1. Introduction
The need for privacy and security has been felt intensely in the wake of so many multi-media and social platforms [
1] generating significant amounts of unstructured data. To protect sensitive information from being transmitted through communication networks and the data that are being stored in cloud storage services from unauthorized access and cyberattacks, cryptographers have explored various methods of ciphering data. One method is obfuscation, which blurs the visual identity in photos and videos in order [
2] to perturb or unsettle original data [
3] in order to protect personal information by encrypting the etymological origins of data [
4], thus making data unreadable by unauthorized users. Another option is data masking [
5], which involves obscuring parts of genomic data to make them unidentifiable during collection, which also makes it unidentifiable during transmission and storage. Tokenization [
6] is another approach, which replaces sensitive data with nonsensitive data tokens that retain all essential elements of the data without compromising the security, thus protecting data confidentiality. Homomorphic encryption is a more complex method that allows computations to be performed on encrypted data without the need for decryption [
7], which is primarily meant for noncryptographers. The process of encryption is commonly judged by how strong the proposed method is in terms of protection against different types of attacks [
8,
9]. It involves the use of an encryption mechanism using an encryption key, a communication channel for data transmission, a decryption system, and a key to decrypt the encrypted data. The strength of an encryption system is determined by the attributes of the key, such as its secrecy, difficulty to guess, and ability to withstand against an exhaustive search [
10]. Each of these methods has its own benefits and limitations, and the appropriate method depends on the specific requirements and circumstances of each application [
11,
12]. The security of an encryption scheme is closely linked to the characteristics of the key the scheme uses. For an unbreakable scheme, the key should be truly random, suitable for one use only, and should be of the same length as the message, also called a one-time pad (OTP). However, these properties also have drawbacks. For instance, transmitting a key that is too long over a secure channel may not be practical, and it may make more sense to send the message itself through it. Furthermore, if the same key is utilized twice, the adversary may use XOR or frequency analysis to obtain information about the messages, and create a straightforward running key cipher in disguise.
Despite the importance of the strength of the key, other critically essential factors should be taken into account, including a novel chaotic oscillator for the overall performance of a novel encryption system [
13] covering potential perspectives of the proposed PRNG. The results are produced in the form of the cipher versions of images. These include the computational complexity of the mathematics representation, the size of the generated key, and the unpredictable nature of the generated sequencing. In addition, the efficiency and practicality of an encryption algorithm should also be considered, as should the availability of the necessary computational resources and the ease of key management. In particular, under the exceptional circumstances of COVID-19 [
14], the tokens shuffling approach (TSA) was introduced for better reliability during the pandemic.
Cryptologists use chaotic functions due to their simple mathematical representation and randomness [
15] by applying the proposed algorithm to some original images to be reconstructed subsequently, achieving remarkable results in screening colonoscopy images through neural networks (NN) [
16]. Chaos-based image encryption techniques are highly efficient in the case of multimedia data [
17], using chaos game for encryption [
18], making them ideal in terms of ease of implementation for cybersecurity applications [
19].
1D chaotic maps are known for their limited number and range of control parameters, in addition to their tendency to converge under finite precision implementation. To address these issues, studies have proposed using 2D chaotic maps [
20] that offer a balance between hardware complexity [
21] and chaotic performance [
22]. Despite this, due to their simple mathematical representation and low cost in terms of hardware implementation, a series of studies have been conducted to test the response of 1D chaotic systems under finite precision implementation [
23,
24], introducing novel 1D chaotic functions to expand the number and range of control parameters used [
25,
26]. The systems proposed in these studies were proven to be robust and secure when used in cryptographic systems.
This paper further explores the trend of expanding the number and range of control parameters of 1D maps [
25] to achieve a wide range of dynamic behavior [
26] by introducing a new piecewise 1D map with chaotic behavior across a wide range of its control parameters.
Furthermore, the newly introduced map is employed as the pseudorandom number generator (PRNG) within a novel image encryption scheme to assess its resilience and suitability in encryption systems. The scheme successfully withstood all rigorous testing it was subjected to, demonstrating its robustness against well-known statistical and differential attacks.
