The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions of Images
This study is centered on a significant scientific contribution within the realm of image cryptography. The chosen approach involves employing the bidimensional Arnold Cat Map transformation to reposition and modify pixel locations, guided by parameters derived from the original image. The construction of the multiplicative group Z/nZ, comprising equivalence classes modulo n, relies on a hyper-chaotic sequence derived from the 2D sinusoidal logistic modulation map. The correlation between this sequence and the preceding step yields an unpredictable blurring pattern, effectively altering the statistical properties of resulting matrices and distributing the influence of individual bits across the entire encrypted image. For each pixel, the encryption process entails an XOR operation with the Z/nZ group, followed by a right shift based on the three Least Significant Bits (LSB) of the preceding pixel. This meticulous procedure is iterated for every pixel, leaving no trace of similarity or association with the original plaintext image, effectively rendering it blurred and indecipherable. To gauge the efficacy of our algorithm, we subjected it to thorough evaluation utilizing diverse criteria, including histogram analysis, which unveiled a nearly uniform pattern in the encrypted images. Entropy values were found to be close to 8, while the correlation analysis exhibited a pronounced proximity to 0. Moreover, we subjected our approach to differential attacks, and the calculated values of the Number of Changing Pixel Rate (NPCR > 99.6) and the Unified Averaged Changed Intensity (UACI > 33.2) corroborated the strength and resilience of our methodology. In addition, to establish its comparative standing, we undertook a comprehensive assessment, meticulously comparing our method to various existing approaches from the literature, including those proposed by Hua, Es-sabry, and Faragallah. This systematic process accentuated the high level of responsiveness and sensitivity inherent in our approach, thus underscoring its innovative and promising nature.
[1] Arroyo D., Rhouma R., Alvarez G., Li S., and Fernandez V., “On the Security of a New Image Encryption Scheme Based on Chaotic Map Lattices,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 18, no. 3, pp. 033112, 2008. https://doi.org/10.1063/1.2959102
[2] Belazi A., Hermassi H., Rhouma R., and Belghith S., “Algebraic Analysis of a RGB Image Encryption Algorithm Based on DNA Encoding and Chaotic Map,” Nonlinear Dynamics, vol. 76, no. 4, pp. 1989-2004, 2014. DOI:10.1007/s11071- 014-1263-y
[3] Borujeni S. and Eshghi M., “Chaotic Image Encryption System Using Phase-Magnitude Transformation and Pixel Substitution,” Telecommunication Systems, vol. 52, pp. 525-537, 2013. DOI: 10.1007/s11235-011-9458-8
[4] Cong L., Xiaofu W., and Songgeng S., “A General Efficient Method for Chaotic Signal Estimationin,” IEEE Transactions on Signal Processing, vol. 47, no. 5, pp. 1424-1428, 1999. DOI: 10.1109/78.757236.
[5] Elazzaby F., El Akkad N., and Kabbaj S., “A New Encryption Approach Based on Four-Square and Zigzag Encryption (C4CZ),” in Proceedings of the Embedded Systems and Artificial Intelligence, Fez, pp. 589-597, 2019. https://doi.org/10.1007/978-981-15-0947-6_56
[6] Elazzaby F., El Akkad N., and Kabbaj S., “Advanced Encryption of Image Based on S-Box and Chaos 2D (LSMCL),” in Proceedings of the 1st International Conference on Innovative Research in Applied Science, Engineering and Technology, Meknes, pp. 1-7, 2020. DOI:10.1109/IRASET48871.2020.9092254
[7] Elazzaby F., EL Akkad N., Sabour K., and Kabbaj S., “An RGB Image Encryption Algorithm Based on Clifford Attractors with a Bilinear Transformation,” in Proceedings of the 5th International Conference on Big Data and Internet of Things, Rabat, pp. 116-127, 2021. https://doi.org/10.1007/978-3-031-07969-6_9
[8] Elazzaby F., EL Akkad N., Sabour K., and Kabbaj S., “A New Contribution of Image Encryption Based on Chaotic Maps and the Z/nZ Group,” Journal of Theoretical and Applied Information Technology, vol. 101, no. 1, pp. 37-47, 2023. https://www.researchgate.net/publication/367 546427
