Académique Documents
Professionnel Documents
Culture Documents
Abstract-Many methods have been put forth to perform image intermediate key is combined with the initial parameter key
encryption using Chaotic Neural Networks. In this paper, and the control parameter key which are then used to generate
another method of chaotic image encryption called the "Triple a chaotic sequence. The chaotic sequence is generated using
Key" method is introduced. In this method, it is required to enter the one-dimensional chaotic logistic map. The method is
an 80-bit session key in addition to the initial parameter key and called "Triple-key" because it provides a three-fold protection
the control parameter key. Each of the keys forms just one part to the original image and three keys have to be entered in the
of the lock that needs to be opened to obtain the original image.
correct order for decrypting the image. The software offers
The position of bits in the 80-bit key determines the scrambling
additional protection by limiting the number of times a person
of individual pixels in the encrypted image. Results reveal a very
can enter the wrong code.
low Correlation coefficient between adjacent pixels in the
encrypted image, which implies higher security and lower The features that make chaotic logistic maps desirable for
probability of security breach through brute force attacks or image encryption have been described in the following
statistical analysis. The software was realized using MATLAB. section. Then, the algorithm of the "Triple key method" is
elaborated. The observations and results of this image
Keywords-image encryption; chaotic neural network; chaotic
encryption method are provided next. Some recommendations
logistic map
are given at the conclusion of the paper.
I. INTRODUCTION
II. FEATURES OF CHAOTIC LOGISTIC MAPS
The security of multimedia data such as digital speech,
Chaos theory is a scientific discipline that focuses on the
images, and videos has become increasingly important
study of nonlinear systems that are highly sensitive to initial
nowadays due to the frequent use of such signals for
conditions that is similar to random behavior, and continuous
communication over open networks. Storage and transmission
system. The properties of chaotic systems are [3]:
of multimedia is needed in many real applications, such as
medical imaging systems, military and radar image (i) Deterministic, this means that they have some
transmission, confidential video conferences and other covert determining mathematical equations ruling their behavior.
operations. In some cases, security breach due to unauthorized
(ii) Unpredictable and non-linear, this means they are
access may be highly detrimental. Hence, it becomes
sensitive to initial conditions. Even a very slight change in the
imperative to encrypt all data that need to be protected.
starting point can lead to significant different outcomes.
Ordinary data like text files can be protected using a
(iii) Appear to be random and disorderly but in actual fact
number of encryption schemes like Data Encryption Standard
they are not. Beneath the random behavior there is a sense of
(DES), Triple DES (TDES), and International Data Encryption
order and pattern.
Algorithm (IDEA) which provide a high level of data security.
The text files can be stored, processed or sent via a network by The highly unpredictable and random-look nature of
encrypting it. But difficulty arises when a real time application chaotic output is the most attractive feature of deterministic
like audio or video has to be encrypted. chaotic system that may lead to various novel applications [4].
Large data size, computational complexity and real time A simple 1D map [5] that exhibits complicated behavior is
maps
constraints make encryption of multimedia data difficult [1]. the logistic map [0,1] [0,1], parameterized by fl:
This makes chaotic scrambling of an image more desirable
when compared to Conventional encryption algorithms. A
(1)
number of chaos based image encryption schemes have been
developed in recent years since 1992 which are briefly dealt
In the logistic map, as Il is varied from to 4, a period
with in [2].
doubling bifurcation occurs. In the region Il E [0, 3], the map
In this paper, a "triple-key" method of image encryption is possesses one stable fixed point. As Il is increased past 3, the
explained. In this image encryption technique, an 80-bit stable fixed point becomes unstable and two new stable
session key is entered in the form of 20 hexadecimal periodic points of period 2 are created. As Il is further
characters. Portions of this session key are extracted and some increased, these stable periodic points in tum become unstable
manipUlations are done on it to form an intermediate key. This and each spawns two new stable periodic points of period 4.
0.8
0.7
0.6
(2)
x" 0.5
0.4
I
I
0. 3 ------------r------------+--
I I
0.2
I ------------ TI -----
r
------------ B. Computing the Initial Parameter X(i)
I I
0.1 ____________ L
I
____________ L ________
I 4. The session key K consisting of 20 hexadecimal
I I
o ----------------------------, characters viz. 0 to 9 and A to F is entered.
