Analysis of Chaotic Image Encryption Using 1D Logistic Map, 2D

International Journal of scientific research and management (IJSRM)
||Volume||3||Issue||11||Pages|| 3754-3761||2015||
Website: www.ijsrm.in ISSN (e): 2321-3418
Analysis of Chaotic Image Encryption Using 1D Logistic Map, 2D
Arnold Cat Map and 3D Arnold Cat Map
Jenny Joseph1, Josy Elsa Varghese2
1
Pursuing M.Tech, Dept. of Computer Science and Engineering, Caarmel Engineering College, MG University, Kerala
[email protected]
2
Assistant professor, Dept. of Computer Science and Engineering,Caarmel Engineering College, MG University, Kerala
[email protected]
Abstract:
Analyzing the randomness, complexity and efficiency of chaotic image encryption using 1D Logistic map,
2D Arnold cat map or 3D Arnold cat map is proposed here. The keys for the encryption process are
generated from the biometric image of the sender. Initially the biometric fingerprint image of the sender is
captured using a scanner, which is preprocessed to the grey level image. By using an efficient technique
on the grey level image, the initial condition for the 1D Logistic map and the keys for the encryption are
generated. The keys are Feature Vector, transform orders and angles for Dual Parameter Fractional
Fourier Transform. The key generation process is followed by the encryption process, which includes
randomization using chaotic map, transformation using DPFrFT and decomposition using Hessenberg
Decomposition. The resulting image after the three processes undergoes inverse Dual Parameter
Fractional Fourier Transform to get the encrypted image. The decryption process is the reverse of
encryption process. The analyses is conducted using Histogram Analysis, Correlation Analysis,
Information Entropy, NPCR and UACI
Keywords: 1D Logistic map, 2D Arnold cat map, 3D Arnold cat map, DPFrFT.
complexity. They are considered to be more
complex and unpredictable. This random behaviour
INTRODUCTION
Due to the rapidly changing technologies in the of chaotic systems makes it more suitable to use in
digital world, the multimedia data such as image, communication to increase security and privacy of
video etc can be distributed all over the world within data.
no time. But unfortunately along with the Motivated by the chaotic properties, recently many
developing technologies, new and efficient ways for researchers have been proposed and analysed many
attacking is also emerging. So the protection of chaos-based multimedia encryption. For example,
multimedia
data
becomes
an
important H.Gao et al [1] proposed a new Nonlinear Chaotic
factor.Cryptography is a commonly used technique, Algorithm which uses power function and tangent
which protects the contents of the messages that is function for image encryption. The process encrypts
transmitted over insecure channels and gives the image using the chaotic sequence generated by
emphasis to the privacy of information. Nowadays NCA map. In [2], Chaudhary et al proposed a
many new and efficient ways of cryptographic chaotic image encryption based on Complex
techniques has been developed. But most of the RandomNumber Generators. These random numbers
algorithms faced disadvantages such as small key are generated by the iteration of 1D Logistic map.
space, low level of security etc. To meet these Here an extra parameter is added in the 1D Logistic
challenges, many chaos-based algorithms have been equation which increases security.
suggested. The chaotic cryptography is the The security of the encryption process can be
application of chaos theory in a system for increased more, by the incorporation of Biometrics.
performing different cryptographic tasks. The Biometrics can be used to uniquely identify a person
chaotic systems are nonlinear systems which cannot using his physical or behavioural characteristics. In
be broken up into small pieces and solved most of the biometric based cryptographic systems,
separately. They have to be dealt with their full the keys for the encryption are generated from the
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3754
DOI: 10.18535/ijsrm/v3i11.17
biometrics. One such example is the method
reported earlier by Hao et al [3] which integrates iris
biometric with cryptography. The system randomly
generates a biometric key which is encoded using
Reed Solomon code and Hadamard code to produce
pseudo iris code. It is then XORed with user’s iris
code. The locked data along with hash value of key
is then stored in a smart card. However, the
biometric data is not very secret. If someone can
capture the iris image of the target using a hidden
camera he can generate the key and reveal the data.
