Metrics An Efficient Image Encryption Scheme Based On Henon Map Skew Tent Map and S-Box

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

An Efficient Image Encryption Scheme Based on:

Henon Map, Skew Tent Map and S-Box


Jansher Khan Jawad Ahmad Seong Oun Hwang
Department of Electrical and Department of Electronic and Department of Computer and
Electronic Engineering Computer Engineering Information Communication
Istanbul Technical University Graduate School, Hongik University Engineering, Hongik University
Istanbul, Turkey South Korea South Korea
Email: jskm893@gmail.com Email: jawad.saj@gmail.com Email: sohwang@hongik.ac.kr

Abstract—Due to easy and simple implementation, normally implementation [2-8].It is reported in [3], some chaos-based
single 1-D chaotic maps like logistic and sine maps are employed image encryptions algorithms are susceptible to various attacks
in multimedia data encryption. However, data encrypted through due to their weaker encryption mechanism and small key
a single chaotic map does not provide better security in terms of spaces. Nowadays, chaos based cryptosystems are gaining the
resistance against various attacks. In this paper, 2D Henon attention of researchers for developing novel secure image
chaotic map and skew tent map are deployed in the design of an
encryption techniques. Newly designed schemes are supposed
efficient chaos-based image encryption algorithm. To confuse the
relationship between plaintext and ciphertext images, both to be secure and which also meet the demands for a real-time
chaotic maps play a key role in the permutation and diffusion image encryption and then transmission overrun secure
mechanism. In the confusion stage, firstly, the Henon chaotic channels. For the sake of improving security characteristics,
map generates two different chaotic sequences, which are further chaos based encryption algorithms usually consist of two
applied in row and column permutation of plaintext image. The processes: (1) chaotic confusion (permutation), which is
pixel values diffusion is produced by unimodal skew tent map via basically shuffling the positions of pixels,(2) chaotic diffusion,
XOR operations. In the last stage of encryption algorithm, changing the pixels gray values. It is understood that a good
Hussain’s substitution box is used to substitute each pixel into a encryption algorithm should be sensitive to cipher keys. The
new random pixel. Extensive security analysis and resistance to
confusion and diffusion processes should also possesses better
statistical attack prove the security of anticipated scheme.
statistical properties to frustrate statistical attack, known as
plaintext attack, chosen-plaintext attack and differential attack
IndexTerms—Henon map, Skew Tent Map, Confusion, etc. In this paper, the plaintext image is shuffled row-wise and
Diffusion, S-Box column-wise by using generalized 2-D Henon map which
confirms better shuffling effects. To make the algorithm more
I. INTRODUCTION secure against various kinds of attacks, diffusion is also carried
Due to the blanketing nature of chaos theory, it is spread out. In the process of diffusion, pixels of shuffled image are
over many fields of todays, technology. That might be the bitwise XORed with random chaotic values which is generated
reason; it is extended in every subject, like computer, physics, by the skew tent map. In the last stage of proposed scheme,
engineering, mathematics, biology and even arts. Most pixels are transformed to new pixels via Hussain’s Substitution
commonly, it plays an active role in many cryptographic Box (S-Box).
applications. In current era, chaotic systems are analyzed to be The rest of the paper is organized as follows. In section II,
extremely powerful for real time implementation in secure Henon and skew tent maps are defined and their chaotic
communications. The security of chaotic systems is due to its properties are also analyzed. Section III demonstrates the
inherent properties like sensitivity to control parameters, initial proposed encryption scheme. The security and experimental
conditions, non-periodicity and deterministic pseudo-random analysis are presented in section IV. Section V concludes the
behavior. Because of some other properties, for example, paper.
nonlinear dynamics and larger key space, chaotic maps can be
implemented in modern cryptosystems. Combination of chaos II. PRELIMINARIES
theory and cryptography has set a new direction for In this paper, we use two chaotic maps, Henon map [9] and
information security or secure communications. skew tent map for shuffling and diffusion process respectively.
Matthews [1] was the first one who suggested the idea of To add some other security characteristics, we also use the
chaos-based encryption algorithm. After the novel idea of Hussain’s S-Box in the proposed scheme. In this section, we
Mattews, many chaos-based image encryption schemes has shortly discuss how the Henon map, skew tent map and
been presented and analyzed. Among these encryption Hussain S-Box can play a key role in image encryption
algorithms, chaotic maps such as Logistic map, Henon map, scheme.
Unimodel skew tent map, Arnold map, Baker map and
Standard map are applied extensively because of simple

