Open Access
ARTICLE
A New Multi Chaos-Based Compression Sensing Image Encryption
1 Department of Electrical Engineering, Riphah International University, Islamabad, 44000, Pakistan
2 Department of Computer Science, College of Computer, Qassim University, Buraydah, 51452, Saudi Arabia
* Corresponding Author: Suliman A. Alsuhibany. Email:
(This article belongs to the Special Issue: Security, Privacy and Trust Management for IoT-based Blockchain)
Computers, Materials & Continua 2023, 76(1), 437-453. https://doi.org/10.32604/cmc.2023.032236
Received 11 May 2022; Accepted 30 June 2022; Issue published 08 June 2023
Abstract
The advancements in technology have substantially grown the size of image data. Traditional image encryption algorithms have limited capabilities to deal with the emerging challenges in big data, including compression and noise toleration. An image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this study. The proposed scheme is built on the intriguing characteristics of an orthogonal matrix. Gram Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic map. Following the diffusion process, a block-wise random permutation of the data is performed using multi-chaos. The proposed scheme provides sufficient security and resilience to JPEG compression and channel noise through a series of experiments and security evaluations. It enables Partial Encryption (PE) for faster processing as well as complete encryption for increased security. The higher values of the number of pixels change rates and unified average change intensity confirm the security of the encryption scheme. In contrast to other schemes, the proposed approach can perform full and partial encryption depending on security requirements.Keywords
Nowadays, the Internet offers a simple and low-cost means of transmitting and receiving real-time information. Threats to digital information technology have increased over the past decade because of the Internet’s heterogeneity. Security is a crucial issue in the communication process to secure multimedia content from unauthorized copying, usage, and alteration. Many encryption techniques have been created by specialists and scholars to give security and protection to multimedia materials. Because the fundamental properties of digital images differ from those of text, academics are proposing new approaches in place of established cryptographic procedures. The majority of proposed methods are pixel permutation-based and hence inadequately guard against well-known cryptographic attacks [1,2]. A tight association between chaos and encryption has been investigated in recent years. Chaotic systems differ from conventional algorithms in terms of sensitivity to beginning circumstances, non-periodicity, non-convergence, and pseudo-randomness [3]. As a result of these characteristics, chaotic systems may readily be utilized to develop image encryption approaches that surpass existing algorithms [4]. Typically, the chaos-based encryption method for images involves two crucial stages: chaotic pixel shuffling for confusion and chaotic pixel value changes for dispersion [5].
Matthew presented the first efficient chaos-based cryptographic encryption technique in 1989 [6]. Fridrich [7] utilized a two-dimensional baker map to encrypt and randomize a N × N image. The researcher emphasized the connection between discretized chaos and cryptography. To improve the encryption speed and enhance the security level, Mao et al. [8] extended the 2D baker map into a 3D chaotic map. According to researchers, the 3D map can achieve 2–3 times quicker processing than a two-dimensional map. Mazloom et al. [9] presented a unique technique of Connected Nonlinear Chaotic Map (CNCM) to solve the disadvantages of chaotic one-dimensional maps. The proposed technique is considered to be more advanced and secure, mainly due to the coupling nature of the Chaotic Neuron Cellular Network (CNCM) and the utilization of a 240-bit secret key. Authors in paper [10] utilized 2 chaotic maps for encrypting images. Zhang et al. [11] broke the algorithm proposed in [10] due to the shortcomings of the permutation approach, which cannot break the bit planes. Researchers enhanced the original image encryption scheme’s overall security. In the encryption approach proposed by Seyedzadeh et al. [12], a 2D piecewise nonlinear chaotic map is linked to obtain improved values for a range of security parameters, such as entropy, Number of Pixel Change Rate (NPCR), and Unified Average Changing Intensity (UACI). To alleviate the shortcomings of the logistic map, various writers developed spatiotemporal chaotic maps for image encryption [13,14]. The technique presented in these papers may be widely implemented in various image encryption systems to improve security. Wang et al. [15] presented the concept of block encryption as a result of dynamic patterns generated by a large number of chaotic maps. The final ciphertext is constructed by employing random sequences, shifting operations, and Exclusive-OR as well as a few rounds. The approach is used to minimize the correlation of the R, G, and B components of a color image. Wang et al. [16] developed a novel technique to address the shortcomings of a Cat Map. Despite the various image encryption techniques that have been developed, many researchers still strive to enhance security while achieving faster processing times. To our understanding, no approach has been reported to date that addresses both encryption and noise resistance simultaneously. The problem statement highlights the challenge of dealing with the noisy effects and compression during the encryption process.