This paper analyzes the randomness, complexity and
efficiency of chaotic image encryption using 1D
Logistic map, 2D Arnold cat map or 3D Arnold cat
map. The biometric fingerprint image of the sender
is captured using a scanner, which is pre-processed
to the grey level image. The initial condition for
iterating 1D Logistic map, Feature Vector, transform
orders and angles for Dual Parameter Fractional
Fourier Transform (DPFrFT) are generated from the
grey level image. The encryption process
randomizes the original image using chaotic map to
get randomized image. The randomized image
undergoes transformation using DPFrFT and
decomposition using Hessenberg Decomposition to
get randomized encrypted image. Then randomized
encrypted image undergoes inverse DPFrFT to get
encrypted image. The decryption process is the
reverse of encryption.
RELATED WORKS
Cryptography is considered as a best method for data
protection against frauds. The two important
techniques in the Cryptography are Encryption and
Decryption. Encryption involves encrypting the data
with a secret key so that only an authorised person
with the key can decrypt it. Thus to make the
encryption more secure the key used should be
managed securely. To make the key management
more secure and to increase the security of the
system, there are a lot of previous works in which
Cryptography is combined with chaos and
Biometrics. A brief explanation of some of the
works is given below.
Zhenjun et al [4] proposed a secure image
encryption using Arnold Transform and Random
Strategies. Arnold transform is a widely used
technique for picture scrambling. In this paper, three
random strategies are used. First random division,
second random iterative numbers and third random
encryption order. The random division is performed
on the image using different squares controlled by a
key, to get series of square blocks. To get the
iterative number of the Arnold transform in a
particular block, produce pseudo random numbers
using a random number generator. For processing
the square blocks, they use a random order.
Experiments are conducted on images sized
512*512.The simulation shows the effectiveness of
the proposed scheme and the usefulness of random
division, random generator etc.
Pawan et al [5] proposed a chaotic image encryption
using 3D Logistic map, 3D Chebyshev map, 3D and
2D Arnold cat map. This technique uses 2D Arnold
cat map to scramble the image. Then using the 3D
Chebyshev map three keys are generated separately
for Red, Green and Blue component from the
scrambled image. These three keys are given as the
initial condition for the 3D Logistic map to produce
X, Y and Z components. X component is XORed
with Red component, Y component is XORed with
Green component and Z Component is XORed with
Blue component. Then all the components are
combined as a single image. The additional
scrambling and substitution is done using 3D Arnold
cat map. The simulation shows that the additional
scrambling and substitution using 3D Arnold cat
map increases security.
Gaurav et al [6] proposed a multimedia encryption
using Dual Parameter Fractional Fourier Transform,
Piecewise Nonlinear Chaotic map and the iris image
of the sender. The keys for the encryption process
are generated from the iris image of the sender. The
original image is scrambled with the help of the
chaotic sequence generated by the iteration of
Piecewise Nonlinear Chaotic map. The scrambled
mage is then transformed using DPFrFT.
Decompose the feature vector into orthogonal
matrices using Hessenberg Decomposition. Then the
image is encrypted using these orthogonal matrices
and inverse transfromation.Results shows that the
Piecewise Nonlinear Chaotic map and the DPFrFT
increase the efficiency of encryption.
In [7], Sunil et al proposed a cancellable key
generation from the fingerprint image. It includes
three stages extracting minutia points from
fingerprint, Secured Feature Matrix generation and
key generation from Secured Feature Matrix. The
fingerprint undergoes histogram equalization to
increase the local contrast of the image. Then Gabor
filter is applied on the resulting image so that the
filer has high response at ridges. Then the image
undergoes binarization so that the image is
converted to binary image. This increases contrast
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3755
DOI: 10.18535/ijsrm/v3i11.17
between ridges and valleys. Then minutia points are
extracted using Ridge Thinning method. The
Secured Feature matrix is generated using AES
encryption method. Then the key is generated by
decrypting Secured Feature matrix using AES
decryption. The approach is tested on five
fingerprint images and the 256-bit keys generated
are also shown in simulation.
