Multi-image Reorganization Encryption Based on S-L-F Cascade Chaos and Bit Scrambling

Xiaoming Song1, Daihan Xu2, Guodong Li1,* and Wenxia Xu1

1School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China

2School of computer science, Beijing University of Technology, Beijing, 100081, China

E-mail: lgdzhy@126.com

*Corresponding Author

Received 01 April 2021; Accepted 11 May 2021; Publication 24 June 2021

Abstract

Aiming at the problems of small value range of a single chaotic parameter, low sequence chaos, and transient effects, a composite chaotic system of cascaded Sine-Sine mapping, Logistic chaos and generalized third-order Fibonacci is proposed (S-L-F). The new system is highly sensitive to initial values, the maximum spectral entropy of the generated sequence can reach 0.95, and the value range of the parameter x is expanded to [0,4] compared with the traditional Logistic, indicating that the new system is suitable for generating pseudo-random sequences for image encryption. For the problem that the traditional multi-image encryption scheme can only encrypt images of the same type and size, the practicability is poor, and a multi-image encryption scheme based on image reorganization and biting is proposed. The algorithm recombines any number, different sizes and different types of images into a three-dimensional matrix, converts it into a binary matrix, performs bit-level scrambling and surface cyclic scrambling, and then restores the scrambling matrix to decimal, and the chaotic sequence performs exclusive-or diffusion, and completes simultaneous encryption at one time, which greatly improves the encryption efficiency and scope of application. The NPCR of the ciphertext image is 0.9961, and the UACI is 0.3345, which proves that the ciphertext image can effectively resist the difference attack. The information entropy is greater than 7.999, which can effectively resist attacks. It has certain application value in image information security. Experimental analysis shows that the algorithm has high security and strong practicability.

Keywords: S-L-F Cascade Chaos, bit-level scrambling, Multi-image Encryption, Logistic chaos, Sine-Sine mapping.

1 Introduction

Chaotic system is a dynamic system, which is sensitive to the values put into it and the system parameters, and the trajectory of the system is unpredictable. Using chaos, it can be generated as a random sequence. As long as the initial value and system parameters are given, a fixed random sequence can be obtained. This reproducible pseudo-random sequence has a range of applications in the fields of information security. In recent years, the research on the construction of cascading chaos [1–5] and bit scrambling algorithm [6–8] has gradually been favored by researchers. Tian Miaomiao and Liu Ye [9] designed an picture encryption algorithm using a 5D hyperchaotic system combined with a four-element loop operation. Zhao Hongxiang [10] and others designed an algorithm based on an improved Henon map. Zhu Shuqin et al. [11] designed a class of quadratic polynomial chaos, and based on this, designed a pseudo-random number generator. Guo Yuan [12] and others constructed a generalized Fibonacci chaotic system that can generate a uniform chaotic sequence to generate random templates, and designed an image encryption algorithm with the key adaptively changing with the plaintext. Wang [13], Farah [14], etc. constructed a compound chaotic system based on Logistic mapping [15], Tent mapping, and sine mapping, and designed encryption algorithms by combining DNA encoding technology and S-box technology, respectively. Xian et al. [16] designed an encryption algorithm based on Chen chaotic system combined with chaotic sub-block scrambling and chaotic digital selective diffusion. Cheng et al. [17] designed an encryption scheme based on a hyperchaotic systems, pixel replacement and bit replacement methods. Wu et al. [18] designed an image encryption scheme based on the Henon-Sine mapping. The parameter range of the mapping is very wide. Chai et al. [19] designed an image encryption scheme using hyperchaotic systems, cellular automata theory and DNA sequence manipulation. Li et al. [21, 22] designed encryption algorithms by generalized chaotic synchronization, and synchronizing two different chaotic systems makes the encryption effect better.

Section 2 introduces the construction and design of the S-L-F system. Section 3 introduces the detailed steps of the image encryption algorithm. Section 4 introduces the simulation results and algorithm security analysis. Section 5 is the conclusion.

2 Chaotic System Construction

Combining Sine-Sine mapping, Logistic chaos and generalized third-order Fibonacci, a cascaded chaotic system is constructed. The Sine-Sine chaotic map is

xn+1=mod(μsin(πxn)×214,1). (1)

Logistic chaotic system is expressed as:

yn+1=μyn(1-yn) (2)
y0=x0 (3)

Combining logistic and Sine-Sine with generalized third-order Fibonacci to construct a cascaded chaotic system is as follows:

Fn =mod(xn-1yn-1Fn-1+xn-2yn-2Fn-2+xn-3yn-3Fn-3,1) (4)
F1 =mod(x1y1×214,1)
F2 =mod(x2y2×214,1)
F3 =mod(x3y3×214,1) (5)

In the system, μ(0.318,1)(1,2)(2,3), x0(0,1). Figure 1 shows the sequence Fn distribution diagram obtained by the system after 5000 iterations.

images

Figure 1 The sequence Fn distribution diagram obtained by the system after 5000 iterations.

