A More Secure Image Encryption Algorithm Using Dual 3-Dimensional Chaotic Maps for RGB Images

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-10
Year of Publication : 2020
Authors : H. J. Yakubu, E. G. Dada
DOI :  10.14445/22312803/IJCTT-V68I10P107

How to Cite?

H. J. Yakubu, E. G. Dada, "A More Secure Image Encryption Algorithm Using Dual 3-Dimensional Chaotic Maps for RGB Images," International Journal of Computer Trends and Technology, vol. 68, no. 10, pp. 35-43, 2020. Crossref, 10.14445/22312803/IJCTT-V68I10P107

Abstract
The need for more secure image communications over the public network cannot be overemphasized due to the high increase in cyber-attacks. Cryptography is acknowledged as the best method of information protection and image security. An encryption algorithm`s security must be entirely based on the secret key, also called the private key. The stronger the secret key, the more secured the encryption algorithm is. Studies have shown that 3-Dimensional continuous-time chaotic systems contain large chaotic structures and complex dynamical behavior that are highly useful for secure communication systems. In this paper, we proposed a more secure image encryption algorithm using two 3-Dimensional chaotic maps (Rabinovich-Fabrikant Equations and Shimizu- Morioka System) for colour images. The proposed scheme adopts the general architecture of the chaotic image encryption algorithm of cryptography, ensuring both confusion and diffusion properties for a secure cypher. The confusion stage is achieved using the rich, chaotic properties of both the Rabinovich-Fabrikant equations and the Shimizu-Morioka system. In contrast, the diffusion stage is achieved using the MOD and bitXOR operations on the pixels values of the confused image and the sequence of solutions generated from the two chaotic maps. The proposed scheme is an asymmetric key encryption scheme where both parties use the secrete key (a set of 13 different numbers, which includes the control parameters and initial conditions for the two maps). A standard test image (Mandrill_colour_256.tif) was used in testing the proposed scheme. Security analysis, such as the statistical analysis, which includes Histogram Uniformity analysis and Correlation Coefficient analysis as well as the differential analysis, which includes the Number of Pixels Change Rate (NPCR) and the Unified Averaged Changing Intensity (UACI) was carried out on the proposed scheme. Results obtained from the analysis show that the proposed scheme is highly effective and can resist any statistical, differential, or brute-force attacks.

