Chapter 2
Chapter 2
LITERATURE REVIEW
Y. Xie, J. Yu, S. Guo, Q. Ding, and E. Wang, “Image encryption scheme with
compressed sensing based on new three-dimensional chaotic system,” Entropy, vol.
21, no. 9, p. 819, 2019.
In this paper, a new three-dimensional chaotic system is proposed for image
encryption. The core of the encryption algorithm is the combination of chaotic system
and compressed sensing, which can complete image encryption and compression at
the same time. The Lyapunov exponent, bifurcation diagram and complexity of the
new three-dimensional chaotic system are analyzed. The performance analysis shows
that the chaotic system has two positive Lyapunov exponents and high complexity. In
the encryption scheme, a new chaotic system is used as the measurement matrix for
compressed sensing, and Arnold is used to scrambling the image further. The
proposed method has better reconfiguration ability in the compressible range of the
algorithm compared with other methods. The experimental results show that the
proposed encryption scheme has good encryption effect and image compression
capability.
10
A. Belazi, A. A. Abd El-Latif, and S. Belghith, “A novel image encryption scheme
based on substitution-permutation network and chaos,” Signal Processing, vol. 128,
pp. 155–170, 2016.
In this paper, a novel image encryption approach based on permutation-substitution
(SP) network and chaotic systems is proposed. It consists of four cryptographic
phases: diffusion, substitution, diffusion and permutation. Firstly, a diffusion phase is
proposed based on new chaotic map. Then, a substitution phase based on strong S-
boxes followed by a diffusion phase based on chaotic logistic map are presented
which will, in turn, significantly increase the encryption performance. Finally, a block
permutation phase is accomplished by a permutation function to enhance the
statistical performance of the proposed encryption approach. Conducted experiments
based on various types of differential and statistical analyses show that the proposed
encryption approach has high security, sensitivity and speed compared to previous
approaches.
M. Kaur and V. Kumar, “Beta chaotic map based image encryption using genetic
algorithm,” International Journal of Bifurcation and Chaos, vol. 28, no. 11, Article
ID 1850132, 2018.
In this paper, an efficient image encryption technique using beta chaotic map,
nonsubsampled contourlet transform, and genetic algorithm is proposed. Initially, the
11
nonsubsampled contourlet transform is utilized to decompose the input image into
subbands. The beta chaotic map is used to develop pseudo-random key that encrypts
the coefficients of subbands. However, it requires certain parameters to encrypt these
coefficients. A multiobjective fitness function for genetic algorithm is designed to
find the optimal parameter of beta chaotic map. The inverse of nonsubsampled
contourlet transform is performed to obtain a ciphered image. The performance of the
proposed technique is compared with recently developed well-known meta-heuristic
based image encryption techniques. Experimental results reveal that the proposed
technique provides better computational speed and high encryption intensity. The
comparative analyses show effectiveness of the proposed image encryption technique.
M. Kaur, D. Singh, K. Sun, and U. Rawat, “Color image encryption using non-
dominated sorting genetic algorithm with local chaotic search based 5d chaotic
map,” Future Generation Computer Systems, vol. 107, pp. 333–350, 2020.
In this paper author specify a new secure key generation which is the predominant
requirement of an image encryption. Chaotic maps are often considered by the
researchers for secure key generation. However, chaotic maps suffer from hyper-
tuning issue because the requirement of initial parameters. Therefore, an integrated
non-dominated sorting genetic algorithm and local chaotic search based
image encryption technique is proposed to tune the hyper-parameters of 5 chaotic map
(TFCM). To implement TFCM, initially, the input image is decomposed into sub-
bands using a dual-tree complex wavelet transform (DTCWT). These sub-bands are
then diffused using the secret key obtained from the optimized 5 chaotic map. Finally,
the inverse DTCWT is applied to obtain the final encrypted image. However, TFCM
is computationally extensive for images with a larger size. Therefore, a parallel
implementation of TFCM is also considered. Experimental analyses show that TFCM
outperforms the competitive techniques in terms of NPCR, entropy, PSNR, and UACI
by 0.9572%, 1.1576%, 1.0373%, and 1.0854%, respectively.
X. Wang and D. Luan, “A novel image encryption algorithm using chaos and
reversible cellular automata,” Communications in Nonlinear Science and Numerical
Simulation, vol. 18, no. 11, pp. 3075–3085, 2013.
