A Color Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System

In this paper, a new color image encryption algorithm based on a fractional-order hyperchaotic system is proposed. Firstly, four chaotic sequences are generated by a fractional-order hyperchaotic system. The parameters of such a system, together with the initial value, are regarded as the secret keys and the plain image is encrypted by performing the XOR and shuffling operations simultaneously. The proposed encryption scheme is described in detail with security analyses, including correlation analysis, histogram analysis, differential attacks, and key sensitivity analysis. Experimental results show that the proposed encryption scheme has big key space, and high sensitivity to keys properties, and resists statistical analysis and differential attacks, so it has high security and is suitable for color image encryption.


Introduction
With the rapid development of the Internet and multimedia technology, multimedia communication has become an important issue.According to the statistics of the US National Security Agency, image information accounts for over 70% of the total information, and it is the principal means of information exchange between people, therefore, the security and confidentiality of image information are becoming increasingly important, and image encryption has become a research hotspot in the field of information security.Each pixel of an original color image is composed of three basic colors-R, G, and B. Compared with gray images, color images provide more information and attract more attention.
Chaos arises from deterministic nonlinear systems.As is well known, chaotic systems possess several intrinsic characteristics, such as extreme sensitivity to initial conditions, broadband power spectrum, and random-like behaviors.Owing to the abovementioned characteristics, chaos has been applied to a variety of disciplines and the most promising application of chaos is in secure communication.In recent years, a number of scholars have proposed several image encryption methods based on chaotic systems [1][2][3][4][5][6].
However, as the authors in [7,8] pointed out, low-dimensional chaotic sequences have many problems, for example, the password cycle is short and low accuracy, and therefore, the security of the image encryption algorithm is difficult to guarantee.A hyperchaotic attractor can show richer dynamic phenomena, and the randomness is higher compared with the chaotic attractor.Therefore, encryption algorithms based on hyperchaotic systems have become a research focus in recent years [9][10][11][12][13][14][15] On the other hand, fractional chaotic systems have potential applications in chaotic secure communication.Compared with integer-order chaotic systems, fractional chaotic systems show higher nonlinearity and more degrees of freedom in the models due to the existence of fractional derivatives.Thus, a fractional chaotic system has a bigger key space and an encrypted system using a fractional-order chaotic attractor is more difficult to copy [6,16].
A neural network system is substantially a nonlinear dynamical system that possesses complex chaotic characteristics.Moreover, the fractional-order hyperchaotic neural network system has the advantages of complex structure, large secret key space, etc. [17].Motivated by the abovementioned reasons, a new color image encryption algorithm on the basis of a fractional-order hyperchaotic neural network system is proposed in this paper.In the traditional image encryption methods, the image cannot fully diffuse among the keys, however, the newly-proposed encryption algorithm can overcome this shortcoming.The algorithm can effectively resist statistical attacks, brute force attacks and possesses higher security.
This paper is organized as follows: in Section 2, the fractional-order hyperchaotic neural network system is introduced.A new color image encryption algorithm is developed in Section 3. The experimental results, analysis, and comparison are presented in Section 4. Finally, Section 5 concludes the paper.

Hyperchaotic System
The model of a fractional-order four-cell neural network system is described by [17]

Encryption Algorithm
In this paper, the plain image is the color image which is 256 256 3 × × , denoted by E .The color image is composed of three primary colors R, G, B, which are expressed by the three monochromatic images, denoted by R E , G E , B E , and (:,:,1) . The encryption process can be described by the following step-by-step procedure: Step 1: Produce four chaotic sequences where the function

( )
Round ⋅ is to rounded to the nearest integer.
Step    ( ) ( ) Step 6: Replace the three vectors HR , HG , HB with length MN into three M N × matrices HR′ , HG′ , HB′ , ( ) and combine the three two-dimensional images into a threedimensional image.Thus, M is the encrypted image.The decryption process is just the reverse of the encryption process, therefore, we do not describe it.

Experimental Analysis
In this section, we provide some experimental results to illustrate the performance of the proposed encryption algorithm.We select secret keys with the initial values 300  In order to show that the proposed image encryption algorithm is secure against the most common attacks, security analyses are performed, including the correlation between adjacent pixels, distribution histogram, differential attack analysis, and the sensitivity of the secret key.

