Back to Search
Start Over
A Novel Method for Image Encryption Based on Chaos and Transcendental Numbers
- Source :
- IEEE Access, Vol 7, Pp 163729-163739 (2019)
- Publication Year :
- 2019
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2019.
-
Abstract
- In this paper, a method for image encryption is proposed based on a novel approach using chaos and transcendental numbers for generating the substitution box and the ciphering keys. The Chaotic Pi Ciphering (CPC) is a robust symmetric cryptosystem of the substitution-permutation-network type, that ciphers images in ten rounds. The objective of CPC is to avoid some general weakness points in cryptosystems, such as the vulnerability to certain types of attacks or the encryption with data loss. The number of rounds can be increased up to 14, with an even further increment of the ciphering security. An 8×8 substitution box is constructed using chaos, and its value of the Differential Power Analysis is lower than the corresponding to the Advanced Encryption Standard (AES). It makes CPC more resistant to differential and linear attacks than AES. CPC has approximately 2512 keys, presenting a high resistance to brute-force attacks. Chaos is produced by a nonlinear differential equation, and the Walsh function is applied to measure the nonlinearity of the box. The transcendental number pi and a positive integer are employed to generate the schedule keys, and the key length is equal to the image size. The randomness of the encrypted images is evaluated with four tests: entropy, correlation, Discrete Fourier Transform, and a goodness-of-fit test using the chi square distribution χ2. CPC was tested using well-known images from the related literature, and its performance was compared to the corresponding to AES. The results show a good entropy and a high randomness, indicating a high-quality ciphering.
- Subjects :
- General Computer Science
Computer science
chaos
02 engineering and technology
Encryption
Discrete Fourier transform
transcendental numbers
0202 electrical engineering, electronic engineering, information engineering
Cryptosystem
General Materials Science
Randomness
Computer Science::Cryptography and Security
Symmetric cryptosystem
Key size
nonlinear differential equations
discrete Fourier transform
business.industry
020208 electrical & electronic engineering
Advanced Encryption Standard
General Engineering
020206 networking & telecommunications
image encryption
Power analysis
Walsh function
lcsh:Electrical engineering. Electronics. Nuclear engineering
business
lcsh:TK1-9971
Algorithm
Subjects
Details
- ISSN :
- 21693536
- Volume :
- 7
- Database :
- OpenAIRE
- Journal :
- IEEE Access
- Accession number :
- edsair.doi.dedup.....ca1d2ab4e6e41494e54028f78a05702e
- Full Text :
- https://doi.org/10.1109/access.2019.2952030