999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Double Encryption Using Trigonometric Chaotic Map and XOR of an Image

2021-12-15 07:07:06OrawitThinnukoolThammaratPanityakulandMahwishBano
Computers Materials&Continua 2021年12期

Orawit Thinnukool,Thammarat Panityakul and Mahwish Bano

1College of Arts,Media and Technology,Chiang Mai University,Chiang Mai,50200,Thailand

2Division of Computational Science,Prince of Songkla University,Hat Yai,Songkhla,90110,Thailand

3Department of Mathematics,Air University,Islamabad,44000,Pakistan

Abstract: In the most recent decades, a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network, where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point, we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second).

Keywords: Double image encryption; target image; random image;trigonometric chaotic map

1 Introduction

With the quick development of multimedia and communication technologies, the amount of information stored and communicated has exponentially expanded.The security of this information became a significant issue examined by numerous specialists, researchers, and analysts.Tragically, traditional text encryption plans like data encryption standard (DES) [1], advanced encryption standard (AES) [2], or the RSA [3] algorithms cannot have secure image data, essentially due to the differences that exist among text and image data, such as the massive size of images, solid excess and solid relation among adjacent pixels.Besides, little distortions in the decipher image data are adequate as it generally relies upon human recognition.In this manner,considering the exceptional properties of digital pictures, a few image encryption schemes have been proposed utilizing different sort of technologies, for example, chaotic maps [4–6], DNA encoding [7–9], quantum theory [10–12], scalable encoding [13], flexible compression and image imprinting [14], and so forth [15].Chaos theory has been broadly utilized in cryptography, it has remarkable features like ergodicity, sensitivity to the parameters and initial values, capriciousness,random-like conduct, and many more, which have coordinated the fundamental necessities of cryptography [16,17].A large number of proposed image encryption frameworks have been dependent on famous chaotic maps like the logistic guide [18,19], sine map [20–22], tent guide [23,24],and Arnold cat map [25,26].Some new chaotic maps [27–31] have not been yet utilized in cryptography; even they have a more extensive chaotic range, better ergodicity, flightiness, and an easier structure than a few well-known chaotic maps.Besides, the greater part of the current image encryption plans utilized the adopted chaotic guides where a few chaotic values have been created for every pixel in the plain-text image.The generation of such a major number of chaotic values devours a lot of computation time and extensively eases the entire encryption process speed.Consequently, these sorts of encryption plans are not reasonable for constant image processing.In the present paper, quick and efficient image encryption conspires because the Trigonometric chaotic map with XOR is proposed.The Trigonometric map has been founded by Orcan Alpar [31] has an extremely basic equation like the logistic map which makes it reasonable for the plan of a real-time image encryption plot.Unlike the logistic map, the Trigonometric map also shows high chaotic conduct in a bigger chaotic scope of the boundaries’qualities,which develops the keyspace and expands the security level.To build the encryption/decryption process speed, the proposed scheme raises the little treatment unit from the pixel level to the row/column level.Moreover, unlike the greater part of the current image encryption plots, the wise utilization of the straightforward chaotic map is adopted.Surely, the new scheme creates just 3 rows and 3 columns for each encryption round.The high security and speed of the proposed scheme are demonstrated through a few notable performances and security tests.The exhibitions of the new strategy can undoubtedly fulfill the prerequisites of real-time image processing at 80 fps(frames per second) for 512 × 512 size images and its security level is parallel to state-of-theart encryption strategies.Consequently, the proposed strategy is an ideal contender for making sure about real-time image processing applications and communications, for example, ensuring the communicated satellite images, procuring the sent images from remote-controlled drones, realtime encryption/decryption of spared Iris biometric recognition images, and so forth.The primary commitments in this paper are continued as follows.

(i) We propose a novel chaos-based image encryption strategy with a high-security level for real-time image processing at 80 fps.

(ii) We make the first and efficient use of the Trigonometric chaotic map in the field of picture encryption.

(iii) We carefully upgrade the utilization of the chaotic map to create arbitrary-like numbers.

(iv) We raise the little processing unit from the pixels level to the rows/columns level.

