Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

CHAOTIC OSCILLATOR BASED IMAGE ENCRYPTION APPLICATION

Tankut KURT1
2

Metin VARAN3

erinden biri olan Runge Kutta 4 ile belirlenen 3 boyutlu kaotik

elelik
ST-800-

-800-

s- in, s-

-kutusundaki rasgele bir


-
an s-kutusunun

kenlerinden faydalanarak y

Anahtar Kelimeler:

ABSTRACT
In our daily life digital image contents have become within a wide range of use. With the intense use of
digital image contents, the secure transferring of the digital images has been a major subject of recent
studies. The unpredictability, the wide range of frequency bands, the periodic behavior of time series,
and being sensitive to the initial conditions make chaos theory and the use of chaotic systems paved the
way of to be used in cryptography applications like used in many different engineering applications.

1
2
3 Sakarya
In this study, a digital image was encrypted with a new encryption algorithm of three dimensional
chaotic system. And also the security analyzes were performed. Firstly, the variable values of the three
dimensional chaotic system were found which determined by the discrete-time differential equation
solution methods of Runge - Kutta 4. The third order chaotic system that used in this study includes x,
y and z state variables which is generated by three random number array. The random numbers obtained
from the x, y and z state variables of the system are shown to be random by passing through the NIST-
800-22 test. Encryption consists of two stages. In the first stage, the s-box with a different size of 16x16
was obtained by using the user-selectable sequence from 3 randomly different sequence arrays using x,
y and z state variables in the chaotic system. The pixel values of the 8-bit image that were converted to
hexadecimal values found corresponding values to be replaced in the s-box, and thus the first phase of
encryption was completed.

In the second phase of the encryption, a random value in the s-box is subjected to the XOR operation
with the values obtained at the end of the first stage. The value of the XOR operation in the S-box is
determined by another random number sequence to be selected by the user. Thus, the generated values
of the s-box and the value of the coordinate that to be executed by XOR are generated by using the
different state variables of the studied chaotic system. After this process, the two-step encryption process
has ended. After encryption, the original image and the encoded image were analyzed to test the
robustness of encryption such as histogram, correlation and entropy. In order to implement this
encryption processes and encryption analyses in an easy and convenient way, a graphical user interface
was also carried out in MATLAB environment. As a result of the analysis, it is proved that the use of
proposed chaotic encryption algorithm strengthens the security performance of image transfer by means
of acquired high random behaviors of the distribution of the gray values of the encrypted image.

Keywords: Chaos, Chaotic system, Cryptography, Image Encryption

dinamik sistemlerin d

ki iterasyonl

-3].

-13]. Kriptoloji bilimi de kaos teorisi olan uygulama

n kriptoloji

-16].

riskler mevcuttur. Bu sebep


(Data Encryption Standard),
-19] gibi

. Bu gibi
mler
-27].

- - -

-kutusunun
-

len S-
ygulanabilmektedir. Tasarlanan

cektir.

S-
-

(1)

a= 10, b = 16, c= -1 parametreleri ve x_0=-

(a) (b) (c)


Zhou sisteminin (a)x-y, (b)x-z, ve (c)y-

S-

-kutusu elde edilecektir.


S-

S-
-

heksadesimal sa -
-

-kutusu elde edilir.


-k
-kutusu

NIST 800-
NIST-800-22
Standarts and Technology tar -800-22 testi
-800-

Bu testte en -
kabul edilmektedir. P-

-800- -800-22
bulunan 16 testin her birinden bulunan p-
-800-

Tablo 1. -800-22 Testi sonucu


P- P- P-
Frekans testi 0.6354 0.5525 0.0298
Blok frekans testi 0.0297 0.7684 0.9056
0.9694 0.5073 0.0119
Yinelemeler testi 0.3999 0.2329 0.9431
Blok 0.4122 0.1301 0.6430
0.6151 0.3566 0.3665
0.1420 0.0107 0.1549
0.0191 0.0251 0.0411
0.6401 0.2193 0.5268
0.4907 0.6798 0.2140
0.7934 0.6918 0.2700
Rastgele gezinimler testi 0.5954 0.0928 0.2135 B
0.4248 0.4133 0.1828
Seri testi-1 0.7826 0.2048 0.6744
Seri testi-2 0.6628 0.1053 0.7524
0.1123 0.9033 0.0439
l rengin belirli oranlarda

an
-
n RGB

S-
-

. -kutusundaki

- -kutusu
n
-
an
ile S-

am

st

il Runge Kutta
-

fa
-
il

i
R
9. Aray

Histogram Analizi

am kullanarak fr

ograma sahiptir.
Korelasyon analizleri

anali
2 ile hesaplanabilir [31].

(2)

-
-1 ve +1

ilir.

