999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Double Encryption Using Trigonometric Chaotic Map and XOR of an Image

2021-12-15 07:07:06OrawitThinnukoolThammaratPanityakulandMahwishBano
Computers Materials&Continua 2021年12期

Orawit Thinnukool,Thammarat Panityakul and Mahwish Bano

1College of Arts,Media and Technology,Chiang Mai University,Chiang Mai,50200,Thailand

2Division of Computational Science,Prince of Songkla University,Hat Yai,Songkhla,90110,Thailand

3Department of Mathematics,Air University,Islamabad,44000,Pakistan

Abstract: In the most recent decades, a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level; however, their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network, where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point, we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second).

Keywords: Double image encryption; target image; random image;trigonometric chaotic map

1 Introduction

With the quick development of multimedia and communication technologies, the amount of information stored and communicated has exponentially expanded.The security of this information became a significant issue examined by numerous specialists, researchers, and analysts.Tragically, traditional text encryption plans like data encryption standard (DES) [1], advanced encryption standard (AES) [2], or the RSA [3] algorithms cannot have secure image data, essentially due to the differences that exist among text and image data, such as the massive size of images, solid excess and solid relation among adjacent pixels.Besides, little distortions in the decipher image data are adequate as it generally relies upon human recognition.In this manner,considering the exceptional properties of digital pictures, a few image encryption schemes have been proposed utilizing different sort of technologies, for example, chaotic maps [4–6], DNA encoding [7–9], quantum theory [10–12], scalable encoding [13], flexible compression and image imprinting [14], and so forth [15].Chaos theory has been broadly utilized in cryptography, it has remarkable features like ergodicity, sensitivity to the parameters and initial values, capriciousness,random-like conduct, and many more, which have coordinated the fundamental necessities of cryptography [16,17].A large number of proposed image encryption frameworks have been dependent on famous chaotic maps like the logistic guide [18,19], sine map [20–22], tent guide [23,24],and Arnold cat map [25,26].Some new chaotic maps [27–31] have not been yet utilized in cryptography; even they have a more extensive chaotic range, better ergodicity, flightiness, and an easier structure than a few well-known chaotic maps.Besides, the greater part of the current image encryption plans utilized the adopted chaotic guides where a few chaotic values have been created for every pixel in the plain-text image.The generation of such a major number of chaotic values devours a lot of computation time and extensively eases the entire encryption process speed.Consequently, these sorts of encryption plans are not reasonable for constant image processing.In the present paper, quick and efficient image encryption conspires because the Trigonometric chaotic map with XOR is proposed.The Trigonometric map has been founded by Orcan Alpar [31] has an extremely basic equation like the logistic map which makes it reasonable for the plan of a real-time image encryption plot.Unlike the logistic map, the Trigonometric map also shows high chaotic conduct in a bigger chaotic scope of the boundaries’qualities,which develops the keyspace and expands the security level.To build the encryption/decryption process speed, the proposed scheme raises the little treatment unit from the pixel level to the row/column level.Moreover, unlike the greater part of the current image encryption plots, the wise utilization of the straightforward chaotic map is adopted.Surely, the new scheme creates just 3 rows and 3 columns for each encryption round.The high security and speed of the proposed scheme are demonstrated through a few notable performances and security tests.The exhibitions of the new strategy can undoubtedly fulfill the prerequisites of real-time image processing at 80 fps(frames per second) for 512 × 512 size images and its security level is parallel to state-of-theart encryption strategies.Consequently, the proposed strategy is an ideal contender for making sure about real-time image processing applications and communications, for example, ensuring the communicated satellite images, procuring the sent images from remote-controlled drones, realtime encryption/decryption of spared Iris biometric recognition images, and so forth.The primary commitments in this paper are continued as follows.

(i) We propose a novel chaos-based image encryption strategy with a high-security level for real-time image processing at 80 fps.

(ii) We make the first and efficient use of the Trigonometric chaotic map in the field of picture encryption.

(iii) We carefully upgrade the utilization of the chaotic map to create arbitrary-like numbers.

(iv) We raise the little processing unit from the pixels level to the rows/columns level.

2 Image Encryption Using Trigonometric Chaotic Map

Chaotic maps hold attractive properties, for example, high affectability to a little change in introductory value and control boundaries, pseudorandom, the precariousness of the framework circle, and simplicity of execution.For the most part, chaotic maps are utilized to produce chaotic key streams that can be utilized in image encryption to accomplish secure correspondence.Numerous chaotic maps have restricted range boundaries making them shaky for image transmission.This paper proposes a clamorous guide alluded to as the trigonometric chaotic map with XOR(TCMX).The qualities of the TCM are researched and used to build up an image encryption strategy.Exploratory outcomes on the TCM show a wide extend of chaotic disorganized conduct,s-unimodality property, and high affectability to a little change in the initial condition.Results likewise show that the arbitrarily produced key streams by the TCM finished the NIST measurable assessments.At long last, encryption results utilizing grey-scale images show that the TCM-based image encryption technique offers exceptionally secure encryption with a short encryption time.

