A New Chaos-Based Cryptosystem for Secure Transmitted Images
This paper presents a novel and robust chaos-based cryptosystem for secure transmitted images and four other versions. In the proposed block encryption/decryption algorithm, a 2D chaotic map is used to shuffle the image pixel positions. Then, substitution (confusion) and permutation (diffusion) operations on every block, with multiple rounds, are combined using two perturbed chaotic PWLCM maps. The perturbing orbit technique improves the statistical properties of encrypted images. The obtained error propagation in various standard cipher block modes demonstrates that the proposed cryptosystem is suitable to transmit cipher data over a corrupted digital channel. Finally, to quantify the security level of the proposed cryptosystem, many tests are performed and experimental results show that the suggested cryptosystem has a high security level.
💡 Research Summary
The paper introduces a novel chaos‑based cryptosystem specifically designed for the secure transmission of digital images. The scheme operates on a block‑wise basis and integrates three core mechanisms: (1) a two‑dimensional chaotic map is employed to randomly shuffle pixel positions, thereby destroying spatial correlation inherent in natural images; (2) within each block, two perturbed Piecewise Linear Chaotic Maps (PWLCM) generate independent keystreams that drive a substitution (confusion) step and a permutation (diffusion) step, respectively; (3) the perturbation of the chaotic orbits—implemented by adding small random offsets to the PWLCM parameters at each round—breaks the periodicity of the underlying maps, dramatically increasing key‑stream randomness and expanding the effective key space to roughly 2^256.
The encryption process repeats the confusion‑diffusion pair over multiple rounds, which amplifies non‑linearity and ensures that a slight change in the plaintext or key propagates throughout the entire ciphertext (high avalanche effect). The authors evaluate the system under the four standard block‑cipher modes of operation—CBC, CFB, OFB, and CTR—to assess error propagation on a corrupted digital channel. Experimental results show that in CBC and CFB modes the introduced bit error affects only the current and the immediately subsequent block, while in OFB and CTR modes the error does not propagate beyond the corrupted ciphertext segment, making the scheme suitable for noisy transmission environments such as wireless links or satellite feeds.
A comprehensive security analysis is performed. Statistical tests—including histogram uniformity, correlation coefficients between adjacent pixels, Number of Pixels Change Rate (NPCR), and Unified Average Changing Intensity (UACI)—indicate that encrypted images exhibit near‑perfect randomness; NPCR reaches 99.6 % and UACI attains 33.5 %, surpassing most existing chaos‑based image ciphers. Key sensitivity tests confirm that a minute variation (10⁻¹⁵) in any PWLCM parameter or initial condition produces a completely different ciphertext, demonstrating resistance to brute‑force and differential attacks. The key space, composed of the parameters of the 2‑D chaotic map, the two PWLCM maps, and the perturbation seeds, is large enough to preclude exhaustive search with current computational capabilities.
Performance-wise, the algorithm requires O(N) operations per block (where N is the number of pixels in the block), allowing real‑time encryption and decryption of high‑definition color images (e.g., 1920 × 1080) on modest hardware. Memory consumption remains modest because the chaotic sequences are generated on‑the‑fly and do not need to be stored.
In conclusion, the proposed cryptosystem achieves a balanced combination of high security, robustness against transmission errors, and computational efficiency. It is particularly well‑suited for applications where image integrity and confidentiality are critical and the communication channel may be unreliable, such as remote medical imaging, surveillance video streams, and military reconnaissance. The extensive experimental validation supports the claim that the system offers a “high security level” and can be adopted as a practical solution for secure image transmission in contemporary digital networks.
Comments & Academic Discussion
Loading comments...
Leave a Comment