You are currently viewing a new version of our website. To view the old version click .
Entropy
  • Article
  • Open Access

5 February 2020

A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion

,
and
1
Information Technology, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh 11671, Saudi Arabia
2
Electrical Department, College of Engineering, Alexandria Higher Institute of Engineering and Technology, Alexandria 21421, Egypt
3
Electrical Department, College of Engineering, Princess Nourah Bint Abdulrahman University, Riyadh 11671, Saudi Arabia
4
Electrical Department, College of Engineering, Horus University-Egypt, New Damietta 34518, Egypt
This article belongs to the Section Complexity

Abstract

Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz diffusion stage and DNA confusion stage. It involves two identical encryption and decryption algorithms, which simplifies the implementation of transmitting and receiving schemes of images securely as a bijective system. Both schemes utilize two distinctive non-consecutive chaotic diffusion stages and one DNA scrambling stage in between. The generation of the coded secret bit stream employs a hybrid chaotic system, which is employed to encrypt or decrypt the transmitted image and is utilized in the diffusion process to dissipate the redundancy in the original transmitted image statistics. The transmitted image is divided into eight scrambled matrices according to the position of the pixel in every splitting matrix. Each binary matrix is converted using a different conversion rule in the Watson–Crick rules. The DNA confusion stage is applied to increase the complexity of the correlation between the transmitted image and the utilized key. These stages allow the proposed image encryption scheme to be more robust against chosen/known plaintext attacks, differential attacks, cipher image attacks, and information entropy. The system was revealed to be more sensitive against minimal change in the generated secret key. The analysis proves that the system has superior statistical properties, bulkier key space, better plain text sensitivity, and improved key sensitivity compared with former schemes.

1. Introduction

Securing multimedia communications is a very important process in modern communication networks [1,2,3,4,5]. Recently, various researches have been dedicated their efforts to developing several schemes to fortify personal digital images. Digital images have many discriminative properties, for instance a wide spectrum and high correlation within the neighboring pixels. These properties make some conventional data encryption schemes not convenient for securing the processing of such information. Therefore, new schemes and approaches, such as deoxyribonucleic acid (DNA) [6,7,8] and chaotic maps [9,10] have been utilized in modern digital image safeguarding schemes. These approaches help to improve robustness against chosen/known plaintext attacks, enriched statistical properties, enhanced key space, amended plain text sensitivity, and upgraded key sensitivity than earlier schemes.
In [11], Qiang et al. introduced a scheme that depended on a DNA series matrix and chaos using dual logistic maps to execute a pair process to the DNA sequences. Following [12], Zhang et al. suggested a new proposal that encoded the plaintext into American Standard Code for Information Interchange (ASCII) code and then converted it into DNA sequential data which will be combined using Exclusive OR (XOR) operation and chaotic map. Subsequently, in [13], Wei et al. developed a new image encryption process reliant on DNA, chaotic images combination, and utilized hamming distance to generate a robust crypto-keys. Then in [14], Rasul et al. recommended an encryption system with the aid of chaos function accompanied by a modified genetic algorithm, and DNA structure is employed for more security. Liu et al. [15] proposed an algorithm depending on a DNA rule merged with chaotic map. In addition, they constructed a cipher procedure based on a one-time encryption key and the chaotic maps to improve the safety and the dynamic deprivation of the proposed procedure, where the primary conditions are created by the MD5 of mouse positions. Later in 2014, Yushu et al. [16] examined the role of image fusion, which depends on crypto-analysis for the encryption method and hiding the information using DNA classification combined with the chaotic map for covering the information [17]. In 2015, Zhang et al. proposed that an image cryptosystem depends on the lookup table concept. They built a different cipher for a digital image cryptosystem that depends on the Latin square and chaos theories [18]. Following in 2017, an efficient digital image encryption process utilizing adaptive rearrangement diffusion and an arbitrary DNA coding is presented [19]. Haider et al. in 2017 [20] proposed a different hybrid encryption algorithm that employs triangular scrambling where DNA mapping and the chaotic map was utilized to increase the security of the scheme. These articles have no robustness against noise, and their conclusions appeared to have a relatively small local and global entropy of the encoded image. On the other hand, the number of pixel change-rates (NPCRs) and the unified average changing intensity (UACI) of the resulted cipher image is far off from the proofed theoretical values, which means that these procedures are not receptive enough to small variations of the input image.
A perfect cryptosystem must satisfy some performance analysis such as large key space, sensitivity to slight change in the secret key, and nearly no correlation between two consecutive adjacent pixels [21]. In 2019, Chengqing Li et al. [22] solving scenario-oriented image security problems by introducing an algorithm with new technologies. In the same year, Zhongyun et al. proposed a cryptosystem that depends on the principles of the Josephus problem and the filtering tools. The algorithm utilizes a standard diffusion and confusion configuration [23]. In [24], a new color image scheme with energetic DNA and a 4D hyperchaotic system is proposed that satisfies the above requirements.
In this article, a new secured encryption algorithm is presented to encrypt an image utilizing an identical encryption and decryption schemes to improve the performance and the security analysis by employing a genome scrambling stage that depends on the DNA mutation process to be robust against several attacks. The plain image is divided into eight scrambled matrices according to the position of the pixel in every splitting matrix. Then, each binary matrix of the eight scrambled matrices is converted using a different conversion rule in the Watson–Crick rules. For example, we scrambled the first matrix with rule 1, the second matrix with rule 2, and so on. This mutation process increases the complexity of the relationship between the transmitted image and the utilized key and allows the proposed encryption algorithm to be more robust against chosen/known plaintext attacks.
The presented algorithm is given in an accurate mathematical language with no exceptional elements and tested against the list given in [25]. It is a bijective algorithm, and its key space is evaluated and tested. The two diffusion processes are presented in mathematical prepositions and the DNA diffusion stage is well defined with numerical examples. The procedure follows Kerckhoffs’ principles, as it does not comprehend any stealthy factors except for the key. It also follows Shannon’s two primitive proposes as it contains two non-consecutive diffusion stages employing the hybrid chaotic map and one confusion stage between them via DNA. From the numerical analysis, it passes many statistical and randomness tests such as histogram analysis, NPCR, UACI, and various correlation tests, and its scores are better than previously presented schemes in most of the tests. The proposed encryption and decryption are more robust against brute force, differential cipher images, and entropy attacks than previous schemes. It has a bigger key space and it is more sensitive to minimal change in the chosen secret key than former techniques.
The remainder of the article is structured as follows. Section 2 details the related background for the employed chaotic map and the DNA cryptography approach. Following is the explanation and discussion of the proposed encryption/decryption procedure in Section 3. Section 4 gives the numerical simulation results, while the security performance of the presented scheme is analyzed in Section 5. Finally, Section 6 presents the whole presented work and conclusions.