Figure 2 shows the spectral entropy of the sequence obtained when the parameter μ takes different values.

images

Figure 2 The relationship between parameter μ and the spectral entropy (SE) of the sequence.

It can be seen that the value range of μ is significantly larger than the traditional logistic, and the spectral entropy of the obtained sequence is also around 0.93, closing to the ideal value 1.

Figure 3 shows the sequence {Fn} generated after 1000 steps of initial value xn and xn+10-6 iteration. It can be seen that even the occurrence of initial values and small changes will greatly affect the generated sequence, indicating that the system has a strong initial value sensitivity.

images

Figure 3 The sequence {Fn} generated after 1000 steps of initial value xn (blue) and xn+10-6(red) iteration.

images

Figure 4 Flow chart of the designed scheme.

3 Proposed Scheme

Figure 4 shows the flow chart of the encryption algorithm.
Step 1 Image reorganization
Read M plaintext images, extract all the pixel values in sequence in the order of row first, then column, and put them into a pre-set m×n×N matrix A. The calculation of N is given by Equation (6), where p is the total number of pixels of M plaintext images. If there is a vacancy in the nth layer of A, we fill it with an integer of [0,255].

N=ceil(pm×n),i=1,2,,M (6)

Step 2 Construct the chaotic sequence
Extract the first row of each layer of A into a two-dimensional matrix A. Calculate the sum of all the elements of A and record it as SA. Pass A+SA into the SHA-256 algorithm to obtain a set of 256-bit hash values H. Revert every 8 bits of h as H set of binary numbers to a decimal vector H={h1,h2,,h32}, and construct the initial values x01,x02,x03,x04 as follows.

x01 =mod(h1h2h8256,1)
x02 =mod(h9h10h16256,1)
x03 =mod(h17h18h24256,1)
x04 =mod(h25h26h32256,1) (7)

Take the parameter μ and substitute the initial values x01, x02, x03, and x04 into S-L-F for 1000 iterations, and then iterate 8×N, m, n, m×n×N times to get four chaotic sequence T1, T2, T3, T4. The chaotic sequence is transformed into an applicable sequence by the following processing. Among them, sortindex() indicates that the sequence is arranged in ascending order, and the index of the corresponding point is taken.

F1 =ceil(mod(T1×210,2×(m+n)))
F2 =ceil(mod(T2×210,2×(8×N+n)))
F3 =ceil(mod(T3×210,2×(8×N+m)))
F4 =ceil(mod(T4×210,256))
F1 =sortindex(F1) (8)

Step 3 Bit scrambling
Arrange the conversion binary of each layer of matrix A from high to low into 8-layer bit planes, as shown in the Figure 5, construct bit matrix B. The layers of the matrix B are scrambled according to the sequence F1,

B(:,:,i)=B(:,:,F1(i)) (9)

and the scrambled matrix B is combined with the sequence F1,F2,F3 from top to bottom, from left to right, and from back to front, to perform surface cyclic scrambling. The specific scrambling method is shown in Figure 6.

images

Figure 5 Convert a decimal plane to 8-layer binary plane.

images

Figure 6 Select a layer from the left to perform surface cycle scrambling operation.

Step 4 Image diffusion
Restore the bit matrix scrambled in the previous step to a decimal matrix C, then reconstruct the sequence F4 into a m×n×N matrix F4, and finally perform a bitwise XOR operation on C and F4 to obtain the ciphertext matrix P=[P1,P2,,PN]. Extracting P=[P1,P2,,PN] layer by layer is the ciphertext image.

4 Experimental Results Analysis

Figure 7 shows the encryption result of the algorithm on the three pictures. The choice of parameter value is μ=2.51, m=n=512. Three pictures each has different size, one of them is a grayscale picture, and we also choose a picture with text information is selected to further enhance the universality of the algorithm proposed in this paper. Three images were tested on the Windows 10 operating system using Matlab R2018a and Intel Core i7-10750H CPU @ 2.60 GHz and 16.0 GB RAM. From Figure 7, it can be intuitively shown that the ciphertext image has no visual connection with the original image. In the following part, we will conduct a qualitative and quantitative analysis of the statistical properties of the ciphertext image to further prove the safety of the algorithm.

images

Figure 7 The encryption results of the proposed algorithm.

