..............................
..............................
..............................
A New Image Encryption Scheme Using Dual Chaotic Map Synchronization
Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using
chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as
the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion
properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and
Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions
and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-
slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common
security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses,
we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many
practical security applications in insecure network channels such as the Internet.
[1] Al-hazaimeh O., “Increase the Security Level for Real-Time Application Using New Key Management Solution,” International Journal of Computer Science Issues, vol. 9, no. 3, pp. 240- 247, 2012.
[2] Al-hazaimeh O., “A Novel Encryption Scheme for Digital Image-Based on one Dimensional Logistic Map,” Computer and Information Science, vol. 7, no. 4, pp. 64-73, 2014.
[3] Al-hazaimeh O., “A New Dynamic Speech Encryption Algorithm Based on Lorenz Chaotic Map over Internet Protocol,” International Journal of Electrical and Computer Engineering, vol. 10, no. 5, pp. 4824-4834, 2020.
[4] Al-hazaimeh O., Al-Jamal M., Alhindawi N., and Omari A., “Image Encryption Algorithm Based on Lorenz Chaotic Map with Dynamic Secret Keys,” Neural Computing and Applications, vol. 13, no. 3, pp. 2395-2405, 2017.
[5] Arthanari S., Mastan M., and Bagank B., “Chaotic Image Encryption using Modular Addition and Combinatorial Techniques,” The International Arab Journal of Information Technology, vol. 12, no. 2, pp. 110-117, 2015.
[6] Bhalekar S. and Daftardar-Gejji V., “Synchronization of Different Fractional Order Chaotic Systems Using Active Control,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 11, pp. 3536- 3546, 2010.
[7] Boccaletti S., Kurths J., Osipov G., Valladares D., and Zhou C., “The Synchronization of Chaotic Systems,” Physics Reports, vol. 366, no. 1-2, pp. 1-101, 2002.
[8] Coppersmith D., “The Data Encryption Standard (DES) and its Strength Against Attacks,” IBM journal of Research and Development, vol. 38, no. 3, pp. 243-250, 1994.
[9] El-Samie A., Ahmed H., Elashry F., Shahieen H., Faragallah S., El-Rabaies M., and Alshebeili A., Image Encryption: A Communication Perspective, CRC Press, 2013.
[10] Fraser M., “Information and Entropy in Strange Attractors,” IEEE Transactions on Information Theory, vol. 35, no. 2, pp. 245-262, 1989.
[11] Fridrich J., “Symmetric Ciphers Based on Two- Dimensional Chaotic Maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.
[12] Govorukhin V., “Calculation Lyapunov exponents for ODE,” MATLAB Central File Exchange, File ID: 4628, 2004.
[13] Guan Z., Huang F., and Guan W., “Chaos-based Image Encryption Algorithm,” Physics Letters A, vol. 346, no. 1-3, pp. 153-157, 2005.
[14] Ho M. and Hung Y., “Synchronization of Two Different Systems By Using Generalized Active Control,” Physics Letters A, vol. 301, no. 5-6, pp. 424-428, 2002.
[15] Kocarev L., “Chaos-Based Cryptography: A Brief Overview,” IEEE Circuits and Systems Magazine, vol. 1, no. 3, pp. 6-21, 2001.
[16] Lü H., Wang S., Li X., Tang G., Kuang J., Ye W., and Hu G., “A New Spatiotemporally Chaotic Cryptosystem and its Security and Performance Analyses,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 14, no. 3, pp. 617-629, 2004.
[17] Muthukumar P., Balasubramaniam P., and Ratnavelu K., “A Novel Cascade Encryption Algorithm for Digital Images Based on Anti- Synchronized Fractional order Dynamical Systems,” Multimedia Tools and Applications, vol. 76, no. 22, pp. 23517-23538, 2017.
[18] Parlitz U., Chua O., Kocarev L., Halle K., and Shang A., “Transmission of Digital Signals by Chaotic Synchronization,” International Journal of Bifurcation and Chaos, vol. 2, no. 4, pp. 973- 977, 1992.
[19] Pecora M. and Carroll L., “Synchronization of Chaotic Systems,” Chaos: An Interdisciplinary The International Arab Journal of Information Technology, Vol. 18, No. 1, January 2021 102 Journal of Nonlinear Science, vol. 25, no. 9, 2015.
[20] Sayed S. and Radwan G., “Generalized Switched Synchronization and Dependent Image Encryption Using Dynamically Rotating Fractional-Order Chaotic Systems,” AEU- International Journal of Electronics and Communications, vol. 123, no. 1, pp. 153-268, 2020.
[21] Shannon E., “Communication Theory of Secrecy Systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.
[22] Sun F., Liu S., Li Z., and Lü Z., “A Novel Image Encryption Scheme Based on Spatial Chaos Map,” Chaos, Solitons and Fractals, vol. 38, no. 3, pp. 631-640, 2008.
[23] Tahat N., Tahat A., Abu-Dalu M., Albadarneh B., Abdallah E., and Al-Hazaimeh O., “A new RSA Public Key Encryption Scheme with Chaotic Maps,” International Journal of Electrical and Computer Engineering, vol. 10, no. 2 , pp. 1430-1437, 2020.
[24] Tél T. and Gruiz M., Chaotic Dynamics: An Introduction Based on Classical Mechanics, Cambridge University Pres, 2006.
[25] Volos C., Kyprianidis M., and Stouboulos N., “Image Encryption Process Based on Chaotic Synchronization Phenomena,” Signal Processing, vol. 93, no. 5, pp. 1328-1340, 2013.
[26] Wang L., Dong T., and Ge M., “Finite-Time Synchronization of Memristor Chaotic Systems and its Application in Image Encryption,” Applied Mathematics and Computation, vol. 347, pp. 293-305, 2019.
[27] Weng T., Yang H., Gu C., Zhang J., and Small M., “Synchronization of Chaotic Systems And Their Machine-Learning Models,” Physical Review E, vol. 99, no. 4, pp. 042203, 2019. Obaida Al-Hazaimeh is an Associate Professor of Computer Science. Now, he is a lecturer at Department of Computer Science and Information Technology. Al- Balqa' Applied University, Jordan. He has received his Ph.D. in Computer Science-Cryptography from Malaysia in 2010. Mohammad Al-Jamal is an Associate Professor of Mathematics. Now, he is a lecturer at Department of Mathematics, Yarmouk University, Jordan. He has earned his Ph.D. in Mathematics from USA in August 2012. Mohammed Bawaneh is an Associate Professor of Computer science. Now, he is a lecturer at Department of Computer Science and Information Technology. Al- Balqa' Applied University, Jordan. He has earned his Ph.D. in Computer Information Systems in 2010. Nouh Alhindawi is an Associate Professor in Computer Science & Software Engineering Departments at Jadara University, Jordan. He has received his Ph.D. in Computer Science-Software Engineering from USA in 2013. Bara’a Hamdoni received her BSc in Mathematics from Jordan University of Science and Technology in 2012, and MSc in Mathematics with specialization in Image Encryption from Yarmouk University in 2018. Appendix A. Common equations related to security analysis ENTROPY ()=∑()log21 () 2−1 =1 CORRELATION: =cov(,) √()√() cov(,)=1 ∑(−())(−()) =1 , ()=1 ∑ =1 , ()=1 ∑( =1 −())2 DIFFERENTIALS: NPCR=1 ×
[∑(,) , ] ×100% UACI=1 ×
[∑1 (,)− 2 (,) 255, ]×100%