A Deep Dive into Chaos-Based Image Encryption - Reviewing, Implementing, and Addressing Challenges

Abstract

Since its introduction in image encryption methods, chaos has proven to be an extremely powerful cryptographic tool. The evolutionary path of chaos-based picture encryption algorithms is thoroughly examined in this article, covering a range of topics including symmetric and asymmetric algorithms, block cyphers, stream cyphers, and their combination with other technologies. The unique properties of chaos, including its pseudo-randomness, topological transitivity, and sensitivity to beginning conditions, make it an ideal subject for interdisciplinary research and provide opportunities to improve image encryption techniques through cross-disciplinary connections. Moreover, the discussion delves into real-world uses, explaining many contexts in which chaotic picture encryption is useful. The thorough examination of chaotic image encryption's current difficulties as well as its useful applications serves as a call to action for researchers. This paper seeks to stimulate further efforts in improving and augmenting the current approaches by providing an overview of the state of the field. Furthermore, it aims to establish a foundation for further developments in chaos-based picture encryption, providing a path for potential growth in this rapidly evolving subject.

Country : Iraq

1 Noor M. Hussein2 Nadia M. Mohammed

  1. Software Engineering Department, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq
  2. Software Engineering Department, College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq

IRJIET, Volume 7, Issue 12, December 2023 pp. 271-280

doi.org/10.47001/IRJIET/2023.712037

References

  1. E. N. (M. I. T. . Lorenz, “Lorenz_Deterministic_Nonperiodic_Flow_1962.Pdf,” Journal of the Atmospheric Sciences, vol. 20. p. 12, 1962.
  2. T.-Y. Li and J. A. Yorke, “Period Three Implies Chaos BT  - The Theory of Chaotic Attractors,” B. R. Hunt, T.-Y. Li, J. A. Kennedy, and H. E. Nusse, Eds., New York, NY: Springer New York, 2004, pp. 77–84. doi: 10.1007/978-0-387-21830-4_6.
  3. R. M. May, “Simple mathematical models with very complicated dynamics,” Nature, vol. 261, no. 5560, pp. 459–467, 1976, doi: 10.1038/261459a0.
  4. C. E. Shannon, “A Mathematical Theory of Communication,” Bell Syst. Tech. J., vol. 27, no. 4, pp. 623–656, 1948, doi: 10.1002/j.1538-7305.1948.tb00917.x.
  5. R. M. May, “Simple mathematical models with very complicated dynamics,” Nature, vol. 261, no. 5560, pp. 459–467, 1976, doi: 10.1038/261459a0.
  6. M. Maqableh, “A Novel Triangular Chaotic Map (TCM) with Full Intensive Chaotic Population Based on Logistic Map,” J. Softw. Eng. Appl., vol. 08, no. 12, pp. 635–659, 2015, doi: 10.4236/jsea.2015.812059.
  7. M. Sobhy and R. Alaa, Chaotic algorithms for data encryption, vol. 2. 2001. doi: 10.1109/ICASSP.2001.941085.
  8. X. Zhang and W. Chen, A new chaotic algorithm for image encryption. 2008. doi: 10.1109/ICALIP.2008.4590187.
  9. B. Zhang and L. Liu, “Chaos-Based Image Encryption: Review, Application, and Challenges,” Mathematics, vol. 11, no. 11. 2023. doi: 10.3390/math11112585.
  10. G. Tang, S. Wang, H. Lü, and G. Hu, “Chaos-based cryptograph incorporated with S-box algebraic operation,” Phys. Lett. Sect. A Gen. At. Solid State Phys., vol. 318, no. 4–5, pp. 388–398, 2003, doi: 10.1016/j.physleta.2003.09.042.
  11. G. Tang, S. Wang, H. Lü, and H. Gang, “Chaos-based cryptograph incorporated with S-box algebraic operation,” Phys. Lett. A, vol. 318, pp. 388–398, Nov. 2003, doi: 10.1016/j.physleta.2003.09.042.