978-1-4673-6601-4/15/$31.00 ©2015 IEEE

Authorized licensed use limited to: American Universtiy in Cairo - (AUC). Downloaded on January 20,2022 at 00:28:17 UTC from IEEE Xplore. Restrictions apply.
Skew Tent Map
1
Henon Map
0.4 0.9

0.8
0.3

0.7
0.2
0.6
0.1
0.5
0
Y

0.4

-0.1
0.3

-0.2 0.2

-0.3 0.1

0
-0.4 1 1.2 1.4 1.6 1.8 2 2.2 2.4 2.6 2.8 3
-1.5 -1 -0.5 0 0.5 1 1.5
X
(a)
1.5
Fig.2. The plot of unimodel skew tent map

1 two random sequences which permutes row and column


positions of an image, respectively.
0.5

A. SKEW TENT MAP


0
Skew tent map U0:[0, 1] [0, 1], also known as
-0.5
asymmetric tent map is a 1-D chaotic map. It is most widely
used in many cryptographic applications [10, 11].
-1 Mathematically, it is given by:

-1.5
0 0.2 0.4 0.6 0.8 1 1.2 1.4 [ ]
(b) (2)
Fig. 1. (a) Attractors for the Henon map with a = 1.4 and b ]
= 0.3. (b) Bifurcation diagram of the Henon map for b = 0.3.
Where a ϵ (0,1) is called the control parameter and x ϵ [0,
A. HENON MAP 1] is known as the state of system. Skew tent map is a
In 1976, Henon proposed a 2-D invertible chaotic system. It noninvertible transformation of the unit interval onto itself. At
was a simplified solution of the Poincare map for the Lorenz a = 0.5, U0becomes a regular tent map. The transformation of
model, represented by the state equations with a chaotic the skew tent map is continuous and piecewise linear. From
attractor [9]. Mathematically, Henon map can be written as Fig.2,the slope of the left branch is: and the slope of the
follows:
right branch is: .For all values of a in the range
(1) (0,1), the skew tent map has positive Lyapunov exponent [10].
This positive Lyapunov exponent indicates the chaotic
Where a and b are known as bifurcation parameters. The properties for the skew tent map. We utilize this chaotic range
contraction in 2-D Henon map is independent of x and y. The of skew tent map for implementing diffusion in our proposed
parameters a and b are examined for various numerical values scheme. The orbits { } of this map are uniformly distributed
and the chaotic nature can be establish fora = 1.4 and b = 0.3 over the interval [0, 1], which is discussed in detail in [10, 11].
only. Figure 1(a) highlights the diagram of the Henon map In [12], some other advantages; such as simplicity, high key
attractor map on the x-y plane. Figure 1(b) exhibits the sensitivity, and larger key space are also highlighted. Due to
bifurcation behavior of the Henon map with b = 0.3.Along the afore mention properties, we are using the skew tent map for
horizontal axis, x coordinate of the attracting set are plotted for the generation of a random matrix. This random matrix is
different values in the range 0 a . At a = 0.35, the deployed in the process of diffusion.
iteration sequence starts to split into a two-periodic oscillation,
B. HUSSAIN S-BOX
which is continued up to the value of 0.85. This splitting
mechanism is also known as periodic-doubling bifurcation. In In [13], Hussain et al presented a new substitution box for
the approximation range,0.85 , successive doubling the purpose of generating confusion in plaintext data. In the
of period occurs. For the value of , the periodicity literature this substitution box is known as Hussain’s S-Box. In
changes to chaotic behavior in the dark region. Due to this [14-19], authors analyzed the properties of this S-Box. It is
chaotic behavior, we use the Henon map in our proposed reported that Hussain’s S-Box can be effectively used in any
encryption scheme. The Henon map is employed for producing encryption algorithm. Various authors has also tested the
strength of the Hussain’s S-Box by applying non-linearity test,

