Method of encrypting images based on two multidimensional chaotic systems using fuzzy logic

Mykola Kushnir, Hryhorii Kosovan, Petro Kroialo

Abstract


The subject of the study: it is proposed to develop a method of image encryption with pixel permutation implemented using fuzzy logic and Hainaut mapping, as well as diffusion, which is implemented using the Lorenz system. Study objectives: To propose an effective way to apply the rules of fuzzy logic in relation to the values generated by the Henon mapping to implement the permutation of pixels in the image, which will provide a random permutation and increase the efficiency of the encryption method. Also, to achieve better security in the process of image encryption, the use of the diffusion process implemented using the Lorenz system. In addition, to increase the sensitivity of the encryption method to change the initial value of the component colors of the pixels will also be used in the encryption process. Investigation methods and research results: developed and presented a method of image encryption with pixel permutation implemented using fuzzy logic and Henon mapping, as well as diffusion, implemented using the Lorenz system. The initial values for the Henon mapping and the Lorenz system will be determined from the entered keyword, and the control parameters are set by the operator, while the values of the component colors of the pixels will also participate in the encryption process. In addition, before the process of rearranging the pixels in the image, the rules of fuzzy logic are implemented by Henon mapping. Also, the values of the component pixels before and after the diffusion procedure will be reduced to a single interval. Thus, as a result of image encryption, the original image changes completely, loses its content and shape, and the color intensity distribution of pixels becomes uniform. The program implementation of the proposed encryption method was also carried out and the qualitative characteristics of the proposed image encryption method were evaluated, namely: analysis of histograms of original and encrypted images, correlation of adjacent image pixels, root mean square error (MSE), peak signal-to-noise ratio (PSNR), entropy before changing the color components of the pixels. Conclusions: the implementation of the method has shown that it has a large number of encryption keys, which makes brute force (the process of their selection) resource-intensive and complex, and the implementation of the encryption process in two stages and using two different chaotic systems significantly improves the security of the encrypted image. The resulting cryptosystem is also resistant to the following attacks: approximation of chaotic orbits, correlation, analytical and statistical attacks.

Keywords


cryptography; encryption; decryption; fuzzy logic; permutation; diffusion; image; chaos; security

Full Text:

PDF

References


Boiko, J., Pyatin, I., Karpova, L., Eromenko O. Study of the Influence of Changing Signal Propagation Conditions in the Communication Chan-nel on Bit Error Rate. Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, Springer, June 2021, vol. 69, pp. 79-103. DOI: 10.1007/978-3-030-71892-3_4.

Semenova, O., Semenov, A., Voznyak, O., Mostoviy, D., Dudatyev, I. The fuzzy-controller for WiMAX networks. 2015 International Siberian Conference on Control and Communications (SIBCON), 2015, pp. 1-4. DOI: 10.1109/SIBCON.2015.7147214.

Iavich, M., Kuchukhidze, T., Iashvili, G., Gnatyuk, S. Hybrid quantum random number generator for cryptographic algorithms. Radioelectronic and Computer Systems, 2021, no. 4 (100), pp. 103-118. DOI: 10.32620/reks.2021.4.09.

May, R. M. Simple mathematical model with very compli-cated dynamics. Nature, 1976, vol. 261, pp. 459–467. DOI: 10.1038/261459a0.

Boiko, J., Pyatin, I., Eromenko, O., Barabash O. Methodology for Assessing Synchronization Conditions in Telecommunication Devices. Advances in Science Technology and Engineering Systems Journal, 2020, vol. 5, iss. 2, pp. 320-327. DOI: 10.25046/aj050242.

Ali, T. S., Ali, R. A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 2020, vol. 79, iss. 27, pp. 19853–19873. DOI: 10.1007/s11042-020-08850-5.

Panduranga, H., Kumar, S. N., Kiran. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher. Eur. Phys. J. Spec. Top., 2014, vol. 223, iss. 8, pp. 1663–1677. DOI: 10.1140/epjst/e2014-02119-9.

Ben Farah, M. A., Guesmi, R., Kachouri, A., Samet M. A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, 2020, vol. 79, iss. 27, pp. 19129–19150. DOI:10.1007/s11042-020-08718-8.

Alvarez, G., Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos, 2006, vol. 16, iss. 8, pp. 2129–2151. DOI: 10.1142/S0218127406015970.

Li, M., Guo, Y., Huang, J., Li, Y. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Signal Process. Image Commun., 2018, vol. 62, pp. 164–172. DOI: 10.1016/j.image.2018.01.002.