2. 5 3 3.5 4
(3)
Figure I. Bifurcation diagram of a one-dimensional logistic map
... dk l
D. Construction ofthe Chaotic neural network
12. Each row is mapped onto a weight matrix W of
d2k (16)
size k x k. The elements in are decided using (9). dk
0,
Wij = 1 -2bn ,
{ i -=1= i
(9)
16. Each row of dj is converted to its corresponding
j i = i, decimal value. Now, djcontains values ranging from to
255.
where i and i vary from 1 to k and n varies from 1 to N.
17. The one-dimensional array is converted to a two
Therefore, when i = i, dimensional array of size N1 x N2 = N which belongs to the
1,
wij = -1,
{ i = i and bnj =
(10)
encrypted image.
F. Decryption Process
i = i and bnj = 1.
18. Decryption procedure is same as the encryption
From (9) and (10), it can be inferred that W is a diagonal procedure, but takes place only when the session key, initial
matrix whose diagonal contains only values 1. The diagonal parameter X(l) and control parameter 11 are correctly entered.
element is I if the corresponding bit in chaotic sequence is
V. OBSERVATIONS AND RESULTS
zero and -I if the corresponding bit is one.
Simulation was done using MATLAB to explore the
13. Each row of B is mapped onto a bias matrix f) of efficiency of this image encryption method. The results
size 1 x k. There exists an element in f) corresponding to each presented here contain both simulation diagrams and
element in a row of B. Also, corresponding to each W, there is mathematical results. Simulation diagrams provide a physical
a f). The elements of f) are decided using (II). feel of the encryption method, while the mathematical results
f).! =
{ 1/2, bnj =
(11)
provide statistical data.
Simulation diagrams include a) Encrypted Image Analysis
-1/2, bnj = 1 b) Histogram Analysis c) Correlation Analysis and d)
Sensitivity Analysis. Mathematical results are depicted using
The only elements in f) are 1/2. two new parameters: Correlation Index and Quality of
Encryption.
E. Encryption process
bit dnj in the input one-dimensional vector as Simulation diagrams present a visual method to analyze
the effects of the encryption technique using data like
encrypted images, histogram and correlation plots. The
simulations for different .bmp images encrypted using the
same set of keys are done in this sub-section. Session key =
Here sign(x) is defined as
'A6C3lJ7F6lJ21E96B85B3A', %1=0.9 and 11=3.9999 are
x =
sign()
. { l,x
(13)
used. Other key combinations may or may not yield better
results depending on the rate of chaos.
0, x < 0.
1) Encrypted Image Analysis
The above encryption looks complicated but actually, it The encrypted and decrypted images obtained for two
can be simplified into a much more precise form. different images for the same combination of keys are shown
in Fig. 2. From the figure, it is inferred that the triple key
{a, dnj = and bnj = method of encryption imparts sufficient amount of confusion
, 1,dnj = 1 and bnj = and diffusion. The encrypted images can never be mapped to
dn]. = (14) their original images by mere inspection because all encrypted
1,dnj = and bnj = 1 images seem similar. At the same time, each encrypted image
O,dnj = 1 and bnj = 1 is unique as would be revealed by the correlation analysis.
Figure 2. Encrypted image analysis of two images cat.bmp and chip.bmp Figure 4. Correlation analysis of the image cat.bmp (a) correlation plot of
vertical pixels in the original image (b) correlation plot of horizontal pixels in
the image decryption becomes easier. When we use the the original image (c) correlation plot of vertical pixels in the encrypted image
Triple-key method of image encryption, the histogram reveals (d) correltaion plot of horizontal pixels in the encrypted image
a uniform distribution of pixels through out the encrypted
As a figure of merit for measuring the efficiency of
image as in Fig. 3.
encryption, two new terms Correlation Index (CI) and Quality
3) Correlation Analysis of Encryption (QoE) are introduced.