.The parameter and x0 may
represent the key.
The 2D chaotic map used in this paper is 2D
Arnold’s cat map. The 2D Arnold’s cat map is given
by equation (5):
3. Preliminaries
Before going to the paper, we will give a brief
introduction about Dual Parameter Fractional
Fourier
Transform
(DPFrFT),
Hessenberg
Decomposition, 1D Logistic map, 2D Arnold Cat
map and 3D Arnold Cat map.
3.1DualParameter Fractional Fourier Transform
DPFrFT is a type of Fractional Fourier Transform
which transforms the image according to the
transform orders. It is more time efficient than
Fractional Fourier Transform. Any application that
needs more randomness can use DPFrFT. It is
defined mathematically by equation (1):
dimension of image. Here
(1)
where α is the transform order, θ is the angle,
is
the Rotational Matrix,
s the transpose of the
Rotational Matrix, x is the original function and
s
the transformed function.
The original function x can be regenerated using
inverse DPFrFT. It is defined by the following
equation (2):
transform. The third parameter inserted is z which is
given by z = (a*x + b* y + z) mod n.
(2)
3.2 Hessenberg Decomposition
Hessenberg decomposition is the decomposition of a
matrix B into an upper Hessenberg matrix H by a
sequence of similarity transformations. It is defined
by equation (3):
B=PHPT
(3)
T
where P is an orthogonal matrix, P is the transpose
of orthogonal matrix P and H is a square matrix in
which all the entries below the first diagonal is 0.
3.3 Chaotic Map
Chaos is a kind of characteristic of a nonlinear
system. A Nonlinear chaotic map is used to generate
complex random number sequence and can be used
to randomize the image. In this paper the basic
encryption technique is carried out using 1D, 2D and
3D chaotic maps.
The 1D chaotic map used in this paper is the simple
logistic map. The logistic map is defined in equation
(4) :
(4)
=
mod n
(5)
b is the position variable (0 < b < n) and a is the
momentum variable, where at = bt – bt-1and n is
pixels before transform and
represents location of
represents location
of pixels after transform.
The 3D chaotic map that is used in this paper is 3D
Arnold’s cat map. The 3D Arnold’s cat map is
defined as equation (6):
=
Here
mod n
(6)
represents location of pixels before
transform and
represents location of pixels after
4. Proposed System
The proposed system analyses the randomness,
complexity and efficiency of image encryption using
different chaotic maps such as 1D Logistic map, 2D
Arnold Cat map and 3D Arnold Cat map. The block
diagram of the proposed system is depicted below in
Figure 1 and the methodology is described below:
Figure 1:Block Diagram of Proposed Encryption
System
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3756
DOI: 10.18535/ijsrm/v3i11.17
The methodology of the system is described as
follows
4.1 Key Generation from Biometrics
Let A be the biometric image having size
m1*n1.Initially, the image A is pre-processed to the
grey level image. The keys are generated from the
grey level image using the following key generation
process.
Randomly select two pixel values say px and py from
the biometric image A.
Take the difference between the two pixels px and py
and divide it with total number of grey levels in the
biometric image to get the threshold(T) as shown in
the following equation (7):
T=px-py/(2L-1)
(7)
Using the threshold T, the key for the 1D Logistic
map is calculated as per the equation (8):
K= (2L*T)mod1
(8)
Normalize the biometric image A using the equation
(9):
(9)
Generate the Feature Matrix FB from the normalized
image using the equation (10):
FB (i, j) =
1,if B(i,j) ≥T
0, if B (i, j) < T.
(10)
Arrange the two dimensional Feature Matrix FB into
the one dimensional Feature Vector Fv.
To get the transform orders and angles for DPFrFT,
partition Feature Vector into two equal segments Fv1
and Fv2 of order (m*n)/2.The transform orders and
angles can be calculated as per equations (11),(12),
(13) and (14):
αx=
(11)
αy=
(12)
θx=
θy=
(13)
(14)
4.2 Image Encryption
The encryption includes Randomization using
chaotic map Transformation using DPFrFT and
decomposition using Hessenberg Decomposition.
