The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption

This paper introduces a new image encryption algorithm based on a Parallel Fuzzy Multi-Modular Chaotic Logistic Map (PFMM-CLM). Firstly, a new hybrid chaotic system is introduced by using four parallel cascade chaotic logistic maps with a dynamic parameter control to achieve a high Lyapunov exponent value and completely chaotic behavior of the bifurcation diagram. Also, the fuzzy set theory is used as a fuzzy logic selector to improve chaotic performance. The proposed algorithm has been tested as a Pseudo-Random Number Generator (PRNG). The randomness test results indicate that system has better performance and satisfied all random tests. Finally, the Arnold Cat Map with controllable iterative parameters is used to enhance the confusion concept. Due to excellent chaotic properties and good randomization test results, the proposed chaotic system is used in image encryption applications. The simulation and security analysis indicate that this proposed algorithm has a very high security performance and complexity.

[1] Bechikh R., Hermassi H., Abd A., and Rhouma R., “Breaking an Image Encryption Scheme Based on A Spatiotemporal Chaotic System,” Signal Process-Image Communication, vol. 39, pp. 151-158, 2015.

[2] Bisht A., Dua M., and Dua S., “A Novel Approach to Encrypt Multiple Images Using Multiple Chaotic Maps and Chaotic Discrete Fractional Random Transform,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, pp. 3519-3531, 2019.

[3] Chai X., Yang K., and Gan Z., “A New Chaos- Based Image Encryption Algorithm with Dynamic Key Selection Mechanisms,” Multimedia Tools Application, vol. 76, no. 7, pp. 9907-9927, 2017.

[4] Chen J., Zhu Z., Fu C., Zhang L., and Zhang Y., “An Efficient Image Encryption Scheme Using Lookup Table Based Confusion and Diffusion,” Nonlinear Dyn, vol. 81, no. 3, pp. 1151-1166, 2015.

[5] El-Khamy S., Korany N., and Mohamed A., “A New Fuzzy-DNA Image Encryption and Steganography Technique,” IEEE Access, vol. 8, pp. 148935-148951, 2020.

[6] Gqaid G. and Talbar S., “Encrypting Image by Using Fuzzy Logic Algorithm,” International Journal of Image Processing and Vision Sciences, vol. 2, no. 1, pp. 25-29, 2013.

[7] Hikal N. and Eid M., “A New Approach for Palmprint Image Encryption Based on Hybrid Chaotic Maps,” Journal of King Saud University- Computer and Information Sciences, vol. 32, no. 7, pp. 870-882, 2020.

[8] Hua Z. and Zhou Y., “Dynamic Parameter Control Chaotic System,” IEEE Transaction on Cybernetics, vol. 46, no. 12, pp. 3330-3341, 2016.

[9] Hua Z. and Zhou Y., “One-Dimensional Nonlinear Model for Producing Chaos,” IEEE Transactions on Circuits and Systems, vol. 65, no. 1, pp. 235- 246, 2018.

[10] Huang H., Yang S., and Ye R., “Efficient Symmetric Image Encryption By Using A Novel 2D Chaotic System,” IET Image Processing, vol. 14, no. 6, pp.1157-1163, 2020.

[11] Kar M., Mandal M., Nandi D., Kumar A., and Banik S., “Bit-plane Encrypted Image Cryptosystem Using Chaotic, Quadratic, and Cubic Maps,” Iete Technical Review, vol. 33, no. 6, pp. 651-661, 2016.

[12] Kang X., Luo X., Zhang X., and Jiang J., “Homogenized Chebyshev-Arnold Map and Its Application to Color Image Encryption,” IEEE Access, vol. 7, pp. 114459-114471, 2019.

[13] Keshari S. and Modani S., “Image Encryption Algorithm based on Chaotic Map Lattice and Arnold Cat Map for Secure Transmission,” International Journal of Computer Science and Telecommunications, vol. 2, no.1, pp. 134-139, 2011.

[14] Lan R., He J., Wang S., Gu T., and Luo X., “Integrated Chaotic Systems for Image Encryption,” Signal Processing, vol. 147, pp. 133-145, 2018.

[15] Li Y., Wang C., and Chen H., “A Hyper-Chaos- Based Image Encryption Algorithm Using Pixel- Level Permutation and Bit-Level Permutation,” Optics and Lasers in Engineering, vol. 90, pp. 238-246, 2017.

[16] Lin R. and Ng T., “Secure Image Encryption Based on an Ideal New Nonlinear Discrete Dynamical System,” Hindawi, vol. 2017, pp. 1- 12, 2018.

[17] Liu L., Lie Y., and Wang D., “A Fast Chaotic Image Encryption Scheme with Simultaneous Permutation-Diffusion Operation,” IEEE Access, vol. 8, pp. 27361-27374, 2020.