Authorized licensed use limited to: American Universtiy in Cairo - (AUC). Downloaded on January 20,2022 at 00:28:17 UTC from IEEE Xplore. Restrictions apply.
linear approximation probability method, bit independence
criterion, differential approximation probability method, strict
avalanche criterion and majority logic criterion. Details of Start End
Hussain S-Box can be found in [13]. In the last step of
diffusion we apply Hussain’s S-Box.
III. PROPOSED ENCRYPTION SCHEME Input Decrypted
Figure 3 shows the flow chart of the proposed encryption Image Image
and decryption algorithms. Steps are explained below. Let I be
an input plaintext image of size m × n. Xm and Ym are random
row vectors of size 1 × m and 1 × n, respectively, which is
generated via the Henon chaotic map. Ѵ is a row vector of Henon Inverse Row
random elements of size 1 × mn which is obtained by iterating Map Scrambling
the skew tent map. Ѵ is converted into Ѷto form a matrix of
size m × n. Here the values of matrix Ѷ are between [0,255]. C
is the final ciphertext image. Figure 3 shows the flow chart of
the proposed encryption and decryption algorithms. Detailed Row Inverse Column
steps are explained below. Scrambling Scrambling
Step-1: Random indices Xm and Ym are obtained by iterating
the Henon map K times using initial conditions x0 andy0.Where
K is calculated by using Eq. 3.Here the value of K is
formulated according to the size of image I. Mathematically, K
Column Henon
can be written as:
Scrambling Map
(3)

Step-2: The plaintext image I is now row-wise permutated


through pseudo-random permutation sequence Xm, to get a
row-permutated image Г. Skew-Tent Map Inverse Bit-wise
Step-3: The row-permutated image Г is now again XOR
permutated column-wise through pseudo-random permutation
sequence Ym, to get a permutated image Ѓ.
Step-4: A random matrix Ѵ is generated via iterating the
skew tent map m × n times through the initial condition v0and Bit-wise Skew-Tent
control parameter a. XOR Map
Step-5: The matrix Ѵ is multiplied by a factor of 1014 and
then passed through modulus 256 operation, to get Ѷ matrix.
Mathematically, Ѷ is calculated as:
Hussain’s Inverse Hussain’s
S-Box S-Box
(4)

Step-6: Each pixel of permutated image Ѓ is bit-wise


XORed with the random matrix Ѷ to get a matrix B.
Ciphertext Ciphertext
Step-7: Substitute each pixel of matrix B with the pixel
Image Image
values of Hussain’s S-Box, to get the final ciphertext image C.

To get the plaintext image I from the ciphertext image C,


apply all steps from 1 to 9 in a reverse order. This reverse
process is also known as decryption mechanism. End Start
IV. EXPERIMENTAL RESULTS AND DISCUSSION
In this section, some experimental results are presented Fig. 3.Flow chart of the proposed encryption/decryption
to demonstrate the effectiveness and robustness of the proposed scheme.
scheme. The proposed algorithm is implemented in MATLAB
R2012b and results are carried out for the Cameraman gray conceals all attributes of plaintext image. It is also clear from
scale image of size 256 × 256 pixels. The Cameraman image is Fig 4(f) and Fig 4(g) that the histogram of ciphertext image is
encrypted through proposed scheme and results are depicted in completely different from plaintext image. Detail security
Fig4. Form Fig 4(e), it is evident that the ciphertext image analyses are presented in subsequent sections.

Authorized licensed use limited to: American Universtiy in Cairo - (AUC). Downloaded on January 20,2022 at 00:28:17 UTC from IEEE Xplore. Restrictions apply.
1000

900

800

700

600

500

400

300

200

100
(a) 0

0 50 100 150 200 250

(f)

600

500

400

300

200
(b)
100

0 50 100 150 200 250

(g)
Fig. 4. (a) Original cameraman image. (b) Row-wise
permuted image. (c) Column-wise permuted image. (d)
Diffused image via XORed operation. (e) The image after
Hussain’s S-Box transformation. (f) Histogram of original
Cameraman image.(g) Histogram of Ciphertext image.

(c) A. CORRELATION COEFFICIENT


In 1880’s, Kral Pearson proposed product moment
correlation coefficient and is used in determining the similarity
between horizontally and vertically adjacent pixels of an
image. It is understood that the correlation among the adjacent
pixels of plaintext image is significantly high. A low
correlation values are required for an encrypted image.
Mathematically, the correlation of an image is given by:
(5)

(d) ∑ ̅ ̅ (6)

∑ ̅ (7)

∑ ̅ (8)

Where σx and σy are the standard deviations (σx≠ 0, σy≠ 0),


is the value of correlation coefficient between -1 and
1.Cov(x,y) is covariance at pixels positions x and y, ̅ and ̅ are
the mean value operators. N is the total number of pixels for an
(e) N × N matrix.

