Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.




References:
[1] G. Álvarez, S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," Int. J. of Bifurcation and Chaos, 2006;16, pp. 2129–2151.
[2] T. Carroll, L. Pecora, "Synchronizing chaotic circuits," IEEE Trans Circuits Systems I, 1991;38, pp. 453–456.
[3] L. Kocarev, K.S. Halle, K. Eckert, L.O. Chua, U. Parlitz, "Experimental demonstration of secure communications via chaotic synchronization," Int. J. of Bifurcation and Chaos, 1992;2, pp. 709-713.
[4] H. Dedieu, M.P. Kennedy, M. Hasler, "Chaos shift keying: modulation and demodulation of a chaotic carrier using self-synchronizing Chua’s circuits," IEEE Trans Circuits Systems II: Analog Digital Signal Process, 1993;40, pp. 634-642.
[5] T. Yang, L. Chua, "Secure communication via chaotic parameter modulation," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1996;43, pp. 817-819.
[6] L. Kocarev, U. Parlitz, "General approach for chaotic synchronization with applications to communications," Phys. Rev. Lett., 1995;74, pp. 5028-5031.
[7] M. Sobhy, A. Shehata, "Secure computer communication using chaotic algorithms," Int. J. of Bifurcation and Chaos, 2000;10, pp. 2831-2839.
[8] G. Alvarez, S. Li, F. Montoya, G. Pastor, M. Romera, "Breaking projective chaos synchronization secure communication using filtering and generalized synchronization," Chaos, Solitons and Fractals, 2005;24, pp. 775–783.
[9] T. Yang, L. Yang, C. Yang, "Breaking chaotic switching using generalized synchronization," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1998;45, pp. 1062–1067.
[10] Y. Zhang, Y. Wang, "A Parameter Modulation Chaotic Secure Communication Scheme with Channel Noises," Chinese Physics Letters, 2011;28, pp. 020505.
[11] S. Li, G. Chen, G. Alvarez, "Return-map cryptanalysis revisited," Int. J. of Bifurcation and Chaos, 2006;16, pp. 1157–1168.
[12] G. Alvarez, F. Montoya, M. Romera, G. Pastor, "Breaking parameter modulated chaotic secure communication system," Chaos, Solitons and Fractals, 2004;21, pp. 783–787.
[13] K. Short, "Unmasking a modulated chaotic communications scheme," Int. J. of Bifurcation and Chaos, 1996;06, pp. 367.
[14] S. Li, G. Álvarez, G. Chen, "Breaking a chaos-based secure communication scheme designed by an improved modulation method," Chaos, Solitons and Fractals, 2005;25, pp. 109–120.
[15] A. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, S. Li, F. Montoya, "Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems," Physical Letters A, 2008;372, pp. 5588–5592.
[16] T. Yang, C. Wu, L. Chua, "Cryptography based on chaotic systems," IEEE Transaction on Circuits and Systems—I: fundamental theory and applications, 1997;44, pp. 469-472.
[17] Y. Zhang, Di. Xiao, H. Liu, H. Nan, "GLS coding based security solution to JPEG with the structure of aggregated compression and encryption," Communications in Nonlinear Science and Numerical Simulation, 2013;19, pp. 1366.
[18] Y. Zhang and Y. Wang, "Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation," Nonlinear Dynamics, 2014;77, pp. 687-698.
[19] Y. Zhang, Di. Xiao, "An image encryption scheme based on rotation matrix bit-level permutation and block diffusion," Communications in Nonlinear Science and Numerical Simulation, 2014;19, pp. 74.
[20] Y. Zhang, Di. Xiao, "Self-adaptive permutation and combined global diffusion for chaotic color image encryption," International Journal of Electronics and Communications, 2014;68, pp. 361-368.
[21] N. Masuda, K. Aihara, "Dynamical characteristics of discretized chaotic permutations," Int. J. of Bifurcation and Chaos, 2002;12, pp. 2087-2103.
[22] S. LI, G. CHEN, X. MOU, "On the dynamical degradation of digital piecewise linear chaotic maps," Tutorial-Review Section of Int. J. of Bifurcation and Chaos, 2005;15, pp. 119-151.
[23] D. Socek, S. Li, S. Magliveras, B. Furht, "Enhanced 1-D chaotic key-based algorithm for image encryption," In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), 2005, pp. 406–407.
[24] H. Gao, Y. Zhang, S. Liang, D. Li, "A new chaotic algorithm for image encryption," Chaos, Solitons & Fractals, 2006;29, pp. 393–9.
[25] N. Pareek, V. Patidar, K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, 2006;24, pp. 926–934.
[26] C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, G. Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, 2009;27, pp. 1371-1381.
[27] C. Li, S. Li, G. Alvarez, G. Chen, K. Lo, "Cryptanalysis of a chaotic block cipher with external key and its improved version," Chaos, Solitons & Fractals, 2008;37, pp. 299–307.
[28] D. Arroyo, R. Rhouma R, G. Alvarez, S. Li, V. Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos: An Interdisciplinary Journal of Nonlinear Science, 2008;18, pp. 033112.
[29] M.F. Haroun and T.A. Gulliver, "New Low Complexity Discrete 3D Chaotic Generators for Communication and Security Applications," IET information security Journal, submitted.
[30] T. Yang, L. Yang, C. Yang, "Cryptanalyzing chaotic secure communications using return maps," Physics Letters A, 1998;245, pp. 495-510.
[31] X. Wu, H. Hu, B. Zhang, "Analyzing and improving a chaotic encryption method," Chaos, Solitons and Fractals, 2004;22, pp. 367–373.
[32] A. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya, S. Li, "A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis," Communications in Nonlinear Science and Numerical Simulation, 2010;15, pp. 3471-3483.
[33] T. Stojanovski, L. Kocarev, U. Parlitz, "A simple method to reveal the parameters of the Lorenz system," Int. J. of Bifurcation and Chaos, 1996;6, pp. 2645–2652.
[34] B. Schneier, "Applied cryptography: protocols, algorithms, and source code in C," 2nd ed. Wiley, New York, 1996.
[35] H. Liu, X. Wang, "Color image encryption based on one-time keys and robust chaotic maps," Computers and Mathematics with Applications, 2010;59, pp. 3320–3327.
[36] A. abdel-latif, X. Niu, "A hybrid chaotic system and cyclic elliptic curve for image encryption," Int. J. Electronics and Commun., 2013;67, pp. 136–143.
[37] V. Patidar, N. Pareek, G. Purohit, K. Sud, "A robust and secure Chaotic Standard Map-Based Pseudorandom Permutation-substitution Scheme for Image Encryption," optics communications, 2011;284, pp. 4331–4339.
[38] S. Sayedzadeh, S. Mirzakuchaki, "A fast color image encryption algorithm based on Coupled two dimensional Piecewise chaotic map," Signal Processing, 2012;92, pp. 1202–1215.
[39] G. Chen, Y. Mao, C. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons and Fractals, 2004;21, pp. 749–761.
[40] A. Kanso, M. Ghebleh, "A novel image encryption algorithm based on a 3D chaotic map," Comm. Nonlinear sci. Numer simulate, 2012;17, pp. 2943-2959.