Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Representation Lost: The Case for a Relational Interpretation of Quantum Mechanics
Next Article in Special Issue
Uncertainty Assessment of Hyperspectral Image Classification: Deep Learning vs. Random Forest
Previous Article in Journal
Revealing the Work Cost of Generalized Thermal Baths
Previous Article in Special Issue
A Novel Multi-Exposure Image Fusion Method Based on Adaptive Patch Structure
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

An Image Encryption Algorithm Based on Time-Delay and Random Insertion

Faculty of Mathematics and Computer Science, Guangdong Ocean University, Zhanjiang 524088, China
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(12), 974; https://doi.org/10.3390/e20120974
Submission received: 19 November 2018 / Revised: 9 December 2018 / Accepted: 13 December 2018 / Published: 15 December 2018
(This article belongs to the Special Issue Entropy in Image Analysis)
Figure 1
<p>Chaotic dynamics in the 2D-SLMM map.</p> ">
Figure 2
<p>Experimental tests: (<b>a</b>) plain-image of Tree; (<b>b</b>) cipher-image of Tree; (<b>c</b>) decrypted image of Tree; (<b>d</b>) plain-image of Lake; (<b>e</b>) cipher-image of Lake; (<b>f</b>) decrypted image of Lake; (<b>g</b>) plain-image of Building; (<b>h</b>) cipher-image of Building; (<b>i</b>) decrypted image of Building.</p> ">
Figure 3
<p>Histograms of: (<b>a</b>) the plain-image of Lena; (<b>b</b>) the cipher-image of Lena; (<b>c</b>) the plain-image of Baboon; (<b>d</b>) the cipher-image of Baboon; (<b>e</b>) the plain-image of Boat; (<b>f</b>) the cipher-image of Boat; (<b>g</b>) the plain-image of Peppers; (<b>h</b>) the cipher-image of Peppers.</p> ">
Figure 4
<p>Information entropy at different times of encryption.</p> ">
Figure 5
<p>Key sensitivity tests for Lena: (<b>a</b>) decryption with <math display="inline"><semantics> <mrow> <msub> <mi>x</mi> <mn>0</mn> </msub> <mo>+</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>14</mn> </mrow> </msup> </mrow> </semantics></math>; (<b>b</b>) decryption with <math display="inline"><semantics> <mrow> <msub> <mi>y</mi> <mn>0</mn> </msub> <mo>+</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>14</mn> </mrow> </msup> </mrow> </semantics></math>; (<b>c</b>) decryption with <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>x</mi> <mo stretchy="false">^</mo> </mover> <mn>0</mn> </msub> <mo>+</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>14</mn> </mrow> </msup> </mrow> </semantics></math>; (<b>d</b>) decryption with <math display="inline"><semantics> <mrow> <msub> <mover accent="true"> <mi>y</mi> <mo stretchy="false">^</mo> </mover> <mn>0</mn> </msub> <mo>+</mo> <msup> <mn>10</mn> <mrow> <mo>−</mo> <mn>14</mn> </mrow> </msup> </mrow> </semantics></math>.</p> ">
Versions Notes

Abstract

:
An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in the permutation stage, a middle parameter is designed to revise the outputs of the chaotic map, yielding a temporal delay phenomena. Then, diffusion operation is applied after a group of random numbers is inserted into the permuted image. Therefore, the gray distribution can be changed and is different from that of the plain-image. This insertion acts as a one-time pad. Moreover, the keystream for the diffusion operation is designed to be influenced by secret keys assigned in the permutation stage. As a result, the two stages are mixed together to strengthen entirety. Experimental tests also suggest that our algorithm, permutation– insertion–diffusion (PID), performs better when expecting secure communications for images.