4.1 Histogram Analysis

Histogram can show the distribution of each color in a grayscale image. A good encryption scheme should be able to erase the statistical characteristics of the original image, so that the attacker cannot obtain the plaintext image through the statistical properties, thereby protecting the original image information. Figure 8 shows the corresponding histograms of the plaintext and ciphertext image. It can be seen that some statistical characteristics of the plaintext image, while the pixel distribution of the ciphertext image is very even, which conceals its own statistical characteristics, indicating that the algorithm of the article can effectively resist statistical attacks.

images

Figure 8 The corresponding histograms of the plaintext image and the ciphertext image.

We randomly selected 2500 points in the original image and the first ciphertext image, respectively, and calculated the correlation diagrams of their horizontal, vertical, and diagonal adjacent points as shown in the Figure 9. It can be seen from the figure that the neighboring points of the original image have obvious relevant statistical characteristics, and the neighboring points of the ciphertext image do not have obvious statistical characteristics.

images

Figure 9 Correlation for the grey value image and its ciphertext image encrypted through the proposed scheme.

4.2 Differential Attack Analysis

The values of NPCR and UACI can reflect the number of changes in pixels of the ciphertext image before and after minor changes are made to the plaintext image and the magnitude of the change in pixel value. The calculation formula is:

NPCR=i-1Mj=1ND(i,j)M×N×100% (10)
{D(i,j)=1,ifC(i,j)=C(i,j)D(i,j)=0,ifC(i,j)C(i,j) (11)
UACI=1M×N(i,jC(i,j)-C(i,j)255)×100% (12)

Among them, M and N represent the rows and columns number of the plaintext image, C(i,j) and C(i,j) indicate the pixel value at the corresponding position of the ciphertext.

This article randomly selects a pixel of one image from multiple images, and adds 1 to the pixel value of this pixel. Table 1 present the NPCR and UACI value of our algorism. The NPCR value calculated from the ciphertext image and the original ciphertext image is 0.9961, and the UACI value is 0.3345, indicating that the values of almost all pixels have changed, and the changes are large. This shows that our algorithm can counter the differential attacks well.

Table 1 NPCR and UACI analysis

Proposed Ref. [23]
NPCR 0.9961 0.9923
UACI 0.3345 0.3303

4.3 Entropy Analysis of Ciphertext

Information entropy can show the average amount of an information after excluding redundant information from a piece of information The calculation formula is:

H(s)=i=0255P(si)log21P(si) (13)

Among them, s is the value of a random variable; P(si) is the probability density function of the occurrence of si. If the probability of all values is equal, then P(si)=128,i{0,1,2,,255}, means the entropy is 8. Therefore, in the image encryption algorithm, the closer the ciphertext image’s entropy is to 8, it means that the encryption makes the image information more uncertain, which means that the scheme can resist attacks based on information entropy.

Table 2 present the entropy of the ciphertext image encrypted by our scheme. The information entropy of our ciphertext image is 7.9993, and compare with other paper than our information entropy obtained is closer to 8. Therefore, the algorithm in this paper can better resist statistical attacks.

Table 2 Entropy analysis

Proposed Ref. [22] Ref. [24]
Entropy 7.9993 7.9417 7.9467

5 Conclusion

This paper proposes a composite chaotic system of cascaded Sine-Sine mapping, Logistic chaos and generalized third-order Fibonacci. It also proposes a multi-image encryption algorithm based on bit scrambling, which can complete multiple-image encryption at one time, which greatly improves the encryption efficiency and scope of application. After encryption, the NPCR value is 0.9961 and the UACI value is 0.3345, which proves that the ciphertext image can effectively resist the difference attack. The information entropy is greater than 7.9993, indicating that the ciphertext image well conceals the image characteristics of the plaintext. Experimental analysis shows that the proposed multi-image encryption algorithm has better encryption effect, strong key sensitivity, excellent security performance indicators, higher encryption efficiency, and can be used in image encryption.

Acknowledgements

The work presented is supported by the financial supports given by research outlay item–Guangxi Key Laboratory of cryptography and information security, and the Guangxi Natural Science Foundation 2018gxnsfaa138177.

References

[1] MENG J. Image encryption with cross colour field algorithm and improved cascade chaos systems. IET Image Processing, 2020, 14: 973–981.

[2] Yuan F, Li YX, Wang GY, A universal method of chaos cascade and its applications, Chaos: An Interdisciplinary Journal of Nonlinear Science 31, 021102 (2021).

[3] Zhao L, Bao LY, Ding HW. S-T linear coupled cascade chaos spread spectrum code and its performance analysis. Telecommunication Engineering, 2021, 61(2):218–223. (in Chinese)

[4] Jin Y, Yuan F, Li YX. Audio encryption method based on cascaded chaotic map. China Sciencepaper, 2020, 15(11):1247–1252+1276. (in Chinese)

[5] Zhao F, Li C, Liu C, et al. Image Encryption Algorithm Based on Sine-Logistic Cascade Chaos, 2019 5th International Conference on Control, Automation and Robotics (ICCAR), 2019, pp. 224–228.