2 Image Encryption Using Trigonometric Chaotic Map

Chaotic maps hold attractive properties, for example, high affectability to a little change in introductory value and control boundaries, pseudorandom, the precariousness of the framework circle, and simplicity of execution.For the most part, chaotic maps are utilized to produce chaotic key streams that can be utilized in image encryption to accomplish secure correspondence.Numerous chaotic maps have restricted range boundaries making them shaky for image transmission.This paper proposes a clamorous guide alluded to as the trigonometric chaotic map with XOR(TCMX).The qualities of the TCM are researched and used to build up an image encryption strategy.Exploratory outcomes on the TCM show a wide extend of chaotic disorganized conduct,s-unimodality property, and high affectability to a little change in the initial condition.Results likewise show that the arbitrarily produced key streams by the TCM finished the NIST measurable assessments.At long last, encryption results utilizing grey-scale images show that the TCM-based image encryption technique offers exceptionally secure encryption with a short encryption time.

3 Quick Survey of Literature

The brisk advancement of multimedia technology and computer networks with the expanded utilization of cloud-based capacity and enormous information expect strategies to ensure individuals’private and confidential information.Simultaneously, the pre-owned assurance technique ought to be exceptionally secure without trading off the usefulness and convenience of the framework to give accommodation to clients.Image encryption is one of the generally utilized and viable strategies to secure images during storage and transmission.Conventional encryption techniques are not appropriated to encrypt images due to image intrinsic qualities, for example, the connection between image pixels, low affectability to information change, and information excess.Chaotic maps hold appealing attributes, for example, insecurity of system orbit, basic execution, and high affectability to a little change in initial values, control boundaries, and pseudo-randomness.Distinctive chaotic maps have been accounted for in the literature, for example, convex sinusoidal map, parameter-varying baker map, cross chaotic map, generalized sine map, combined sine and tent map, generalized logistic map.Each proposed chaotic map has its points of interest and detriments regarding encryption time, security, and unpredictability.The logistic map, one of the most normally utilized chaotic maps, has a little keyspace making it not invulnerable against brute force attacks, doesn’t give uniform dissemination of the iterative variable, and has a flimsy value of Lyapunov exponent [8,11].It has been discovered that the vast majority of confusing cryptosystems have lacking strength and security [12].Another work detailed that the logistic map, mandelbrot map, and symmetric tent map hold an enormous arrangement of weaknesses.The literature likewise announced distinctive chaotic-based image encryption techniques, for example [14–16].A one-dimensional chaotic map is proposed in this paper; the trigonometric chaotic map (TCMX).At that point, the qualities of the TCM are examined.The investigated qualities are affectability to a little change in the initial condition, chaotic conduct, s-unimodality, and randomness.Based on the examined qualities, an image encryption strategy is created.At last,factual properties and the encryption performance of the created image encryption strategy are dissected.

4 Trigonometric Chaotic Map

Eq.(1) displays the proposed trigonometric chaotic map.

wheresn+1∈[0, 1],s0represents the initial condition, andλrepresents the control parameter.

5 TCM Characteristics Investigation

Attributes of the trigonometric chaotic map are examined here.The assessed qualities are chaotic conduct, s-unimodality, affectability to a little change in starting condition, and haphazardness.Fig.1 shows the iterations of the trigonometric chaotic map.The iteration begins from zero and continues expanding until it arrives at its most extreme worth and afterward diminishes back to zero.Likewise, the iteration function has a single maximum value.In this way,the TCM accomplishes the unimodality property atλ= 1.42.Then, the range of the control parameterλwithin which the trigonometric chaotic map accomplishes the unimodality trademark is considered.The bifurcation outline is utilized for this reason [6], as appeared in Fig.2 for control boundary rangeλ∈[1.3, 1.55].The bifurcation outline shows that the TCM fulfills the unimodality characteristic forλ∈[1.3859, 1.4424].

Figure 1:The iteration function of TCM for λ= 1.42

Figure 2:The bifurcation diagram of TCM for λ ∈[1.3, 1.55]

The chaotic conduct of the TCM is examined utilizing the Schwarzian derivative.Condition(2) shows the Schwarzian derivative of the TCM.Fig.3 shows the charted Schwarzian derivative of the TCM for control boundaryλ= 1.42 and introductory condition s0= 0.26.Fig.3 shows a negative Schwarzian derivative along with the entire interval which demonstrates that the TCM gives chaotic conduct at the chosen estimation of initial condition and control boundary.