[9] Elazzaby F., EL Akkad N., Sabour K., and Kabbaj S., “A New Encryption Scheme for RGB Color Images by Coupling 4D Chaotic Laser Systems and the Heisenberg Group,” Multimedia Tools and Applications, pp. 1-20, 2023. https://doi.org/10.1007/s11042-023-16139-6
[10] El Akkad N., Merras M., Saaidi A., and Satori., K., “Camera Self-Calibration with Varying Parameters from two Views,” WSEAS Transactions on Information Science and Applications, vol. 10, no. 11, pp. 356-367, 2013. https://www.wseas.org/multimedia/journals/infor mation/2013/e045705-255.pdf
[11] Es-Sabry M., El Akkad N., Merras M., Saaidi A. and Satori K., “A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher,” in Proceedings of the 3rd International Conference of Big Data, Cloud and Applications, Kenitra, pp. 78-88, 2018. https://doi.org/10.1007/978-3-319-96292-4_7
[12] Es-sabry M., El akkad N., Merras M., Saaidi A., and Satori K., “A New Image Encryption Algorithm Using Random Numbers Generation of two Matrices and Bit-Shift Operators,” Soft Computing, vol. 24, pp. 3829-3848, 2020. https://doi.org/10.1007/s00500-019 04151-8
[13] Es-sabry M., El akkad N., Merras M., Saaidi A., Satori K., “A New Color Image Encryption Using Random Numbers Generation and Linear Functions,” in Proceedings of the Embedded Systems and Artificial Intelligence, Fez, pp. 581- The Coupling of a Multiplicative Group and the Theory of Chaos in the Encryptions … 15 588, 2019. https://doi.org/10.1007/978-981-15- 0947-6_55
[14] Es-Sabry M., El Akkad N., Merras M., Saaidi A., and Satori K., “Grayscale Image Encryption Using Shift Bits Operations,” in Proceedings of the International Conference on Intelligent Systems and Computer Vision, Fez, pp. 1-7, 2018. DOI:10.1109/ISACV.2018.8354028
[15] Essaid M., Akharraz I., Saaidi A., Mouhib A., Mohamed E., Ismail A., Abderrahim S., and Ali M., “A New Color Image Encryption Algorithm Based on Iterative Mixing of Color Channels and Chaos,” Advances in Science, Technology and Engineering Systems Journal, vol. 2, no. 5, pp. 94- 99, 2017. DOI:10.25046/aj020515
[16] Faragallah O., Alzain M., El-Sayed H., Al-Amri J., El-Shafai W., Afifi A., Naeem E., and Soh B., “Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding,” IEEE Access, vol. 7, pp. 4184-4194, 2019. DOI:10.1109/ACCESS.2018.2879857
[17] Gray R., Entropy and Information Theory, Springer Science and Business Media, 2011. https://doi.org/10.1007/978-1-4419-7970-4
[18] Guo H., Zhang X., Zhao X., Yu H., and Zhang L., “Quadratic Function Chaotic System and its Application on Digital Image Encryption,” IEEE Access, vol. 8, pp. 55540-55549, 2020. https://ieeexplore.ieee.org/stamp/stamp.jsp?arnu mber=9040448
[19] Hilborn R., Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers, Oxford University Press, 2001.
[20] Hua Z., Zhou Y., Pun C., and Chen C., “2D Sine Logistic Modulation Map for Image Encryption,” Information Sciences, vol. 297, pp. 80-94, 2015. https://doi.org/10.1016/j.ins.2014.11.018
[21] Hua Z. and Zhou Y., “One-Dimensional Nonlinear Model for Producing Chaos,” EEE Transactions on Circuits and Systems-I: Regular Papers, vol. 65, no. 1, pp. 235-246, 2018. DOI:10.1109/TCSI.2017.2717943
[22] Hua Z., Zhou Y., and Huang H., “Cosine- Transform-Based Chaotic System for Image Encryption,” Information Sciences, vol. 480, pp. 403-419, 2019. https://doi.org/10.1016/j.ins.2018.12.048
[23] Jafar I., Darabkh K., and Jubair F., “Separable High Capacity Reversible Data Hiding Algorithm for Encrypted Images,” The International Arab Journal of Information Technology, vol. 19, no. 5, pp. 812-821, 2022. https://doi.org/10.34028/iajit/19/5/13
[24] Khan J. and Ahmad J., “Chaos Based Efficient Selective Image Encryption,” Multidimensional Systems and Signal Processing, vol. 30, pp. 943- 961, 2019. https://doi.org/10.1007/s11045-018- 0589-x
[25] Kaur G., Agarwal R., and Patidar V., “Multiple Image Encryption with Fractional Hartley Transform and Robust Chaotic Mapping,” in Proceedings of the 6th International Conference on Signal Processing and Integrated Networks, Noida, pp. 399-403, 2019. DOI:10.1109/SPIN.2019.8711777
[26] Kaur G., Agarwal R., and Patidar V., “Chaos Based Multiple Order Optical Transform for 2D Image Encryption,” Engineering Science and Technology an International Journal, vol. 23, no. 5, pp. 998-1014, 2020. https://doi.org/10.1016/j.jestch.2020.02.007
[27] Lesne A., “Chaos in Biology,” Biology Forum/Rivista di Biologia, vol. 99, no. 3, pp. 467- 481, 2006.