1. Introduction

With fast development of computer and network technologies, digital information (multimedia) modalities (such as images, video, and audio) have been widely adopted for daily communication. Among these, image analysis is a most direct and simple way to learn and understand the natural world. Images are increasingly transformed over networks every day, according to the Google analysis. Images and applications utilizing image processing are used in many fields, such as medicine, education, and aerospace, to name a few. However, illegal attackers may visit, read, or intercept our transmitted information.
Cryptology can be utilized to develop methods for secure transmission of images. However, images are different from text files, and have many unique characteristics, such as bulk data capacity, high redundancy, and strong inter-pixel correlation. As a result, traditional encryption algorithms such as DES, AES, and IDEA are not suitable for secure encoding of images. Development of algorithms for effective image encryption remains an important priority in the fields of computer science and communications. Recently, chaos-based image encryption schemes have received considerable attention; these methods allow for hiding image-related information accounting for the desirable properties [1,2] of extreme sensitivity to initial conditions, ergodicity, and pseudo-randomness of chaos systems (maps). As early as 1998, Fridrich [3] proposed an image encryption method that used a two-dimensional chaotic map. In what follows, many encryption algorithms have been designed, which fully or partially utilize the Fridrich structure (i.e., permutation–diffusion). For example, a bit-level image encryption algorithm [4] was proposed based on piecewise linear chaotic maps, in which a diffusion strategy was introduced followed by a permutation of bits for each value. Quantum chaotic map [5] with a diffusion-permutation architecture-based image encryption algorithm has been presented. Norouzi et al. designed diffusion-only image encryption schemes [6,7]. The test results show high sensitivity and high complexity. The behavior of quantum walks was proved [8] to be chaotic, and a permutation-based image encryption algorithm has been proposed. It calculates the sum of the plain-image and uses the resulting value to diffuse the image’s pixels. Furthermore, to enhance the sensitivity of the encryption method, a quantum hash function is taken to act as a hash function for the privacy amplification process [9]. Exclusive OR (XOR) as a diffusion operation and shuffling as a permutation are then applied to the plain-image and yield a cipher-image with a new encryption structure. A unique and more distinctive encryption algorithm is proposed based on the complexity of a highly nonlinear S box in Flesnelet domain [10]. DNA-based image encryption methods [11,12,13] and other similar architectures [14,15,16,17,18,19,20,21,22] have also been presented as encryption techniques to ensure communication of images.
However, some schemes have been found to be insecure. For example, Li [23] evaluated a class of permutation-only encryption algorithms. Using a known(chosen)-plaintext attack, the plain-image could be recovered if the encryption algorithm [24] was used. Furthermore, it was shown how permutation-only image encryption schemes can be broken with little computation complexity [25,26]. Eslami and Bakhshandeh [27] designed a new image encryption to promote the plain-text sensitivity and to enhance the diffusion performance. However, the keystream used in that diffusion was not related to the plain-image. As a result, Akhavan et al [28] re-evaluated the security and broke it successfully using a chosen plain-text attack [27]. Other cryptanalysis methods [29,30,31,32] have been proposed as well.
To solve the above security problem and to enhance the connection between the plain-image and the keystream, a novel chaotic image encryption scheme, named permutation–insertion–diffusion (PID), is proposed in this paper. A middle parameter is designed to revise the outputs of the chaotic map, acting like a time-delay phenomena. To enhance the security of the Fridrich structure, especially the shortcoming of unchanged gray values before the diffusion operation [33,34], a group of random numbers are inserted in the pre-encrypted image to rewrite the gray distribution followed by the diffusion encryption. As a result, the proposed algorithm can be seen as a one-time pad. The rest of this paper is organized as follows. The proposed cryptosystem is described after an introduction of a chaotic map. Then, some experimental results are shown by using our method. After that, security analyses are evaluated to explain the better performance of our scheme. Finally, conclusions are drawn followed by a discussion.

2. The Proposed Cryptosystem

A two-dimensional (2D) chaotic map, called a 2D Sine Logistic modulation map (2D-SLMM), was studied in [34]. The map is defined by
x i + 1 = u ( sin ( π y i ) + v ) x i ( 1 x i ) , y i + 1 = u ( sin ( π x i + 1 ) + v ) y i ( 1 y i ) , i = 0 , 1 , 2 ,
where u [ 0 , 1 ] , v [ 0 , 3 ] . To enhance the nonlinearity and the randomness, parameter v is set to modulate the output of the Logistic map. When we let v be close to 3, the output pairs ( x i + 1 , y i + 1 ) of 2D-LASM distribute in the whole data range of the 2D phase plane. Thus, v is set to be 3 [34] in 2D-SLMM to display good chaotic performance. Figure 1 shows the chaotic orbit for the 2D-SLMM output. A detailed description of the map is provided in [34].