Correlation is a measure of the similarity that exists
IChl+ICvl
between two adjacent pixels in an image. Here correlation is CI = (18)
2
plotted for vertically adjacent and horizontally adjacent pixels
in an image. The vertical and horizontal correlation plots for
Here, CI refers to the correlation index, Ch the correlation
original and encrypted images for an image are shown in Fig.
between horizontally adjacent pixels and Cv the correlation
4. The correlation is indicated by the correlation coefficient in
between vertically adjacent pixels. CI is the average
both horizontal and vertical directions. The formula for
correlation existing between the adjacent pixels. It can take
correlation coefficient is given by
values in the range [-1,1] .
The nearer the CI is to zero, the lower the correlation, the
(17) higher the confusion and diffusion properties of the encrypted
image, the higher the encryption efficiency and hence, the
lower the ease of decryption without knowledge of the keys.
So the aim is that a lower CI has to be attained.
B. Mathematical Results: Sensitivity Analysis
The efficiency of an encryption system can also be QoE = 1 - ICII) x 100)% (19)
determined by the sensitivity analysis, i.e. sensitivity of the
encryption process to the change in key. Here sensitivity Higher the value of QoE, better the encryption process. It
analysis is done and the mathematical results thus obtained are is seen in table 2 that triple key method provides a QoE of
tabulated in tables 1 and 2. Table 1 shows the sensitivity more than 99% in every case.
analysis for four different images using the same combination
of keys. Table 2 shows the sensitivity analysis for the same
image using different keys. The significance of this data is
revealed by the definition of two new parameters as explained TABLEr. SENSITIVITY TO INPUT IMAGE
below.
Correlation CI
Image QoE
Input Output Input Output
V 0.9300 V -0.0022
Cat.bmp 0.9245 0.0042 99.58%
H 0.9190 H -0.0062
V 0.8493 V -0.0008
,.) Chip.bmp 0.8172 0.0053 99.47%
H 0.7851 H -0.0097
V 0.9558 V -0.0133
Rose.bmp 0.9514 0.0093 99.07%
H 0.9469 H -0.0052
V 0.9213 V -0.0007
Taj.bmp 0.9067 0.0049 99.51%
H 0.8920 H -0.0092
Ib)
Encrypted Image
No.
Keys CI QoE
Session Key -
I FSDIBOCB3E6F5C79143B 0.0030 99.70
X(l) = O.S and 11= 3.9999
Session Key =
2 FSDIBOCB9E6F5C79143B 0.0086 99.14
X(l) = O.S and 11= 3.9999
Session Key =
3 FSDIBOCB9E6F5C79143B 0.0071 99.29
X(I) = 0.7 and 11= 3.9999
REFERENCES
[I] Shiguo Lian, jinsheng Sun, Zhiquan Wang; "A novel image encryption
scheme based on JPEG encoding" Information Visualisation, 2004. IV
2004. Proceedings. Eighth international Conference on, 14-16 July
2004, Pages: 217-220.
[2] N. K. Pareek, Vinod Patidar, K. K. Sud; "Image encryption using
chaotic logistic map", Image and Vision Computing 24 (2006) 926-934.
[3] Salleh. M., S. Ibrahim and I. F. Isnin. 2002. "Ciphering Key Of Chaos
Image Encryption". Proceeding of International Conference on AI and
Engineering Technology. UNIMAS, Sabah, Malaysia.
[4] Jakimoski, G. and L. Kocarev. 2001. "Chaos and Cryptography: Block
Encryption Ciphers Based on Chaotic Maps". IEEE Transactions On
Circuits And Systems-I: Fundamental Theory And Applications.
4S(2): 163-169.
[5] C. W. Wu and N. F. Rulkov, "Studying chaos via 1-0 maps-a
tutorial," IEEE Trans. on Circuits and Systems I: Fundamental Theory
and Applications, vol. 40, no. 10, pp. 707-721, 1993.
[6] H. -C. Chen, 1. -I. Guo, L. -CO Huang, 1. -C. Yen, "Design and
Realization of a New Signal Security System for Multimedia Data
Transmission", EURASIP Journal on Applied Signal Processing
2003:13, 1291-1305.
[7] 1. -C. Yen and 1. -I. Guo, "A chaotic neural network for signal
encryption/decryption and its VLSI architecture," in Proc. 10th VLSI
Design/CAD Symposium, pp. 319-322, Nan-Tou, Taiwan, August
1999.