Efficient image encryption via chaotic hight algorithm

Document Type : Research Paper

Author

Department of Basic Sciences, College of Dentistry, University of Baghdad, Iraq

Abstract

This paper is devoted to introducing a new three dimensions hyperchaotic system and adapting it to enhance the Hight algorithm. The proposal hyperchaotic system with one equilibrium point is mainly derived from the Lorenz system, which we called (3D-NSC). The dynamic analysis of 3D-NSC presents some properties such as; stability of symmetric equilibria; phase diagram, bifurcation and Lyapunov exponents (LE), which are all investigated analytically and numerically.  Also, the circuit design of the 3D-NSC is introduced with some properties. The proposed system is occupied with improving the Hight algorithm. The main propose system is to create a key schedule for the chaotic Hight algorithm. This system is then applied to encrypt different images types. Our proposed system showed high encryption efficiency compared to systems, based on some performance analyzes such as; histogram, pixel change rate (NPCR), standardized variable mean intensity (UACI), pixel correlation, and entropy.

Keywords

[1] M. Alawida, J.S. Teh and A. Samsudin, An image encryption scheme based on hybridizing digital chaos and finite state machine, Signal Proces. 164 (2019) 249-266.
[2] D.S. Ali, N.A. Alwan and N.M. Al-Saidi, Image encryption based on highly sensitive chaotic system, AIP Conf. Proc. AIP Publishing, LLC. 2183(1) (2019) 080007.
[3] N. M. Al-Saidi, MG. Nadia, S. S. Al-Bundi and J. N. Al-Jawari, A hybrid of fractal image coding and fractal dimension for an efficient retrieval method, Comput. Appl. Math. 37(2) (2018) 996–1011.
[4] N.M. Al-Saidi and A.H. Ali, Towards enhancing of fractal image compression performance via block complexity, Ann. Conf. New Trends Inf. Commun. Technol. Appl. IEEE (2017) 246–251.
[5] N. M. Al-Saidi, M. R. M. Said and W. A. M. Othman, Password authentication based on fractal coding scheme, Journal of Applied Mathematics, 2012 (2012).
[6] N.A. Alwan, A.Y. Yousif and N.M. Al-Saidi, Performance-enhancing of RSA public key via three-dimensional hyperchaotic system, AIP Conf. Proc. 2325(1) (2021) 020027.
[7] A.M. Asl, A. Broumandnia and S.J. Mirabedini, Scale invariant digital color image encryption using a 3D modular chaotic map, IEEE Access 9 (2021) 102433–102449.
[8] M. S¸ahin A¸cikkapi, F. Ozkaynak and A. Bedri  Ozer,  Side-channel analysis of chaos-based substitution box structures, IEEE Access 7 (2019) 79030–79043.
[9] C. Cao, K. Sun and W. Liu, A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map, Signal Proces. 143 (2018) 122–133.
[10] H. Diab and A.M. El-Semary, Secure image cryptosystem with unique key streams via hyper-chaotic system, Signal Proces. 142 (2018) 53–68.
[11] A.K. Farhan, N.M.G. Al-Saidi, A.T. Maolood, F. Nazarimehr and I. Hussain, Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder, Entropy 21(10) (2019) 958.
[12] S. Heron, Advanced encryption standard (AES), Network Security 2009(12) (2009) 8–12.
[13] D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B.S. Koo and S. Chee, HIGHT: A new block cipher suitable for low-resource device, In International Workshop on Cryptographic Hardware and Embedded Systems, Springer, Berlin, Heidelberg, (2006) 46-59.
[14] Z. Hua and Y. Zhou, Image encryption using 2D Logistic-adjusted-Sine map, Inf. Sci. (Ny) 339 (2016) 237–253.
[15] Z. Hua, Y. Zhou, C.M. Pun and C.P. Chen, 2D Sine Logistic modulation map for image encryption, Inf. Sci. (Ny) 297 (2015) 80–94.
[16] Z. Hua, F. Jin, B. Xu and H. Huang, 2D logistic-sine-coupling map for image encryption, Signal Proces. 149 (2018)148–161.