2.1. Image Cryptosystem

To deduce the strong correlation among adjacent pixels in the plain-image, pixel shuffling is considered as a first step. Let P be an m × n plain-image, and randomly set initial conditions u = 0.9966 , v = 3.000 , x 0 = 0.4237 and y 0 = 0.1784 in the permutation stage. Then, after a certain number of iterations, two sets { x i } and { y i } are obtained. To generate a keystream with a time-delay-like phenomenon, the following operations are performed:
s = 1 + P i , j , t = y i × 10 14 + s mod 7 + 1 , x ¯ i = x i + t , h i = 3 x ¯ i × 10 14 mod n + 1 , i = 1 , 2 , , l j = 5 x ¯ j × 10 14 mod m + 1 , j = 1 , 2 , ,
where a corresponds to the floor operation on a, and t is a time-delay factor. As a result, we obtain H = { h 1 , h 2 , , h m } and L = { l 1 , l 2 , , l n } for circular permutations of row and column. Assume that the permuted image is T after permutation encryption.
If permutation-only operation is applied to a plain-image, then the gray distribution of the permuted image is the same as that of the plain-image. Moreover, encryption schemes in this family were found to be insecure. To enhance the security level of the proposed algorithm, random numbers are inserted into the image T before the first row with a random row a and the first column with a random column b. A new image B is obtained, with the dimensions of ( m + 1 ) × ( n + 1 ) . As a result, the gray distribution of B is different from that of image P. Fortunately, the insertion function acts as a one-time pad owing to the random numbers being generated anew each time. For example, vector a = { 3 , 8 , 9 , 20 } may become a = { 11 , 34 , 5 , 7 } randomly with a four-dimension. Thus, the obtained cipher-images are different, even if the encryption is performed on the same plain-image in different communications.
To determine the relationship between the different pixels in the cipher-image, diffusion is further used to encrypt the permuted image B. Again, random initial conditions are set as u = 0.9966 , v = 3.000 , x ^ 0 = 0.6028 and y ^ 0 = 0.1883 in the diffusion stage, and the chaotic map is iterated. Then, a chaotic matrix M with the same size as B is obtained after a certain number of iterations. To revise the gray distribution, the following operation is performed on the matrix rows:
D = B + M mod 256 , r = ( x 0 + y 0 ) × 10 14 mod 7 + 1 , C i = C i 1 + r M i + D i mod 256 , i = 1 , 2 , , m + 1 ,
where C i , M i , and D i represent the row vectors of C, M, and D, respectively. C 0 is a constant vector. Finally, a cipher-image C is obtained. It is noted that, before the diffusion operation, a rewriting operation for the permuted image B should be performed, which overcomes the shortcoming of the Fridrich structure and enhances the encryption security. Considering a similar function in the case of columns, the above function by row is applied again, this time on the columns of image C, and the following cipher-image E is obtained:
F = C + M mod 256 , E j = E j 1 + r M j + F j mod 256 , j = 1 , 2 , , n + 1 .

2.2. Encryption Steps

As described above, the proposed encryption scheme can be summarized in the following steps, with the symmetric PID structure:
Step 1.
Read the plain-image as P and obtain its size m × n .
Step 2.
Compute the sum s over the plain-image.
Step 3.
Generate the two sets H and L by simulating a time-delay phenomena.
Step 4.
Apply circular permutation to both rows and columns, and obtain T.
Step 5.
Insert random numbers into the permuted image T and obtain B by simulating a one-time pad.
Step 6.
Iterate the chaotic map again and obtain matrix M.
Step 7.
Apply the diffusion operation to revise the gray distribution, on both row and column dimensions.
Step 8.
Obtain the cipher-image E.

2.3. Decryption

Owing to the symmetric cryptosystem nature of our method, image decryption can be performed by applying the same steps in reverse, starting from the ciphered image and ending up with the plain image. Using correct keys, the diffusion operation is firstly applied, followed by the permutation operations in the reverse order.