Authorized licensed use limited to: American Universtiy in Cairo - (AUC). Downloaded on January 20,2022 at 00:28:17 UTC from IEEE Xplore. Restrictions apply.
As mentioned earlier that the lower value of correlation Table 1
coefficients is an indicator of lower similarities among Correlation analysis of the plaintext and ciphertext images
neighbor pixels. Table 1 shows correlation values of the
plaintext and the ciphertext images, respectively. These results Direction of adjacent pixels Plaintext Ciphertext
illustrates that the pixels of ciphertext image are less correlated Image Image
with each other.
Horizontal 0.9472 -0.0042
B. ENTROPY
Vertical 0.9577 0.0114
Entropy is a statistical measure of randomness that can be Diagonal 0.9062 -0.0074
used to demonstrate the texture of an image. Mathematically,
the entropy H (m)can be calculated as:
Table 2: Results of encryption quality analysis
∑ ( ) (7)
Parameters Cipher image
Where is the probability of occurrence of symbol
MD 66521
(mi), N is the total number of symbol m and log2denotes that
the entropy values are represented in bits. For a true random
source that emits28 symbols, its ideal entropy value is H (m) = ID 39554
8. The value of entropy is calculated by Eq. 7 for the ciphertext
image which is 7.9972. This means that the ciphertext image is Dp 0.0489
very close to a true random source and the proposed scheme
has resistance against entropy attack. MSE 40.3295

C. HISTOGRAM ANALYSIS NPCR 99.0799


For a highly secure encryption scheme, the histogram plot
of the ciphertext image should be ideally uniform. Figure 3(g) UACI 33.5612
shows that the ciphertext image have fairly uniform histogram
and significantly different from the histogram of plaintext
image. Hence, it does not provide any useful information for
the attackers to perform any type of statistical attack on the V. CONCLUSION
encrypted image.
An efficient, lightweight image encryption and decryption
D. ENCRYPTION QUALITY ANALYSIS scheme, based on chaotic maps and Hussain S-Box is
presented in this paper. In the process of permutation, the
In [20-22], Jawad et al underlined various parameters
proposed scheme shuffles plaintext image in an unpredictable
(metrics) which can be used for security and efficiency analysis
way. To change the gray values of shuffled image, an efficient
of an image encryption scheme. These security and quality
diffusion process is also the main part of the proposed scheme.
parameters are correlation coefficient, maximum deviation
Sensitivity of the Henon map and the skew tent map to the
(MD), irregular deviation (ID), deviation from uniform
initial conditions and control parameters provides the security
histogram (Dp), Number of Pixel Change Rate (NPCR), Mean
attributes. We analyzed the scheme through performing various
Square Error (MSE) and Unified Average Change Intensity
differential and statistical tests. The experimental results are in
(UACI). These metrics are applied on the encrypted
favor of the proposed scheme. The scheme can also be easily
Cameraman image and the results are tabulated in Table 2.
manipulated for an image of unequal width and height as well.
These results prove the security, quality and validity of the
All these desired properties make the presented scheme a
proposed scheme against different kinds of attacks.
potential candidate for the real time encryption and decryption
of digital images.
E. KEY SPACE ANALYSIS
To resist against the brute-force attack, a large key space is ACKNOWLEDGMENT
required. According to IEEE floating format, the precision of
64-bit number is about 10-15. According to this format, the key This research was supported by Basic Science Research
space is (1015)4 which is around 2199. Hence this key space is Program through the National Research Foundation of Korea
large enough to resist brute force attack.
(NRF) funded by the Ministry of Education (2014054174) and
the Agency for Defense Development under contract
UD130057ED.
This research was also supported by the MSIP (Ministry of
Science, ICT and Future Planning), Korea, under the Global IT