12
In this paper, a novel image encryption scheme is proposed based on
reversible cellular automata (RCA) combining chaos. In this algorithm, an
intertwining logistic map with complex behavior and periodic boundary reversible
cellular automata are used. We split each pixel of image into units of 4 bits, then
adopt pseudorandom key stream generated by the intertwining logistic map to
permute these units in confusion stage. And in diffusion stage, two-dimensional
reversible cellular automata which are discrete dynamical systems are applied to
iterate many rounds to achieve diffusion on bit-level, in which we only consider the
higher 4 bits in a pixel because the higher 4 bits carry almost the information of an
image. Theoretical analysis and experimental results demonstrate the proposed
algorithm achieves a high security level and processes good performance against
common attacks like differential attack and statistical attack. This algorithm belongs
to the class of symmetric systems.
13
In this paper, a five-dimensional discrete hyperchaotic map is constructed by
combining Logistic map and 3D discrete Lorenz map. Based on this chaotic system, a
block-based image encryption scheme related to plaintext is designed. The encryption
scheme includes scrambling operation and diffusion operation. In the scrambling
operation, the scrambling sequence is related to the pixels of the plaintext image,
while in the diffusion operation, two rounds of diffusion are carried out for intra-block
diffusion, and the generation of random diffusion sequence is related to a pixel value
in the block in each round of diffusion, which makes the algorithm resist chosen-
plaintext attack. When the next block is diffused, the generation of the diffusion
sequence is related to the first and last pixels of the previous block, which makes the
block and block interact with each other and enhances the sensitivity of the algorithm
to plaintext. Theoretical analysis and experimental results demonstrate the security
and practicability of the cryptosystem.
H. Liu, B. Zhao, and L. Huang, “A novel quantum image encryption algorithm based
on crossover operation and mutation operation,” Multimedia Tools and Applications,
vol. 78, no. 14, pp. 20465–20483, 2019.
In this paper, a new algorithm of image encryption based on random selection of
crossover operation and mutation operation is proposed. Crossover operation and
14
mutation operation come from genetic algorithm that gets high-quality solutions to
optimization. First, quantum chaos sequence and two-dimensional logistic sequence
are XORed with plain-image. And then, adjacent pixels of the image are carried out
bit-level crossover operation and crossover bits rely heavily on chaotic maps for
chaotic property. Finally, two different bits of each pixel are employed to perform
mutation for high randomness. In order to obtain the high complexity and
unpredictability further, quantum chaotic map is coupled with nearest-neighboring
coupled-map lattices (NCML). Computer simulations and statistical analyses show
that the proposed algorithm has more than 1045 bits key space, low correlation closed
to 0, ideal information entropy closed to 8, acceptable speed performance
4.7081Mbt/s and resistance to various attacks.
15
some parameters and value assignment to these parameters is very crucial. Because,
poor value assignments may make the chaotic map un-chaotic. Therefore, hyper-
parameter tuning of chaotic maps is required. Recently, meta-heuristic based image
encryption approaches have been designed by researchers to resolve this issue.
However, the majority of the techniques suffer from poor computational speed and
stuck in local optima problems. Therefore, in this study, a strength Pareto
evolutionary algorithm-II based meta-heuristic approach is proposed to tune the
hyper-parameters of the four-dimensional chaotic map. The proposed approach is also
implemented in a parallel fashion to enhance the computational speed. The
effectiveness of the proposed approach is evaluated through extensive experiments.
16
A new block cipher for gray images is proposed in this paper which fully utilizes
whole set of DNA complementary rules dynamically for encoding and decoding each
pixel of a block. The most significant (MSB) part of each block is added under DNA
addition operation with least significant (LSB) while LSB part itself get encrypted by
chaotically selecting different DNA rules for each pixel. The initial condition is
calculated from 128-bits external input key and then the said key is modified for each
subsequent block of an image. An image is permuted by Piecewise Linear Chaotic
Map (PWLCM) while logistic sequence is used for the selection of encoding and
decoding rules for each pixel of a block. The simulated experimental results and the
security analysis in terms of quantitative and qualitative way show that our cipher can
not only achieve good encryption effect to resist the exhaustive and statistical attacks
but also is a good candidate for encrypting large sized uncompressed gray images.
E. Chen, L. Min, and G. Chen, “Discrete chaotic systems with one-line equilibria and
their application to image encryption,” International Journal of Bifurcation and
Chaos, vol. 27, no. 3, Article ID 1750046, 2017.