3. Experimental Results

Three images were randomly chosen, tests were performed using our proposed method, and the results are reported in this section. The test was implemented in Matlab 2011b running on Windows 7 (Notebook with Intel(R) Core(TM) i3-2350, 2.30 GHz CPU). To increase the security, the PID process was applied twice to each image. Then, the former 100 iteration results for the chaotic map were deleted to avoid harmful effects. Figure 2 shows the plain-images, corresponding cipher-images, and their decrypted results. It is clear that these cipher-images contain no useful image-related information, compared with their corresponding plain-images.

4. Security Analyses

4.1. Key Space Analysis

The key space corresponds to the space of all combinations of keys that can be used in a certain encryption scheme. Here, there are four keys, i.e., x 0 , y 0 , x ^ 0 , y ^ 0 , not including the parameters u, v. The key space becomes as large as 10 56 2 186 if the precision is set to 10 14 . As a result, it is difficult to conduct a successful brute-force.

4.2. Histogram Analysis

To reduce the chance of attack and to efficiently hide the information of a plain-image, the histogram of the corresponding cipher-image should be uniform and significantly distinct from that of the plain-image. Figure 3 shows the histograms for the images of Lena, Baboon, Boat, and Peppers before and after using our encryption scheme. It is clear that the histograms of the encrypted images are flat. Thus, successful attacks are impossible.

4.3. Information Entropy Analysis

Information entropy [1] is an efficient measure of the randomness of an input image (message). This measure can be defined using the following equation:
E ( m ) = i = 0 L 1 p ( m i ) l o g 2 1 p ( m i ) ,
where L = 2 k is the total number of states of the tested message ( k = 8 for a gray level image). Here, we tested four images, and the results are listed in Table 1 (using code “entropy” in Matlab). We conclude that the information entropy indicates that it is difficult to conduct a successful attack because the values of the information entropy for the cipher-images are close to a theoretical value of 8 [35,36]. The random numbers inserted into the image in each encryption, so the values of the information entropy would be changed very slightly each time. Figure 4 shows the results for encrypting Lena and Boat at different times.

4.4. Key Sensitivity Analysis

A good image encryption algorithm should be very sensitive to all of the keys used. We tested our algorithm on the image of Lena, and the results are listed in Figure 5. Figure 5a–d shows the incorrect decryption from the cipher-image with a small change (i.e., 10 14 ) added in keys x 0 , y 0 , x ^ 0 , and y ^ 0 , respectively. Therefore, the proposed image encryption algorithm possesses a high key sensitivity and can frustrate brute-force attackers.

4.5. Differential Analysis

To test the sensitivity of the proposed encryption method to a small change, even one bit, in the plain-image, we used two common measures [37,38], the number of pixel change rate (NPCR) and the unified average changing intensity (UACI). The measures are defined as follows:
N P C R = i , j D ( i , j ) m × n × 100 % ,
U A C I = 1 m × n i , j | C ( i , j ) C ( i , j ) | 255 × 100 % ,
D ( i , j ) = 0 , if C ( i , j ) = C ( i , j ) , 1 , otherwise ,
where C and C are two cipher-images corresponding to the same plain-images differing only in one bit. The results of this test are listed in Table 2 for a change in the value of the ( 100 , 89 ) position. The results in Table 2 show that our method has high sensitivity to changes in the plain-images because the values are nearly ideal [39].

4.6. Run Test for Randomness

The run test mainly examines whether the probability of an event is random. In Matlab software, ”runstest” performs a run test on a given sequence X. This is a test of the hypothesis that the values in X come in a random order. If the sequence is random, then the test result is 0, or the result is 1. By using our algorithm, the test results are listed in Table 3. Therefore, the outputs show good statistical randomness.