3 Quick Survey of Literature

The brisk advancement of multimedia technology and computer networks with the expanded utilization of cloud-based capacity and enormous information expect strategies to ensure individuals’private and confidential information.Simultaneously, the pre-owned assurance technique ought to be exceptionally secure without trading off the usefulness and convenience of the framework to give accommodation to clients.Image encryption is one of the generally utilized and viable strategies to secure images during storage and transmission.Conventional encryption techniques are not appropriated to encrypt images due to image intrinsic qualities, for example, the connection between image pixels, low affectability to information change, and information excess.Chaotic maps hold appealing attributes, for example, insecurity of system orbit, basic execution, and high affectability to a little change in initial values, control boundaries, and pseudo-randomness.Distinctive chaotic maps have been accounted for in the literature, for example, convex sinusoidal map, parameter-varying baker map, cross chaotic map, generalized sine map, combined sine and tent map, generalized logistic map.Each proposed chaotic map has its points of interest and detriments regarding encryption time, security, and unpredictability.The logistic map, one of the most normally utilized chaotic maps, has a little keyspace making it not invulnerable against brute force attacks, doesn’t give uniform dissemination of the iterative variable, and has a flimsy value of Lyapunov exponent [8,11].It has been discovered that the vast majority of confusing cryptosystems have lacking strength and security [12].Another work detailed that the logistic map, mandelbrot map, and symmetric tent map hold an enormous arrangement of weaknesses.The literature likewise announced distinctive chaotic-based image encryption techniques, for example [14–16].A one-dimensional chaotic map is proposed in this paper; the trigonometric chaotic map (TCMX).At that point, the qualities of the TCM are examined.The investigated qualities are affectability to a little change in the initial condition, chaotic conduct, s-unimodality, and randomness.Based on the examined qualities, an image encryption strategy is created.At last,factual properties and the encryption performance of the created image encryption strategy are dissected.

4 Trigonometric Chaotic Map

Eq.(1) displays the proposed trigonometric chaotic map.

wheresn+1∈[0, 1],s0represents the initial condition, andλrepresents the control parameter.

5 TCM Characteristics Investigation

Attributes of the trigonometric chaotic map are examined here.The assessed qualities are chaotic conduct, s-unimodality, affectability to a little change in starting condition, and haphazardness.Fig.1 shows the iterations of the trigonometric chaotic map.The iteration begins from zero and continues expanding until it arrives at its most extreme worth and afterward diminishes back to zero.Likewise, the iteration function has a single maximum value.In this way,the TCM accomplishes the unimodality property atλ= 1.42.Then, the range of the control parameterλwithin which the trigonometric chaotic map accomplishes the unimodality trademark is considered.The bifurcation outline is utilized for this reason [6], as appeared in Fig.2 for control boundary rangeλ∈[1.3, 1.55].The bifurcation outline shows that the TCM fulfills the unimodality characteristic forλ∈[1.3859, 1.4424].

Figure 1:The iteration function of TCM for λ= 1.42

Figure 2:The bifurcation diagram of TCM for λ ∈[1.3, 1.55]

The chaotic conduct of the TCM is examined utilizing the Schwarzian derivative.Condition(2) shows the Schwarzian derivative of the TCM.Fig.3 shows the charted Schwarzian derivative of the TCM for control boundaryλ= 1.42 and introductory condition s0= 0.26.Fig.3 shows a negative Schwarzian derivative along with the entire interval which demonstrates that the TCM gives chaotic conduct at the chosen estimation of initial condition and control boundary.

Figure 3:The schwarzian derivative of TCM for λ= 1.42

In summary, the obtained robust chaos and unimodality characteristics demonstrate that the trigonometric chaotic map satisfies the s-unimodality property at the chosen values of the control parameter and initial condition.Another thing to investigate is the sensibility to a little change in the initial condition.Fig.4 displays two sequences; we get using (1).The two produced sequences have become complicated, after some iteration, shows the high sensitivity of the TCM to a smaller change in the initial condition.