This paper introduces nine four-dimensional discrete chaotic systems with one-line
equilibria (DCSLE), consisting of some simple sine functions. Based on the
generalized chaos synchronization (GCS) theorem, a DCSLE is used to construct an
eight-dimensional DCSLE GCS system. The new DCSLE GCS system is verified by
numerical simulation and then used to design a chaotic pseudorandom number
generator (CPRNG). The randomness of ten 100-key streams generated by the
CPRNG, two GCS-based CPRNGs, the RC4 PRNG and the ZUC PRNG are tested by
the SP800-22/FIPS 140-2 tests. The test results confirm that the randomness
performances of the three CPRNGs are promising, for there are no significant
correlations between a keystream and any perturbed keystream generated by such
CPRNG. Also, the key space of the CPRNG is larger than 2117021170. Finally, the
CPRNG is used with an avalanche-effect encryption scheme to encrypt an RGB
image, demonstrating that the CPRNG is able to generate the avalanche effects which
are similar to those generated by ideal CPRNGs.
17
A new image encryption method based on permutation–diffusion architecture is
proposed. Permutation and diffusion operations are performed row-wise and column-
wise on input image. To permute and diffuse the pixels, Lorenz-like chaotic system
with varying bifurcation parameter is used to generate six random sequences. Initially,
three sequences help in change the pixel’s position and next three used to diffuse the
pixels. The main benefit of this method is that it is more sensitive to input image.
Since input parameters required for secure key generation depend upon the input
image.
J. Liu, S. Tang, J. Lian, Y. Ma, and X. Zhang, “A novel fourth order chaotic system
and its algorithm for medical image encryption,” Multidimensional Systems and
Signal Processing, vol. 30, no. 4, pp. 1637–1657, 2019.
Today, medical imaging suffers from serious issues such as malicious tampering and
privacy leakage. Encryption is an effective way to protect these images from security
threats. Chaos has been widely used in image encryption, the majority of these
algorithms are based on classical chaotic systems. For now, these systems are easy to
analyze and predict, which are not sufficient for image encryption proposes. In this
paper, a novel fourth order chaotic system is proposed, accompanied by analysis of
Lyapunov exponent and bifurcations. Finally, the application of this system with
medical image encryption is proposed. As this system could have six control
parameters and four initial conditions, the key space is far greater than 5.1 × 218191,
which is large enough to resist brute force attack. Correlation analysis and differential
attack analysis further demonstrate that this scheme has a strong resistance against
statistical attacks and differential attack.
C. Chen, K. Sun, and S. He, “An improved image encryption algorithm with finite
computing precision,” Signal Processing, vol. 168, Article ID 107340, 2020.
When a digital chaotic system is realized on hardware of finite computing precision, it
will lead to short period orbits. Although many existing image encryption algorithms
declared that the average cycle lengths of their digital chaotic systems are larger than
the required cycle lengths in image encryption, there are still many period orbits
whose lengths are far smaller than the average cycle length. To further improve
security with finite precision, an improved cryptosystem is proposed based on a new
18
two-dimensional chaotic map derived from the Sine map, the Chebyshev map and a
linear function (2D-SCL). Performance estimation demonstrates that the 2D-SCL has
good ergodicity, hyperchaotic behavior, large cycle lengths under low computing
precisions, and its complexity is larger and more stable than that of several newly
developed 2D chaotic maps. Thus we design an improved cryptosystem based on the
2D-SCL map. In the scheme, we combine the confusion and diffusion processes in
one stage to improve the running speed. Based on the SHA-1 hash values of plain
image and the chaotic sequence, a pseudorandom sequence is designed and then an
anti-degradation method is introduced to improve the dynamic degradation of the 2D-
SCL map under finite computing precision. Meanwhile, this algorithm also updates
the initial values of the 2D-SCL map in real-time, thus enhancing the ability to resist
known-plaintext and chosen-plaintext attacks. The largest precision is set at 2−16, and
simulation results show that this algorithm has high security, low time complexity,
and the ability to withstand common attacks.
K. Xuejing and G. Zihui, “A new color image encryption scheme based on dna
encoding and spatiotemporal chaotic system,” Signal Processing: Image
Communication, vol. 80, Article ID 115670, 2020.
In this paper, a new color image encryption scheme based on DNA operations and
spatiotemporal chaotic system is presented. Firstly, to hide the distribution
information of the plain image, we convert the plain image into three DNA matrices
based on the DNA random encoding rules. Then, the DNA matrices are combined
into a new matrix and is permutated by a scramble matrix generated by mixed linear-
nonlinear coupled map lattices (MLNCML) system. In which, the key streams are
associated with the secret keys and plain image, which can ensure
our cryptosystem plain-image-dependent and improve the ability to resist known-
plaintext or chosen-plaintext attacks. Thereafter, to resist statistical attacks, the
scrambled matrix is decomposed into three matrices and diffused by DNA deletion-
insertion operations. Finally, the three matrices are decoded based on DNA random
decoding rules and recombined to three channels of the cipher image. Simulation
results demonstrate that the proposed image cryptosystem has good security and can
resist various potential attacks.
19