4.7. Comparisons

To make a comparison, information entropy was taken to measure the randomness of different plain-images and their corresponding cipher-images. Here, a color image of Lena was selected for comparison with some methods [1,38,40]. The results are given in Table 4 for tests on cipher-images. Obviously, the information entropy values are close to the ideal value of 8 for our proposed scheme. Furthermore, computational complexity is an important metric for measuring the efficiency of the designed algorithm. Table 5 compares the proposed algorithm with some recent references, for different sizes. Considering key size, information entropy, and running speed, Table 6 displays the comparisons for some of other methods [41,42,43,44,45], where information entropy is tested for a cipher-image. Thus, our method can show good performance to satisfy a real-time communication.

5. Discussion and Conclusions

In this paper, an image encryption scheme was proposed that utilizes a chaotic map. This paper makes four significant and novel contributions: (1) The keystream used in the permutation stage is affected by the plain-image, (2) a time-delay phenomenon is simulated and constructed for choosing chaotic outputs, (3) a group of random numbers are inserted into the permuted image before diffusion, and (4) the keystream used in the diffusion stage is affected by the keys assigned in the permutation stage. According to the results of some tests and security analyses, the proposed image encryption scheme exhibits a good performance and is suitable for application in secure communications.
An image encryption algorithm based on time-delay and random insertion with a PID structure was investigated in this paper. With the help of chaotic map as key generator and its inherent properties, time-delay was simulated by outputs of chaotic map. Then, random numbers are inserted before diffusion operation to remedy the shortcoming of Fridrich structure. Compared with previous works, the proposed image encryption algorithm has the following features:
(1)
High sensitivity to keys and the plain-image.
(2)
Time-delay phenomenon is simulated according to outputs of the chaotic map.
(3)
One-time pad is designed by inserting random numbers before diffusion.
(4)
The keystream used in the diffusion stage is affected by keys assigned in the permutation stage.
(5)
Faster speed to implement the encryption.

Author Contributions

X.H. proposed the main idea of random insertion; G.Y. performed the experiments and then wrote the paper.

