Skip Navigation Links
Journal of Vibration Testing and System Dynamics

C. Steve Suh (editor), Pawel Olejnik (editor),

Xianguo Tuo (editor)

Pawel Olejnik (editor)

Lodz University of Technology, Poland

Email: pawel.olejnik@p.lodz.pl

C. Steve Suh (editor)

Texas A&M University, USA

Email: ssuh@tamu.edu

Xiangguo Tuo (editor)

Sichuan University of Science and Engineering, China

Email: tuoxianguo@suse.edu.cn


Three Level Image Encryption Using a Modulo-based Chaotic Map

Journal of Vibration Testing and System Dynamics 8(4) (2024) 391--403 | DOI:10.5890/JVTSD.2024.12.002

Nikolaos Charalampidis$^{1}$, Christos Volos$^{1}$, Lazaros Moysis$^{1,2}$, Ioannis Antoniades$^{1}$,\\ Ioannis Stouboulos$^{1}$

$^{1}$ Laboratory of Nonlinear Systems - Circuits & Complexity, Physics Department, Aristotle University of Thessaloniki, Thessaloniki, Greece

$^{2}$ Department of Mechanical Engineering, University of Western Macedonia, Kozani, Greece

Download Full Text PDF

 

Abstract

This paper investigates the issue of chaos-based image encryption. Based on the $z$-shaped fuzzy number, the exponential function, and the modulo operator, a 1-D chaotic map is constructed and studied. This map contains areas with constant chaotic behavior and high Lyapunov exponent values. A statistically secure pseudorandom bit generator is designed based on the new map, and it is used in the encryption process. A three level color image encryption technique is introduced that is based on a shuffling process to the rows and columns of an image, followed by a modulation process in each pixel, and finally by an XOR operation. The resulting ciphertext image is then shown to be resistant to a variety of attacks, including histogram, correlation, and entropy analysis, NPCR and UACI measures, cropping and tampering attacks, and transmission noise. This is demonstrated by applying the encryption to a set of images.