3. Proposed Image Cryptosystem

Let P represent the originally transmitted image, which is exemplified by a matrix with size W × H where W and H are the size of the columns and rows of the matrix P, respectively. Each element of the grayscale original image is signified by 8-bit i.e., 256 intensity levels. The presented encryption scheme is illustrated in Figure 2. Its private key is defined as S = { x 0 ,   y 0 ,   z 0 ,   w 0 ,   a 1 ,   a 2 } , where y 0 , x 0 ,   z 0 , and w 0 are the initial parameters of the 4D hyperchaotic system, whose value ranges are y 0 (   40 ,   40 ) ,   x 0 (   40 ,   40 ) ,   w 0 (   250 ,   250 ) ,   and   z 0 ( 1 ,   81 ) where a 1 and a 2 are 8-bit random numbers selected by the user. The step size of x 0 ,   y 0 ,   z 0 is 10 13 , while the step size of w 0 is 10−12. In the encryption process, there are dual pseudo-random matrices X and Y that are produced by repeating the hyperchaotic system to encrypt the original image. In the decryption algorithm, the pseudorandom matrices are produced by the indistinguishable methods utilized in the encryption algorithm; then, these matrices are rotated a half cycle to generate new different matrices designated by YNew and XNew.
Figure 2. The proposed securing system for images: (a) encryption process, (b) decryption process.
In the presented scheme, the encryption and decryption algorithm are the same, both counting the exact identical stages of the forward image diffusion stage, circling the resulting image by 180 degrees, scrambling the outcome with the DNA confusion stage, rotating the consequence by 180 degrees, utilizing the backward image diffusion, and rotating it by 180 degrees again. The algorithm comprises four main stages, as portrayed in the subsequent sections.

3.1. Secret Code Stream Generator

There are two pseudo-random matrices are generated using the hyperchaotic Lorenz system given by Equation (1), represented by X and Y, and both of the size W × H. Iterate this equation beginning with the four initial values defined in the private key S for a 1 + a 2 times in order to avoid the ephemeral values of the hyperchaotic Lorenz system, and then resume iterating for W × H to get four pseudo-noise streams, which are designated by {xi}, {yi}, {zi}, and {wi}, i = 1, 2, ···, W × H, separately. Generate the two matrices X, Y from the sequences {xi}, {yi} by
X ( k , l ) = F l o o r ( ( x ( k   1 )   × H + l + 500 mod 1 ) × 10 13 ) mod 256 ,
Y ( k , l ) = F l o o r ( ( y ( k   1 )   × H + l + 500 mod 1 ) × 10 13 ) mod 256 ,
where Floor(f) yields the largest principle integer number not as much of f, and “+500” is used to translate any negative numbers to positive numbers. These two matrices are used for forward and backward diffusion in the encryption process. However, for the decryption procedure demonstrated in Figure 2b, new matrices XNew and YNew are generated by spinning the novel matrices X and Y by 180 degrees, correspondingly. They are generated utilizing
X N e w ( i ,   j ) = X ( i ,   W + 1 j ) ,   f o r   i = 1 H ,   j = 1 W ,  
Y N e w ( i ,   j ) = Y ( i ,   W + 1 j ) ,   f o r   i = 1 H ,   j = 1 W .

3.2. Forward Diffusion Stage

In this stage, the algorithm obtains a new matrix denoted by Q by applying XOR (⊕) operation between the two matrices of the original image P elements and the pseudo-random matrix X elements according to the subsequent formulas
Q ( 1 , 1 ) = P ( 1 , 1 ) X ( 1 , 1 ) a 1
Q ( 1 , j ) = P ( 1 , j ) X ( 1 , j ) Q ( 1 , j 1 ) ,   f o r   j = 2 , 3 , , W
Q ( i ,   1 ) = P ( i ,   1 ) X ( i ,   1 ) Q ( i 1 ,   1 ) ,   f o r   i = 2 , 3 , , H
Q ( i ,   j ) = P ( i ,   j ) X ( i ,   j ) Q ( i 1 ,   j )     Q ( i ,   j 1 ) Q ( i 1 ,   j 1 ) ,     f o r   i = 2 , 3 , , H ,   a n d   j = 2 , 3 , , W
Then, we rotate matrix Q by 180 degrees to attain a matrix designated by A using
A ( i ,   j ) = Q ( i ,   W + 1 j ) ,   f o r   i = 1 , 2... H ,   a n d   j = 1 , 2... W
which is the input to the next DNA scrambling stage described in the following subsection.