Correlation of Adjacent Pixels
We choose vertical and horizontal directions of the plain image and its ciphered image, and randomly select 3000 pairs of adjacent pixels in the opposite angle direction to test the correlation between adjacent pixels before and after the encryption.The following formulas are adopted: ( ) E x is the estimation of mathematical expectations of x , ( ) D x is the estimation of variance of x , x and y are the values of two adjacent pixels in the image, N is the total number of pixels selected from the image.Each pixel in an ordinary image is highly correlated with its adjacent pixels either in horizontal or vertical.An ideal encryption design should produce cipher images with no such correlation to the adjacent pixels.We compute the correlation coefficients for horizontally and vertically adjacent pixels, respectively.Figure 3 shows the correlation of the plain image and the cipher image.It can be easily found that the correlation of the initial image is an obvious linear relationship, whereas the correlation of the cipher image shows a stochastic relationship.Table 2 shows the vertical and horizontal correlation of the plain image and the cipher image.The results show that the correlation coefficients of the plain image are all close to 1.However, the correlation coefficients of the cipher image is close to 0. This indicates that the proposed encryption algorithm possesses high security against statistical attacks.

Histogram of the Image
The comparison of the distribution histogram before and after the encryption is as follows.From Figure 4, we can see that the histograms of the encrypted image are fairly uniform and significantly different from the histograms of the original image and hence they do not provide any clues that could be employed for any statistical analysis attack on the encrypted image.

Differential Attack Analysis
In order to obtain the correlation of the plain image and the cipher image, an attacker often makes a small alteration in the plain image to observe the change in the resulting cipher image.This attack is called the differential attack.If an encryption algorithm can guarantee that the cipher image undergoes a substantial change if the plain image undergoes a small change, then such an encryption algorithm would be good against differential attacks.Number of Pixels Change Rate (NPCR) [22] and Unified Average Changing Intensity (UACI) [23] are two common quantitative measures, which are defined as: where M and N mean the width and height of the image, is defined as: if The test results of NPCR and UACI are shown in Table 3.They indicate that compared with some existing algorithms, the proposed algorithm could effectively resist plain text attacks and differential attacks.Table 3. NPCR and UACI for different encryption algorithms.

Key Sensitivity Analysis
A good cryptosystem should be sensitive to the secret keys.That is to say, if the attacker uses two slightly different keys to decrypt the same plain image, the two encrypted images should be completely independent of each other.We test the key sensitivity by using one of the keys, which is a little different from the original one.If we take 0 0.10000000001 x = to decipher and 0 0.10000000000 y = , 0 0.10000000000 z = − , 0 0.10000000000 w = remain the same., which is greater than that of the algorithm proposed in [6,26].For a computer with a computation speed of 1 quadrillion operations per second, the decryption time would be 54 46 10 3.17 10 s ≈ × years.Therefore, large-scale exhaustive searches are useless for this kind of encryption algorithm.This suggests that the proposed algorithm has higher security.

Conclusions
In this paper, a novel encryption algorithm based on a fractional-order hyperchaotic system which can effectively enhance the cryptosystem security is presented.The scheme is described in detail.Security analyses, including correlation analysis, histogram analysis, and key sensitivity analysis are carried out to verify the security of the proposed encryption scheme.The experimental results demonstrate that the encryption algorithm has high security.
diffusion transformation of the former pixel.
the proposed algorithm, we encrypt the Lena image, and the plain image and the corresponding cipher image are depicted in Figure 2a,b.

Figure 3 .
Figure 3. Horizontal and vertical correlation of the plain image and the cipher image.(a) horizontal correlation of the plain image (R); (b) horizontal correlation of the cipher image (R); (c) horizontal correlation of the plain image (G); (d) horizontal correlation of the cipher image (G); (e) horizontal correlation of the plain image (B); (f) horizontal correlation of the cipher image (B).

Figure 4 .
Figure 4. Histogram of the plain image and the encrypted image.(a)-(c) Histograms of the plain R, G and B images, respectively; (d)-(f) Histograms of the cipher R, G and B images, respectively.
the ciphered image that is changed some grey level of the pixels.Matrix

2 :
Expand R E , G E , B E to one-dimensional row vectors ER , EG , EB with length M N × .Let , the pixel value beginning from pos with length in ER is replaced by the corresponding value in EB .Similarly, the pixel value beginning from pos with length in EG is replaced by the corresponding value in ER ; the pixel value beginning from pos with length in EB is replaced by the corresponding value in EG .The replacement rules are shown in Table 1, where R, G, B represent the diagram layers of the color components of the plain image.

Table 1 .
The local scrambling replacement rules.

Table 2 .
Correlation coefficients of the plain image and cipher image.