References

  1. [1]  Sharma, M., Ranjan, R.K., and Bharti, V. (2022), A pseudo-random bit generator based on chaotic maps enhanced with a bit-xor operation, Journal of Information Security and Applications, 64, 103299.
  2. [2]  Tang, X. and Mandal, S. (2021), Encrypted physical layer communications using synchronized hyperchaotic maps, IEEE Access, 9, 13286-13303.
  3. [3]  Teh, J.S., Tan, K., and Alawida, M. (2019), A chaos-based keyed hash function based on fixed point representation, Cluster Computing, 22, 649-660.
  4. [4]  Artiles, J.A., Chaves, D.P., and Pimentel, C. (2022), Robust image watermarking algorithm using chaotic sequences, Journal of Information Security and Applications, 68, 103219.
  5. [5]  Kumar, M., Saxena, A., and Vuppala, S.S. (2020), A survey on chaos based image encryption techniques, Multimedia Security Using Chaotic Maps: Principles and Methodologies, 1-26.
  6. [6]  Hua, Z., Zhou, B., and Zhou, Y. (2018), Sine chaotification model for enhancing chaos and its hardware implementation, IEEE Transactions on Industrial Electronics, 66(2), 1273-1284.
  7. [7]  Talhaoui, M.Z., Wang, X., and Midoun, M.A. (2021), A new one-dimensional cosine polynomial chaotic map and its use in image encryption, The Visual Computer, 37, 541-551.
  8. [8]  Zhang, Z., Zhu, H., Ban, P., Wang, Y., and Zhang, L.Y. (2022), Buffeting chaotification model for enhancing chaos and its hardware implementation, IEEE Transactions on Industrial Electronics, 70(3), 2916-2926.
  9. [9]  Barman, M. and Chaudhury, J.P. (2013), A framework for selection of membership function using fuzzy rule base system for the diagnosis of heart disease, International Journal of Information Technology and Computer Science, 5(11), 62-70.
  10. [10]  Ayubi, P., Setayeshi, S., and Rahmani, A.M. (2020), Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application, Journal of Information Security and Applications, 52, 102472.
  11. [11]  Liu, L., Miao, S., Cheng, M., and Gao, X. (2016), A pseudorandom bit generator based on new multi-delayed chebyshev map, Information Processing Letters, 116(11), 674-681.
  12. [12]  Alawida, M., Samsudin, A., and Teh, J.S. (2020), Enhanced digital chaotic maps based on bit reversal with applications in random bit generators, Information Sciences, 512, 1155-1169.
  13. [13]  Tutueva, A.V., Nepomuceno, E.G., Karimov, A.I., Andreev, V.S., and Butusov, D.N. (2020), Adaptive chaotic maps and their application to pseudo-random numbers generation, Chaos, Solitons $\&$ Fractals, 133, 109615
  14. [14]  Moysis, L., Volos, C., Jafari, S., Munoz-Pacheco, J.M., Kengne, J., Rajagopal, K., and Stouboulos, I. (2020), Modification of the logistic map using fuzzy numbers with application to pseudorandom number generation and image encryption, Entropy, 22(4).
  15. [15]  Klir, G. and Yuan, B. (1995), Fuzzy Sets and Fuzzy Logic, 4, Prentice hall New Jersey.
  16. [16]  Akraam, M., Rashid, T., and Zafar, S. (2022), An image encryption scheme proposed by modifying chaotic tent map using fuzzy numbers, Multimedia Tools and Applications, 82(11), 16861-16879.
  17. [17]  Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker, E. (2001), A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, Technical report, Booz-allen and hamilton inc mclean va.
  18. [18]  Marton, K. and Suciu, A. (2015), On the interpretation of results from the nist statistical test suite, Science and Technology, 18(1), 18-32.
  19. [19]  Tsafack, N., Iliyasu, A.M., De~Dieu, N.J., Zeric, N.T., Kengne, J., Abd-El-Atty, B., Belazi, A., and Abd EL-Latif, A.A. (2021), A memristive rlc oscillator dynamics applied to image encryption, Journal of Information Security and Applications, 61, 102944.
  20. [20]  Abdelfatah, R.I. (2019), Secure image transmission using chaotic-enhanced elliptic curve cryptography, IEEE Access, 8, 3875-3890.
  21. [21]  El-Latif, A.A.A., Abd-El-Atty, B., Belazi, A., and Iliyasu, A.M. (2021), Efficient chaos-based substitution-box and its application to image encryption, Electronics, 10(12), 1392.
  22. [22]  De, S., Bhaumik, J., and Giri, D. (2022), A secure image encryption scheme based on three different chaotic maps, Multimedia Tools and Applications, 81(4), 5485-5514.
  23. [23]  Yosefnezhad Irani, B., Ayubi, P., Amani Jabalkandi, F., Yousefi Valandar, M., and Jafari Barani, M. (2019), Digital image scrambling based on a new one-dimensional coupled sine map, Nonlinear Dynamics, 97(4), 2693-2721.
  24. [24]  Pourjabbar Kari, A., Habibizad~Navin, A., Bidgoli, A.M., and Mirnia, M. (2021), A new image encryption scheme based on hybrid chaotic maps Multimedia Tools and Applications, 80, 2753-2772.
  25. [25]  Wu, Y., Noonan, J.P., and Agaian, S. (2011), Npcr and uaci randomness tests for image encryption, Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31-38.
  26. [26]  Alvarez, G. and Li, S. (2006), Some basic cryptographic requirements for chaos-based cryptosystems, International Journal of Bifurcation and Chaos, 16(08), 2129-2151.
  27. [27]  Moysis, L., Kafetzis, I., Tutueva, A., Butusov, D., and Volos, C. (2022), Chaos-based image encryption based on bit level cubic shuffling, Cybersecurity: A New Approach Using Chaotic Systems, Springer, 157-191.
  28. [28]  Wang, X., Xu, M., and Li, Y. (2019), Fast encryption scheme for 3d models based on chaos system, Multimedia Tools and Applications, 78(23), 33865-33884.
  29. [29]  Teh, J.S., Alawida, M., and Sii, Y.C. (2020), Implementation and practical problems of chaos-based cryptography revisited, Journal of Information Security and Applications, 50, 102421.
  30. [30]  Sayed, W.S., Radwan, A.G., Fahmy, H.A., and El-Sedeek, A. (2020), Software and hardware implementation sensitivity of chaotic systems and impact on encryption applications, Circuits, Systems, and Signal Processing, 39, 5638-5655.
  31. [31]  Montero-Canela, R., Zambrano-Serrano, E., Tamariz-Flores, E.I., Mu{\~n}oz-Pacheco, J.M., and Torrealba-Mel{e}ndez, R. (2020), Fractional chaos based-cryptosystem for generating encryption keys in ad hoc networks, Ad Hoc Networks, 97, 102005.