Acknowledgments

This work was fully supported by the National Natural Science Foundations of China (No. 61602124, No. 61702116), the Science and Technology Planning Project of Guangdong Province of China (No. 2017A010101025), the Natural Science Foundations of Guangdong Province of China (No. 2016A030310333), the Program for Scientific Research Start-up Funds of Guangdong Ocean University of China (No. R17037), the Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China (No. HDYQ2017006), and the Supporting funding Projects of Guangdong Ocean University of China (No. P15238, No. P16084).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, X.J.; Wang, K.S.; Wang, X.Y.; Kan, H.B. Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn. 2017, 90, 855–875. [Google Scholar] [CrossRef]
  2. Huang, X.L.; Ye, G.D. An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear Sci. 2014, 19, 4094–4104. [Google Scholar] [CrossRef]
  3. Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 1998, 8, 1259–1284. [Google Scholar] [CrossRef]
  4. Xu, L.; Li, Z.; Li, J.; Hua, W. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Laser Eng. 2016, 78, 17–25. [Google Scholar] [CrossRef]
  5. Seyedzadeh, S.M.; Norouzi, B.; Mosavi, M.R.; Mirzakuchaki, S. A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 2015, 81, 511–529. [Google Scholar] [CrossRef]
  6. Norouzi, B.; Seyedzadeh, S.M.; Mirzakuchaki, S.; Mosavi, M.R. A novel image encryption based on hash function with only two-round diffusion process. Multimed. Syst. 2014, 20, 45–64. [Google Scholar] [CrossRef]
  7. Norouzi, B.; Mirzakuchaki, S.; Seyedzadeh, S.M.; Mosavi, M.R. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 2014, 71, 1469–1497. [Google Scholar] [CrossRef]
  8. Yang, Y.G.; Pan, Q.X.; Sun, S.J.; Xu, P. Novel image encryption based on quantum walks. Sci. Rep. 2015, 5, 7784. [Google Scholar] [CrossRef]
  9. Yang, Y.G.; Xu, P.; Yang, R.; Zhou, Y.H.; Shi, W.M. Quantum Hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 2016, 6, 19788. [Google Scholar] [CrossRef] [Green Version]
  10. Bibi, N.; Farwa, S.; Muhammad, N.; Jahngir, A.; Usman, M. A novel encryption scheme for high-contrast image data in the Fresnelet domain. PLoS ONE 2018, 13, e0194343. [Google Scholar] [CrossRef]
  11. Guesmi, R.; Farah, M.A.B.; Kachouri, A.; Samet, M. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn. 2016, 83, 1123–1136. [Google Scholar] [CrossRef]
  12. Chen, J.X.; Zhu, Z.L.; Zhang, L.B.; Zhang, Y.S.; Yang, B.Q. Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Inf. Sci. 2016, 345, 257–270. [Google Scholar] [CrossRef]
  13. Huang, X.L.; Ye, G.D. An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed. Tools Appl. 2014, 72, 57–70. [Google Scholar] [CrossRef]
  14. Shen, Q.; Liu, W.B. A novel digital image encryption algorithm based on orbit variation of phase diagram. Int. J. Bifurc. Chaos 2017, 27, 1750204. [Google Scholar] [CrossRef]
  15. Zhang, Y.S.; Xiao, D. Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt. Laser Eng. 2013, 51, 472–480. [Google Scholar] [CrossRef]
  16. Ghebleh, M.; Kanso, A.; Noura, H. An image encryption scheme based on irregularly decimated chaotic maps. Signal Process.-Image 2014, 29, 618–627. [Google Scholar] [CrossRef]
  17. Hua, Z.Y.; Zhou, B.H.; Zhou, Y.C. Sine-transform-based chaotic system with FPGA implementation. IEEE Trans. Ind. Electron. 2018, 65, 2557–2566. [Google Scholar] [CrossRef]
  18. Hua, Z.Y.; Yi, S.; Zhou, Y.C. Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process. 2018, 144, 134–144. [Google Scholar] [CrossRef]
  19. Karawia, A.A. Encryption algorithm of multiple-image using mixed image elements and two dimensional chaotic economic map. Entropy 2018, 20, 801. [Google Scholar] [CrossRef]
  20. Abdallah, E.E.; Hamza, A.B.; Bhattacharya, P. Video watermarking using wavelet transform and tensor algebra. Signal Image Video Process. 2010, 4, 233–245. [Google Scholar] [CrossRef]
  21. Abdallah, E.E.; Hamza, A.B.; Bhattacharya, P. MPEG video watermarking using tensor singular value decomposition. In Proceedings of the 2007 International Conference Image Analysis and Recognition, Montreal, QC, Canada, 22–24 August 2007; pp. 772–783. [Google Scholar]