Figure 3:The schwarzian derivative of TCM for λ= 1.42

In summary, the obtained robust chaos and unimodality characteristics demonstrate that the trigonometric chaotic map satisfies the s-unimodality property at the chosen values of the control parameter and initial condition.Another thing to investigate is the sensibility to a little change in the initial condition.Fig.4 displays two sequences; we get using (1).The two produced sequences have become complicated, after some iteration, shows the high sensitivity of the TCM to a smaller change in the initial condition.

Figure 4:Two sequences obtained for (s0, λ) = (0.26, 1.42), marked with squares, and for (s0, λ)= (0.26001, 1.42), marked with circles

Then again, the Lyapunov exponent is utilized to explore the chaotic behavior of the TCM as appeared in (3).Condition (4) shows the derivative of (1).The produced Lyapunov type of the TCM appears in Fig.5 for the control boundary rangeλ∈[1, 1.6].As mentioned in the literature, any chaotic map should give chaotic conduct to the Lyapunov exponent inside the scope of [0, 0.69].Fig.5, the TCM gives chaotic conduct toλ∈[1, 1.466].The acquired experimental after-effects of the bifurcation chart and Lyapunov exponent show that the TCM has chaotic conduct and fulfills the s-unimodality attribute forλ∈[1.3859, 1.4424].In correlation, the logistic and tent maps give chaotic conduct and fulfill the s-unimodality trademark forλ∈[3.96, 4] andλ∈(1.999, 2), separately.This demonstrates the trigonometric chaotic map has a wide range of chaotic conduct.

Figure 5:The Lyapunov exponent of the TCM for λ ∈[1,1.6]

The last characteristic to explore is arbitrariness which can be utilized to decide the appropriateness of utilizing the TCM in cryptographic applications.A protected keystream generator shouldn’t show deterministic attributes or essential statistical predispositions.The NIST statistical test suite is utilized to tentatively approve whether the created key streams by the TCM hold arbitrary conduct.The NIST suite is utilized to direct 15 statistical tests intended to test various sorts of non-arbitrariness in a binary sequence.As a pre-preparing step, iterates of the TCM are changed over into binary sequences as appeared in (4).

The degree of significanceαfor all NIST tests is set to 1% which shows that one arrangement in 100 successions is expected to be dismissed.The p-esteem is figured for each statistical test.In every statistical test, if the p-esteem is larger than the degree of significance then the succession is acknowledged as an arbitrary sequence with a 99% significance level.Or, the succession is dismissed.

Table 1:NIST statistical test suite results for 100 key streams of size 200000-bit each generated by the TCM for control parameter λ= 1.42 and randomly chosen initial value

As Tabs.1–3 show, the NIST statistical test suite is performed on a lot of 100 key streams of size 200000 pieces each created by the TCM, tent map, and logistic map, individually.For each test, the p-values are registered and the extent of key streams that pass the condition p-esteem≥αis figured.The TCM, as appeared in Tab.1, has a better extent of key streams that pass the condition p-esteem ≥0.01 than a tent and logistic maps.Additionally, the P-values of p-values,found through the chi-square test, are for the most part higher than the level of significanceαin the occurrence of the TCM and tent guide.In any case, the logistic map fizzled in three tests:block frequency, runs, and longest-runs of ones.In the three map results, the p-values are consistently distributed over the stretch (0, 1).For the TCM and tent map, since all p-values are larger than 0.01 then the produced key streams are analyzed arbitrarily with a certainty of 99%.

Table 2:NIST statistical test suite results for 100 keystreams of size 200000-bit each generated by the tent map for control parameter λ= 1.9999 and randomly chosen initial value

Table 3:NIST statistical test suite results for 100 key streams of size 200000-bit each generated by the logistic map for control parameter λ= 1.9999 and randomly chosen initial value (4)

6 Proposed Image Encryption Method

The proposed image encryption strategy is summed up as follows.Without the loss of oversimplification, the dimension of the image encryptionIis expected asM×N.