The process is described in the following steps:
Randomization using chaotic map.
If the chaotic map is Logistic map(equation 4), then
iterate it by using the key K generated from the Key
Generation process and store the chaotic sequence
generated to get the random matrix (Rk),which
randomizes the original image of size m1*n1 into
randomized image using the following equation
(15):
Ir(i,j)= ln Rk (i, j)/ ln I (i, j)
(15)
If the chaotic map is 2D Arnold Cat map (equation
5), the iteration will shuffle the pixels of the image
and will give the randomized image.
If the chaotic map is 3D Arnold Cat map (equation
6), the iteration will shuffle the pixels and the
intensity values of the image to give the shuffled and
substituted randomized image.
2) Transformation using DPFrFT
Apply transformation on the randomized image
using DPFrFT using equation (16):
=
(16)
3) Decomposition using Hessenberg Decomposition
Distribute Feature Vector Fv repeatedly into two
arrays A1 and A2 of size m1*m1 and n1*n1.
Apply Hessenberg Decomposition on two arrays A1
and A2 to get two orthogonal matrices Q1 and Q2
using the following equation (17):
A1=Q1HQ1TandA2=Q2HQ2T
(17)
4) Final encryption using randomization and inverse
transformation
Using Q1 and Q2,randomized encrypted image Ire is
generated as follows in equation (18):
Ire = Q1 Ir Q2T
(18)
Perform inverse
transformation using inverse
DPFrFT on Ire to get the encrypted image J as in
equation (19):
=
(19)
4.3 Image Decryption
The decryption process is as follows:
1) Transformation of encrypted image J, using
DPFrFT
The encrypted image undergo transformation using
DPFrFT as shown in the equation (20):
=
(20)
2) Decomposition of transformed image J
Using the two orthogonal matrices Q1 and Q2 which
is generated by Hessenberg Decomposition, the
partially decrypted image Jd is generated as in
equation (21):
Jd=Q1TJQ2
(21)
3) Inverse transformation of partially decrypted
image Jd
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3757
DOI: 10.18535/ijsrm/v3i11.17
The partially decrypted image Jd undergoes inverse
transformation using inverse DPFrFT to get
randomized decrypted image Jrd as in equation (22):
=
(22)
4) Undo Randomization of randomized decrypted
image Jrd
If the chaotic map is Logistic map (equation (4)),
then using
the random matrix(Rk) undo the
randomization and decrypt the image using the
following equation (23):
=
(23)
If the chaotic map is 2D Arnold Cat map or 3D
Arnold Cat map, multiplying the inverse of the map
with the image will give the decrypted image as in
equation (24):
(24)
Analysis, Information Entropy, Histogram Analysis,
NPCR and UACI.
5.1 Correlation Analysis
Correlation Coefficient is an inevitable factor to
evaluate the encryption process. The correlation
between two adjacent pixels in an image shows the
degree of relationship between them. It expresses a
measure of security. For a good encryption, the
adjacent pixels in the horizontal/vertical /diagonal
direction should be uncorrelated. It can be visually
tested by plotting the correlation distribution
between adjacent pixels in the encrypted image. It is
measured to ensure that the redundant information
available in the encrypted image is as low as
possible.
For calculating the correlation coefficient, the
following equation (25), (26), (27) an (28) are used:
(25)
(a)
(b)
(c)
(26)
(27)
(d)
(e)
(f)
(g)
(h)
(i)
Figure 2: Images of original image, encrypted image
and decrypted image.(a) original image (b)
encrypted image using 1D Logistic map (c)
decrypted image using 1D Logistic map (d) original
image (e) encrypted image using 2D Arnold Cat
map (f) decrypted image using 2D Arnold Cat map
(g) original image (h) encrypted image using 3D
Arnold Cat map (f) decrypted image using 3D
Arnold Cat map
(28)
where x and y are grey values of two adjacent pixels
in the encrypted image. If the correlation coefficient
is equal to zero or near to zero, then the adjacent
pixels are not correlated. If it is equal to -1, then the
encrypted image is a negative of original image.