3.3. DNA Mutation Scrambling Stage

To improve the fight of the encryption process against chosen/known plaintext attacks, we introduce a new scrambling stage that depends on the DNA mutation process. Utilizing this stage improves the complex relative between the plain image, the encrypted one, and the utilized key. A small difference in the original image or key will affect a major divergence in the encrypted image with assent. The steps to get the scrambled matrix are as follows.
  • Divide matrix A into two equally matrices by selecting the even columns together and create the first matrix AE; then, select the odd columns and create the second matrix AO. Both matrices have the size of H × W / 2 .
  • Generate two new matrices AOE and AOO from AO by selecting the even rows together and the odd rows together. Repeat for AE to generate AEE, AEO matrices. The four matrices have the size W / 2 × H / 2 .
  • Repeat Step 2 to generate eight new matrices AEEE, AEEO, AEOE, AEOO, AOEE, AOEO, AOOE each of size W / 2 × H / 4 . Figure 3 illustrates the output of every step applied to matrix A with a size of 10 × 10.
    Figure 3. The effect of applying the first three steps of the DNA mutation scrambling stage on a 10 × 10 matrix.
  • Convert each pixel into the eight matrices to 8-bit binary values, each of size 4 W × H / 4 . For example, the first three elements in matrix AOOO are ‘31’, ‘33’, and ‘35’, which will be converted to ‘00011111’, ‘00100001’, and ‘00100011’.
  • Encode every binary element in the eight matrices with the DNA encoding rules. Each binary matrix is encoded using a different conversion rule, as shown in Table 1. For instance, rule 1 is used to encode the first matrix, rule 2 is used for the second matrix, etc. The outputs of this stage are eight DNA encoded matrices with the size of 2 W × H / 4 . For illustration, ‘00011111’, ‘00100001’, and ‘00100011’ will be encoded with Rule 8 to ‘GACC’, ‘GTGA’, and ‘GTGC’, respectively.
  • Mutate the existing DNA pairs to their mutated values according to Table 2. For illustration, the ‘GACC’, ‘GTGA’, and ‘GTGC’ will be mutated to ‘CAGC’, ‘CTCA’, and ‘CTCC’, respectively.
    Table 2. DNA mutation rules.
  • Convert the mutated DNA values to their corresponding binary values according to Table 1. For example, ‘CAGC’, ‘CTCA’, and ‘CTCC’ will be mutated to ‘11010011’, ‘11101101’, and ‘11101111’, correspondingly.
  • Concert the binary values to their decimal values in the range from ‘0’ to ‘255’. For instance, the ‘11010011’, ‘11101101’, and ‘11101111’ will be converted to 211, 237, and 239, respectively.
  • Concatenate the eight matrices into one decimal matrix denoted by I of size W × H with the new confused values and rotated by 180 degrees to generate a matrix denoted by B fed to the next stage of backward diffusion.

3.4. Backward Diffusion Stage

In the backward image diffusion stage, the matrix B is converted into a matrix signified by E, with the XOR process and the pseudo-noise matrix Y by
E ( H , W ) = B ( H , W ) Y ( H , W ) a 1
E ( H , j ) = B ( H , j ) Y ( H , j ) B ( H , j + 1 ) ,   f o r   j = W 1 , , 1
E ( i , W ) = B ( i , W ) Y ( i , W ) B ( i + 1 , 1 ) ,   f o r   i = H 1 , , 1
E ( i , j ) = B ( i , j ) Y ( i , j ) B ( i + 1 , j ) B ( i , j + 1 ) B ( i + 1 , j + 1 ) ,   f o r   i = H 1 ,   , 1 ,   f o r   j = W 1   ,   , 1
Turn around the matrix E by 180 degrees to get a ciphered image matrix symbolized by C using
C ( i , j ) = E ( i , W + 1 j ) ,   f o r   i = 1 , 2... H , and   j = 1 , 2... W

4. Simulation Effects

The algorithm is carried out on the Lena, Cameraman, and Circuit images. ‘Mathematica 11’ software is used to apply the proposed symmetric encryption and decryption scheme. The utilized secret symmetric key is set to S = {3.3133, 12.0546, 40.8879, −34.5677, 35, 201}, which is employed in each encryption and decryption algorithm, and the used plain images with size 200 × 200 pixels are illustrated in Figure 4a. The corresponding cipher image is generated using the encryption algorithm, and it is shown in Figure 4b. Then, we decrypted the cipher image Figure 4b with the correct secret key S to get the perfectly reconstructed image, as shown in Figure 4c. The histograms of the plain images and the corresponding generated cipher images are shown in Figure 5a,b, respectively. It’s clear from Figure 4 and Figure 5 that the pattern of the cipher image is noise-like and is not related to the original plain image. The recovered image is a perfectly reconstructed version of the original plain image, while the histogram of the cipher image is almost flat, which ensures that no statistical information from the original image can be discovered consequently.
Figure 4. Simulation results. (a) plain images, (b) Generated cipher images of (a), (c) Recovered image from (b).
Figure 5. Histograms analysis. (a) Histograms of plain images, (b) Histograms of cipher images.