[17] M. Khan and F. Masood, A novel chaotic image encryption technique based on multiple discrete dynamical maps, Multimedia Tools Appl. 78(18) (2019) 26203–26222.
[18] L.R. Knudsen, Practically secure Feistel ciphers, Int. Workshop on Fast Software Encryption, Springer, (1993) 211–221.
[19] S. Koppu and V.M. Viswanatham, A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform, Model. Simul. Eng. 2017 (2017) Article ID 7470204.
[20] W. Liu, K. Sun and C. Zhu, A fast image encryption algorithm based on chaotic map, Optics Lasers Engin. 84 (2016) 26–36.
[21] H. Liu and X. Wang, Color image encryption based on one-time keys and robust chaotic maps, Comput. Math. Appl. 59(10) (2010) 3320–3327.
[22] E.N. Lorenz, Deterministic nonperiodic flow, J. Atmospheric Sci. 20(2) (1963) 130–141.
[23] G. Maddodi, A. Awad, D. Awad, M. Awad and B. Lee, A new image encryption algorithm based on heterogeneous chaotic neural network generator and DNA encoding, Multimed. Tools Appl. 77(19) (2018) 24701–24725.
[24] G. Makris and I. Antoniou, Cryptography with chaos, Proc. 5th Chaotic Model. Simul. Int. Conf. Athens, Greece, (2012) 12–15.
[25] A. Nag, J. Singh, S. Khan, S. Ghosh, S. Biswas, D. Sarkar, and P.P. Sarkar, Image encryption using affine transform and XOR operation, Int. Conf. Signal Proces. Commun. Comput. Network. Technol. (2011) 309–312.
[26] H. Natiq, M.R.M. Said, N.M. Al-Saidi and A. Kilicman, Dynamics and complexity of a new 4d chaotic laser system, Entropy 21(1) (2019) 34.
[27] H. Natiq, N.M. Al-Saidi and M.R.M. Said, Complexity and dynamic characteristics of a new discrete-time hyperchaotic model, Second Al-Sadiq Int. Conf. Multidiscip. IT Commun. Sci. Appl. (2017) 1–6.
[28] H. Natiq, N.M.G. Al-Saidi, M.R.M. Said and A. Kilicman, A new hyperchaotic map and its application for image encryption, Eur. Phys. J. Plus, 133(1) (2018) 6.
[29] H. Poincare, Science et Methode, Flammarion, Paris, 1908.
[30] A. Rukhin, J. Soto, J. Nechvatal, M. Smid and E. Barker, S.D. Leigh, M. Levenson, M. Vangel, D.L. Banks, N.A. Heckert, J.F. Dray Jr. and S.C. Vo, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Pub Series, 2021.
[31] C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Technical J. 28(4) (1994) 656–715.
[32] Standard, Data Encryption and others, Federal information processing standards publication 46, National Bureau of Standards, US Department of Commerce 23 (1977).
[33] M. T. Wazi, D. S. Ali, N. M. Al-Saidi and N. A. Alawn, A secure image cryptosystem via multiple chaotic maps, Discrete Math Algorithms Appl. 2021 (2021) 2150141.
[34] X. Wu, D. Wang, J. Kurths and H. Kan, A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system, Inf. Sci. (Ny). 349-350 (2016) 137–153.
[35] Y. Wu, J. P. Noonan and S. Agaian, NPCR and UACI randomness tests for image encryption, J. Selected Areas Telecommun. 1(2) (2011) 31–38.
[36] L. Xu, X. Gou, Z. Li and J. Li, A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion, Optics Lasers Engin. 91 (2017) 41–52.
[37] W. Yan, Z. Jiang, X. Huang and Q. Ding, A Three-Dimensional Infinite Collapse Map with Image Encryption, Entropy 23(9) (2021) 1221.
[38] L. Yi, X. Tong, Z. Wang, M. Zhang, H. Zhu and J. Liu, A novel block encryption algorithm based on chaotic S-box for wireless sensor network, IEEE Access 7 (2019) 53079–53090.
[39] D. Younus, N.M. Al-Saidi and W.K. Hamoudi, Secure optical communication based on new 2D-hyperchaotic map, AIP Conf. Proc. AIP Publishing LLC. 2183(1) (2019) 090006.
[40] Y. Zhang, L. Zhang, J. Zhou, L. Liu, F. Chen and X. He, A review of compressive sensing in information security field, IEEE Access 4 (2016) 2507–2519.
Volume 13, Issue 1
March 2022
Pages 2179-2194
  • Receive Date: 03 September 2021
  • Revise Date: 25 October 2021
  • Accept Date: 06 November 2021