Problem statement is discussed with the help of example. This article addresses two critical issues: the effects of noise and compression. Fig. 1a displays the original Cameraman image, while Figs. 1b to 1d show the distorted images for different signal-to-noise ratio (SNR) values. It can be seen clearly in Fig. 1 that image quality diminishes with decreasing SNR. The primary concern is whether it is possible to recover the original plaintext image if a encoded image is distorted by channel noise. Encrypting the Cameraman image and transporting it via an AWGN channel with SNR values varying from 30 to 10 is the best way to demonstrate these effects. It is clear from Fig. 2 that accurate decryption is impossible. It is because only 16 bytes or 44 blocks are used by the 128-bit advanced encryption standard (AES) algorithm at one time. If a single pixel value in a 44-block encrypted AES image is altered by one bit, the entire 44-block cannot be properly decoded. As a result, if the pixel values change during transmission, AES cannot decrypt the original image. One should examine whether the original unencrypted image can still be retrieved after compressing an encrypted image. It has been previously stated that traditional encryption methods are not appropriate for use in compressed scenarios or channels with noise.
Our suggested system is built around three primary components: chaotic maps, orthogonal matrices, and discrete cosine transform (DCT). In this section, we will study chaotic maps and DCT to have a better grasp of the suggested system. Using a logistic map as an illustration of a chaotic map’s power is essential to illustrate the concept. The DCT, which may be employed in the PE process, is also explained in the next section.
An insect population model was devised by scientist May in 1976 [17]. There is a relationship between the discrete logistic map, which is the suggested scheme’s discrete version, and the logistic equation. Because of this, iterative maps and difference equations are two terms typically used to describe the discrete insect population scheme. The discrete representation of a
where
where
where
The time complexity of a cryptosystem can be reduced through the use of PE. Increasing computing effectiveness can be obtained by encrypting only a fraction of multimedia material. While performing PE, many academics focus on the lower frequency coefficients rather than the higher frequency ones. Consider the case where
where
This section divides the proposed system into two parts: image encryption through a chaos-based [20] orthogonal matrix and the whole encryption/decryption procedure. The Gram–Schmidt method is used to build an orthogonal matrix in the proposed technique. This algorithm takes a random matrix as input and produces an orthogonal matrix as output. Singular Value Decomposition (SVD) [21] is another approach for orthogonal matrix production that may potentially be employed. However, this algorithm has been preferred for orthogonal matrix generation because of its complexity.
3.1 Orthogonal Matrix for Image Encryption
Suppopse, we have
Each vector in Q is perpendicular and linearly independent of the others, forming the basis for the subspace covered by Q. When all of the vectors in matrix Q are normalized, Q is referred to as an orthonormal set. If
1.
2.
3.
Proposition 1
When Q is an orthogonal matrix, accurate decryption of the P is always possible.
Proof
Eq. (7) can be written as:
When a matrix P is multiplied by the identity matrix I, the values of matrix P stay unaltered. Eq. (8) demonstrates that decryption of the image is always achievable. When the relevant characteristics of orthogonal matrix Q are used, the decryption transformation may be calculated easily. The fundamental image encryption described in Eq. (6) can be modified so that the intruder obtains no information about the image. Reiterating Eq. (6) will produce this type of diffusion. The use of several orthogonal matrices raises the ciphertext C’s complexity to guard against statistical and differential attacks. By iterating the chaos map, many orthogonal matrices are created using the Gram–Schmidt process. Eq. (6) may be iterated mathematically as follows:
where
Proposition 2
The decryption is still achievable despite the fact that the image P has been pre-multiplied by even more than an orthogonal matrix:
The proposed work steps are discussed in this section, with a focus on the approach for PE which is depicted in Fig. 3. Let
1. DCT of
2. Iterating the Logistic map to get random values.
3. The Gram–Schmidt procedure is used to generate an orthogonal matrix using the random values obtained in step 2.
4. Perform the multiplication of
5. Replace
6. Calculate the inverse DCT of
7. Convert
8. Iterate the IST using the initial control parameters
Grayscale images should use pixel values ranging from 0 to 255. To produce the final ciphertext C, the permuted blocks are quantized and scaled to maintain the pixel values between 0 and 255.
Results from our experiments are presented in this section to highlight the method’s fundamental characteristics. It has a high PSNR of decrypted output due to noise resilience and compressed sensing. The experiments are carried out on a variety of photographs kept in our database. Both the frequency and spatial domains of these images are encrypted. For the sake of consistency, all images in this article are 256 × 256 pixels in size. However, the proposed approach is adaptable to different sizes. To demonstrate the utility of our suggested technique, Figs. 4 and 5 illustrate the results for partial and complete encryption, respectively. These findings show that neither entire nor PE photos provide any meaningful details about the original image. Full encryption, on the other hand, encrypts the entire piece of text; hence, it seems identical to PE. Since just a tiny portion of the data is encrypted, PE takes less time to encrypt and decode than full encryption, as discussed in Section 5.