5. Performance and Security Analysis

5.1. Key Space

The key space is usually designed to be large enough to prevent an opponent from using a brute-force attack to find the key used to encrypt the plain images. In this article, the key space of the presented cryptosystem consisted of the initial conditions of the hyperchaotic Lorenz system x 0 , y 0 , z 0 , w 0 , a 1   and   a 2 . The value ranges were x 0 (   40 , 40 ) , y 0 ( 40 , 40 ) , and z 0 ( 1 , 80 ) each with a step size of 10 13 , while the value range of w 0 ( 250 , 250 ) had a step size of 10 12 . a 1 and a 2 are two 8-bit random numbers whose value ranges are [0,255] with a single step size. Therefore, the key space of the proposed algorithm is 1.6777 × 10 64 , and that space is large enough to resist brute-force attacks. It would take 2.03451 × 10 21 days to crack the systems if 17 billion attempts are tried hourly using a very high-performance machine.

5.2. Statistical Attacks Analysis

The encryption process should have the ability to struggle against statistical confrontation, and this can be assessed by histogram analysis and a chi-square test.

5.2.1. Image Histogram Analysis

The histograms of the original images of Lena, Cameraman, and Circuit shown in Figure 5a are non-uniform. The characteristic peak is clear and most of the images’ information can be obtained effortlessly. On the other hand, Figure 5b displays the histograms of the cipher images with a nearly uniform statistical distribution. These two aspects prove the statement of resisting the statistical attacks and the cipher images attack in our proposed encryption process. The correlation among nearby pixels signifies the randomness of the encrypted resulted gray levels. Now, we discuss the correlation in the horizontal, the vertical and the diagonal directions. Choose a random N duos of nearby pixels, and ( x i , y i ) are the concerned pixel values of the i-th pair (i = 1, 2, …, N). After that, the correlation coefficient r can be computed by
r = i = 1 N ( x i x ¯ ) ( y i y ¯ ) i = 1 N ( x i x ¯ ) 2 i = 1 N ( y i y ¯ ) 2
where r is the sample size, ( x i , y i ) are the distinct sample points with index I, x ¯ = 1 / N i = 1 N x i is the sample mean, and similarly for y ¯ . Now, let N = 2000, and the resulted different correlation coefficients of the cipher image and original image are recorded in Table 3. The correlation in the horizontal course for each image is shown in Figure 6. The correlation of plain images is high and close to 1. In contrast, the correlation of the cipher images is low and near to 0, which indicates that encrypted pixels are valued and distributed randomly in the encrypted images.
Table 3. Calculated correlation coefficients.
Figure 6. Correlation analysis plot. (a) Horizontal direction correlation for plain images Lena, Cameraman, and Circuit, (b) Horizontal correlation for their cipher images respectively.

5.2.2. Chi-Square Test

To proof the uniform distribution of the resulted ciphered images in a more precise manner, we perform the chi-square test to show that the cipher image is a uniform distribution. The chi-square test is described
χ 2 = i = 0 L 1 ( o i e i ) 2 e i
where L is the number of pixel grayscale levels, o i is the occurrence frequency of each gray level (0–255) in the histogram of the resulted encrypted images, and e i is the probable frequency of the uniform distribution. The uniform distribution of the histogram is assessed with the aid of the chi-square χ 2 test. The null hypothesis is only accepted when the p-value is greater than the significance amount s ( s [ 0 , 1 ] ) . Table 4 presents the chi-square score and their p-value for the histogram of the encrypted Lena, Cameraman, and Circuit images and the significance level amount of 0.05. The obtained score is smaller than χ t h 2 (255, 0.05) = 293.247, while their p-value is larger than 0.05. Therefore, the null hypothesis is achieved, and the histogram of the encrypted images is uniformly distributed. Based on that, the presented encryption algorithm is strong against statistical attacks.
Table 4. Histogram chi-square test.

5.3. Key Sensitivity Analysis

To test the key sensitivity of a secret key, we can create a different secret key S2 after the secret key S = { x 0 , y 0 , z 0 , w 0 , a 1 , a 2 } by changing { a 1 , a 2 } by 1 or any component of { x 0 , y 0 , z 0 } by 10 13 or w 0 by 10 12 . First, encrypt the plaint image P for the presented encryption system with the secret keys of S1 and S2 to get dual cipher images, symbolized by C1 and C2, correspondingly. Contrast C1 and C2 to get two gauges named Diff1 and Diff2 using [40]
D i f f 1 = ( 1 W × H ) i = 1 W j = 1 H | S i g n   ( C 1 ( i , j ) C 2 ( i , j ) ) | × 100 %
D i f f 2 = ( 1 W × H ) i = 1 W j = 1 H | C 1 ( i , j ) C 2 ( i , j ) | 256 × 100 %
where Sign(·) is the sign role, and (W, H) are the width and height of the original image, correspondingly. Correspondingly, the hypothetical values for D i f f 1 and D i f f 2 in the case of dual arbitrary images are 99.6094% and 33.3328%.
Another way to assess the secret key sensitivity and secure the plain image P1 utilizing the secret key S1 of the presented system to get the ciphered image C, and then decrypt the ciphered image C by the new secret key S2 to retrieve the plain image signified by P2. Compare P1 and P2 to get D i f f 3 and D i f f 4 respectively, using [40]
D i f f 3 = ( 1 W × H ) i = 1 W j = 1 H | S i g n   ( P 1 ( i , j ) P 2 ( i , j ) ) | × 100 %
D i f f 4 = ( 1 W × H ) i = 1 W j = 1 H | P 1 ( i , j ) P 2 ( i , j ) | 256 × 100 % .
Assume that the plain image denoted by P1 and another random image is denoted by P2; then, the hypothetical values of D i f f 3 and D i f f 4 are 99.6094% and 28.5059%, respectively [40]. To test the plaintext sensitivity, 100 trials are done for the Lena, Cameraman, and Circuit images and calculate the average values of D i f f 1 , D i f f 2 , D i f f 3 , and D i f f 4 . Table 5 shows that the calculated results of D i f f 1 , D i f f 2 , D i f f 3 , and D i f f 4 are nearly equal to their hypothetical values; these values indicators are designating that the presented scheme is very sensitive to minimal alteration in the generated secret key.
Table 5. Key sensitivity tests results (%).