Tablo 2
Red Green Blue
0.98134 0.98586 0.99009
(Yatay)
0.96492 0.97135 0.97595
(Dikey)
0.00058 0.00195 0.00272

-0.00105 0.00508 -0.00168

Entropi Analizi

demekt

(3)

r.
Tablo 3
Red Green Blue
Orijinal 7.6466 7.7057 7.7269

7.9992 7.9992 7.9991

i -

-kutusunda yerine

ve entropi analizleri

bir

olarak
.

ma

KAYNAKLAR
1. Baker, G. L., Baker, G. L., & Gollub, J. P. (1996). Chaotic dynamics: an introduction. Cambridge
University Press, 256s.
2. Strogatz, S. H. (1994). Nonlinear Dynamics and Chaos: With applications to physics, biology,
chemistry, and engineering Perseus Books Publishing, 512s.
3. Hilborn, R. C. (2000). Chaos and nonlinear dynamics: an introduction for scientists and engineers.
Oxford University Press on Demand, 672s.
4. Lorenz, E. N. (1963). Deterministic nonperiodic flow. Journal of the atmospheric sciences, 20(2),
130-141.
5. , 397-398.
6. Shimizu, T., & Morioka, N. (1980). On the bifurcation of a symmetric limit cycle to an asymmetric
one in a simple model. Physics Letters A, 76(3-4), 201-204.
7. Shaw, R. (1981). Strange attractors, chaotic behavior, and information flow. Zeitschrif
Naturforschung A, 36(1), 80-112.
8. Arneodo, A., Coullet, P., & Tresser, C. (1981). Possible new strange attractors with spiral structure.
Communications in Mathematical Physics, 79(4), 573-579.
9. Sprott, J. C. (1994). Some simple chaotic flows. Physical review E, 50(2), R647.
10. Chen, G., & Ueta, T. (1999). Yet another chaotic attractor. International Journal of Bifurcation and
chaos, 9(07), 1465-1466.
11. Liu, C., Liu, T., Liu, L., & Liu, K. (2004). A new chaotic attractor. Chaos, Solitons & Fractals, 22(5),
1031-1038.
12. Sundarapandian, V., & Pehlivan, I. (2012). Analysis, control, synchronization, and circuit design of
a novel chaotic system. Mathematical and Computer Modelling, 55(7-8), 1904-1915.
13. Elhadj, Z. (2008). Dynamical analysis of a 3-D chaotic system with only two quadratic nonlinearities.
Journal of Systems Science and Complexity, 21(1), 67-75.
14. Stinson, D., (2007). Cryptography Theory and Practice Third Edition, Chapman & Hall, 619s.
15. Katz, J., & Lindell, Y. (2008). Introduction to modern cryptography: principles and protocols.
Cryptography and network security, 552s.
16. Paar, C., & Pelzl, J. (2010). SHA-3 and The Hash Function Keccak. Understanding Cryptography A
Textbook for Students and Practitioners, www. crypto-textbook. com, 392s.
17. National Institute of Standards and Technology. (2001). Advanced Encryption Standard (AES). FIPS
PUB 197, Gaithersburg, Maryland, 9-25.
18. National Institute of Standards and Technology. (1999). Data Encryption Standard (DES). FIPS PUB
46, Gaithersburg, Maryland, 8-15.
19. National Institute of Standards and Technology. (2009). Digital Signature Standard (DSS). FIPS
PUB 186-4, Gaithersburg, Maryland, 15-19.
20. Chang, C. C., Hwang, M. S., & Chen, T. S. (2001). A new encryption algorithm for image
cryptosystems. Journal of Systems and Software, 58(2), 83-91.
21. Zhang, Z., & Sun, S. (2011, October). Image encryption algorithm based on logistic chaotic system
and s-box scrambling. In Image and Signal Processing (CISP), 2011 4th International Congress on
(Vol. 1, pp. 177-181). IEEE.
22. Fu, C., Chen, J. J., Zou, H., Meng, W. H., Zhan, Y. F., & Yu, Y. W. (2012). A chaos-based digital
image encryption scheme with an improved diffusion strategy. Optics Express, 20(3), 2363-2378.
23. Ogras, H., & Turk, M. (2012). Digital image encryption scheme using chaotic sequences with a
nonlinear function. World Academy of Science, Engineering and Technology, 67, 555-558.
24. Volos, C. K., Kyprianidis, I. M., & Stouboulos, I. N. (2013). Image encryption process based on
chaotic synchronization phenomena. Signal Processing, 93(5), 1328-1340.
25. Hraoui, S., Gmira, F., Jarar, A. O., Satori, K., & Saaidi, A. (2013, May). Benchmarking AES and
chaos based logistic map for image encryption. In Computer Systems and Applications (AICCSA),
2013 ACS International Conference on (pp. 1-4). IEEE.
26. Gaur, E. A., & Gupta, E. M. (2014). Review&58; Image Encryption Using Chaos Based algorithms.
International Journal of Engineering Research and Applications, 4(3), 904-907.
27. Liu, H., Kadir, A., & Niu, Y. (2014). Chaos-based color image block encryption scheme using S-
box. AEU-international Journal of Electronics and Communications, 68(7), 676-686.
28. Zhou, W., Xu, Y., Lu, H., & Pan, L. (2008). On dynamics analysis of a new chaotic attractor. Physics
Letters A, 372(36), 5773-5777.
29. A. Rukhin et al., A Statistical Test Suite for Random and Pseudorandom Number Generators for
Cryptographic Applications, NIST, Gaithersburg, MD, 2010.
30. Volos, C., Akgul, A., Pham, V. T., Stouboulos, I., & Kyprianidis, I. (2017). A simple chaotic circuit
with a hyperbolic sine function and its use in a sound encryption scheme. Nonlinear Dynamics, 89(2),
1047-1061.
31. Shannon, C. E. (1948). A mathematical theory of communication. Bell system technical journal,
27(3), 379-423.

You might also like