(i) The original image is scaled into a size of 256 × 256 pixels.

(ii) Consider a random image of the same size (M× N) as the original image for confusion and diffusion processes.

(iii) The original image and random image are separated into square blocks.Each square of sizem×mpixels where (5) is proposed to findm.

whererforms an aspect of the secret key; in addition to the control boundary and initial condition of TCM.

(iv) The accompanying advances are performed on each square of the original and random images.

a.The corresponding square of original and random images is changed over into a row vector.Perform XOR on the row vector of the original image and random image to obtain a row vector.

b.A row vector, of size [1,m×m], is obtained by using (1) to create pseudorandom numbers.The produced numbers are utilized as pixel location files to rearrange the pixel areas of the row vector.

c.Pixel intensity estimations of the scrambled row vector, obtained from the last step,are changed as per (6),

whereKis a created keystream utilizing Eq.(1) andbis the acquired line vector having performed XOR of original and random row vectors from the past advance.

d.The resultant row vector is changed over into a square, of sizem×mpixels, and secured to shape the encoded image.

(v) Pixel intensity estimations of the encoded image are changed utilizing (6).This progression is proposed to improve the security of the proposed encryption process.

7 Experimental Results

To test the execution of the proposed image encryption technique, the notable Lena and Cameraman images are utilized.The proposed encryption technique is executed utilizing MATLAB.In this paper, the Lena image is utilized as appeared in Figs.6 and 7 shows a non-uniform histogram of Lena image which demonstrates that the dominant part of image pixel values of intensity is concentrated around the center.The boundaryrof (6) is set to four resulting in a square size of 16 × 16 pixels.The proposed encryption technique is used to get the encoded Lena image as appeared in Fig.8.This figure demonstrates a total blurring of image content.The histogram of the encoded image, as appeared in Fig.9, shows the semi-uniform dissemination of encoded image pixels and the power of the encryption strategy against histogram assault strategies.Encryption resistance against Brute-Force Attacks is examined.Brute Force Attack strategies utilize a broad search of the set of all values of secret key parameters to decode an encoded image.Exploratory outcomes demonstrate that the parameters x0,λ,Kought to be changed by the accuracy of one part in 1018, 1017,1016to recuperate the real image from the encoded image.As such, the proposed encryption technique has an intricacy of order O(2169).Any encryption algorithm ought to have an intricacy (complexity) bigger than (2128) to be adequately secure against brute power attacks [17].

Figure 6:The Lyapunov exponent of the TCM for λ ∈[1, 1.6]

Figure 7:Histogram of Lena image of Fig.6

Figure 8:Encrypted image using encryption method

Encryption insusceptibility against the high connection between contiguous image pixels is explored.Condition (7) is used to quantify the horizontal, vertical, and diagonal correlation between two contiguous pixels of an image,

where (x0,y0) demonstrates pixel intensity estimation of two haphazardly chosen neighboring pixels.1,000 neighboring pixels are arbitrarily chosen to figure out their vertical, horizontal,and diagonal correlation.Encryption execution of the proposed Trigonometric Chaotic Map is analyzed against the execution of notable maps, for example, Logistic Map (LM), Tent Map (TM),and Nonlinear Chaotic Map (NCA), Eqs.(8)–(10), has appeared in Tab.4.Tab.4 shows a high connection between pixels of the original image and a poor connection between pixels of encoded images.The proposed TCM-based encryption strategy accomplished the best average correlation result.Then again, Entropy is utilized to discover a measure of arbitrariness in an image.The consequences of Tab.4 demonstrate that the original image has low entropy esteem.Conversely,the encrypted images have high entropy esteem where the ideal worth ought to be 8.The Tent Map-based image encryption technique accomplished the best entropy result.In any case, the proposed TCM-based strategy accomplished close entropy results to that of the TCM-based encryption strategy.This demonstrates the strength of the proposed image encryption technique against entropy assault strategies.In outline, the acquired semi-uniform histogram, statistical correlation, and entropy results show the superior permutation and substitution properties of the proposed TCM-based encryption technique.The decoding stage is done by reversing the steps associated with segment IV.