5.4. Differential Attack

An opponent can get valuable information by altering several pixels of the plain image. The NPCR and UACI are usually employed to measure the resistance of the encrypted image against differential raids. We utilize the presented encryption scheme to encrypt P1 and P2 to get their corresponding cipher images denoted by C1 and C2 with the same secret key, where P2 (i, j) = [P1 (i, j) + 1] mod 256. Then, the NPCR and UACI are given by
NPCR = 1 W × H i = 1 W j = 1 H | S i g n ( C 1 ( i , j ) C 2 ( i , j ) ) | × 100 %
UACI = 1 W × H i = 1 W j = 1 H | S i g n ( C 1 ( i , j ) C 2 ( i , j ) ) | 256 × 100 %
The theoretical values of NPCR and UACI for any two random images with 256 gray levels are 99.609% and 33.464%, respectively. The NPCR and UACI test outcomes are presented in Table 6 and Table 7, respectively. If one bit of the input image is altered, the NPCR and UACI of traditional methods, in CCAES [41], CDCP [42], and CHC [43] are close to hypothetical values. DNA-based methods, C-DNA [44] and HC-DNA [45], have a better noise attack performance than the previous works. Furthermore, the values are compared against the critical values as in [46,47]. These demonstrate the capability of the proposed algorithm to stand for differential attacks. So, the presented cryptosystem attains high performance by getting NPCR values and UACI values near to their hypothetical values.
Table 6. Number of pixel change rat (NPCR) test analysis (%).
Table 7. Unified average changing intensity (UACI) test analysis (%).

5.5. Cipher Image Sensitivity Analysis

To measure the differential attacks based on ciphered image analysis, we obtain the cipher image C1 by encrypting the plain image P1 using the corresponding secret key S1 Then, generate a new cipher image C2 from C1 by shifting the randomly selected pixel of the C 1 ( i , j ) value by 1 where C 2 ( i , j ) = [ C 1 ( i , j ) + 1 ] mod 256 for a selected pixel position ( i , j ) in a random manner. To analyze cipher image sensitivity firstly, decrypt the ciphered image C2 utilizing the presented algorithm with the secret key S1 to get P2, which is the recovered image. Analyze the difference between the two recovered images P1 and P2 by using Equations (15) and (16) to calculate the values of D i f f 3 and D i f f 4 . Secondly, change any element of the secret key S1 to get new secret key S2, and decrypt C1 and C2 by the proposed scheme with the new secret key S2 to obtain their corresponding recovered images P3 and P4, correspondingly. Later, compute the indicators named D i f f 3 and D i f f 4 among P3 and P4. Finally, reiterate the overhead steps 100 times and compute the middling values. The calculated value of D i f f 3 equal to 99.6150 and D i f f 4 equals to 28.4170, which are near its hypothetical values. Therefore, the presented scheme is shown to be very vulnerable to the slight alteration of cipher images and can withstand the differential cipher images attacks.

5.6. Resisting Chosen/Known Plaintext Attacks

The chosen/known plaintext attack [48,49] can occur when an attacker chooses an arbitrary plaintext and its corresponding cipher text to distinguish the algorithm or the secret key, which allows it to decrypt any cipher text using this algorithm. Assume that dual plain images P1 and P2 are identical except for P1 (i, j) ≠ P2 (i, j) where P2 (i, j) = [P1 (i, j) + 1] mod 256. In the forward image diffusion stage, the plain images P1 and P2 are transformed to matrices denoted by Q1 and Q2 with the XOR logic process and the pseudo-noise matrix X. Consequently, rotate Q1 and Q2 by 180 degrees to get A1 and A2. Thus, the pixel located at (1, 1) swaps its position with the pixel located at (w1, h1) in A1, while the pixel located at location (1, 1) swaps its position with the pixel located at (w2, h2) in A2. After one time of DNA scrambling operation, on the pixel (1, 1), the value of I1 (1, 1) ≠ I2 (1, 1). In a similar way, the value of I1 (1, 2) ≠ I2 (1, 2). This means that as for images I1 and I2, we have I1 (i, j) ≠ I2 (i, j). Rotate I1 and I2 by 180 degrees to obtain B1 and B2, respectively; then, we get B1 (i, j) ≠ B2 (i, j) for i = 1, 2, · · ·, W, j = 1, 2, · · ·, H and B1 (W, 1) ≠ B2 (W, 1). According to Figure 2, by backward diffusion operation, E1 and E2 are generated from B1 and B2 respectively, so according to the proposed algorithm described, we can get E1 (i, j) ≠ E2 (i, j). Thus, C1 (i, j) ≠ C2 (i, j), i = 1, 2, · · ·, W, j = 1, 2, · · ·, H. These revealed that for identical plain images P1 and P2 with just one pair of pixels being dissimilar, their ciphered images C1 and C2 will be unique for each corresponding pixel location, even when they are cyphered with an identical secret key. Therefore, the presented encryption algorithm can withstand the chosen/known plaintext attacks.