  12. T. Azizi and B. Alali, “Chaos Induced by Snap-Back Repeller in a Two Species Competitive Model,” Am. J. Comput. Math., vol. 10, no. 02, pp. 311–328, 2020, doi: 10.4236/ajcm.2020.102017.
  13. H. A. J. Al-Asady, O. Q. J. Al-Thahab, and S. S. Hreshee, “Robust Encryption System Based Watermarking Theory by Using Chaotic Algorithms: A Reviewer Paper,” J. Phys. Conf. Ser., vol. 1818, no. 1, 2021, doi: 10.1088/1742-6596/1818/1/012086.
  14. Ł. Pawela and K. Życzkowski, “Matrix logistic map: fractal spectral distributions and transfer of chaos,” arXiv:2303.06176v1, pp. 1–8, 2023, [Online]. Available: http://arxiv.org/abs/2303.06176
  15. F. Bianchi and T.-C. Dinh, “Every complex H{\’e}non map is exponentially mixing of all orders and satisfies the CLT,” vol. 80, pp. 1–11, 2023, [Online]. Available: http://arxiv.org/abs/2301.13535
  16. K. Scheicher, V. F. Sirvent, and P. Surer, “Dynamical properties of the tent map,” J. London Math. Soc., vol. 93, no. 2, pp. 319–340, 2016, doi: 10.1112/jlms/jdv071.
  17. S. F. Al-Azzawi, Mujiarto, L. Patria, A. Sambas, and W. S. M. Sanjaya, “Stability of Lorenz System at the Second Equilibria Point based on Gardano’s Method,” J. Phys. Conf. Ser., vol. 1477, no. 2, 2020, doi: 10.1088/1742-6596/1477/2/022009.
  18. A.Kumar, “Rossler’s system using piecewise derivative,” Results Phys., vol. 50, no. March, p. 106555, 2023, doi: 10.1016/j.rinp.2023.106555.
  19. J. Bao and Q. Yang, “Period of the discrete Arnold cat map and general cat map,” Nonlinear Dyn., vol. 70, no. 2, pp. 1365–1375, 2012, doi: 10.1007/s11071-012-0539-3.
  20. M. Lawnik and M. Berezowski, “New Chaotic System: M-Map and Its Application in Chaos-Based Cryptography,” Symmetry (Basel)., vol. 14, no. 5, 2022, doi: 10.3390/sym14050895.
  21. M. H. S. Hasan, “Image Encryption using Modified RC4 Algorithm,” in 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA), 2023, pp. 430–434. doi: 10.1109/MI-STA57575.2023.10169339.
  22. S. Sriadhi, R. Rahim, and A. S. Ahmar, “RC4 Algorithm Visualization for Cryptography Education,” J. Phys. Conf. Ser., vol. 1028, no. 1, 2018, doi: 10.1088/1742-6596/1028/1/012057.
  23. S. Kareem, “Image Encryption by Using RC4 Algorithm Image Encryption by Using RC4 Algorithm,” Eur. Acad. Res., no. July 2014, 2014.
  24. T. H. Tran, L. Lanante, Y. Nagao, M. Kurosaki, and H. Ochi, “Hardware Implementation of High Throughput RC4 algorithm,” ISCAS 2012 - 2012 IEEE Int. Symp. Circuits Syst., no. June 2014, pp. 77–80, 2012, doi: 10.1109/ISCAS.2012.6272151.
  25. S. Lian, J. Sun, and Z. Wang, “A block cipher based on a suitable use of the chaotic standard map,” Chaos, Solitons & Fractals, vol. 26, no. 1, pp. 117–129, 2005, doi: https://doi.org/10.1016/j.chaos.2004.11.096.
  26. Z. H. Guan, F. Huang, and W. Guan, “Chaos-based image encryption algorithm,” Phys. Lett. Sect. A Gen. At. Solid State Phys., vol. 346, no. 1–3, pp. 153–157, 2005, doi: 10.1016/j.physleta.2005.08.006.
  27. T. Xiang, X. Liao, G. Tang, Y. Chen, and K. Wong, “A novel cryptosystem based on iterating a chaotic map,” Phys. Lett. A, vol. 349, pp. 109–115, Jan. 2006, doi: 10.1016/j.physleta.2005.02.083.
  28. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image Vis. Comput., vol. 24, no. 9, pp. 926–934, 2006, doi: https://doi.org/10.1016/j.imavis.2006.02.021.
  29. D. Xiao, X. Liao, and P. Wei, “Analysis and improvement of a chaos-based image encryption algorithm,” Chaos, Solitons & Fractals, vol. 40, no. 5, pp. 2191–2199, 2009, doi: https://doi.org/10.1016/j.chaos.2007.10.009.
