Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map
Abstract
:1. Introduction
2. Improved Logistic–Chebyshev Map
2.1. Classic Chaotic Maps
2.1.1. Logistic Map
2.1.2. Chebyshev Map
2.2. Proposed LCCM Chaotic System
2.3. Chaotic Behaviors
2.4. Randomness Test
3. Image Encryption Based on Improved Logistic–Chebyshev Map
3.1. Key Stream Generation
3.2. Multi-Level Permutation
3.3. Image Diffusion
3.4. Image Decryption
4. Experimental Results
4.1. Histogram Analysis
4.2. Correlation Analysis
4.3. Information Entropy
4.4. Differential Attack Analysis
4.5. Resistance against Chosen Plaintext
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
- Sabery, M.K.; Yaghoobi, M. A new approach for image encryption using chaotic Logistic map. In Proceedings of the 2008 International Conference on Advanced Computer Theory and Engineering, Phuket, Thailand, 20–22 December 2008; pp. 585–590. [Google Scholar]
- Ai-hong, Z.; Lian, L. Improving for chaotic image encryption algorithm based on logistic map. In Proceedings of the 2010 the 2nd Conference on Environmental Science and Information Application Technology, Wuhan, China, 17–18 July 2010; pp. 211–214. [Google Scholar]
- Hazarika, N.; Saikia, M. A novel partial image encryption using chaotic logistic map. In Proceedings of the 2014 International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 20–21 February 2014; pp. 231–236. [Google Scholar]
- Hua, Z.; Zhou, Y.; Pun, C.-M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
- Hua, Z.; Zhou, Y. Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 2016, 339, 237–253. [Google Scholar] [CrossRef]
- Wei, D.; Jiang, M. A fast image encryption algorithm based on parallel compressive sensing and DNA sequence. Optik 2021, 238, 166748. [Google Scholar] [CrossRef]
- Kumar, K.; Roy, S.; Rawat, U.; Mishra, I. An efficient image encryption technique using Logistic map and 2D-TCLM. In Proceedings of the Cyber Warfare, Security and Space Research, 28 August 2022; Springer International Publishing: Cham, Switzerland, 2022; Volume 1599, pp. 87–96. [Google Scholar]
- Diab, H. An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 2018, 6, 42227–42244. [Google Scholar] [CrossRef]
- Huang, X. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 2012, 67, 2411–2417. [Google Scholar] [CrossRef]
- Wang, X.; Luan, D.; Bao, X. Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit. Signal Process. 2014, 25, 244–247. [Google Scholar] [CrossRef]
- Qi, F.; Huang, S.; Li, T.; Yang, H.; Kang, X. 2D Henon-Chebyshev Chaotic map for image encryption. In Proceedings of the 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), Zhangjiajie, China, 10–12 August, 2019; pp. 774–781. [Google Scholar]
- Shahna, K.U.; Mohamed, A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 2020, 90, 106162. [Google Scholar] [CrossRef]
- Dai, Y.; Wang, X. Medical image encryption based on a composition of Logistic Maps and Chebyshev Maps. In Proceedings of the 2012 IEEE International Conference on Information and Automation, Shenyang, China, 6–8 June 2012; pp. 210–214. [Google Scholar]
- Liu, L.; Jiang, D.; Wang, X.; Rong, X.; Zhang, R. 2D Logistic-adjusted-Chebyshev map for visual color image encryption. J. Inf. Secur. Appl. 2021, 60, 102854. [Google Scholar] [CrossRef]
- Wang, X.; Du, X. Pixel-level and bit-level image encryption method based on Logistic-Chebyshev dynamic coupled map lattices. Chaos Solitons Fractals 2022, 155, 111629. [Google Scholar] [CrossRef]