5.7. Global Information Entropy

The global information entropy indicates the uncertainty of global image information, which is denoted by H ( m ) of matrix m, and evaluated as
H ( m ) = i = 0 255 p ( m i ) log 2 ( ( p ( m i ) )
where p ( m i ) represents the probability of m i . The theoretical value of the global information entropy intended for an 8-bit grayscale random image is nearer to 8. The global information entropy calculated results are presented in Table 8. We take the plain image Lena and the corresponding ciphered image as an example with a grayscale level L of 256. In the proposed system, the information entropy of the plain image is equal to 7.4430 and the entropy of the cipher image is equal to 7.9882, which demonstrates that the proposed cryptosystem can resist entropy attacks efficiently.
Table 8. Information entropy.

5.8. Local Shannon Entropy

Wu et al. [50] have expressed a new entropy gauge to regulate the real randomness by picking the non-overlapping blocks inside the encrypted image. The local Shannon entropy (LSE) is computed by calculating the mean of several global Shannon entropies on every one of the building blocks. Taking into account the randomness of the ciphered image, but the global entropy analysis in the previous section, the LSE can be defined by
H k , l ( m ) = i = 0 k H ( m i ) k
where m1, m2, …, mk are k selected image blocks, while l is the amount of pixels for each block. The local entropy values for the encrypted image are presented in Table 9. It can be shown that the local entropy value is nearer to the optimum hypothetical value (≈8). Therefore, the proposed algorithm has good randomness.
Table 9. Local Shannon entropy.

5.9. Complexity Analysis

To compute the complications of performing the presented algorithm, the image size as W × H is taken into consideration. Let n indicate the quantity of pixels inside the image. The complexity of the presented algorithm can be determined by the following discussed operations. These operations consist of binary data conversion, DNA scrambling operation, secret key generation, forward and backward image diffusion, and decimal data conversion. The complexity of binary data conversion is O(n2) and that of the DNA scrambling operation is equal to O(4n2). The secret key creation process consists of tri-sub-operations such as pseudo-random sequence production, binary transformation, and DNA scrambling with a complexity of O(6n2). In contrast, the complexity of forward and backward diffusion operations is O(62n2). The conversions from DNA to binary data and binary data to decimal data take O(5n2). Therefore, the overall complexity of the presented image encryption scheme is O(78n2).

5.10. Encryption and Decryption Speed

The computer used was constructed with Intel Duo Core I7 M460@2.53 GHz, 8 GB DDR3 RAM, Windows 10. For the encryption time TE and decryption time TD, the effect of a 1 + a 2 can be neglected due to its very small value contrasted to the effect of the original image size. So, we put the values of a 1 and a 2 to 128. We made the experiments on the pictures with the size of 200 × 200 pixels and recorded the encryption/decryption algorithm duration in Table 10.
Table 10. Encryption/Decryption time.
From Table 10, we can see that for 1000 pieces of images encrypting or decrypting, the execution times of different encryption schemes was listed. As can be seen, the encryption speed of our proposed algorithm is sufficiently fast to meet real-time performance necessities.

6. Conclusions

This article introduced a new bijective algorithm which is dedicated to secure image transmission over the data communication systems. Both encryption and decryption algorithms are identical and each have two diffusion processes and one DNA confusion process, which reduces hardware implementation complexity according to Shannon’s’ proposal. The diffusion process employs the hyperchaotic system and the confusion process uses the DNA, which both enhance the proposed algorithm security. When compared with former algorithms, the statistical tests proved that the proposed cryptosystem has a larger key space to resist brute-force attack, and the randomness tests showed that the encrypted pixels are distributed more randomly through the ciphered image. In addition, the proposed system was revealed to be more sensitive than former techniques against minimal change in secret key and better resistance against the known plaintext, the chosen plaintext, the differential cipher image attacks, and entropy attacks.
Finally, as future research, we advise an additional investigation of the simulation analysis of the chaotic performance by using an exponential chaotic model and other confusion techniques to generate a robust chaotic image encryption technique with the addition of fault-tolerance technology for the purpose of enhanced transmission of high-quality and secure data.

