Encryption Using Binary Key Sequences in Chaotic Cryptosystem

Full Text (PDF, 1080KB), PP.48-60

Views: 0 Downloads: 0

Author(s)

Vishwas C. G. M. 1,* R. Sanjeev Kunte 1 Varun Yarehalli Chandrappa 2

1. J.N.N. College of Engineering / Department of Information Science & Engineering, Shivamogga-577204, Karnataka, India

2. Central Queensland University / School of Engineering and Technology, Melbourne-3008, Australia

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2023.04.05

Received: 25 Feb. 2023 / Revised: 4 May 2023 / Accepted: 20 Jun. 2023 / Published: 8 Aug. 2023

Index Terms

Linear Feedback Shift Register, Random Binary Key Sequence, Chaotic Image Cryptosystem, Confusion, Diffusion

Abstract

Transmission of images on the network is considered insecure which has security-related issues. In this paper, to provide security to digital images, an encryption system that uses four chaotic maps for binary key sequence generation is proposed. The system consists of stages namely, confusion, generation of random binary chaotic key sequence, pseudo-random number generation (RN), and diffusion. Keys for encryption are chosen randomly based on a pseudo random generator from the selected chaotic maps by the linear feedback shift register (LFSR). The algorithm achieves good results in terms of NPCR, UACI, and entropy values. The developed cryptosystem resists differential attacks, is sensitive to minor alterations in the keys, and has a large key space.

Cite This Paper

Vishwas C. G. M., R. Sanjeev Kunte, Varun Yarehalli Chandrappa, "Encryption Using Binary Key Sequences in Chaotic Cryptosystem", International Journal of Computer Network and Information Security(IJCNIS), Vol.15, No.4, pp.48-60, 2023. DOI:10.5815/ijcnis.2023.04.05

Reference

[1]Fu C, Meng W-h, Zhan Y-f et al., “An efficient and secure medical image protection scheme based on chaotic maps,” Computers in Biology and Medicine, Vol 43(8), pp.1000–1010, 2013.
[2]Khanzadi H, Eshghi M, Borujeni SE, “Image encryption using random bit sequence based on chaotic Maps,” Arabian Journal for Science and Engineering”, Vol 39, pp. 1039–1047, 2014.
[3]W. Stallings, “Cryptography and Network Security: Principles and Practice,” Prentice-Hall, New Jersey, 1999.
[4]K. Gupta, R. Gupta, R. Agrawal, and S. Khan, “An Ethical Approach of Block Based Image Encryption Using Chaotic Map,” International Journal of Security and Its Applications, vol.9, no.9, pp.105-122, 2015.
[5]W. Wang, H. Tan, Y. Pang, Z. Li, P. Ran, and J. Wu,” A Novel Encryption Algorithm Based on DWT and Multichaos Mapping,” Hindawi Publishing Corporation, Journal of Sensors Volume, pp. 105-121, 2016.
[6]Yu F, Li L, Tang Q, Cai S , Song Y , Xu Q, “ A Survey on True Random Number Generators Based on Chaos, Discrete Dynamics in Nature and Society,” pp. 1-10, 2019.
[7]Soleymani, A., Nordin, M. J., & Sundararajan, E., “A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map,” The Scientific World Journal, Vol 2014, pp. 1–21, 2014.
[8]Asia Mahdi Naser Alzubaidi, “Color Image Encryption and Decryption using Pixel Shuffling with Henon Chaotic System”, International Journal of Engineering Research & Technology, Vol. 3, pp. 1414-1418, 2014.
[9]Ye, G., & Huang, X., “A feedback chaotic image encryption scheme based on both bit-level and pixel-level,” Journal of Vibration and Control, Vol 22(5), pp. 1171–1180, 2015.
[10]Li, Y., Wang, C., & Chen, H. A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering, Vol 90, pp. 238–246, 2017.
[11]Sravanthi, D., Abhimanyu Kumar Patro, K., Acharya, B., & Majumder, S., “A Secure Chaotic Image Encryption Based on Bit-Plane Operation. Advances in Intelligent Systems and Computing,” pp. 717–726, 2018.
[12]Askar, S. S., Karawia, A. A., & Alammar, F. S, “Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map,” IET Image Processing, 12(1), 158–167, 2018.
[13]Hu, Yu, S., & Zhang, Z., “On the Cryptanalysis of a Bit-Level Image Chaotic Encryption Algorithm. Mathematical Problems in Engineering, Vol 2020, pp. 1–15, 2020.
[14]Benlashram, A., Al-Ghamdi, M., Al Talhi, R., & Kaouther Laabidi, P, “A novel approach of image encryption using pixel shuffling and 3D chaotic map,” Journal of Physics: Conference Series, 1447, 012009, pp. 1-10, 2020.
[15]Moysis, L., Kafetzis, I., Tutueva, A., Butusov, D., Volos, C, “Chaos-Based Image Encryption Based on Bit Level Cubic Shuffling,” Abd El-Latif, A.A., Volos, C. (eds) Cybersecurity. Studies in Big Data, Vol 102, 2022.
[16]Devipriya M., Brindha M, “Image encryption using modified perfect shuffle-based bit level permutation and learning with errors based diffusion for IoT devices,” Computers and Electrical Engineering, Vol 100, May 2022.
[17]C.G.M. Vishwas and R. S. Kunte, “An Image Cryptosystem based on Tent Map,” Third International Conference on Smart Systems and Inventive Technology, pp. 1069-1073, 2020.
[18]Vishwas C.G.M and R Sanjeev Kunte, “Image Encryption using Hybrid Chaotic Cryptosystem,” Grenze International Journal of Engineering and Technology, Vol 9, Issue 1, 2023.
[19]Deb S, Bhuyan B, “Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR,” Multimedia Tools and Applications, 80, pp. 19803–19826, 2021.
[20]Chai, X., Yang, K. & Gan, Z., “A new chaos-based image encryption algorithm with dynamic key selection mechanisms,” Multimedia Tools & Applications 76, pp. 9907–9927, 2017.
[21]Chai XL, Han DJ, Lu Y, Chen YR, Gan ZH., “A novel image encryption algorithm based on the chaotic system and DNA computing,” International Journal of Modern Physics C, Vol 28, pages 1750069, 2017.
[22]Yue Wu, Joseph P. Noonan, and Sos Again, “NPCR and UACI Randomness Tests for Image Encryption,” Cyber Journals: Journal of Selected Areas in Telecommunications, pp. 31-38, 2011.
[23]Sun. SL, “A Novel Hyperchaotic Image Encryption Scheme Based on DNA Encoding, Pixel-Level Scrambling and Bit-Level Scrambling,” in IEEE Photonics Journal, vol. 10, no. 2, pp. 1-14, 2018.
[24]Gao TG, Chen ZQ., “A new image encryption algorithm based on hyper-chaos,” Physics Letters A, Vol 372, pp. 394–400, 2008.
[25]Teng L, Wang XY., “A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive,” Optics Communication, Vol 285, pp. 4048–4054, 2012.
[26]Chen JX, Zhu ZL, Fu C. “An efficient image encryption scheme using lookup table based confusion and diffusion,” Nonlinear Dyn 81, pp. 1151–1166, 2015.
[27]Wang XY, Zhang HL., “A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems,” Nonlinear Dyn 83, pp. 333–346, 2016.