Reference
[1] E. F. Abd El-Samie, H. E. H. Ahmed, F. I. Elashry, H. M. Shahieen, S.O. Faragallah, M. E. El-Rabaie, and A. S. Alshebeili, “Image Encryption- A Communication Perspective”. 1st Ed., CRC Press, London, pp.: 1-86, 2014.
[2] I. Mishkovski, and L..Kocarev, “Chaos-Based Public-key Cryptography”, Springer-Verlag Berlin Heidelberg, SCI 354, pp.: 27-65, 2011.
[3] L. Abraham and N. Daniel, "Secure Image Encryption Algorithms: A Review," International Journal of Scientific and Technology Research, Vol. 2, No. 4, pp.: 186 – 189, 2013.
[4] Y, Cao, "A New Hybrid Chaotic Map and its Application on Image Encryption and Hiding," Mathematical Problems in Engineering, 728375, 13pp, 2013.
[5] R. Ye, "A Highly Secure Image Encryption Scheme Using Compound Chaotic Maps." Journal of Emerging Trends in Computing and Information Sciences, Vol. 4, No. 6, pp.: 532 – 544, 2013.
[6] N. Ramadan, H. H. Ahmed, S. E. Elkhamy, F. E. Abd Abd El- Samie, "Chaos-Based Image Encryption Using an Improved Quadratic Chaotic Map," American Journal of Signal Processing, Vol. 6, No. 1, pp.: 1-13, 2016.
[7] M. Mishra, P. Mishra, M. C.Adhikary and S. Kumar, "Image Encryption Using Fibonacci-Lucas Transformation," International Journal on Cryptography and Information Security, Vol. 2, No. 3, pp.: 131-141, 2012.
[8] Y. Wu, G. Yang, H. Jin, and J. P. Noonan, "Image Encryption Using the Two-dimensional Logistics Chaotic Map," Journal of Electronic Imaging, Vol. 21, No.1, 28pp, 2012.
[9] A. A. Abd El-Latif, L. Li, T. Zhang, N. Wang, X. Song and X. Niu, "Digital image encryption scheme based on multiple chaotic systems," Sensing and Imaging, An international Journal on continuing subsurface sensing technologies and applications, Springer, Vol. 56, No. 2, pp.: 67-88, 2012.
[10] S. Sam, P. Devaraj, and R. S. Bhuvaneswaran, "A novel image cypher based on mixed transformed logistic maps," Multimedia tools and applications, An International Journal, Springer, Vol. 56, No. 2, pp. 315-330. 2012.
[11] J. Won Yoon and H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in nonlinear science and numerical simulations, Elsevier, Vol. 15, No. 12, pp. 3998-4006, 2010.
[12] A. L. Shil` nikov, "Bifurcation and Chaos in the Shimizu-Morioka System," Selecta Mathematica Sovietica, Vol. 10, No. 2, pp.: 105- 117, 1991.
[13] M-F. Danca and G. Chen, "Bifurcation and Chaos in a Complex Model of Dissipative Medium”, International Journal of Bifurcation and Chaos, Vol. 14, No. 1, pp.: 3409-3447, 2004.
[14] G. Hanchinamani. and L. Kulakarni, "Image Encryption Based on 2-D Zaslavskii Chaotic Map and Pseudo Hadmard Transform". International Journal of Hybrid Information Technology, Vol. 7, No.4, pp.:185-200, 2014.
[15] S. Ramakrishnan, B. Elakkiya, R. Geetha, and P. Vasuki, "Image Encryption Using Chaotic Maps in Hybrid Domain," International Journal of Communication and Computer Technologies, Vol. 2, No. 5, pp.: 44 – 48, 2014.
[16] M-F. Danca, M. Feckan, N. Kuznetsov, and G. Chen, "Looking More Closely to the Rabinovich-Fabrikant System," ArXiv:1509.09206v2 [nlin.CD] 1 23pp. Oct 2015.
[17] G. A. Sathishkumar, K. B. Bagan, and N. Sriraam, "Image Encryption Based on Diffusion and Multiple Chaotic Maps," International Journal of Network Security and its Applications, Vol. 3, No. 2, pp.: 181 – 194. 2011.
[18] T. Shimizu and N. Morioka, "on the Bifurcation of a Symmetric Limit Cycle to an Asymmetric one in a Simple Model," Physics Letters A, 76:201-204, 1980.
[19] D. J. Nkapkop, Y. J. Effa, E. A. J. Fouda, M. Alidou, L. Bitjoka, and M. Borda, "A Fast Image Encryption Algorithm Based on Chaotic Maps and the Linear Diophantine Equation," Computer Science and Applications, Vol.1, No. 4, pp.: 232-243, 2014.
[20] E. K?se, "Controller Design by Using Sliding Mode and Passive Control Methods for Continuous-Time Non-linear Shimizu- Morioka Chaotic System," International Journal of Engineering Innovation and Research, Vol. 4, No. 6, pp.: 895-902, 2015.
[21] H. R. Salih, "The Stability Analysis of the Shimizu-Morioka System with Hopf Bifurcation," Journal of Kirkuk University- Scientific Studies, Vol. 6, No. 2, pp.: 184-200, 2011.
[22] M. I. Rabinovich, and A. I. Fabrikant, "Stochastic self-modulation of waves in non-equilibrium media," J. Exp. Theor. Phys., Vol. 77, pp. :617-629. (1979),
[23] Y. Wu, J. P. Noonan, and S. Agaian, "NPCR and UACI Randomness Tests for Image Encryption," Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications, pp.: 31-38, 2011.
[24] I. Mishkovski, and L. Kocarev, Chaos-Based Public-key Cryptography, Springer-Verlag, Berlin Heidelberg. SCI 354, (2011), pp. 27-65.
[25] H. J. Yakubu and T. Aboiyar, "A Chaos Based Image Encryption Algorithm using Shimizu-Morioka System," International Journal of Communication and Computer Technologies, Vol. 6, No. 1, pp.: 07-11, 2018.
[26] E. R. Boriga, A. C.Dascalescu, and A. Diaconu, "A New One- Dimensional Chaotic Map and its use in a Novel Real-Time Image Encryption Scheme," Advances in Multimedia, Vol. 2, No. 1, pp.:1-15, 2014.
[27] H. J. Yakubu, E. G. Dada, S. B. Joseph, and A. K. Anukem, "A New Chaotic Image Encryption Algorithm for Digital Colour Images Using Rabinovich-Fabrikant Equations," International Journal of Computer Science and Information Security, Vol. 17, No. 1, pp. :15-23. January 2019

Keywords
Private Key, Public key, Diffusion, Chaotic map, Brute-force attack, Differential attack, Cipher, Chaos.