- Basha, S.M.; Mathivanan, P.; Ganesh, A.B. Bit level color image encryption using Logistic-Sine-Tent-Chebyshev (LSTC) map. Optik 2022, 259, 168956. [Google Scholar] [CrossRef]
Test Name | p-Value | Results |
---|---|---|
Frequency test | 0.6245 | pass |
Block Frequency test | 0.7148 | pass |
Cusum-Forward test | 0.8653 | pass |
Cusum-Reverse test | 0.3261 | pass |
Runs test | 0.3984 | pass |
Long Runs test of Ones | 0.7215 | pass |
Binary Matrix Rank Test | 0.6279 | pass |
Spectral DFT test | 0.5462 | pass |
Non-overlapping test Templates | 0.7906 | pass |
Overlapping test Templates | 0.9270 | pass |
Maurer’s Universal test | 0.3844 | pass |
Approximate Entropy test | 0.8568 | pass |
Random Excursions test | 03227 | pass |
Lempel Ziv complexity test | 0.6403 | pass |
Linear complexity test | 0.3042 | pass |
Random Excursions Variant test | 0.5318 | pass |
Serial test | 0.8471 | pass |
Images | Correlation of Plaintext Image | Correlation of Ciphertext image | ||||
---|---|---|---|---|---|---|
Horizontal Correlation | Vertical Correlation | Diagonal Correlation | Horizontal Correlation | Vertical Correlation | Diagonal Correlation | |
couple | 0.9263 | 0.8766 | 0.8359 | 0.0086 | 0.0032 | 0.0042 |
Goldhill | 0.9646 | 0.9531 | 0.9245 | 0.0026 | 0.0070 | 0.0009 |
lighthouse | 0.8970 | 0.9298 | 0.8435 | 0.0010 | 0.0000 | 0.0029 |
peppers | 0.9508 | 0.9574 | 0.9212 | 0.0020 | 0.0021 | 0.0002 |
Pepper | Horizontal 0.9508 | Vertical 0.9574 | Diagonal 0.9212 | Average |
---|---|---|---|---|
Ref. [9] | 0.0103 | 0.0121 | 0.0310 | 0.0178 |
Ref. [13] | 0.0023 | 0.0016 | 0.0046 | 0.0028 |
Ref. [7] | 0.0082 | 0.0027 | 0.0035 | 0.0048 |
Ref. [17] | 0.0123 | 0.0052 | 0.0014 | 0.0063 |
Our scheme | 0.0020 | 0.0021 | 0.0002 | 0.0014 |
Images | Plaintext Image | Ciphertext Image | Ref. [9] | Ref. [13] | Ref. [7] |
---|---|---|---|---|---|
couple | 7.1662 | 7.9971 | 7.9982 | 7.9918 | 7.9962 |
Goldhill | 7.4452 | 7.9976 | 7.9973 | 7.9925 | 7.9839 |
lighthouse | 7.4557 | 7.9973 | 7.9926 | 7.9964 | 7.9952 |
peppers | 7.5897 | 7.9979 | 7.9946 | 7.9376 | 7.9913 |
Average | 7.4142 | 7.9975 | 7.9957 | 7.9796 | 7.9917 |
Images | Couple | Goldhill | Lighthouse | Peppers |
---|---|---|---|---|
NPCR (%) | 99.6262 | 99.5956 | 99.6185 | 99.6155 |
UCAI (%) | 33.4716 | 33.4873 | 33.4851 | 33.4718 |
Algorithms | Proposed | Ref. [9] | Ref. [13] | Ref. [7] | Ref. [17] |
---|---|---|---|---|---|
NPCR (%) | 99.6262 | 99.6243 | 99.5993 | 99.5846 | 99.56 |
UCAI (%) | 33.4716 | 14.6022 | 33.4600 | 33.4510 | 33.4578 |
Image | Differences in Key Streams | |
---|---|---|
NPCR (%) | UACI (%) | |
couple | 99.2372 | 33.0617 |
Goldhill | 99.2693 | 33.1732 |
lighthouse | 99.2514 | 33.0115 |
peppers | 99.1656 | 33.0248 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jiang, M.; Yang, H. Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map. Information 2023, 14, 456. https://doi.org/10.3390/info14080456
Jiang M, Yang H. Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map. Information. 2023; 14(8):456. https://doi.org/10.3390/info14080456
Chicago/Turabian StyleJiang, Mingfang, and Hengfu Yang. 2023. "Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map" Information 14, no. 8: 456. https://doi.org/10.3390/info14080456
APA StyleJiang, M., & Yang, H. (2023). Image Encryption Algorithm Using Multi-Level Permutation and Improved Logistic–Chebyshev Coupled Map. Information, 14(8), 456. https://doi.org/10.3390/info14080456