Author Contributions

Methodology, D.H.E., H.G.M. and K.H.M.; Software D.H.E., H.G.M. and K.H.M. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Fast-track Research Funding Program.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Psannis, K.E.; Plageras, A.P.; Ishibashi, Y.; Kim, B.-G. Algorithms for efficient digital media transmission over IoT and cloud networking. J. Multimed. Inf. Syst. 2018, 5, 1–10. [Google Scholar]
  2. Stergiou, C.; Psannis, K.E.; Kim, B.-G.; Gupta, B. Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 2018, 78, 964–975. [Google Scholar] [CrossRef]
  3. Memos, V.A.; Psannis, K.E.; Ishibashi, Y.; Kim, B.G.; Gupta, B.B. An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework. Future Gener. Comput. Syst. 2017. [Google Scholar] [CrossRef]
  4. Psannis, K.E.; Stergiou, C.; Gupta, B.B. Advanced Media-based Smart Big Data on Intelligent Cloud Systems. IEEE Trans. Sustain. Comput. 2018, 4, 77–87. [Google Scholar] [CrossRef]
  5. Stergiou, C.; Psannis, K.E. Recent advances delivered by Mobile Cloud Computing and Internet of Things for Big Data applications: A survey. Int. J. Netw. Manag. 2017, 27, 1–12. [Google Scholar] [CrossRef]
  6. Liu, L.; Zhang, Q.; Wei, X. A RGB image encryption algorithm based on DNA encoding and chaos map. Comput. Electr. Eng. 2012, 38, 1240–1248. [Google Scholar] [CrossRef]
  7. Gahlaut, A.; Bharti, A.; Dogra, Y.; Singh, P. DNA-based Cryptography. Asp. Mol. Comput. Lect. Notes Comput. Sci. 2003, 2950, 167–188. [Google Scholar]
  8. Adleman, L.M. Molecular computation of solutions to combinatorial problems. Science 1994, 266, 1021–1024. [Google Scholar] [CrossRef]
  9. Li, S.; Chen, G.; Zheng, X. Chaos-based encryption for digital images and videos. In Multimedia Security Handbook; CRC Press: Boca Raton, FL, USA, 2004; pp. 133–167. [Google Scholar]
  10. Mazloom, S.; Eftekhari-Moghadam, A.M. Color image encryption based on Coupled Nonlinear Chaotic Map. Chaos Solitons Fractals 2009, 42, 1745–1754. [Google Scholar] [CrossRef]
  11. Zhang, Q.; Guo, L.; Wei, X. Image encryption using DNA addition combining with chaotic maps. Math. Comput. Model. 2010, 52, 2028–2035. [Google Scholar] [CrossRef]
  12. Yunpeng, Z.; Yu, Z.; Zhong, W.; Sinnott, R.O. Index-Based Symmetric DNA Encryption Algorithm. In Proceedings of the 4th International Congress on Image and Signal Processing, CISP 2011, Shanghai, China, 15–17 October 2011; pp. 2290–2294. [Google Scholar]
  13. Zhang, Q.; Zhang, J.; Lian, S.; Guo, L.; Wei, X. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 2011, 85, 290–299. [Google Scholar]
  14. Enayatifar, R.; Abdullah, A.H.; Isnin, I.F. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 2014, 56, 83–93. [Google Scholar] [CrossRef]
  15. Liu, H.; Wang, X.; Kadir, A. Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. J. 2012, 12, 1457–1466. [Google Scholar] [CrossRef]
  16. Liu, H.; Wang, X. Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 2010, 59, 3320–3327. [Google Scholar] [CrossRef]
  17. Zhang, Q.; Guo, L.; Wei, X. Cryptanalyzing a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 2013, 124, 3596–3600. [Google Scholar] [CrossRef]
  18. Zhu, J.C.Z.; Fu, C.; Zhang, L.Z.Y. An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn. 2015, 81, 1151–1165. [Google Scholar]
  19. Chen, J.; Zhu, Z.; Zhang, L.; Zhang, Y.; Yang, B. Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption Exploiting self-adaptive permutation—Diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. J. 2018, 142, 340–353. [Google Scholar] [CrossRef]
  20. Al-Mashhadi, H.M.; Abduljaleel, I.Q. Color Image Encryption Using Chaotic Maps, Triangular Scrambling, with DNA Sequences. In Proceedings of the International Conference on Current Research in Computer Science and Information Technology, ICCIT 2017, Dhaka, Bangladesh, 22–24 December 2017; pp. 93–98. [Google Scholar]
  21. Liu, H.; Wang, X. Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 2011, 284, 3895–3903. [Google Scholar] [CrossRef]
  22. Hua, Z.; Xu, B.; Jin, F.; Huang, H. Image encryption using Josephus problem and filtering diffusion. IEEE Access 2019, 7, 8660–8674. [Google Scholar] [CrossRef]
  23. Li, C.; Zhang, Y.; Xie, E.Y. When an attacker meets a cipher-image in 2018: A Year in Review. Inf. Secur. Appl. 2019, 48. [Google Scholar] [CrossRef]
  24. Chai, X.; Fu, X.; Gan, Z.; Lu, Y.; Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process. 2019, 155, 44–62. [Google Scholar] [CrossRef]
  25. Özkaynak, F. Brief review on application of nonlinear dynamics in image. Nonlinear Dyn. 2018, 92, 305–313. [Google Scholar] [CrossRef]
  26. Matthews, R. On the derivation of a ‘chaotic’ encryption algorithm. Cryptologia 1989, 13, 29–42. [Google Scholar] [CrossRef]