The paper is organized as follows:
Section 2 provides a literature overview of the well-known 1D maps, and
Section 3 introduces the new 1D map and presents the results of verifying its chaotic behavior. In
Section 4, a new image encryption algorithm is suggested, which utilizes the map as a pseudorandom number generator (PRNG). The robustness of the proposed encryption scheme is demonstrated by applying known attacks in
Section 5 before concluding the paper in
Section 6. The effectiveness of the proposed algorithm was proven through rigorous testing, showing that it possesses robustness with remarkable confusion–diffusion properties.
3. Modified 1D Map
All the above-mentioned maps are simple mathematical functions that have been used in the fields of cryptography and other domains. However, they have certain limitations when it comes to generating pseudorandom sequences for use in the domain of cryptography. One of these limitations is the range of control parameters that results in limited chaotic behavior. For example, for a logistic map to be fully chaotic and to fill the complete space range , the control parameter must be .
To overcome this limitation, a new function is introduced that consists of a combination of the logistic map as given in Equation (
1), a piecewise noniterative linear tent map given by
of Equation (
3), and finally the iterative tent map as given in Equation (
2). The iterative 1D map is given by Equation (
4):
where
and
show the present and next states, respectively. The parameters
r and
are the control parameters for the logistic map and the tent map with approximate values of 4 and 2. The control parameter
c is a global parameter that modifies the slope of the function and is used to create different dynamic behaviors as shown in
Figure 2.
3.1. Sensitivity to Control Parameters and Initial Condition
The sensitivity of this system to small changes in the initial conditions or the control parameter
c is a key aspect to consider when studying its dynamics. Small changes in the initial conditions can lead to vastly different behaviors in the long term, resulting in a highly sensitive system. Similarly, small changes in the value of the control parameter
c can lead to significant changes in the system dynamics. This is clearly depicted in
Figure 3 where perturbations of
in any of the initial conditions or control parameters produced two completely different sequences.
This property is crucial for ensuring the security and robustness of encryption systems that rely on the chaotic nature of the resulting PRNGs. This will make it extremely difficult for an attacker to predict or reproduce the sequence without having knowledge of the initial conditions.
3.2. Bifurcation Diagram
The bifurcation diagram of the function of Equation (
4) is a powerful tool for understanding its dynamic behavior.
Figure 4 shows a visual representation of how the system changes in its response to changes in the control parameter
c. The function does not exhibit any of the usual dynamic behavior consisting of a sequence in the regions of stable fixed points, periodic orbits, and then chaos. Instead, when setting
and
while varying
c, the function shows full chaotic behavior over the range of
.
It is also worth noting that the function can also show chaotic behavior for a range of
r values and specific values of
c as can be seen in
Figure 4. This suggests that the system behavior is not solely determined by the control parameter c, but also by other parametric values of
r. However, in this manuscript, we chose to solely focus on studying the properties of the function for changes in the control parameter
c. This allows for a more in-depth analysis of the system’s behavior that relates to this specific parameter.
Figure 5 shows examples of the bifurcation diagram of (4) depending on r when (a) c = 0.1, (b) c = 1.8.
3.3. Lyapunov Exponent
The Lyapunov exponent (LE) is a mathematical tool used to measure the rate of separation of nearby trajectories in a dynamic system. It is an important concept in the study of chaos theory and provides a measure of the sensitivity of the system’s behavior to initial conditions.
The Lyapunov exponent is calculated by taking the average rate of change of the distance between two nearby trajectories over time. It is represented mathematically as given in Equation (
5):
where
denotes the LE, while
and
show the spacing between the two trajectories. The positive Lyapunov exponent implies that the system is sensitive to initial conditions and that small variations in initial conditions will grow exponentially over time, leading to vastly varying outcomes. To calculate the Lyapunov exponent numerically, one can use the method in [
30], which involves linearizing the system of equations at a given point and then iterating the linearized equations to calculate the exponential growth rate of the distance between nearby trajectories.