  22. Li, S.L.; Ding, W.K.; Yin, B.S.; Zhang, T.F.; Ma, Y.D. A novel delay linear coupling logistics map model for color image encryption. Entropy 2018, 20, 463. [Google Scholar] [CrossRef]
  23. Li, C.Q. Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 2016, 118, 203–210. [Google Scholar] [CrossRef] [Green Version]
  24. Yeo, J.C.; Guo, J.I. Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. IEE Proc.-Vis. Image Signal Process. 2000, 147, 167–175. [Google Scholar]
  25. Jolfaei, A.; Wu, X.W.; Muthukkumarasamy, V. On the security of permutation-only image encryption schemes. IEEE Trans. Inf. Forensics Sec. 2016, 11, 235–246. [Google Scholar] [CrossRef]
  26. Li, C.Q.; Lin, D.D.; Lü, J.H. Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimed. 2017, 24, 64–71. [Google Scholar] [CrossRef]
  27. Eslami, Z.; Bakhshandeh, A. An improvement over an image encryption method based on total shuffling. Opt. Commun. 2013, 286, 51–55. [Google Scholar] [CrossRef]
  28. Akhavan, A.; Samsudin, A.; Akhshani, A. Cryptanalysis of “an improvement over an image encryption method based on total shuffling”. Opt. Commun. 2015, 350, 77–82. [Google Scholar] [CrossRef]
  29. Hermassi, H.; Belazi, A.; Rhouma, R.; Belghith, S.M. Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed. Tools Appl. 2014, 72, 2211–2224. [Google Scholar] [CrossRef]
  30. Liu, Y.S.; Tang, J.; Xie, T. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt. Laser Technol. 2014, 60, 111–115. [Google Scholar] [CrossRef] [Green Version]
  31. Zhu, C.X.; Sun, K.H. Cryptanalyzing and improving a novel color image encryption algorithm using RT-enhanced chaotic tent maps. IEEE Access 2018, 6, 18759–18770. [Google Scholar] [CrossRef]
  32. Xie, E.Y.; Li, C.Q.; Yu, S.M.; Lü, J.H. On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process 2017, 132, 150–154. [Google Scholar] [CrossRef]
  33. Solak, E.; Çokal, C.; Yildiz, O.T.; Biyikoğu, T. Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 2010, 20, 1405–1413. [Google Scholar] [CrossRef]
  34. Hua, Z.Y.; Zhou, Y.C.; Pun, C.M.; Chen, C.L.P. 2D Sine Logistic modulation map for image encryption. Inf. Sci. 2015, 297, 80–94. [Google Scholar] [CrossRef]
  35. Zhu, C.X. A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 2012, 285, 29–37. [Google Scholar] [CrossRef]
  36. Hua, Z.Y.; Zhou, B.H.; Zhou, Y.C. Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans. Ind. Electron. 2019, 66, 1273–1284. [Google Scholar] [CrossRef]
  37. Ye, G.D.; Huang, X.L. An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 2017, 251, 45–53. [Google Scholar] [CrossRef]
  38. Liu, H.J.; Wang, X.Y. Color image encryption using spatial bit level permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903. [Google Scholar] [CrossRef]
  39. Dăscălescu, A.C.; Boriga, R.E. A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn. 2013, 74, 307–318. [Google Scholar] [CrossRef]
  40. Kadir, A.; Hamdulla, A.; Guo, W.Q. Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 2014, 125, 1671–1675. [Google Scholar] [CrossRef]
  41. Stoyanov, B.; Kordov, K. Image encryption using chebyshev map and rotation equation. Entropy 2015, 17, 2117–2139. [Google Scholar] [CrossRef]
  42. Stoyanov, B.; Kordov, K. Novel image encryption scheme based on chebyshev polynomial and duffing map. Sci. World J. 2014, 2014, 283639. [Google Scholar] [CrossRef] [PubMed]
  43. Seyedzade, S.M.; Mirzakuchaki, S.; Atani, R.E. A novel image encryption algorithm based on hash function. In Proceedings of the 2010 Iranian Conference on Machine Vision and Image Processing, Isfahan, Iran, 27–28 October 2010. [Google Scholar]
  44. Chai, X.L.; Gan, Z.H.; Yuan, K.; Lu, Y.; Chen, Y.R. An image encryption scheme based on three-dimensional Brownian motion and chaotic system. Chin. Phys. B 2017, 26, 020504. [Google Scholar] [CrossRef]
  45. Ramadan, N.; Ahmed, H.H.; El-khamy, S.E.; El-Samie, F.E.A. Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain. J. Cent. South Univ. 2017, 24, 2049–2057. [Google Scholar] [CrossRef]
