روش جدید رمزگذاری تصویر با استفاده از بلوک بندی و نگاشت آشوب

نوع مقاله : مقاله پژوهشی

نویسندگان

دانشکده مهندسی برق و کامپیوتر - دانشگاه تبریز

چکیده

رمزگذاری یکی از قدرتمندترین ابزارهایی است که امنیت اطلاعات را در حوزه ارتباطات و فناوری اطلاعات تضمین می‌کند. رمزگذاری تصویر از سایر رمزگذاری‌ها متفاوت است. این تفاوت به دلیل ویژگی‌های ذاتی تصاویر است. آخرین تلاش‌ها در زمینه‌ی رمزگذاری تصاویر بر پایه‌ی آشوب بوده است. در این مقاله، یک الگوریتم جدید رمزگذاری مبتنی برآشوب برای رمزگذاری تصویر ارائه شده است. در روش پیشنهادی به ‌جای رمزگذاری یک تصویر در هر مرحله، چهار تصویر به‌صورت هم‌زمان رمزگذاری می‌شود. به ‌این‌ ترتیب که چهار تصویر استاندارد با همدیگر ترکیب شده و یک تصویر واحد از ترکیب آن‌ها به وجود می‌آید. رمزگذاری هم‌زمان چهار تصویر باعث پیچیده‌تر شدن الگوریتم رمزگذاری پیشنهادی، افزایش امنیت و همچنین گستردگی تغییر مقدار سطح خاکستری هر پیکسل خواهد شد. از نگاشت لجستیک آشوب برای تولید کلید و همچنین جابجایی بلوک‌های تصویر و تغییر مکان آن‌ها استفاده می‌شود. در نهایت تصویر حاصل با کلید رمزگذاری، XOR شده و تصویر رمزگذاری شده تولید می‌گردد. با توجه به ترکیب چهار تصویر و رمزگذاری هم‌زمان آن‌ها و بررسی تعداد زیادی از معیارهای ارزیابی تصویر ازجمله معیار آنتروپی اطلاعات که مقدار آن در الگوریتم پیشنهادی ما عدد9994/7 به دست آمده است و به مقدار ایده­آل 8 بسیار نزدیک‌ است، نشان می‌دهد که الگوریتم پیشنهادی ما از عملکرد خوبی برخوردار است.

کلیدواژه‌ها


عنوان مقاله [English]

A new method of image encryption using image blocking and chaos mapping

نویسندگان [English]

  • delavar zareai
  • Mohammad Ali Balafar
  • mohammad reza feizi derakhshi
Faculty of Electrical and Computer Engineering, University of Tabriz,
چکیده [English]

Encryption is one of the most powerful tools that ensures information security in the field of communication and information technology. Image encryption is different from other encryptions. This difference is due to the inherent characteristics of the images. Recent attempts to encrypt images have been based on chaos. In this paper, a new chaos-based encryption algorithm for image encryption is presented. In the proposed method, instead of encryption one image in each step, four images are encrypted simultaneously. In this way, four standard images are combined and a single image of their combination is created. Simultaneous encoding of four images will cause to complicate the proposed encryption algorithm, increase security, and extend the amount of gray area per pixel. Finally, the resulting image is XORed with encryption key and the encrypted image is generated. Considering the combination of four images and their simultaneous encoding, as well as examining a large number of image evaluation criteria, specifically the information entropy, that has achieved a value equal to 7/9994 in our proposed algorithm, which is really close to the ideal value of 8, shows that the proposed algorithm performs appropriately.