  30. X. Tong and M. Cui, “Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator,” Signal Processing, vol. 89, no. 4, pp. 480–491, 2009, doi: https://doi.org/10.1016/j.sigpro.2008.09.011.
  31. M. Amin, O. Faragallah, and A. Abd El-Latif, “A chaotic block cipher algorithm for image cryptosystems,” Commun. Nonlinear Sci. Numer. Simul., vol. 15, pp. 3484–3497, Nov. 2010, doi: 10.1016/j.cnsns.2009.12.025.
  32. Y. Wang, K.-W. Wong, X. Liao, and G. Chen, “A new chaos-based fast image encryption algorithm,” Appl. Soft Comput., vol. 11, no. 1, pp. 514–522, 2011, doi: https://doi.org/10.1016/j.asoc.2009.12.011.
  33. X. Huang, “Image encryption algorithm using chaotic Chebyshev generator,” Nonlinear Dyn., vol. 67, no. 4, pp. 2411–2417, 2012, doi: 10.1007/s11071-011-0155-7.
  34. M. Stanciu and O. Datcu, Atmel AVR microcontroller implementation of a new enciphering algorithm based on a chaotic Generalized Hénon Map. 2012. doi: 10.1109/ICComm.2012.6262554.
  35. N. Bigdeli, Y. Farid, and K. Afshar, “A novel image encryption/decryption scheme based on chaotic neural networks,” Eng. Appl. Artif. Intell., vol. 25, no. 4, pp. 753–765, 2012, doi: https://doi.org/10.1016/j.engappai.2012.01.007.
  36. J. S. Armand Eyebe Fouda, J. Yves Effa, S. L. Sabat, and M. Ali, “A fast chaotic block cipher for image encryption,” Commun. Nonlinear Sci. Numer. Simul., vol. 19, no. 3, pp. 578–588, 2014, doi: https://doi.org/10.1016/j.cnsns.2013.07.016.
  37. L. Sui, K. Duan, J. Liang, and X. Hei, “Asymmetric double-image encryption based on cascaded discrete fractional random transform and logistic maps,” Opt. Express, vol. 22, no. 9, p. 10605, 2014, doi: 10.1364/oe.22.010605.
  38. A.A.A. El-Latif, L. Li, and X. Niu, “A new image encryption scheme based on cyclic elliptic curve and chaotic system,” Multimed. Tools Appl., vol. 70, no. 3, pp. 1559–1584, 2014, doi: 10.1007/s11042-012-1173-2.
  39. X. Wang, L. Liu, and Y. Zhang, “A novel chaotic block image encryption algorithm based on dynamic random growth technique,” Opt. Lasers Eng., vol. 66, pp. 10–18, 2015, doi: https://doi.org/10.1016/j.optlaseng.2014.08.005.
  40. H. Liu, A. Kadir, and Y. Li, “Asymmetric color pathological image encryption scheme based on complex hyper chaotic system,” Optik (Stuttg)., vol. 127, no. 15, pp. 5812–5819, 2016, doi: https://doi.org/10.1016/j.ijleo.2016.04.014.
  41. J. Chen, Z. Zhu, C. Fu, H. Yu, and L. Zhang, “A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism,” Commun. Nonlinear Sci. Numer. Simul., vol. 20, no. 3, pp. 846–860, 2015, doi: https://doi.org/10.1016/j.cnsns.2014.06.032.
  42. L. Liu and S. Miao, “A new image encryption algorithm based on logistic chaotic map with varying parameter,” Springerplus, vol. 5, no. 1, p. 289, 2016, doi: 10.1186/s40064-016-1959-1.
  43. M. A. Murillo-Escobar, C. Cruz-Hernández, F. Abundiz-Pérez, and R. M. López-Gutiérrez, “Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller,” Microprocess. Microsyst., vol. 45, pp. 297–309, 2016, doi: https://doi.org/10.1016/j.micpro.2016.06.004.
  44. C. Pak and L. Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017, doi: https://doi.org/10.1016/j.sigpro.2017.03.011.
  45. A.Yaghouti Niyat, M. H. Moattar, and M. Niazi Torshiz, “Color image encryption based on hybrid hyper-chaotic system and cellular automata,” Opt. Lasers Eng., vol. 90, pp. 225–237, 2017, doi: https://doi.org/10.1016/j.optlaseng.2016.10.019.