Authorized licensed use limited to: American Universtiy in Cairo - (AUC). Downloaded on January 20,2022 at 00:28:17 UTC from IEEE Xplore. Restrictions apply.
Talent support program (NIPA-2014-H0905-14-1004) [16] Hussain I, Shah T, Aslam SK(2010) Graphical SAC
supervised by the NIPA (National IT Industry Promotion analysis of S8 APA- S-box, Adv Algebra 3(2):57-62
Agency). [17] Shah T, Hussain I, Gondal MA, Mahmood H (2011)
Statistical analysis of S-box in image encryption
applications based on majority logic criterion. Int J PhysSci
References: 6(16):4110-4127
[18] Hussain I, Shah T, Mahmood H, Gondal MA, Bhatti
[1] R. Matthews, On the derivation of a chaotic UY (2011): some analysis of S-box based on residue of
encryption algorithm, Cryptologia, 8(1989), 29–41 prime number. Proc Pak AcadSci 48(2): 111-115
[2] Z.-H. Guan, F. Huang, W. Guan,Chaos-based [19] Tran Mt, Bui DK, Doung AD (2008) Gray S-box for
image encryption algorithm, Physics Letters A, 346 advanced encryption standard. Int Conf Comp Intel Secur
(2005), 153–157. 253-256
[3] S. Lian, J. Sun, Z. Wang, A block cipher based on [20] Ahmad, J., Ahmed, F.: Efficiency analysis and security
a suitable use of the chaotic standard map, Chaos, evaluation of image encryption schemes. IJENS 23 (2012)
Solitons and Fractals, 26 (2005), 117–129. 18(31).
[4] K. W. Wong, B. Kwok, W. S. Law, A fast image [21] Younas, M Bin and Ahmad, Jawad.: Comparative
encryption scheme based on chaotic standard map, analysis of chaotic and non-chaotic image encryption
Physics Letters A , 372(2008), 2645–2652. schemes. International Conference on Emerging
Technologies (ICET), IEEE, 81-86 (2014)
[5] V. Patidar, N. K. Pareek, K. K. Sud, A new
[22] Ahmad, Jawad, Hwang Oun Seong, Arshid: An
substitution–diffusion based image cipher using
Experimental Comparison of Chaotic and Non-chaotic
chaotic standard and logistic maps, Commun.
Image Encryption Schemes, WPC, 1-8 (2015)
Nonlinear Sci. Numer.Simulat., 14 (2009) 3056–
3075.
[6] L. Kocarev, Chaos-based cryptography: a brief
overview, IEEE Circuits and Systems Magazine,
1(2001), pp. 6–21.
[7] N. K. Pareek, V. Patidar, K. K. Sud, Image
encryption using chaotic logistic map, Image and
Vision Computing, 24(2006), 926-934
[8] X. Tong, M. Cui, Image encryption with compound
chaotic sequence cipher shifting dynamically,
Image and Vision Computing, 26 (2008), 843–850.
[9] M. Henon, A two-dimensional mapping with a
Strange attractor, Communications in Mathematical
Physics 50(1976)69-77.
[10] G.Alvarez, S.Li, Some basic cryptographic
requirements for chaos-based cryptosystems, International
Journal of Bifurcation and Chaos 16(8) (2006) 2129-2151.
[11] M.Hasler, Y. L. Maistrenko, An introduction to the
synchronization of chaotic systems: Coupled skew tent
maps, Circuits and Systems I: Fundamental Theory and
Applications, IEEE transactions on 44(10) (1997) 856{866.
[12] Zhang, G., Liu, Q.: A novel image encryption method
based on total shuffling scheme. Opt. Commum. 284, 2775-
2780(2011).
[13] HusssainIqtadar, Shah Tariq, gondal Muhammad Asif,
Mahmood Hassan. A projective general linear group based
algorithm for the construction of substitution box for block
ciphers. Neural ComputAppl 2012:22(6):1085-93.
[14] Hussain I, Shah T, Mahmood H, Afzal M (2010)
Comparative analysis of S-boxes on graphical SAC. Int J
ComputAppl 2(5):5-8
[15] Hussain, Mahmood Z (2010) Graphical strict
avalanche criterian for Kasumi S-box. Can J Comput Math
Nat Sci Eng Med 1(5):132-136

Authorized licensed use limited to: American Universtiy in Cairo - (AUC). Downloaded on January 20,2022 at 00:28:17 UTC from IEEE Xplore. Restrictions apply.

You might also like