[28] Liu C. and Lu J., “A Novel Fractional-Order Hyperchaotic System and its Circuit Realization,” International Journal of Modern Physics B, vol. 24, no. 10, pp. 1299-1307, 2010. https://doi.org/10.1142/S0217979210053707
[29] Lu L., Luan L., Meng L., and Li C., “Study on Spatiotemporal Chaos Tracking Synchronization of a Class of Complex Network,” Nonlinear Dynamic, vol. 70, pp. 89-95, 2012. https://doi.org/10.1007/s11071-012-0432-0
[30] Mansouri A. and Wang X., “Image Encryption Using Shuffled Arnold Map and Multiple Values Manipulations,” The Visual Computer, vol. 37, no. 6, pp. 189-200, 2021. DOI:10.1007/s00371-020- 01791-y
[31] Mollaeefar M., Sharif A., and Nazari M., “A Novel Encryption Scheme for Colored Image Based on High Level Chaotic Maps,” Multimedia Tools and Applications, vol. 76, no. 1, pp. 607- 629, 2017. DOI:10.1007/s11042-015-3064-9
[32] Norouzi B., Seyedzadeh S., Mirzakuchaki S., and Mosavi M., “A Novel Image Encryption Based on Hash Function with only Two-Round Diffusion Process,” Multimedia Systems, vol. 20, pp. 45-64, 2014. https://doi.org/10.1007/s00530-013-0314-4
[33] Paschalakis S. and Lee P., “Double Precision Floating-Point Arithmetic on FPGAs,” in Proceedings of the IEEE International Conference on Field-Programmable Technology, Tokyo, pp. 352-358, 2003. DOI:10.1109/FPT.2003.1275775
[34] Patidar V., Pareek N., and Sud K., “A New Substitution-Diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 7, pp. 3056- 3075, 2009. https://doi.org/10.1016/j.cnsns.2008.11.005
[35] Skrobek A., “Cryptanalysis of Chaotic Stream Cipher,” Physics Letters A, vol. 363, no. 1-2, pp. 84-90, 2007. https://doi.org/10.1016/j.physleta.2006.10.081 16 The International Arab Journal of Information Technology, Vol. 21, No. 1, January 2024
[36] Talhaoui M., Wang X., and Midoun M., “A New One-Dimensional Cosine Polynomial Chaotic Map and its Use in Image Encryption,” The Visual Computer, vol. 37, pp. 541-551, 2020. https://doi.org/10.1007/s00371-020-01822-8
[37] Tong X., Wang Z., Zhang M., Liu Y., Xu H., and Ma J., “An Image Encryption Algorithm Based on the Perturbed High-Dimensional Chaotic Map,” Nonlinear Dynamics, vol. 80, pp. 1493-1508, 2015. https://doi.org/10.1007/s11071-015-1957-9
[38] Tong X., Cui M., and Wang Z., “A New Feedback Image Encryption Scheme Based on Perturbation with Dynamical Compound Chaotic Sequence Cipher Generator,” Optics Communications, vol. 282, no. 14, pp. 2722-2728, 2009. https://doi.org/10.1016/j.optcom.2009.03.075
[39] Wang X. and Guo K., “A New Image Alternate Encryption Algorithm Based on Chaotic Map,” Nonlinear Dynamics, vol. 76, pp. 1943-1950, 2014. https://doi.org/10.1007/s11071-014-1259-7
[40] Wang X., Feng L., Li R., and Zhang F., “A Fast Image Encryption Algorithm Based on Non- Adjacent Dynamically Coupled Map Lattice Model,” Nonlinear Dynamics, vol. 95, pp. 797- 2824, 2019. https://doi.org/10.1007/s11071-018- 4723-y
[41] Weidenmüller H. and Mitchell G., “Random Matrices and Chaos in Nuclear Physics Nuclear Structure,” Review of Modern Physics, vol. 81, no. 2, pp. 539-589, 2009. DOI:10.1103/REVMODPHYS.81.539
[42] Wu X., Hu H., and Zhang B., “Parameter Estimation only from the Symbolic Sequences Generated by Chaos System,” Chaos Solitons Fractals, vol. 22, no. 2, pp. 359-366, 2004. https://doi.org/10.1016/j.chaos.2004.02.008
[43] Wu X., Zhu B., Hu Y., and Ran Y., “A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps,” IEEE Access, vol. 5, pp. 6429-6436, 2017. DOI:10.1109/ACCESS.2017.2692043
[44] Wu Y., Noonan J., and Agaian S., “NPCR and UACI Randomness Tests for Image Encryption,” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications, vol. 1, no 2, pp. 31- 38, 2011. https://fliphtml5.com/vbho/fepe/basic
[45] Zhu C., “A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences,” Optics Communications, vol. 285, no. 1, pp. 29- 37, 2012. https:// doi.org/10.1016/j.optcom.2011.08.079
[46] Zhu H., Zhang X., Yu H., Zhao C., and Zhu Z., “An Image Encryption Algorithm Based on Compound Homogeneous Hyper-Chaotic System,” Nonlinear Dynamics, vol. 89, pp. 61-79, 2017. https://doi.org/10.1007/s11071-017-3436-y