[18] Liu L. and Miao S., “A New Image Encryption Algorithm Based on Logistic Chaotic Map with Varying Parameter,” Springer Plus, vol. 289, no. 5, pp. 1-12, 2016.

[19] Liu L. and Miao S., “A New Simple One- Dimensional Chaotic Map and Its Application for Image Encryption,” Multimedia Tools Application, vol. 77, no. 16, pp. 21445-21462, 2018.

[20] Liu L., Wang D., and Lei Y., “An Image Encryption Scheme Based on Hyper Chaotic System and DNA with Fixed Secret Keys,” IEEE Access, vol. 8, pp. 46400-46416, 2020.

[21] Luo Y., Yu J., Lai W., and Liu L., “A Novel Chaotic Image Encryption Algorithm Based on Improved Baker Map and Logistic Map,” Multimedia Tools Application, vol. 78, no. 15, pp. 22023-22043, 2019.

[22] Mondal B., Kumar P., and Singh S., “A Chaotic Permutation and Diffusion Based Image Encryption Algorithm for Secure Communications,” Multimedia Tools A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption 235 Application, vol. 77, no. 23, pp. 31177-31198, 2018.

[23] Niu Y. and Zhanga X., “Novel Plaintext-Related Image Encryption Scheme Based on Chaotic System and Pixel Permutation,” IEEE Access, vol. 8, pp. 22082-22093, 2020.

[24] Nkapkop J., Effa J., Borda M., Bitjoka L., and Mohamadou A., “Chaotic Encryption Scheme Based on a Fast Permutation and Diffusion Structure,” The International Arab Journal of Information Technology, vol. 14, no. 6, pp. 812- 819, 2017.

[25] Pareeka N., Patidar V., and Sud K., “Diffusion- Substitution Based Gray Image Encryption Scheme,” Digital Signal Processing, vol. 23, no. 3, pp. 894-901, 2013.

[26] Parvaz R. and Zarebnia M., “A Combination Chaotic System and Application in Color Image Encryption,” Optics and Laser Technology, vol. 101, pp. 30-41, 2018.

[27] Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Leigh S., Levenson M., Vangel M., Banks D., Heckert A., Dray J., and Vo S., Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, National Institute of Standards and Technology, 2010.

[28] Singh G. and Supriya S., “A Study of Encryption Algorithms (RSA, DES, 3DES And AES) for Information Security,” International Journal of Computer Application, vol. 67, no. 19, pp. 33-38, 2013.

[29] Tong X., Zhang M., Wang Z., Liu Y., and Ma J., “An Image Encryption Scheme Based on A New Hyper Chaotic Finance System,” Optik, vol. 126, no. 20, pp. 2445-2452, 2015.

[30] Wang X., Feng L., and Zhao H., “Fast Image Encryption Algorithm Based On Parallel Computing System,” Information Science, vol. 486, pp. 340-358, 2019.

[31] Wang X. and Zhang H., “A Color Image Encryption with Heterogeneous Bit-Permutation and Correlated Chaos,” Optics Communications, vol. 342, pp. 51-60, 2015.

[32] We Z., Zhang X., and Zhong X., “Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption,” IEEE Access, vol. 7, pp. 37989-38008, 2019.

[33] Wu X., Kan H., and Kurths J., “A New Color Image Encryption Scheme Based on DNA Sequences and Multiple Improved 1D Chaotic Maps,” Applied Soft Computing, vol. 37, pp. 24- 39, 2015.

[34] Wu Y., Zhou Y., and Bao L., “Discrete Wheel Switching Chaotic System and Applications,” IEEE Transaction on Circuits and Systems, vol. 61, no. 12, pp. 3469-3477, 2014.

[35] Xu L., Li Z., Li J., and Hue W., “A Novel Bit- Level Image Encryption Algorithm Based on Chaotic Maps,” Optics and Lasers in Engineering, vol. 78, pp. 17-25, 2016.

[36] Ye G. and Wong K., “An Efficient Chaotic Image Encryption Algorithm Based on A Generalized Arnold Map”, Nonlinear Dynamics, vol. 69, no. 69, pp. 2079-2087, 2012.

[37] Zhang J. and Huo D., “Image Encryption Algorithm Based on Quantum Chaotic Map and DNA Coding,” Multimedia Tools Application, vol. 78, pp. 16505-16621, 2019.

[38] Zhou Y., Bao L., and Chen C., “Image Encryption Using A New Parametric Switching Chaotic System,” Signal Process, vol. 93, no. 11, pp. 3039-3052, 2013.

[39] Zhou Y., Bao L., and Chen C., “A New 1D Chaotic System for Image Encryption,” Signal Processing, vol. 97, pp. 172-182, 2014.

[40] Zhou Y., Hua Z., Pun C., and Chen C., “Cascade Chaotic System with Applications,” IEEE Transaction on Cybernetics, vol. 45, no. 9, pp. 2001-2012, 2015.