Figure 6 shows that the function of Equation (
4) has a
in the range of
. This indicates that the system is chaotic within this range of the control parameter
c, as the Lyapunov exponent measures the rate of separation of the nearby trajectories, and a positive exponent implies exponential divergence.
4. Proposed Encryption Algorithm
Image encryption is a critical component of the information security domain, particularly in the domain of digital communication. With the proliferation of images being exchanged over various networks, the need for robust and secure image encryption algorithms has become increasingly important. The goal of image encryption is to convert an image into a ciphertext, which is unreadable to anyone unless it is decrypted. The encrypted image should remain confidential, even if intercepted by a cybernetic attacker.
The image encryption process must be secure, providing a high level of protection against various attacks, including brute force attacks and statistical attacks. In addition, the encryption process must be efficient and capable of performing real-time applications. The importance of image encryption cannot be underemphasized, especially in the case of sensitive images, such as medical or military images, which require the highest level of protection.
In this paper, the image encryption method is described in detail, providing a technical and mathematical analysis of the encryption process. The focus is on developing an efficient and secure image encryption algorithm that satisfies the requirements expected for protection of such levels. The algorithm (shown in Algorithm 1) was tested and evaluated using various statistical tests, and the results are discussed in detail.
4.1. Encryption Steps
The proposed image encryption algorithm is based on a permutation–confusion process that utilizes the proposed chaotic function as its core pseudorandom number generator (PRNG) with different keys and .
The overall key K is composed of two subkeys, and , each of which has a length of 128 bits, with the least significant 64 bits representing the parameter and the most significant 64 bits representing the parameter c. The generation of these keys is performed through the following steps:
The 256-bit sequence, referred to as the hash, is generated using the SHA-256 algorithm, which is a cryptographic hash function that takes an input of any length and produces a fixed-size output of 256 bits. Key
uses the least, i.e., 128 bits, and
uses the most, i.e., 128 bits. The values of
and
c for each key are derived from the hash using Equation (
6) to Equation (
9). In these equations,
and
denote the
Least and
Most 64 bits of
, respectively. Similarly,
and
represent the
Least and
Most 64 bits of
, respectively. The presence of
in the denominator of all equations ensures that the resulting value falls within the range [0,1). By multiplying this value by 2 in Equations (7) and (9), the range is extended to [0,2).
These equations ensure that and c stay in the ranges and .
In the permutation stage, a simple and effective algorithm is used to break the correlation between adjacent pixels in the message image, which is an important step for securing the scheme against statistical attacks. This is achieved by using the dimension of the original image and the subkey to generate a sequence using the function . The permuted pixels are then sorted based on this generated sequence.
The permutation process starts by reading a grayscale message image (
) with size
. Each pixel in the image is converted to its binary form
. The image is then reshaped into a 1D array. The sequence is generated from a pseudorandom number generator (PRNG) using Equation (
4) with a length of
, where
and
. The subsequence of length
n is extracted from this generated sequence. This subsequence is sorted while keeping the sorted element original index. The pixels in 1D
are also sorted based on this generated sequence.
In the confusion stage, the goal is to increase the resistance against differential attacks by ensuring that any small change in the original image leads to nonuniform spreading across the ciphered image.
To achieve this, a stream
is generated from the function
and used to replace the bit level value of each encrypted pixel using Equation (
10):
where
is the permuted pixels,
y is the generated subsequence, and
is the resulting image after the confusion step. This equation generates a confused image by performing an XOR operation on each pixel value with a value in the range of 0–255 derived from the “
” part of the equation.
Algorithm 1 Proposed Image Encryption Algorithm |
functionDeriveFromHash() return end function functionPermutePixels() for each in do end for return end function functionConfusePixels() for each in do end for return end function
|
4.2. Decryption Steps
The decryption process is the reverse of the encryption process. By using the same key and reversing the steps of encryption, decryption can be performed.