For simulation purpose, here same image is
encrypted using 1D Logistic map, 2D Arnold Cat
map and 3D Arnold Cat map. Then the correlation
coefficients between horizontally adjacent pixels of
three encrypted images are calculated. Also the
correlation distribution of three encrypted images are
plotted in Figure 3 and the Correlation Coefficient of
different images are shown in Table 1
5. Experimental Results and Discussion
A good encryption should be highly complex and
resistant against all types of attacks. The analysis
performed here to check the efficiency, randomness
and complexity of encryption are, Correlation
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3758
DOI: 10.18535/ijsrm/v3i11.17
(a)
The Information Entropy is a commonly used
technique to measure the randomness. It expresses
the degree of uncertainties of the system. A good
encryption decreases the correlation between the
pixels of an encrypted image and thus it increases
the value of entropy of the image. The Information
Entropy is calculated using the equation (29):
(29)
For conducting experiment, the same image is
encrypted using 1D Logistic map, 2DArnold Cat
map and 3D Arnold Cat map. Then the entropy for
the three images is calculated.
(b)
(c)
Figure 3: Correlation Distribution of encrypted
images using (a) 1D Logistic map (b) 2D Arnold Cat
map and (c) 3D Arnold Cat map
Figure 3(a) shows the Correlation Distribution of
encrypted mage using 1D Logistic map. From the
figure we can see that the adjacent pixels of the
encrypted mage are highly correlated. Figure 3(b)
shows the Correlation Distribution of encrypted
mage using 2D Arnold Cat map. The figure shows
that the horizontally adjacent pixels are uncorrelated
than 1D map. Figure 3(c) shows the Correlation
Distribution of encrypted mage using 3D Arnold Cat
map. It is obvious that the horizontally adjacent
pixels are uncorrelated than 1D and 2D map.
Table 1: Correlation Coefficient of two encrypted
images and the corresponding chaotic map
Image
Rose
Rose
Rose
Cat
Cat
Cat
Chaotic Map
1D Logistic map
2D Arnold Cat
map Cat
3D Arnold
map map
1D Logistic
2D Arnold Cat
map Cat
3D Arnold
map
5.2 Information Entropy
Correlation
Coefficient
0.9958
0.8228
0.2354
0.9487
0.6776
0.2519
Figure 4: Information Entropy of encrypted images
using 1D Logistic map, 2D Arnold Cat map and 3D
Arnold Cat map
Figure 4 shows the Information Entropy of three
encrypted images. Red line shows the entropy of
three images using 1D Logistic map Blue line shows
the entropy of three images using 2D Arnold Cat
map and Green line shows the entropy of three
images using 3D Arnold Cat map. If entropy is high,
then randomness of encrypted image is also high.
From the figure, we can see that entropy using 1D
Logistic map is lesser than 2D Arnold Cat map
which is lesser than 3D Arnold Cat map.
5.3 Histogram Analysis
Histogram is a commonly used analysis technique in
Image Processing. An image histogram shows the
distribution of pixels in an image by plotting the
number of pixels at each color intensity level. It
shows the efficiency of the encryption process. For
an efficient encryption, the histogram of the
encrypted image will be nearly uniform.
For analyzing the histogram of image encrypted
using 1D,2D or 3D chaotic map, the same image is
encrypted using 1D Logistic map,2D Arnold Cat
map and 3D Arnold Cat map. The Figures 5(a), 5(b)
and 5(c) shows the histogram of three encrypted
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3759
DOI: 10.18535/ijsrm/v3i11.17
images which is encrypted using 1D Logistic map,
2D Arnold Cat map and 3D Arnold Cat map
(a)
measures the percentage average differences of
intensities between two ciphered images.