Hoang, T. M., Thanh, H. X. Cryptanalysis and security improvement for a symmetric color image encryption algorithm. Optik, 2018, vol. 155, pp. 366–383. DOI: 10.1016/j.ijleo.2017.10.072.

Guo, S., Liu, Y., Gong, L., Yu, W., Gong, Y. Bit-level image cryptosystem combining 2D hyper-chaos with a modified non-adjacent spatiotemporal chaos. Multimedia Tools and Applications, 2018, vol. 77, iss. 16, pp. 21109–21130. DOI: 10.1007/s11042-017-5570-4.

Ye, G., Pan, C., Huang, X., Zhao, Z., He, J. A Chaotic Image Encryption Algorithm Based on Information Entropy. Int. J. Bifurc. Chaos, 2018, vol. 28, iss. 01, article id: 1850010, pp. 750-758. DOI: 10.1142/S0218127418500104.

Chen, J.-X., Zhu, Z.-L., Fu, C., Yu, H., Zhang, L.-B. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Communications in Nonlinear Science and Numerical Simulation, 2015, vol. 20, iss. 3, pp. 846–860. DOI: 10.1016/j.cnsns.2014.06.032.

Fridrich, J. Symmetric Ciphers Based on TwoDimensional Chaotic Maps. Int. J. Bifurcation Chaos. 1998, vol. 8, iss. 6, pp. 1259–1284. DOI: 10.1142/S021812749800098X.

Liu, W., Sun, K., Zhu, C. A fast image encryption algorithm based on chaotic map. Opt Lasers Eng., 2016, vol. 84, pp. 26–36. DOI: 10.1016/j.optlaseng.2016.03.019.

Hamza, R., Titouna, F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective, 2016, vol. 25, iss. 4-6, pp. 162–179. DOI: 10.1080/ 19393555.2016.1212954.

Ping, P., Xu, F., Mao, Y., Wang, Z. Designing permutation–substitution image encryption networks with Henon map. Neurocomputing, 2018, no. 283, pp. 53–63. DOI: 10.1016/j.neucom.2017.12.048.

Mishra, K., Saharan, R. A fast image encryption technique using Henon chaotic map. Progress in advanced computing and intelligent engineering. Advances in Intelligent Systems and Computing. Springer, Singapore, 2019, vol. 713, pp. 329–339. DOI: 10.1007/978-981-13-1708-8_30.

Wang, X., Liu, L. Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics, 2013, vol. 73, iss.1, pp. 795–800. DOI: 10.1007/s11071-013-0832-9.

Mudia, H. M., Chavan, P. V. Fuzzy Logic Based Image Encryption for Con-fidential Data Transfer Using (2, 2) Secret Sharing Scheme. Procedia Computer Science, 2016, vol. 78, pp. 632-639. DOI: 10.1016/j.procs.2016.02.110.

Pandurangi Ramacharya, B., Patil, M. R., Keralkar, S. Fast partial image encryption with fuzzy logic and chaotic mapping. Evol. Intel., 2022. 17 p. DOI: 10.1007/s12065-021-00693-9.

Zhang, G., Liu, Q. A novel image encryption method based on total shuffling scheme. J Opt Commun., 2011, vol. 284, iss. 3, pp. 2775–2780. DOI: 10.1016/j.optcom.2011.02.039.

Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S. M., Mosavi, M. R. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools and Applications, 2014, vol. 71, iss. 3, pp. 1469–1497. DOI: 10.1007/s11042-012-1292-9.

Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., Mosavi M. R. A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems, 2014, vol. 20, iss. 1, pp. 45–64. DOI: 10.1007/s00530-013-0314-4.

Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 2007, vol. 366, iss. 4-5, pp. 391–396. DOI: 10.1016/j.physleta.2007.01.081.

Rhouma, R., Belghith, S. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Chaos, Solitons & Fractals, 2009, vol. 41, iss. 4, pp. 1718–1722. DOI: 10.1016/j.chaos.2008.07.016.

Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G. On the security defects of an image encryption scheme. Image and Vision Computing, 2009, vol. 27, iss. 9, pp. 1371–1381. DOI: 10.1016/j.imavis.2008.12.008.

Ahmed, M. H., Shibeeb, A. K., Abbood, F. H. An efficient confusion-diffusion structure for image encryption using plain image related henon map. International Journal of Computing, 2020, vol. 19, iss. 3, pp. 464-473. DOI: 10.47839/ijc.19.3.1895.




DOI: https://doi.org/10.32620/reks.2022.4.09

Refbacks

  • There are currently no refbacks.