A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm

  • PDF / 8,021,747 Bytes
  • 31 Pages / 439.642 x 666.49 pts Page_size
  • 95 Downloads / 195 Views

DOWNLOAD

REPORT


A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm Ali Shakiba1 Received: 15 September 2019 / Revised: 24 May 2020 / Accepted: 28 July 2020 / © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract In this paper, we designed a new hyperchaotic two-dimensional map with wide distribution and two large positive Lyapunov exponents. Then, we used it to construct a new randomized bit-level chaotic image encryption algorithm with the proposed hyperchaotic map as the source of randomization for permutation and diffusion. The input image is randomized by appending an extra random row and an additional random column to it. Then, the whole permutation and diffusion process are randomized by relating the parameters of the hyperchaotic mapping dependent on the hash value of the randomized image. In the permutation step, the randomized image is split into binary images, and then each binary image is randomly and independently permuted. Then, the permuted binary images are combined, and diffusion is applied to each pixel. Various security experiments are designed to assess the performance of the proposed encryption algorithm, including entropy analysis, histogram analysis, key-space analysis, the pixel-level and the bit-level correlation analysis, and differential attacks as well as key-sensitivity and randomization analysis. According to these experiments, the proposed algorithm shows an excellent security performance compared to several recent image encryption algorithms. Moreover, the proposed encryption algorithm is robust against data loss and noise attacks. Finally, the running time of the proposed algorithm is smaller compared to several recent algorithms. Keywords Chaotic image encryption · Bit-level encryption · Hyperchaos

1 Introduction The multimedia resources, specifically digital images, are almost everywhere and play a key role in today’s world. However, most of the time, they contain valuable, sensitive information that needs protection from unauthorized access in various applications such as the Internet of things (IoT) [53–55], secure communication of medical images [1], steganography [50], and forensics [49]. Therefore, there is a large body of literature around various  Ali Shakiba

[email protected]; [email protected] 1

Department of Computer Science, Vali-e-Asr University of Rafsanjan, Rafsanjan, 77188-97111, Iran

Multimedia Tools and Applications

solutions in protecting image confidentiality, e.g., chaos-based [3, 15, 20, 38, 43, 44, 59, 66– 68], DNA coding [62], cellular automata [51, 65], wavelets [61], and compressive sensing [4, 71]. Notably, chaotic mappings found wide usage in many cryptographic protocols ranging from key-establishment [21], data encryption [46, 47], and authentication [45]. Chaotic image encryption is one of the most active areas of research in this venue. Note that there are many differences between image and text data, e.g., bulk data capacity, a strong correlation between adjacent pixels, and high redundancy