When signals are sent via an AWGN (also known as channel noise), they are typically distorted. Even when the original picture is corrupted by AWGN, traditional decryption techniques are unable to recover it. Fig. 6 shows the impact of AWGN at an SNR of 40 dB on decoded images received. As demonstrated in Fig. 6, the recovered images have a high PSNR and are perceptually comparable to the original images. PSNR values for our suggested strategy at various SNR levels are shown in Table 1. As seen in the figure, Table 1 indicates that the presented system provides noise-tolerating flexibility while retaining an acceptable high PSNR even at low SNR levels.
Bitmap files store plaintext images and have a size of 65 KB. The method explained in this section can be used to encrypt an image and save it as a Bitmap file without any additional compression. This approach utilizes quantization and scaling, resulting in the encrypted images having the same size as the plaintext images 65 KB. Even though the encrypted data has been compressed, encrypted files of original size can still be decrypted using JPEG compression. When the JPEG-compressed data is decoded, various PSNRs are produced, depending on the Quality Factor (QF) used. The decrypted output quality is found to be excellent, with a high PSNR as evidenced by Tables 2–5 which display the JPEG-compressed files and PSNR values for various quality levels. As the QF value is reduced, the quality of degrades. While the PSNR results are outstanding at QF = 100, the compression ratio is insufficient compared with original size.
4.3 The Effect of Different Parameters on Computational Complexity
The encryption technique proposed in this paper has mainly focused on processing time that is determined by three parameters:
5 Security and Performance Evaluation
It is imperative to ensure the security of an image encryption method and verify its ability to withstand various forms of attacks. This section thoroughly examines the dependability of the proposed technique.
To evaluate an encryption algorithm, it is common to perform key space analysis. This analysis examines the size and complexity of the key space, which is a critical factor in preventing brute force attacks. The larger the key space, the more challenging it becomes for an attacker to break the encryption. In addition, image encryption methods that use chaotic systems are often considered more secure due to erodicity and initial conditions. As a result, the proposed encryption technique will be assessed for its reliability and ability to resist various forms of attacks. If the key space is more than
5.2 Analysis of Differential Attack
Differential attacks on image encryption may be evaluated largely using two frequently used metrics: NPCR and UACI [24,25]. Let
5.3 Analysis of Statistical Attack
By inventing statistical assaults on ciphertext images, an intruder can learn about plaintext images. Therefore, any statistical attacks should be able to be withstood by an image encryption approach. We use histogram analysis and correlation analysis to demonstrate protection against statistical assaults.
An image encryption technique is to be regarded as secure if the histogram’s output of plaintext and ciphertext images are completely distinct. The ciphertext picture’s histogram should not give any details of the image. Comprehensive Encryption (CE) histogram analysis findings are shown in Fig. 7. Fig. 7 demonstrates that the histogram of the encrypted image bears a close resemblance to the Gaussian distribution function. According to these findings, the frequency distribution of the plaintext picture is hidden behind the encrypted histogram. For all test photos, similar Gaussian distribution functions are generated when PE is used.
The neighouring points (pixels) in a plaintext image have an intrinsic correlation. When it comes to extremely reliable image encryption, low correlation coefficients in both directions are generally necessary [26]. Table 8 indicates that the horizontal connection between encrypted images is high and smooth for both whole and partial images. This horizontal correlation is crucial in compression, as discussed in Section 4.2.
Using the MATLAB software R2021a, the suggested technique was evaluated with all image sizes of
This study presents a novel and efficient approach to image encryption that utilizes the unique characteristics of chaotic maps and orthogonal matrices. Because of the ability of the proposed technique to endure channel noise and JPEG compression, the proposed system is particularly well-suited for use with big data. Even with low SNR values, the suggested technique can retrieve perceptually identical plaintext. When photos are compressed, the quality changes with the encrypted image size. In contrast to standard techniques, from the ciphertext image, the original image may still be deciphered. Furthermore, the suggested approach is usable in a variety of contexts with varying security and processing time requirements. To minimize processing time, only a small fraction of DCT coefficients are encrypted in the frequency domain. However, security evaluations indicate that encrypting all pixels in the spatial domain leads to higher security. The proposed approach employs a symmetric key for both encryption and decryption, which means that the same secret key is used for both operations. The encoded image can only be decoded using the same secret key. In future, our aim is to proposed public key encryption along with compression. Further security may be achieved by using the concept of spatiotemporal chaos and multi-chaos approaches. Moreover, we aim to perform cipertext and plaintext attacks analysis in future.
Acknowledgement: The researchers would like to thank the Deanship of Scientific Research, Qassim University for funding the publication of this project.