کلیدواژه‌ها [English]

  • Information security
  • image encryption
  • Chaotic logistics map
  • image blocking
[1]       S. Som and S. Sen, “A non-adaptive partial encryption of grayscale images based on chaos”, Procedia Technology, vol. 10, pp. 663-671, 2013/01/01/ 2013.
[2]       J. S. Khan and J. Ahmad, “Chaos based efficient selective image encryption”, Multidimensional Systems and Signal Processing, vol. 30, no. 2, pp. 943-961, 2019/04/01 2019.
[3]       G. Gu and J. Ling, “A fast image encryption method by using chaotic 3D cat maps”, Optik, vol. 125, no. 17, pp. 4700-4705, 2014/09/01/ 2014.
[4]       M. Kaur and V. Kumar, “A comprehensive review on image encryption techniques”, Archives of Computational Methods in Engineering, vol. 27, no. 1, pp. 15-43, 2020/01/01 2020.
[5]       D. Zareai, M. Balafar, and M. R. Feizi Derakhshi, “A new grayscale image encryption algorithm composed of logistic mapping, Arnold cat, and image blocking”, Multimedia Tools and Applications, vol. 80, no. 12, pp. 18317-18344, 2021/05/01 2021.
[6]       S. Lian, J. Sun, and Z. Wang, “A block cipher based on a suitable use of the chaotic standard map”, Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117-129, 2005/10/01/ 2005.
[7]       N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map”, Image and Vision Computing, vol. 24, no. 9, pp. 926-934, 2006/09/01/ 2006.
[8]       S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps”, Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408-419, 2008/01/01/ 2008.
[9]       T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos”, Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008/01/21/ 2008.
[10]     A. Shokouh Saljoughi and H. Mirvaziri, “A new method for image encryption by 3D chaotic map”, Pattern Analysis and Applications, vol. 22, no. 1, pp. 243-257, 2019/02/01 2019.
[11]     M. Kaur and D. Singh, “Multi objective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption”, Multidimensional Systems and Signal Processing, vol. 32, no. 1, pp. 281-301, 2021/01/01 2021.
[12]     M. Kalra, S. Katyal, and R. Singh, “A tent map and logistic map based approach for chaos-based image encryption and decryption”, Innovations in Computer Science and Engineering: Springer, 2019, pp. 159-165.
[13]     Y. Luo, J. Yu, W. Lai, and L. Liu, “A novel chaotic image encryption algorithm based on improved baker map and logistic map”, Multimedia Tools and Applications, vol. 78, no. 15, pp. 22023-22043, 2019/08/01 2019.
[14]     W. Gao, J. Sun, W. Qiao, and X. Zhang, “Digital image encryption scheme based on generalized Mandelbrot-Julia set”, Optik, vol. 185, pp. 917-929, 2019/05/01/ 2019.
[15]     D. Ravichandran, A. Banu S, B. K. Murthy, V. Balasubramanian, S. Fathima, and R. Amirtharajan, “An efficient medical image encryption using hybrid DNA computing and chaos in transform domain”, Medical & Biological Engineering & Computing, vol. 59, no. 3, pp. 589-605, 2021/03/01 2021.
[16]     H. Liu, F. Wen, and A. Kadir, “Construction of a new 2D Chebyshev-Sine map and its application to color image encryption”, Multimedia Tools and Applications, vol. 78, no. 12, pp. 15997-16010, 2019/06/01 2019.
[17]     X. Chai, Y. Chen, and L. Broyde, “A novel chaos-based image encryption algorithm using DNA sequence operations”, Optics and Lasers in Engineering, vol. 88, pp. 197-213, 2017/01/01/ 2017.
[18]     P. Mani, R. Rajan, L. Shanmugam, and Y. Hoon Joo, “Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption”, Information Sciences, vol. 491, pp. 74-89, 2019/07/01/ 2019.
[19]     H. Liu, B. Zhao, and L. J. E. Huang, “Quantum image encryption scheme using Arnold transform and S-box scrambling”, Entropy, vol. 21, no. 4, p. 343, 2019.