For calculating NPCR and UACI, the same image is
encrypted using 1D Logistic map, 2D Arnold Cat
map and 3D Arnold Cat map. Then some random
numbers of pixels are selected from the original
image and make some slight change. Then the
changed image is encrypted using 1D Logistic map,
2D Arnold Cat map and 3D Arnold Cat map. Then
by using the two encrypted images of one chaotic
map, it can be calculated using equations (30), (31)
and (32):
(30)
(31)
where D is a matrix of same size as the original
image(m1*n1) and P and C is the encrypted images.
UACI (Unified Average Changing Intensity):
(b)
(c)
Figure 5: Histogram Analysis of encrypted mages
using (a) 1D Logistic map (b) 2D Arnold Cat map
and (c) 3D Arnold Cat map
(32)
Ideally, NPCR should be close to 100% and UACI
should be between 30 and 40%
.
Figure 6: UACI of encrypted images using 1D
Logistic map, 2D Arnold Cat map and 3D Arnold
Cat map
The Histogram Analysis shows that histogram of
encrypted image which is encrypted using 3D
Arnold Cat map is more uniform than others.
5.4 NPCR and UACI
NPCR and UACI is used to test the influence of
how a minor change in the plain image reflected in
the ciphered image.NPCR stands for Number of
Pixels Change Rate. It measures the difference of
pixel numbers between two ciphered images.UACI
stands for Unified Average Changing Intensity .It
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3760
DOI: 10.18535/ijsrm/v3i11.17
Figure 7: NPCR of encrypted images using 1D
Logistic map, 2D Arnold Cat map and 3D Arnold
Cat map
6. Conclusion
The randomness, complexity and efficiency of
multimedia encryption using 1D Logistic map, 2D
Arnold Cat map and 3D Arnold Cat map is analyzed
here. The application of DPFrFT and Hessenberg
Decomposition add more randomness to the system.
Also the use of biometrics for the key generation
increases the security of the system. For simulation,
different analyses are conducted with different
images. From the analysis we can see that encryption
using 3D Arnold Cat map has more randomness,
complexity and efficiency than others. But it has
certain disadvantages such as it is periodic, so that
the original image will be regenerated after number
of iteratons.Also it requires image to have image
height equal to image width. So an image encryption
using image compression technique and more
chaoticity which overcomes the weakness of Arnold
transform can be considered as a future work.
References
1. H. Gao, Y. Zhang, S. Liang, and D. Li, “A
new chaotic algorithm for image encryption”,
Chaos, Solitons and Fractals, vol. 29, no. 2,
pp. 393399, Jul. 2006
2. Kavita Chaudhary,Shiv Saxena, “A new
encryption method using Chaotic Logistic
3.
4.
5.
6.
7.
map”, International Journal of Advanced
Research in Computer Science and Software
Engineering 4(8), August - 2014, pp. 517521
F.Hao,R.Anderson,andJ.Daugman,“Combinin
g crypto with biometrics effectively”, IEEE
Trans.Comput., vol. 55, no. 9, pp. 10811088,
Sep. 2006
Zhenjiang Tang, Xianquan Zhang,” Secure
Image Encryption without Size Limitation
Using Arnold Transform and Random
Strategies” JOURNAL OF MULTIMEDIA,
VOL. 6, NO. 2, APRIL 2011
Pawan N. Khade and Prof. Manish
Narnaware, 3D Chaotic Functions for Image
Encryption, IJCSI International Journal of
Computer Science Issues, Vol. 9,Issue 3, No
1, May 2012
Gaurav Bhatnagar, Q. M. Jonathan Wu,”
Biometric Inspired Multimedia Encryption
Based on Dual parameter fractional fourier
transform”IEEE transactions on systems,
man, and cybernetics: systems, vol. 44, no. 9,
September 2014
S. V. K. Gaddam and M. Lal, “Efficient
cancellable biometric key generation scheme
for cryptography”, Int. J. Netw. Security, vol.
11, no. 2, pp. 5765, 2010
Jenny Joseph1, IJSRM volume 3 issue 11 Nov 2015 [www.ijsrm.in]
Page 3761