[6] Zhu HG, Dai LW, Liu YT, Wu, LJ, et al. A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Mathematics and Computers in Simulation, 2021, 185: 754–770.

[7] Li CL, Zhou Y, Li HM, et al. Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl (2021).

[8] Jing S, Guo Y, Chen W. Meaningful ciphertext encryption algorithm based on bit scrambling, discrete wavelet transform and improved chaos. IET Image Process. 2021; 15:1053–1071.

[9] MM, Liu Y, Gong LH. Image encryption algorithm based on chaos and quaternary system. Modern Electronics Technique, 2020, 43(23):49–53+57. (in Chinese)

[10] Zhao HX, Xie SC, Zhang JZ, et al. Fast image encryption algorithm based on improved Henon map. Application Research of Computers, 2020, 37(12):3726–3730. (in Chinese).

[11] Zhu SQ, Wang WH, Li JQ. Designing a class of quadratic polynomial chaotic maps and their pseudo random number generator. Computer Engineering and Applications, 2018, 54(09):84–88. (in Chinese).

[12] Guo Y, Xu X, Jing SW, et al. Optical Image Encryption Based on Spiral Phase Transform and Generalized Fibonacci Chaos. Journal of Electronics & Information Technology, 2020, 42(04): 988–996. (in Chinese)

[13] Xing YW, Mao ZZ. A new image encryption algorithm based on ladder transformation and DNA coding. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-020-10318-5

[14] M. A. Ben Farah, A. Farah, T. Farah. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, 2020, 99(4): 3041–3064.

[15] May RM. Simple mathematical models with very complicated dynamics. Nature. 1976, 261 (5560):459–467.

[16] Xian YJ, Wang XY, Yan XP, et al. Image Encryption Based on Chaotic Sub-Block Scrambling and Chaotic Digit Selection Diffusion. Optics and Lasers in Engineering, 2020, 134:106202.

[17] Cheng GF, Wang CH, Chen H. A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int. J. Bifurc. Chaos, 2019; 20(9):1950115.

[18] Wu JH, Liao XF, Yang B. Image encryption using 2D hénon-sine map and dna approach. Signal Process, 2018; 153:11–23.

[19] Chai XL, Gan ZH, Yang K, et  al. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Communication 2017; 52:6–19.

[20] Li GD, Pu Y, Yang B, et al. Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption . Cluster Computing, 2018, 22: 7423–7434.

[21] Li GD, Yang B, Pu Y, et al. Synchronization of Generalized Using to Image Encryption. International Journal of Pattern Recognition & Artificial Intelligence, 2017, 31(6).

[22] Mao J, Wang HY, Chen Y. Image encryption algorithm based on dynamic key selection and multi-direction diffusion. Optical Technique, 2018, 44(03): 278–286. (in Chinese).

[23] Khan JS, Ahmad J. Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 2019, 30(2):943–961.

[24] Lin Q, Wang YJ, Wang Q. The image encryption scheme with optional dynamic state variables based on hyperchaotic system. Scientia Sinica (Technologica), 2016, 46(09): 910–918. (in Chinese)

Biographies

images

Xiaoming Song is a graduate student. Become a student of the School of Mathematics and Computing Science of Guilin University of Electronic Technology in the fall of 2020. His work centers on chaos theory, discussing information and image encryption solutions based on chaos theory.

images

Daihan Xu is an undergraduate student at the Beijing Institute of Technology. She is interested in artificial neutral network and deep learning. At present, she works on data analysis, information security and image encryption, under supervision of Prof. Guodong Li.

images

Guodong Li is a professor at the School of Mathematics and Computational Science, Guilin University of Electronic Technology. He was a professor in the Department of Applied Mathematics of Xinjiang University of Finance and Economics. His current research interests include information security, image processing, and data mining.

images

Wenxia Xu is an associate professor at the School of Mathematics and Computational Science, Guilin University of Electronic Technology. She was a professor in the Department of Applied Mathematics of Xinjiang University of Finance and Economics. Her current research interests include information security, image processing, and data mining.

Abstract

1 Introduction

2 Chaotic System Construction

images

images

images

images

3 Proposed Scheme

images

images

4 Experimental Results Analysis

images

4.1 Histogram Analysis

images

images

4.2 Differential Attack Analysis

4.3 Entropy Analysis of Ciphertext

5 Conclusion

Acknowledgements

References

Biographies