Figure 4:Two sequences obtained for (s0, λ) = (0.26, 1.42), marked with squares, and for (s0, λ)= (0.26001, 1.42), marked with circles

Then again, the Lyapunov exponent is utilized to explore the chaotic behavior of the TCM as appeared in (3).Condition (4) shows the derivative of (1).The produced Lyapunov type of the TCM appears in Fig.5 for the control boundary rangeλ∈[1, 1.6].As mentioned in the literature, any chaotic map should give chaotic conduct to the Lyapunov exponent inside the scope of [0, 0.69].Fig.5, the TCM gives chaotic conduct toλ∈[1, 1.466].The acquired experimental after-effects of the bifurcation chart and Lyapunov exponent show that the TCM has chaotic conduct and fulfills the s-unimodality attribute forλ∈[1.3859, 1.4424].In correlation, the logistic and tent maps give chaotic conduct and fulfill the s-unimodality trademark forλ∈[3.96, 4] andλ∈(1.999, 2), separately.This demonstrates the trigonometric chaotic map has a wide range of chaotic conduct.

Figure 5:The Lyapunov exponent of the TCM for λ ∈[1,1.6]

The last characteristic to explore is arbitrariness which can be utilized to decide the appropriateness of utilizing the TCM in cryptographic applications.A protected keystream generator shouldn’t show deterministic attributes or essential statistical predispositions.The NIST statistical test suite is utilized to tentatively approve whether the created key streams by the TCM hold arbitrary conduct.The NIST suite is utilized to direct 15 statistical tests intended to test various sorts of non-arbitrariness in a binary sequence.As a pre-preparing step, iterates of the TCM are changed over into binary sequences as appeared in (4).

The degree of significanceαfor all NIST tests is set to 1% which shows that one arrangement in 100 successions is expected to be dismissed.The p-esteem is figured for each statistical test.In every statistical test, if the p-esteem is larger than the degree of significance then the succession is acknowledged as an arbitrary sequence with a 99% significance level.Or, the succession is dismissed.

Table 1:NIST statistical test suite results for 100 key streams of size 200000-bit each generated by the TCM for control parameter λ= 1.42 and randomly chosen initial value

As Tabs.1–3 show, the NIST statistical test suite is performed on a lot of 100 key streams of size 200000 pieces each created by the TCM, tent map, and logistic map, individually.For each test, the p-values are registered and the extent of key streams that pass the condition p-esteem≥αis figured.The TCM, as appeared in Tab.1, has a better extent of key streams that pass the condition p-esteem ≥0.01 than a tent and logistic maps.Additionally, the P-values of p-values,found through the chi-square test, are for the most part higher than the level of significanceαin the occurrence of the TCM and tent guide.In any case, the logistic map fizzled in three tests:block frequency, runs, and longest-runs of ones.In the three map results, the p-values are consistently distributed over the stretch (0, 1).For the TCM and tent map, since all p-values are larger than 0.01 then the produced key streams are analyzed arbitrarily with a certainty of 99%.

Table 2:NIST statistical test suite results for 100 keystreams of size 200000-bit each generated by the tent map for control parameter λ= 1.9999 and randomly chosen initial value

Table 3:NIST statistical test suite results for 100 key streams of size 200000-bit each generated by the logistic map for control parameter λ= 1.9999 and randomly chosen initial value (4)

6 Proposed Image Encryption Method

The proposed image encryption strategy is summed up as follows.Without the loss of oversimplification, the dimension of the image encryptionIis expected asM×N.

(i) The original image is scaled into a size of 256 × 256 pixels.

(ii) Consider a random image of the same size (M× N) as the original image for confusion and diffusion processes.

(iii) The original image and random image are separated into square blocks.Each square of sizem×mpixels where (5) is proposed to findm.

whererforms an aspect of the secret key; in addition to the control boundary and initial condition of TCM.

(iv) The accompanying advances are performed on each square of the original and random images.

a.The corresponding square of original and random images is changed over into a row vector.Perform XOR on the row vector of the original image and random image to obtain a row vector.

b.A row vector, of size [1,m×m], is obtained by using (1) to create pseudorandom numbers.The produced numbers are utilized as pixel location files to rearrange the pixel areas of the row vector.

c.Pixel intensity estimations of the scrambled row vector, obtained from the last step,are changed as per (6),

whereKis a created keystream utilizing Eq.(1) andbis the acquired line vector having performed XOR of original and random row vectors from the past advance.

d.The resultant row vector is changed over into a square, of sizem×mpixels, and secured to shape the encoded image.

(v) Pixel intensity estimations of the encoded image are changed utilizing (6).This progression is proposed to improve the security of the proposed encryption process.

