Image encryption with dynamic chaotic Look-Up Table

Reading time: 5 minute
...

📝 Abstract

In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image. The results of different experimental tests, such as Key space analysis, Information Entropy and Histogram analysis, show that the proposed encryption image scheme seems to be protected against various attacks. A comparison between the plain and encrypted image, in terms of correlation coefficient, proves that the plain image is very different from the encrypted one.

💡 Analysis

In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image. The results of different experimental tests, such as Key space analysis, Information Entropy and Histogram analysis, show that the proposed encryption image scheme seems to be protected against various attacks. A comparison between the plain and encrypted image, in terms of correlation coefficient, proves that the plain image is very different from the encrypted one.

📄 Content

Image Encryption with Dynamic Chaotic Look-Up Table

Med Karim ABDMOULEH, Ali KHALFALLAH and Med Salim BOUHLEL Research Unit: Sciences and Technologies of Image and Telecommunications Higher Institute of Biotechnology Sfax, Tunisia medkarim.abdmouleh@isggb.rnu.tn; khalfallah.ali@laposte.net; medsalim.bouhlel@enis.rnu.tn

Abstract—In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (LUT) to compute the new value of the current pixel to cipher. Applying this process on each pixel of the plain image, we generate the encrypted image.
The results of different experimental tests, such as Key space analysis, Information Entropy and Histogram analysis, show that the proposed encryption image scheme seems to be protected against various attacks. A comparison between the plain and encrypted image, in terms of correlation coefficient, proves that the plain image is very different from the encrypted one. Keywords- Chaos; Image encryption; Logistic-map; Look-Up Table. I. INTRODUCTION Nowadays, in the digital world, the security of transmitted digital images/videos becomes more and more vital, against the web attacks which become important [1]. So, cryptography is used to confirm security in open networks [2].
Cryptography is the science that uses mathematics to offer encryption algorithms to protect information. Many cryptographic methods have been proposed. These techniques are classified into three categories: • Symmetric cryptography: in this class the same key is used for encryption and decryption. Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are the best known examples of symmetric encryption [3] [4]. • Asymmetric cryptography: two different keys are used. The first realization of a public key algorithm called RSA [5] according to its inventors Rivest, Shamir and Adelman, is the most used algorithm in asymmetric encryption. • Hybrid cryptography: it is based on combination of the best features of symmetric cryptography and asymmetric [6]. Security has become a key issue in the world of electronic communication. An efficient cryptosystem should not be broken by hackers. In this research we have tried to propose a secure and simple method of image encryption based on chaotic function. This paper is organized as follows: section II describes the relation between chaos and cryptography and presents the Logistic Map function. The proposed method is introduced in section III. In section IV, we discuss the experimental results and test the efficiency of the algorithm. Finally, section V is devoted to the conclusion. II. CHAOTIC SYSTEM Since the 1990’s, Chaotic Systems (CS) have attracted researchers to use them in secure communication [7] [8]. Most CS proposed in literature are characterized by certain properties [9] that facilitate their use in the design of modern cryptographic systems. These properties are essentially the ergodicity, sensitivity to the initial values and to the controlling parameters. In modern cryptography, the CS have been used extensively in the development of cryptosystems. The CS are among the best known and most widely used in cryptography, they cite the Logistic Map (LM). The Logistic Map [10] is one of the most famous and simplest one-dimensional map. Therefore this function has been studied recently for cryptography applications. The LM is widely used in image encryption [11] [12]. The Logistic Map function is expressed by the following formula:

1 (1 ) n n n X X X µ

  • = −

       (1) 
    

Where x is a floating number, which takes values in the interval [0, 1], n = 0, 1, 2, … and µ is the control parameter
0 < µ ≤ 4. If parameter µ takes a value between 0 and 3, the Logistic Map, which is defined by equation (1), is seen to converge to a particular value after some iteration. As parameter µ is further increased, the curves bifurcations become faster and faster. µ should be greater than 3.5784257 (known as the “point of accumulation”) in order to have a chaotic system. Finally for µ=3.9 to 4, the chaos values are generated in the complete range of 0 to 1 [13]. III. PROPOSED METHOD In this section, we present our new image cryptosystem. The architecture of the proposed method is shown in “Fig. 1- 3”. In the first step, we generate a chaotic matrix using the Logistic Map function LM1 (x0XOR and µ0XOR). We mix this chaotic matrix with the plain image using the logical function XOR to obtain the initial encrypted image I1.

Figure 1. XOR Chaotic encryption For each pixel P1 from I1, we generate a chaotic LUT using the Logistic Map function (LM2) having as parameters µ0 and x0(Pc). Where Pc is the value of the previous encrypted pixel by our cryptosystem. The initial condition x0(Pc) depends

This content is AI-processed based on ArXiv data.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut