryption techniques based on chaotic maps. In Proceedings of the 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 16–18 March 2016; pp. 933–938. [Google Scholar]
- Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
- Zhang, L.; Zhang, Y. Research on lorenz chaotic stream cipher. In Proceedings of the 2005 IEEE International Workshop on VLSI Design and Video Technology, Suzhou, China, 28–30 May 2005; pp. 431–434. [Google Scholar]
- Jia, X. Image Encryption using the Ikeda map. In Proceedings of the 2010 International Conference on Intelligent Computing and Cognitive Informatics (ICICCI), Kuala Lumpur, Malaysia, 22–23 June 2010; pp. 455–458. [Google Scholar]
- Lin, C.F.; Wang, B.S. 2D Chaos-Based Visual Encryption Mechanism in EEG Signals. In Proceedings of the 2010 International Symposium on Parallel and Distributed Processing with Applications (ISPA), Taipei, Taiwan, 6–9 September 2010; pp. 470–473. [Google Scholar]
- Lian, S.; Sun, J.; Wang, Z.; Dai, Y. A fast video encryption scheme based-on chaos. In Proceedings of the Control, Automation, Robotics and Vision Conference, Kunming, China, 6–9 December 2004; Volume 1, pp. 126–131. [Google Scholar]
- Shang, F.; Sun, K.; Cai, Y. An efficient MPEG video encryption scheme based on chaotic cipher. In Proceedings of the Image and Signal Processing, Sanya, China, 27–30 May 2008; Volume 3, pp. 12–16. [Google Scholar]
- Su, Z.; Lian, S.; Zhang, G.; Jiang, J. Chaos-based video encryption algorithms. In Chaos-Based Cryptography; Springer: Heidelberg/Berlin, Germany, 2011; pp. 205–226. [Google Scholar]
- Mhatre, R.M.; Bhardwaj, D. Classifying Iris Image Based on Feature Extraction and Encryption Using Bio-Chaotic Algorithm (BCA). In Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, India, 12–14 December 2015; pp. 1068–1073. [Google Scholar]
- Muhammad, N.; Bibi, N.; Mahmood, Z.; Akram, T.; Naqvi, S.R. Reversible integer wavelet transform for blind image hiding method. PLoS ONE 2017, 12, e0176979. [Google Scholar] [CrossRef] [PubMed]
- Parlitz, U.; Junge, L. Synchronization of chaotic systems. In Proceedings of the Control Conference (ECC), Karlsruhe, Germany, 31 August–3 September 1999; pp. 4637–4642. [Google Scholar]
- Fu, C.; Zhang, Z.C.; Chen, Y.; Wang, X.W. An Improved Chaos-Based Image Encryption Scheme; Springer: Heidelberg/Berlin, Germany, 2007; pp. 575–582. [Google Scholar]
- Khade, P.N.; Narnaware, M. 3D chaotic functions for image encryption. IJCSI Int. J. Comput. Sci. Issues 2012, 9, 323–328. [Google Scholar]
- Hossain, M.B.; Rahman, M.T.; Rahman, A.S.; Islam, S. A new approach of image encryption using 3D chaotic map to enhance security of multimedia component. In Proceedings of the 2014 International Conference on Informatics, Electronics & Vision (ICIEV), Dhaka, Bangladesh, 23–24 May 2014; pp. 1–6. [Google Scholar]
- Sathishkumar, G.; Bagan, K.B.; Sriraam, N. Image encryption based on diffusion and multiple chaotic maps. arXiv, 2011; arXiv:1103.3792. [Google Scholar]
- Hu, Y.; Zhu, C.; Wang, Z. An improved piecewise linear chaotic map based image encryption algorithm. Sci. World J. 2014, 2014. [Google Scholar] [CrossRef] [PubMed]
- Wolkerstorfer, J.; Oswald, E.; Lamberger, M. An ASIC Implementation of the AES SBoxes; Springer: Heidelberg/Berlin, Germany, 2002; pp. 67–78. [Google Scholar]
- Mroczkowski, P. Generating Pseudorandom S-Boxes-a Method of Improving the Security of Cryptosystems Based on Block Ciphers. J. Telecommun. Inf. Technol. 2009, 2, 74–79. [Google Scholar]
- Kazmi, S.; Ikram, N. Chaos based key expansion function for block ciphers. Multimed. Tools Appl. 2013, 66, 267–281. [Google Scholar] [CrossRef]
- Das, M.L.; Narasimhan, V.L. A simple and secure authentication and key establishment protocol. In Proceedings of the Emerging Trends in Engineering and Technology, Maharashtra, India, 16–18 July 2008; pp. 844–849. [Google Scholar]
- Gao, L.; Wang, X.; Zhang, W. Chaotic hash function based on Tandem-DM construction. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Changsha, China, 16–18 November 2011; pp. 1745–1749. [Google Scholar]