[20]     A. M. Shaheen, T. R. Sheltami, T. M. AlKharoubi, and E. Shakshuki, “Digital image encryption techniques for wireless sensor networks using image transformation methods: DCT and DWT”, Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 12, pp. 4733-4750, 2019/12/01 2019.
[21]     A. Firdous, A. U. Rehman, and M. M. S. J. I. A. Missen, “A gray image encryption technique using the concept of water waves, chaos and hash function”, IEEE, vol. 9, pp. 11675-11693, 2021.
[22]     Y. Zhou, C. Li, W. Li, H. Li, W. Feng, and K. Qian, “Image encryption algorithm with circle index table scrambling and partition diffusion”, Nonlinear Dynamics, vol. 103, no. 2, pp. 2043-2061, 2021/01/01 2021.
[23]     M. Wang, X. Wang, T. Zhao, C. Zhang, Z. Xia, and N. Yao, “Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme”, Information Sciences, vol. 544, pp. 1-24, 2021/01/12/ 2021.
[24]     F. Musanna, D. Dangwal, and S. Kumar, “Novel image encryption algorithm using fractional chaos and cellular neural network”, Journal of Ambient Intelligence and Humanized Computing, 2021/03/06 2021.
[25]     X. Wang and S. Gao, “A chaotic image encryption algorithm based on a counting system and the semi-tensor product”, Multimedia Tools and Applications, vol. 80, no. 7, pp. 10301-10322, 2021/03/01 2021.
[26]     M. Dua, A. Suthar, A. Garg, and V. Garg, “An ILM-cosine
transform-based improved approach to image encryption”, Complex & Intelligent Systems, vol. 7, no. 1, pp. 327-343, 2021/02/01 2021.
[27]     B. Bouteghrine, C. Tanougast, and S. Sadoudi, “Novel image encryption algorithm based on new 3-d chaos map”, Multimedia Tools and Applications, vol. 80, no. 17, pp. 25583-25605, 2021/07/01 2021.
[28]     C. E. J. T. B. s. t. j. Shannon, “Communication theory of secrecy systems”, IEEE, vol. 28, no. 4, pp. 656-715, 1949.
[29]     M. Ghebleh, A. Kanso, and H. Noura, “An image encryption scheme based on irregularly decimated chaotic maps”, Signal Processing: Image Communication, vol. 29, no. 5, pp. 618-627, 2014/05/01/ 2014.
[30]     Z. Parvin, H. Seyedarabi, and M. Shamsi, “A new secure and sensitive image encryption scheme based on new substitution with chaotic function”, Multimedia Tools and Applications, vol. 75, no. 17, pp. 10631-10648, 2016/09/01 2016.
[31]     R. Aqeel ur, X. Liao, A. Kulsoom, and S. Ullah, “A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps”, Multimedia Tools and Applications, vol. 75, no. 18, pp. 11241-11266, 2016/09/01 2016.
[32]     A. ur Rehman, D. Xiao, A. Kulsoom, M. A. Hashmi, and S. A. Abbas, “Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules”, Multimedia Tools and Applications, vol. 78, no. 7, pp. 9355-9382, 2019/04/01 2019.
[33]     R. Aqeel ur, X. Liao, M. A. Hahsmi, and R. Haider, “An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos”, Optik - International Journal for Light and Electron Optics, vol. 153, pp. 117-134, 2018/01/01/ 2018.
[34]     A. ur Rehman, X. Liao, A. Kulsoom, and S. A. Abbas, “Selective encryption for gray images based on chaos and DNA complementary rules”, Multimedia Tools and Applications, vol. 74, no. 13, pp. 4655-4677, 2015/07/01 2015.
[35]     X. Huang and G. Ye, “An image encryption algorithm based on hyper-chaos and DNA sequence”, Multimedia Tools and Applications, vol. 72, no. 1, pp. 57-70, 2014/09/01 2014.
[36]     P. Zhen, G. Zhao, L. Min, and X. Jin, “Chaos-based image encryption scheme combining DNA coding and entropy,” Multimedia Tools and Applications, vol. 75, no. 11, pp. 6303-6319, 2016/06/01 2016.
[37]     A. A. Abd El-Latif and X. Niu, “A hybrid chaotic system and cyclic elliptic curve for image encryption,” AEU - International Journal of Electronics and Communications, vol. 67, no. 2, pp. 136-143, 2013/02/01/ 2013.
[38]     M. Asgari-Chenaghlu, M. A. Balafar, and M. R. Feizi-Derakhshi, “A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation,” Signal Processing, vol. 157, pp. 1-13, 2019/04/01/ 2019.