  27. Zhu, C.; Chen, Z.; Ouyang, W. A New Image Encryption Algorithm Based on General Chen’s Chaotic System. J. Cent. South Univ. Technol. 2006, 37, 1142–1148. [Google Scholar]
  28. Khan, M.; Shah, T. A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dyn. 2014, 76, 377–382. [Google Scholar] [CrossRef]
  29. Fu, X.Q.; Liu, B.C.; Xie, Y.Y.; Li, W.; Liu, Y. Image encryption-then-transmission using DNA encryption algorithm and the double chaos. IEEE Photonics J. 2018, 10, 1–16. [Google Scholar] [CrossRef]
  30. Lorenz, E. Deterministic Nonperiodic Flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef]
  31. LÜ, J.; Chen, G. A New Chaotic Attractor Coined. Int. J. Bifurc. Chaos 2002, 12, 659–661. [Google Scholar] [CrossRef]
  32. Liu, C.; Liu, T.; Liu, L.; Liu, K. A new chaotic attractor. Chaos Solitons Fractals 2004, 22, 1031–1038. [Google Scholar] [CrossRef]
  33. Park, J.H. Intuitionistic fuzzy metric spaces. Chaos Solitons Fractals 2004, 22, 1039–1046. [Google Scholar] [CrossRef]
  34. Dai, H.; Jia, L.X.; Zhang, Y.B.; Shang, J. A new four-dimensional hyperchaotic L system and its adaptive control. Chin. Phys. B 2011, 20, 1–9. [Google Scholar]
  35. Wang, X.-Y.; Yang, L.; Liu, R.; Kadir, A. A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 2010, 62, 615–621. [Google Scholar] [CrossRef]
  36. Wang, X.; Wang, M. A hyperchaos generated from Lorenz system. Phys. A Stat. Mech. Appl. 2008, 387, 3751–3758. [Google Scholar] [CrossRef]
  37. Zhang, F.; Zhang, G. Dynamical Analysis of the Hyperchaos Lorenz System. Complexity 2016, 21, 440–445. [Google Scholar] [CrossRef]
  38. Zhang, Y. A chaotic system based image encryption scheme with identical encryption and decryption algorithm. Chin. J. Electron. 2017, 26, 1022–1031. [Google Scholar] [CrossRef]
  39. Srividhya, N.; Vino, T. Genome Based Highly Secured Image Using DNA Cryptography and Trellis Algorithm. In Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016, Chennai, India, 23–25 March 2016; pp. 1658–1662. [Google Scholar]
  40. Zhang, Y. Plaintext Related Image Encryption Scheme Using Chaotic Map. Telkomnika Indones. J. Electr. Eng. 2013, 12, 635–643. [Google Scholar] [CrossRef]
  41. Arab, A.; Rostami, M.J.; Ghavami, B. An image encryption method based on chaos system and AES algorithm. J. Supercomput. 2019, 75, 6663. [Google Scholar] [CrossRef]
  42. Zhu, C.; Hu, Y.; Sun, K. New Image Encryption Algorithm Based on Hyperchaotic System and Ciphertext Diffusion in Crisscross Pattern. J. Electron. Inf. Technol. 2013, 34, 1735–1743. [Google Scholar] [CrossRef]
  43. Zhu, C.; Sun, K. Cryptanalysis and improvement of a class of hyperchaos based image encryption algorithms. Acta Phys. Sin. 2012, 61, 1–12. [Google Scholar]
  44. Wang, X.; Liu, C. A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed. Tools Appl. 2017, 76, 6229–6245. [Google Scholar] [CrossRef]
  45. Zhan, K.; Wei, D.; Shi, J.; Yu, J. Cross-utilizing hyperchaotic and DNA sequences for image encryption. J. Electron. Imaging 2017, 26, 1–11. [Google Scholar] [CrossRef]
  46. Ravichandran, D.; Praveenkumar, P.; Rayappan, J.B.B.; Amirtharajan, R. Chaos based crossover and mutation for securing DICOM image. Comput. Biol. Med. 2016, 72, 170–184. [Google Scholar] [CrossRef] [PubMed]
  47. Ravichandran, D.; Praveenkumar, P.; Rayappan, J.B.B.; Amirtharajan, R. DNA Chaos Blend to Secure Medical Privacy. IEEE Trans. NanoBiosci. 2017, 16, 850–858. [Google Scholar] [CrossRef] [PubMed]
  48. Liu, Y.; Yu, L.; Wong, Y.Z.K.; Wang, J. Chosen-plaintext attack of an image encryption scheme based on modified permutation—Diffusion structure. Nonlinear Dyn. 2016, 84, 2241–2250. [Google Scholar] [CrossRef]
  49. Zhang, Y.; Xiao, D.; Wen, W.; Li, M. Cryptanalyzing a novel image cipher based on mixed transformed logistic maps. Multimed. Tools Appl. 2014, 73, 1885–1896. [Google Scholar] [CrossRef]
  50. Wu, Y.; Zhou, Y.; Saveriades, G.; Agaian, S.; Noonan, J.P.; Natarajan, P. Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 2013, 222, 323–342. [Google Scholar] [CrossRef]
  51. Zhu, H.; Zhao, C.; Zhang, X. A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem. Signal Process. Image Commun. 2013, 28, 670–680. [Google Scholar] [CrossRef]
  52. Zhu, Z.; Zhang, W.; Wong, K.W.; Yu, H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 2011, 181, 1171–1186. [Google Scholar] [CrossRef]
  53. Zhou, Y.; Bao, L.; Philip Chen, C.L. Image encryption using a new parametric switching chaotic system. Signal Process. 2013, 93, 3039–3052. [Google Scholar] [CrossRef]
  54. Zhu, H.; Zhao, C.; Zhang, X.; Yang, L. An image encryption scheme using generalized Arnold map and affine cipher. Optik 2014, 125, 6672–6677. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.