Chaos Baker-based Image Encryption in Operation Modes

  • Mohammed Alzain Department of Information Technology, College of Computers and Information Technology, Taif University
Keywords: Image encryption, Chaos Baker map, ECB, CBC, OFB, CFB

Abstract

This research paper study the application of chaos baker map for digital image encryption in different operation modes. The  employed modes include the  electronic  code  book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of  tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entropy measure, encryption quality measures, and noise resistance measures. Simulation results demonstrated the effectively of baker-based encryption in CBC mode.

References

[1] B. Schneier, "Applied Cryptography: Protocols, Algorithms, and Source Code in C," John Wiley and Sons, Indianapolis, IN, USA, 2015.
[2] A. A. El-Latif, L. Li, and X. Niu, "A new image encryption scheme based on cyclic elliptic curve and chaotic system," Multimedia Tools and Applications, vol. 70, no. 3, pp. 1559–1584, 2014.
[3] X. Wu, H. Kan, and J. Kurths, "A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps," Applied Soft Computing, vol. 37, pp. 24–39, 2015.
[4] X. Zhang, X. Fan, J. Wang, and Z. Zhao, "A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution," Multimedia Tools and Applications, vol. 75, no. 4, pp. 1745–1763, 2016.
[5] G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[6] Z. Zhu, W. Zhang, K. Wong, and H. Yu, "A chaos-based symmetric image encryption scheme using a bit-level permutation," Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011.
[7] N. Zhou, S. Pan, S. Cheng, and Z. Zhou, "Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing," Optics & Laser Technology, vol. 82, pp. 121–133, 2016.
[8] L. Xu, Z. Li, J. Li, and W. Hua, "A novel bit-level image encryption algorithm based on chaotic maps," Optics and Lasers in Engineering, vol. 78, pp. 17–25, 2016.
[9] L. Xu, X. Gou, Z. Li, and J. Li, "A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion," Optics and Lasers in Engineering, vol. 91, pp. 41–52, 2017.
[10] Y. Wu, G. Yang, H. Jin, and J. P. Noonan, "Image encryption using the two-dimensional logistic chaotic map," Journal of Electronic Imaging, vol. 21, no. 1, Article ID 013014, 2012.
[11] N. K. Pareek, V. Patidar, and K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006.
[12] R. Boriga, A. C. Dascalescu, and A.-V. Diaconu, "A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme," Advances in Multimedia, vol. 2014, Article ID 409586, 15 pages, 2014.
[13] D. Arroyo, R. Rhouma, G. Alvarez, S. Li, and V. Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 18, no. 3, Article ID 033112, 2008.
[14] J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259–1284, 1998.
[15] G. Chen and X. Dong, "From Chaos to Order: Methodologies, Perspectives, and Applications," Series on Nonlinear Science, World Scientific, 1998.
[16] T. Ueta and G. Chen, "Bifurcation analysis of Chen's equation," International Journal of Bifurcation and Chaos, vol. 10, no. 8, pp. 1917-1931, 2000.
[17] Wolf, J. B. Swift, and H. L. A. Swinney, "Determining Lyapunov exponents from a time series," Physica D: Nonlinear Phenomena, vol. 16, no. 3, pp. 285–317, 1985.
[18] Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29-37, 2012.
[19] Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Multimedia Tools and Applications, vol. 71, no. 3, pp. 1469-1497, 2014.
[20] N. Zhou, Y. Hu, L. Gong, and G. Li, "Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations," Quantum Information Processing, vol. 16, no. 6, 2017.
[21] H.-M. Yuan, Y. Liu, T. Lin, T. Hu, and L.-H. Gong, "A new parallel image cryptosystem based on 5D hyper-chaotic system," Signal Processing: Image Communication, vol. 52, pp. 87–96, 2017.
[22] Podlubny, I. Petráš, B. M. Vinagre, and L. Dorcák, "Analogue realizations of fractional-order controllers," Nonlinear Dynamics, vol. 29, no. 1-4, pp. 281-296, 2002.
[23] Z. Wang, X. Huang, Y.-X. Li, and X.-N. Song, "A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system," Chinese Physics B, vol. 22, no. 1, Article ID 010504, 2013.
[24] Zhao, S. Wang, Y. Chang, and X. Li, "A novel image encryption scheme based on an improper fractional-order chaotic system," Nonlinear Dynamics, vol. 80, no. 4, pp. 1721-1729, 2015.
[25] X. Huang, T. Sun, Y. Li, and J. Liang, "A color image encryption algorithm based on a fractional-order hyperchaotic system," Entropy, vol. 17, no. 1, pp. 28–38, 2014.
[26] Kuo-Tsang Huang, Jung-Hui Chiu, and Sung-Shiou Shen, "A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers," International Journal of Network Security & Its Applications (IJNSA). vol. 5(1): 19, pp. 2-13, 2013.
[27] William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and transmission error detection by block chaining," US Patent 4074066, 1976.
[28] Morris Dworkin "Recommendation for Block Cipher Modes of Operation: Methods and Techniques," NIST Special Publication 800-38A, 2001. http://dx.doi.org/10.6028/NIST.SP.800-38A
[29] Davies, D. W.; Parkin, G. I. P. (1983). "The average cycle size of the key stream in output feedback encipherment," Advances in Cryptology, Proceedings of CRYPTO 82. New York: Plenum Press. pp. 263–282. ISBN 0306413663.
[30] Ensherah A. Naeem, Mustafa M. Abd Elnaby, Hala S. El-sayed, Fathi E. Abd El-Samie, and Osama S. Faragallah, "Wavelet Fusion for Encrypting Images with Few Details," Computers and Electrical Engineering, vol. 60, pp. 450-470, 2016.
[31] Osama S. Faragallah, Ashraf Afifi, "Optical Color Image Cryptosystem Using Chaotic Baker Mapping Based-Double Random Phase Encoding", Optical and Quantum Electronics, vol. 49(3):89, pp. 1-33, 2017.
[32] H. Elkamchouchi and M. A. Makar, "Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers," in Proceedings Twenty second National Radio Science Conference (NRSC 2005), pp. C11, Cairo, Egypt, Mar. 15,17, 2005.
[33] Ziedan, M. Fouad, and D. H. Salem, "Application of Data encryption standard to bitmap and JPEG images," Proceedings Twentieth National Radio Science Conference, pp. C16, Egypt, Mar. 2003.
[34] Osama S. Faragallah, "Optical Double Color Image Encryption Scheme in the Fresnel-based Hartley Domain Using Arnold Transform and Chaotic Logistic Adjusted Sine Phase Masks," Optical and Quantum Electronics, vol. 50(3):118, pp. 1-27, 2018.
Published
2018-04-30
How to Cite
Alzain, M. (2018). Chaos Baker-based Image Encryption in Operation Modes. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 17(1), 7153-7163. https://doi.org/10.24297/ijct.v17i1.7328