Funding Statement: The authors received no specific funding for this study.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
References
1. C. M. Kumar, R. Vidhya and M. Brindha, “An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function,” Applied Intelligence, vol. 52, no. 3, pp. 2556–2585, 2022. [Google Scholar]
2. J. Ahmad and S. O. Hwang, “Chaos-based diffusion for highly autocorrelated data in encryption algorithms,” Nonlinear Dynamics, vol. 82, no. 4, pp. 1839–1850, 2015. [Google Scholar]
3. J. Ahmad and S. O. Hwang, “A secure image encryption scheme based on chaotic maps and affine transformation,” Multimedia Tools and Applications, vol. 75, no. 21, pp. 13951–13976, 2016. [Google Scholar]
4. A. P. Kari, A. H. Navin, A. M. Bidgoli and M. Mimia, “A new image encryption scheme based on hybrid chaotic maps,” Multimedia Tools and Applications, vol. 80, no. 2, pp. 2753–2772, 2021. [Google Scholar]
5. M. Z. Talhaoui and X. Wang, “A new fractional one dimensional chaotic map and its application in high-speed image encryption,” Information Sciences, vol. 550, pp. 13–26, 2021. [Google Scholar]
6. R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. [Google Scholar]
7. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259–1284, 1998. [Google Scholar]
8. Y. Mao, G. Chen and S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation and Chaos, vol. 14, no. 10, pp. 3613–3624, 2004. [Google Scholar]
9. S. Mazloom and A. M. Eftekhari-Moghadam, “Color image encryption based on coupled nonlinear chaotic map,” Chaos, Solitons & Fractals, vol. 42, no. 3, pp. 1745–1754, 2009. [Google Scholar]
10. Z. L. Zhu, W. Zhang, K. W. Wong and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. [Google Scholar]
11. Y. Q. Zhang and X. Y. Wang, “Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation,” Nonlinear Dynamics, vol. 77, no. 3, pp. 687–698, 2014. [Google Scholar]
12. S. M. Seyedzadeh and S. Mirzakuchaki, “A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map,” Signal Processing, vol. 92, no. 5, pp. 1202–1215, 2012. [Google Scholar]
13. Y. Q. Zhang and X. Y. Wang, “Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice,” Physica A: Statistical Mechanics and Its Applications, vol. 402, pp. 104–118, 2014. [Google Scholar]
14. Y. Q. Zhang, X. Y. Wang, J. Liu and Z. L. Chi, “An image encryption scheme based on the MLNCML system using DNA sequences,” Optics and Lasers in Engineering, vol. 82, pp. 95–103, 2016. [Google Scholar]
15. X. Y. Wang and Q. Yu, “A block encryption algorithm based on dynamic sequences of multiple chaotic systems,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 2, pp. 574–581, 2009. [Google Scholar]
16. X. Wang, L. Liu and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Optics and Lasers in Engineering, vol. 66, pp. 10–18, 2015. [Google Scholar]
17. R. M. May, “Simple mathematical models with very complicated dynamics,” in The Theory of Chaotic Attractors, New York, NY: Springer, pp. 85–93, 2004. [Google Scholar]
18. A. Belazi, S. Kharbech, M. N. Aslam, M. Talha, W. Xiang et al., “Improved sine-tangent chaotic map with application in medical images encryption,” Journal of Information Security and Applications, vol. 66, pp. 103131, 2022. [Google Scholar]
19. R. A. Elmanfaloty and E. Abou-Bakr, “An image encryption scheme using a 1D chaotic double section skew tent map,” Complexity, vol. 2020, pp. 1–18, 2020. [Google Scholar]
20. G. Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, pp. 347–354, 2010. [Google Scholar]
21. T. Huang, R. Zhao, L. Bi, D. Zhang and C. Lu, “Neural embedding singular value decomposition for collaborative filtering,” IEEE Transactions on Neural Networks and Learning Systems, vol. 33, pp. 6021–6029, 2021. [Google Scholar]
22. T. S. Shores, “Matrix algebra,” in Applied Linear Algebra and Matrix Analysis, NY, USA: Springer, pp. 55–144, 2007. [Google Scholar]
23. H. Liu and X. Wang, “Image encryption using DNA complementary rule and chaotic maps,” Applied Soft Computing, vol. 12, no. 5, pp. 1457–1466, 2012. [Google Scholar]
24. X. Wang and D. Luan, “A novel image encryption algorithm using chaos and reversible cellular automata,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 11, pp. 3075–3085, 2013. [Google Scholar]
25. X. Y. Wang, F. Chen and T. Wang, “A new compound mode of confusion and diffusion for block encryption of image based on chaos,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2479–2485, 2010. [Google Scholar]
26. M. B. Younas and J. Ahmad, “Comparative analysis of chaotic and non-chaotic image encryption schemes,” in Int. Conf. on Emerging Technologies (ICET), Islamabad, Pakistan, IEEE, pp. 81–86, 2014. [Google Scholar]
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.