- Solak, E. Cryptanalysis of chaotic ciphers. In Chaos-Based Cryptography; Springer: Heidelberg/Berlin, Germany, 2011; pp. 227–256. [Google Scholar]
Female Dataset | Male Dataset | ||||||||
---|---|---|---|---|---|---|---|---|---|
Name | Size (MB) | Dimensions | Name | Size (MB) | Dimensions | ||||
n | m | l | n | m | l | ||||
Female01 | 922 | 1403 | 975 | 29 | Male01 | 993 | 1349 | 965 | 41 |
Female02 | 820 | 1169 | 912 | 42 | Male02 | 974 | 1294 | 969 | 43 |
Female03 | 993 | 1346 | 935 | 46 | Male03 | 949 | 1337 | 948 | 39 |
Female04 | 906 | 1279 | 912 | 43 | Male04 | 927 | 1322 | 981 | 35 |
Female05 | 802 | 1260 | 904 | 33 | Male05 | 851 | 1379 | 969 | 24 |
Female06 | 651 | 1237 | 855 | 21 | Male06 | 894 | 1317 | 1066 | 24 |
Female07 | 1014 | 1368 | 942 | 45 | Male07 | 986 | 1447 | 1044 | 26 |
Female08 | 883 | 1322 | 955 | 33 | Male08 | 1013 | 1423 | 1059 | 30 |
Female09 | 952 | 1323 | 1043 | 31 | Male09 | 920 | 1366 | 938 | 35 |
Female10 | 763 | 1197 | 970 | 27 | Male10 | 1085 | 1271 | 1038 | 50 |
Female11 | 867 | 1213 | 929 | 42 | Male11 | 1105 | 1414 | 975 | 47 |
Female12 | 771 | 1214 | 914 | 32 | Male12 | 937 | 1317 | 981 | 36 |
Name | Serial Time (s) | Parallel Time(s) | Entropy | ||||
---|---|---|---|---|---|---|---|
Upload | Encrypt | Download | Total | Original | Encrypted | ||
Female01 | 12.4671 | 0.0194 | 0.003338 | 0.0231 | 0.045838 | 7.6478 | 7.99995 |
Female02 | 14.5577 | 0.0220 | 0.003502 | 0.0259 | 0.051482 | 6.9685 | 7.99994 |
Female03 | 18.0801 | 0.0289 | 0.004160 | 0.0323 | 0.065360 | 7.7217 | 7.99994 |
Female04 | 15.3995 | 0.0249 | 0.003745 | 0.0290 | 0.057645 | 7.4850 | 7.99994 |
Female05 | 11.4269 | 0.0188 | 0.003177 | 0.0225 | 0.044477 | 6.9084 | 7.99994 |
Female06 | 6.6332 | 0.0129 | 0.002135 | 0.0139 | 0.028935 | 7.5043 | 7.99996 |
Female07 | 17.8849 | 0.0286 | 0.004158 | 0.0332 | 0.065958 | 7.7350 | 7.99997 |
Female08 | 12.8754 | 0.0208 | 0.003407 | 0.0249 | 0.049107 | 7.5038 | 7.99994 |
Female09 | 13.5488 | 0.0230 | 0.005120 | 0.0420 | 0.070120 | 6.0217 | 7.99995 |
Female10 | 10.5763 | 0.0164 | 0.003324 | 0.0186 | 0.038324 | 7.0142 | 7.99996 |
Female11 | 14.7164 | 0.0215 | 0.003804 | 0.0243 | 0.049604 | 6.9170 | 7.99994 |
Female12 | 11.4762 | 0.0145 | 0.002545 | 0.0194 | 0.036445 | 7.2636 | 7.99994 |
Name | Serial Time (s) | Parallel Time(s) | Entropy | ||||
---|---|---|---|---|---|---|---|
Upload | Encrypt | Download | Total | Original | Encrypted | ||
Male01 | 16.6417 | 0.0253 | 0.00353 | 0.0304 | 0.05923 | 7.6170 | 7.99994 |
Male02 | 16.9902 | 0.0249 | 0.00356 | 0.0301 | 0.05856 | 7.2491 | 7.99994 |
Male03 | 15.0768 | 0.0243 | 0.00346 | 0.0298 | 0.05756 | 7.4629 | 7.99994 |
Male04 | 14.8045 | 0.0239 | 0.00351 | 0.0301 | 0.05751 | 7.4662 | 7.99995 |
Male05 | 10.4175 | 0.0186 | 0.00295 | 0.0275 | 0.04905 | 7.3869 | 7.99995 |
Male06 | 9.8852 | 0.0187 | 0.00334 | 0.0256 | 0.04764 | 7.7191 | 7.99996 |
Male07 | 11.8605 | 0.0225 | 0.00421 | 0.0261 | 0.05281 | 7.0507 | 7.99995 |
Male08 | 14.7449 | 0.0246 | 0.00394 | 0.0311 | 0.05964 | 7.2739 | 7.99995 |
Male09 | 13.2484 | 0.0225 | 0.00284 | 0.0294 | 0.05474 | 7.2322 | 7.99994 |
Male10 | 22.14 | 0.0351 | 0.00353 | 0.0395 | 0.07813 | 7.4603 | 7.99996 |
Male11 | 20.9537 | 0.0346 | 0.00467 | 0.0481 | 0.08737 | 7.3924 | 7.99995 |
Male12 | 13.939 | 0.0253 | 0.00347 | 0.0331 | 0.06187 | 7.3524 | 7.99995 |
Input Images | NPCR | UACI |
---|---|---|
Female09 and Female10 | 99.6186 | 33.4595 |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Villaseñor, C.; Gutierrez-Frias, E.F.; Arana-Daniel, N.; Alanis, A.Y.; Lopez-Franco, C. Parallel Crossed Chaotic Encryption for Hyperspectral Images. Appl. Sci. 2018, 8, 1183. https://doi.org/10.3390/app8071183
Villaseñor C, Gutierrez-Frias EF, Arana-Daniel N, Alanis AY, Lopez-Franco C. Parallel Crossed Chaotic Encryption for Hyperspectral Images. Applied Sciences. 2018; 8(7):1183. https://doi.org/10.3390/app8071183
Chicago/Turabian StyleVillaseñor, Carlos, Eric F. Gutierrez-Frias, Nancy Arana-Daniel, Alma Y. Alanis, and Carlos Lopez-Franco. 2018. "Parallel Crossed Chaotic Encryption for Hyperspectral Images" Applied Sciences 8, no. 7: 1183. https://doi.org/10.3390/app8071183