  46. Huang, X.L. Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn. 2012, 67, 2411–2417. [Google Scholar] [CrossRef]
  47. Ye, G.D.; Huang, X.L. A novel block chaotic encryption scheme for remote sensing image. Multimed. Tools Appl. 2016, 75, 11433–11446. [Google Scholar] [CrossRef]
  48. Fouda, J.S.A.E.; Effa, J.Y.; Sabat, S.L.; Ali, M. A fast chaotic block cipher for image encryption. Commun. Nonlinear Sci. Numer. Simul. 2014, 9, 578–588. [Google Scholar] [CrossRef]
Figure 1. Chaotic dynamics in the 2D-SLMM map.
Figure 1. Chaotic dynamics in the 2D-SLMM map.
Entropy 20 00974 g001
Figure 2. Experimental tests: (a) plain-image of Tree; (b) cipher-image of Tree; (c) decrypted image of Tree; (d) plain-image of Lake; (e) cipher-image of Lake; (f) decrypted image of Lake; (g) plain-image of Building; (h) cipher-image of Building; (i) decrypted image of Building.
Figure 2. Experimental tests: (a) plain-image of Tree; (b) cipher-image of Tree; (c) decrypted image of Tree; (d) plain-image of Lake; (e) cipher-image of Lake; (f) decrypted image of Lake; (g) plain-image of Building; (h) cipher-image of Building; (i) decrypted image of Building.
Entropy 20 00974 g002
Figure 3. Histograms of: (a) the plain-image of Lena; (b) the cipher-image of Lena; (c) the plain-image of Baboon; (d) the cipher-image of Baboon; (e) the plain-image of Boat; (f) the cipher-image of Boat; (g) the plain-image of Peppers; (h) the cipher-image of Peppers.
Figure 3. Histograms of: (a) the plain-image of Lena; (b) the cipher-image of Lena; (c) the plain-image of Baboon; (d) the cipher-image of Baboon; (e) the plain-image of Boat; (f) the cipher-image of Boat; (g) the plain-image of Peppers; (h) the cipher-image of Peppers.
Entropy 20 00974 g003
Figure 4. Information entropy at different times of encryption.
Figure 4. Information entropy at different times of encryption.
Entropy 20 00974 g004
Figure 5. Key sensitivity tests for Lena: (a) decryption with x 0 + 10 14 ; (b) decryption with y 0 + 10 14 ; (c) decryption with x ^ 0 + 10 14 ; (d) decryption with y ^ 0 + 10 14 .
Figure 5. Key sensitivity tests for Lena: (a) decryption with x 0 + 10 14 ; (b) decryption with y 0 + 10 14 ; (c) decryption with x ^ 0 + 10 14 ; (d) decryption with y ^ 0 + 10 14 .
Entropy 20 00974 g005
Table 1. Information entropy tests.
Table 1. Information entropy tests.
Test ImagesPlain-ImageCipher-Image
Lena7.45327.9970
Boat7.12387.9993
Peppers7.57157.9992
Baboon7.35797.9993
Table 2. Sensitivity tests.
Table 2. Sensitivity tests.
Test ImagesUACINPCR
Lena33.353799.6109
Boat33.489999.5900
Peppers33.518699.6044
Baboon33.528099.6136
UACI: unified average changing intensity; NPCR: number of pixel change rate.
Table 3. Run test for randomness.
Table 3. Run test for randomness.
ImagesLenaPeppersBoatBaboon
Results0000
RandomnessPassPassPassPass
Table 4. Comparisons of information entropy.
Table 4. Comparisons of information entropy.
ChannelsRGBAverage
Ref. [1]7.99037.98907.98937.9895
Ref. [38]7.98717.98817.98787.9877
Ref. [40]7.92787.97447.97057.9576
Ref. [46]7.99697.99747.99707.9971
Ref. [47]7.98957.98977.98937.9895
Ref. [48]7.99687.99707.99727.9970
Ours7.99777.99737.99757.9975
Table 5. Comparisons of speed performance.
Table 5. Comparisons of speed performance.
SizesRef. [46]Ref. [47]Ref. [48]Ours
256 × 256 0.1641 s0.0552 s0.0671 s0.0312 s
512 × 512 0.6630 s0.2031 s0.2293 s0.1373 s
Table 6. Comparisons by gray Boat image.
Table 6. Comparisons by gray Boat image.
SizesKey SizeInformation EntropyRunning SpeedSoftware
[41] 2 298 7.999321.684 sMatlab
[44] 2 128 7.99935.960 sMatlab
ours 2 186 7.99920.137 sMatlab

Share and Cite

MDPI and ACS Style

Huang, X.; Ye, G. An Image Encryption Algorithm Based on Time-Delay and Random Insertion. Entropy 2018, 20, 974. https://doi.org/10.3390/e20120974

AMA Style

Huang X, Ye G. An Image Encryption Algorithm Based on Time-Delay and Random Insertion. Entropy. 2018; 20(12):974. https://doi.org/10.3390/e20120974

Chicago/Turabian Style

Huang, Xiaoling, and Guodong Ye. 2018. "An Image Encryption Algorithm Based on Time-Delay and Random Insertion" Entropy 20, no. 12: 974. https://doi.org/10.3390/e20120974

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop