Professional Documents
Culture Documents
Image Encryption Using Random Pixel Permutation by Chaotic Mapping
Image Encryption Using Random Pixel Permutation by Chaotic Mapping
Abstract— With the fast evolution of digital data exchange, scrambling the pixels [7] and [11]. We have proposed a new
security of information becomes much important in data storage image encryption scheme which provides reasonable security
and transmission. Due to the increasing use of images in even if the generated random sequence from chaotic maps has
industrial processes, it is essential to protect confidential images short periodic orbits. In the proposed algorithm, the pixels of
from unauthorized access. We have proposed a new image
the plaintext image are first scrambled using a pseudorandom
encryption algorithm using random pixel permutation based on
chaos logistic maps and prime modulo multiplicative linear sequence generated using prime modulo multiplicative linear
congruential generators. The random-like nature of chaos is congruential generators (PMMLCG) and then the pixels are
effectively spread into the encrypted image through permutation permuted and transformed using chaos logistic maps. The
and transformation of pixels in the plain image. The pixel pixels in the image are permuted using the pseudorandom
transformation results in the encryption scheme being resistive to sequence as the index of the row or column to be permuted.
cryptanalytic attacks. Simulation results show high sensitivity to However, the pseudorandom permutation discussed above
key, plaintext and cipher text changes. From a cryptanalytic should be repeated several times to provide reasonable
point of view, the scheme is highly resistive to known/chosen security since this approaches shuffles image pixels locally.
plaintext and cipher text attacks. The proposed technique gives
Through the proposed scheme, our main goals are to achieve
good parametric and sensitivity results proving itself an eligible
candidate for image encryption. Moreover it is a lossless high level of security and high robustness against statistical
encryption technique and hence apt for securing medical and cryptanalysis. The remainder of the paper is organized as
military image. follows. In Section II, description of the overall framework of
the proposed image encryption scheme is presented and the
Keywords- Image encryption; Non-linear chaotic dynamic construction of the primitive pseudorandom sequences and
system; Stream generator; Security analysis; Cryptography. chaotic maps is discussed in detail. Section III evaluates the
security of the proposed algorithm via several randomness
I. INTRODUCTION tests and compares it with earlier techniques. Finally, in
With rapid developments in the multimedia and Section IV the conclusion of the paper is presented.
communications industry, a great deal of concern has been II. PROPOSED IMAGE ENCRYPTION TECHNIQUE
raised regarding the security of an image transmitted or stored
over open channels. A major challenge is to protect the The proposed technique first generates a prime modulo
confidentiality of such images in wired and wireless networks. multiplicative linear congruential generator sequence and a
The most effective method is to encrypt the image so that only chaos logistic sequence. The effectiveness of the algorithm
authorized entities with the key can decrypt them. The depends on the randomness of the generated sequences. The
limitations on using encryption for securing images are: (1) PMMLCG sequence is generated depending on the input
Perceptual quality control - An image encryption algorithm secret key and the chaotic binary sequence is generated
can be used to intentionally degrade the quality of the image. depending on the size of the image, secret key and the
However, the degradation must be visually unperceivable, (2) predefined value of µ (3.9876543210001, 4). The choice of µ
Real-time constraint - In many multimedia applications, very affects the dynamics of the system and guarantees the chaotic
efficient encryption and decryption algorithms are needed to state of the system with perfect randomness. The initial seed
access images in a real-time environment. As one of the speed for the random sequence generators are derived from the
up techniques, selected parts of the images are encrypted. secret key, thereby making the technique highly sensitive to
Most chaos-based encryption schemes, are based on key changes. The sequences are then used to scramble the
permutation, and basically produce a long random sequence position of pixels in the plain image and the values of pixels
by using chaos maps as pseudorandom number generators and are transformed by simple bitwise XOR operation between
encrypt a plain image by swapping the original coordinates of adjacent pixel values. The algorithm of the proposed technique
pixels with the random sequence generated, thereby is illustrated in Fig. 1 and described below.
248
WHILE (i!=M and k!=N) Cross–correlation: The cross–correlation coefficient
I(i , j) I(xi , xk ) [1], [2] and [10] CAB between the plain image A and the
END cipher image B quantifies the level to which the
GENERATE two Chaos sequences defined by (2), using an encrypted image pixels are relatively randomized. The
initial seed derived from the key. closer it is to zero, the better. Our proposed algorithm
PERMUTE ROWS of the plain image produces cipher images with cross correlation values
WHILE i!=M (horizontal, vertical and diagonal correlation) that are
I(i , :) I(xi , :) lower than other chaos-based image encryption
I(i , :)= I(i , :) I(i+1 , :) schemes. Fig. 5 compares the correlation results
END obtained using the proposed algorithm and the
correlation results using AES encryption scheme [13].
PERMUTE COLUMNS of the resulting image
The cross- correlation is given by
WHILE k!=N
I(: , j) I(: , xk ) 1 r c
I(: , j)= I(: , j) I(: , j+1) ( Ai, j A)( Bi, j B)
r c i j (4)
END C AB
r c r c
1 1
XOR pixels in each row with the chaos map. ( ( Ai, j A) 2 )( r c
r c i j
( Bi , j B) 2 )
WHILE i!=M i j
Ai,j and Bi,j are the pixels in the ith row and jth column of
III. EFFECTIVENESS A and B respectively and r, c represent the no. of rows
and columns in the image.
A. Qualitative analysis
Net Pixel Change Rate: Net Pixel Change Rate
Qualitative analysis includes perception of the images and (NPCR) [1] and [9], is the measure of the number of
the analysis of histogram [11] (the plot of gray levels in an in cipher text pixels changed between two plaintext
an image against their frequencies of occurrence). Fig. 3 shows images A and A’ differing by only one pixel, and
the result of encrypting the Lena image, shown in Fig. 2, using encrypted using the same encryption algorithm.
the proposed algorithm. Fig. 2 shows several spikes in the
histogram of the plain image due to gray levels which have r c
h ( pi log 2 pi ) , (3)
1 i(i 1)
i UACI exp ected i 1
100% (8)
n2 n 1
where pi is the frequency of intensity level i in the
= 33.4635%.
image. The maximum h an 8–bit image can attain is 8.
The average of our results is 7.99. Hence a statistical Our encryption scheme reaches an average UACI of
attack is difficult to make. 20-22%.
249
Average moving distance of scrambling: The average one bit, is shown in Fig. 4. The results substantiate that
moving distance of scrambling [14] is given by, our technique has high degree of key sensitivity [1], [2]
and [6].
1 r c
D (w i) 2 (v j) 2 ,
r c i 1 j 1
(9) Encryption key sensitivity: We have measured the
parametric changes between encrypted images of
where, (i, j) represents a pixel coordinate in the original lena.tif with two keys differing by 1 bit and obtained a
image and (w, v) represents the pixel coordinate of that NPCR of 99.26, thus proving the difficulty of a related
point in the scrambled image. A large value of average key attack [1], [2] and [6].
moving distance of scrambling indicates that the
original image and the scrambled image are less
related, and hence the efficiency of the scrambling
technique is high. The scrambling technique used in
our proposed technique uses four different random
sequences to scramble pixels in 4 stages as explained
in section II. Our proposed technique gives an average
moving distance of scrambling of 135.0582 at each
stage, which substantiates the efficiency of the
proposed algorithm.
PSNR: Peak Signal-to-Noise Ratio is commonly used Figure 2. Original Lena image and its histogram
as a measure of quality of the encryption technique. In
image encryption, a low value of PSNR for the cipher
image implies that the cipher image is noise-like, i.e.,
the amount of significant signal information available
is very less in the cipher image. The PSNR results
obtained by encrypting sample images with our
proposed technique, in comparison to the PSNR
obtained in earlier chaos-based techniques [11], [13] is
presented in Table I. Our results provide a PSNR lower
than that of currently existing techniques, thereby
showing significant improvement. Figure 3. Encrypted image and its histogram
250
TABLE I. QUANTITATIVE ANALYSIS (PSNR RESULTS)
251