A one-dimensional trigonometric chaotic map (TCM) is proposed.Experimental results show that the TCM has high affectability to a little change in introductory condition, fulfills the sunimodality trademark, and has wide chaotic conduct.The NIST factual test suite tentatively approves that the produced key streams by the TCM hold arbitrary conduct making the TCM reasonable for cryptographic applications.The proposed TCM is used to build up an image encryption strategy that for the most part comprises of two stages.The image substitution step rearranges image pixel locations.Trial results demonstrate immunity against Brute-Force and Entropy assaults.Results additionally demonstrate the unrivaled substitution and permutation properties of the proposed image encryption strategy.Future work ought to be examined the resistance of the proposed encryption technique against regular assaults, for example, man-in-themiddle and replay.

Figure 9:Histogram of an encrypted image of Fig.8

Table 4:Correlation results of one thousand neighboring pixels randomly selected from original and encrypted images

8 Conclusions

In this paper, we have developed a more secure image cryptosystem dependent on a trigonometric chaotic map and XOR of an arbitrary image.To make the encryption more secure and unbreakable, we utilized a basic chaotic map; produced a row vector of original and a random image.The confusion and diffusion have been done in a row-wise approach like XOR.It has produced a row vector which further applied a TCM resulted in the form of an encrypted image.Usual tests have been performed for the security of the algorithm; results have been produced and presented using the proposed algorithm.

Funding Statement:This research work was partially funded by the Chiang Mai University.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 国产麻豆福利av在线播放 | 日本一区二区三区精品视频| 国产精品无码制服丝袜| 亚洲一区免费看| 99热国产这里只有精品无卡顿"| 婷婷成人综合| 免费99精品国产自在现线| 综合人妻久久一区二区精品 | 国产jizzjizz视频| 国产另类视频| 国产福利2021最新在线观看| 中文字幕亚洲另类天堂| 青青热久免费精品视频6| 久久福利片| 国产性生大片免费观看性欧美| 五月婷婷丁香综合| 欧美日韩国产综合视频在线观看| 国产h视频免费观看| 亚洲人成网线在线播放va| 日韩无码真实干出血视频| 欧美日韩精品在线播放| 亚洲自偷自拍另类小说| 大陆精大陆国产国语精品1024| 亚洲国产成人在线| 亚洲精品无码av中文字幕| 精品久久久久久久久久久| 国产成人凹凸视频在线| 国产精品免费入口视频| 1769国产精品免费视频| 欧美成人午夜影院| 中文字幕在线观| 五月婷婷综合网| 国产91无毒不卡在线观看| 国产另类视频| 欧美午夜网| 成人夜夜嗨| 国产区91| 日韩在线欧美在线| 波多野结衣一区二区三区88| 最新国产精品第1页| 欧美成人免费午夜全| 国产91视频免费| 国产三级精品三级在线观看| 国国产a国产片免费麻豆| 中文字幕中文字字幕码一二区| 日本高清成本人视频一区| 丰满人妻被猛烈进入无码| 亚洲精品福利视频| 无码丝袜人妻| 国产一区二区三区视频| 高清久久精品亚洲日韩Av| 99在线观看免费视频| 欧美日韩成人| 在线观看国产精品日本不卡网| 波多野结衣一区二区三区四区| 2021国产v亚洲v天堂无码| 欧美色丁香| 日韩免费无码人妻系列| 99久久亚洲精品影院| 日本国产在线| 影音先锋亚洲无码| 直接黄91麻豆网站| 丁香婷婷激情综合激情| 亚洲中文字幕国产av| 亚洲成人在线网| 国产成人午夜福利免费无码r| 国产成人精品优优av| www亚洲天堂| 91丝袜乱伦| 精久久久久无码区中文字幕| 99精品视频九九精品| 久久久久久午夜精品| 國產尤物AV尤物在線觀看| 国产亚洲高清视频| 国内黄色精品| 精品无码视频在线观看| 国产亚洲精品无码专| 久久精品aⅴ无码中文字幕| 亚洲中文无码h在线观看 | 成人在线观看一区| 日韩大片免费观看视频播放| 午夜三级在线|