  46. Ü. Çavuşoğlu, A. Akgül, A. Zengin, and I. Pehlivan, “The design and implementation of hybrid RSA algorithm using a novel chaos based RNG,” Chaos, Solitons & Fractals, vol. 104, pp. 655–667, 2017, doi: https://doi.org/10.1016/j.chaos.2017.09.025.
  47. K. Ratnavelu, M. Kalpana, P. Balasubramaniam, K. Wong, and P. Raveendran, “Image encryption method based on chaotic fuzzy cellular neural networks,” Signal Processing, vol. 140, pp. 87–96, 2017, doi: https://doi.org/10.1016/j.sigpro.2017.05.002.
  48. J. Wang, Q. H. Wang, and Y. Hu, “Asymmetric Color Image Cryptosystem Using Detour Cylindrical-Diffraction and Phase Reservation Truncation,” IEEE Access, vol. 6, pp. 53976–53983, 2018, doi: 10.1109/ACCESS.2018.2871102.
  49. S. Janakiraman, K. Thenmozhi, J. B. B. Rayappan, and R. Amirtharajan, “Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller,” Microprocess. Microsyst., vol. 56, pp. 1–12, 2018, doi: https://doi.org/10.1016/j.micpro.2017.10.013.
  50. D. S. Laiphrakpam and M. S. Khumanthem, “A robust image encryption scheme based on chaotic system and elliptic curve over finite field,” Multimed. Tools Appl., vol. 77, no. 7, pp. 8629–8652, 2018, doi: 10.1007/s11042-017-4755-1.
  51. L. G. Nardo, E. G. Nepomuceno, J. Arias-Garcia, and D. N. Butusov, “Image encryption using finite-precision error,” Chaos, Solitons & Fractals, vol. 123, pp. 69–78, 2019, doi: https://doi.org/10.1016/j.chaos.2019.03.026.
  52. A.Belazi, M. Talha, S. Kharbech, and W. Xiang, “Novel Medical Image Encryption Scheme Based on Chaos and DNA Encoding,” IEEE Access, vol. 7, pp. 36667–36681, 2019, doi: 10.1109/ACCESS.2019.2906292.
  53. X.-Y. Wang and Z.-M. Li, “A color image encryption algorithm based on Hopfield chaotic neural network,” Opt. Lasers Eng., vol. 115, pp. 107–118, 2019, doi: https://doi.org/10.1016/j.optlaseng.2018.11.010.
  54. L. Chen, H. Yin, T. Huang, L. Yuan, S. Zheng, and L. Yin, “Chaos in fractional-order discrete neural networks with application to image encryption,” Neural Networks, vol. 125, pp. 174–184, 2020, doi: https://doi.org/10.1016/j.neunet.2020.02.008.
  55. Z. Hua, Z. Zhu, S. Yi, Z. Zhang, and H. Huang, “Cross-plane colour image encryption using a two-dimensional logistic tent modular map,” Inf. Sci. (Ny)., vol. 546, pp. 1063–1083, 2021, doi: https://doi.org/10.1016/j.ins.2020.09.032.
  56. A.Shakiba, “A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad,” J. King Saud Univ. - Comput. Inf. Sci., vol. 33, no. 5, pp. 562–571, 2021, doi: https://doi.org/10.1016/j.jksuci.2019.03.003.
  57. B. Vaseghi, S. Mobayen, S. S. Hashemi, and A. Fekih, “Fast Reaching Finite Time synchronization Approach for Chaotic Systems With Application in Medical Image Encryption,” IEEE Access, vol. 9, pp. 25911–25925, 2021, doi: 10.1109/ACCESS.2021.3056037.
  58. Y. Zhang, L. Zhang, Z. Zhong, L. Yu, M. Shan, and Y. Zhao, “Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation,” Opt. Lasers Eng., vol. 143, p. 106626, 2021, doi: https://doi.org/10.1016/j.optlaseng.2021.106626.
  59. G.-D. Ye, H.-S. Wu, X.-L. Huang, and S.-Y. Tan, “Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map,” Chinese Phys. B, vol. 32, no. 3, p. 30504, 2023, doi: 10.1088/1674-1056/ac7dbb.
  60. C. Yang, P. Pan, and Q. Ding, “Image Encryption Scheme Based on Mixed Chaotic Bernoulli Measurement Matrix Block Compressive Sensing,” Entropy, vol. 24, no. 2. 2022. doi: 10.3390/e24020273.
  61. W. Song, C. Fu, Y. Zheng, L. Cao, M. Tie, and C.-W. Sham, “Protection of image ROI using chaos-based encryption and DCNN-based object detection,” Neural Comput. Appl., vol. 34, no. 7, pp. 5743–5756, 2022, doi: 10.1007/s00521-021-06725-w.