7 Experimental Results

To test the execution of the proposed image encryption technique, the notable Lena and Cameraman images are utilized.The proposed encryption technique is executed utilizing MATLAB.In this paper, the Lena image is utilized as appeared in Figs.6 and 7 shows a non-uniform histogram of Lena image which demonstrates that the dominant part of image pixel values of intensity is concentrated around the center.The boundaryrof (6) is set to four resulting in a square size of 16 × 16 pixels.The proposed encryption technique is used to get the encoded Lena image as appeared in Fig.8.This figure demonstrates a total blurring of image content.The histogram of the encoded image, as appeared in Fig.9, shows the semi-uniform dissemination of encoded image pixels and the power of the encryption strategy against histogram assault strategies.Encryption resistance against Brute-Force Attacks is examined.Brute Force Attack strategies utilize a broad search of the set of all values of secret key parameters to decode an encoded image.Exploratory outcomes demonstrate that the parameters x0,λ,Kought to be changed by the accuracy of one part in 1018, 1017,1016to recuperate the real image from the encoded image.As such, the proposed encryption technique has an intricacy of order O(2169).Any encryption algorithm ought to have an intricacy (complexity) bigger than (2128) to be adequately secure against brute power attacks [17].

Figure 6:The Lyapunov exponent of the TCM for λ ∈[1, 1.6]

Figure 7:Histogram of Lena image of Fig.6

Figure 8:Encrypted image using encryption method

Encryption insusceptibility against the high connection between contiguous image pixels is explored.Condition (7) is used to quantify the horizontal, vertical, and diagonal correlation between two contiguous pixels of an image,

where (x0,y0) demonstrates pixel intensity estimation of two haphazardly chosen neighboring pixels.1,000 neighboring pixels are arbitrarily chosen to figure out their vertical, horizontal,and diagonal correlation.Encryption execution of the proposed Trigonometric Chaotic Map is analyzed against the execution of notable maps, for example, Logistic Map (LM), Tent Map (TM),and Nonlinear Chaotic Map (NCA), Eqs.(8)–(10), has appeared in Tab.4.Tab.4 shows a high connection between pixels of the original image and a poor connection between pixels of encoded images.The proposed TCM-based encryption strategy accomplished the best average correlation result.Then again, Entropy is utilized to discover a measure of arbitrariness in an image.The consequences of Tab.4 demonstrate that the original image has low entropy esteem.Conversely,the encrypted images have high entropy esteem where the ideal worth ought to be 8.The Tent Map-based image encryption technique accomplished the best entropy result.In any case, the proposed TCM-based strategy accomplished close entropy results to that of the TCM-based encryption strategy.This demonstrates the strength of the proposed image encryption technique against entropy assault strategies.In outline, the acquired semi-uniform histogram, statistical correlation, and entropy results show the superior permutation and substitution properties of the proposed TCM-based encryption technique.The decoding stage is done by reversing the steps associated with segment IV.

A one-dimensional trigonometric chaotic map (TCM) is proposed.Experimental results show that the TCM has high affectability to a little change in introductory condition, fulfills the sunimodality trademark, and has wide chaotic conduct.The NIST factual test suite tentatively approves that the produced key streams by the TCM hold arbitrary conduct making the TCM reasonable for cryptographic applications.The proposed TCM is used to build up an image encryption strategy that for the most part comprises of two stages.The image substitution step rearranges image pixel locations.Trial results demonstrate immunity against Brute-Force and Entropy assaults.Results additionally demonstrate the unrivaled substitution and permutation properties of the proposed image encryption strategy.Future work ought to be examined the resistance of the proposed encryption technique against regular assaults, for example, man-in-themiddle and replay.

Figure 9:Histogram of an encrypted image of Fig.8

Table 4:Correlation results of one thousand neighboring pixels randomly selected from original and encrypted images

8 Conclusions

In this paper, we have developed a more secure image cryptosystem dependent on a trigonometric chaotic map and XOR of an arbitrary image.To make the encryption more secure and unbreakable, we utilized a basic chaotic map; produced a row vector of original and a random image.The confusion and diffusion have been done in a row-wise approach like XOR.It has produced a row vector which further applied a TCM resulted in the form of an encrypted image.Usual tests have been performed for the security of the algorithm; results have been produced and presented using the proposed algorithm.

Funding Statement:This research work was partially funded by the Chiang Mai University.

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 激情在线网| 亚洲一级毛片| 欧美精品v| 日韩免费成人| 欧美在线伊人| 四虎国产永久在线观看| 欧美激情成人网| 色亚洲激情综合精品无码视频 | 91精选国产大片| 在线精品视频成人网| 亚洲无码A视频在线| 99久久婷婷国产综合精| 九九免费观看全部免费视频| 老色鬼久久亚洲AV综合| 2021国产精品自产拍在线| 91亚瑟视频| 日韩黄色精品| 色哟哟精品无码网站在线播放视频| 香蕉久久永久视频| 亚洲一区波多野结衣二区三区| a毛片基地免费大全| 精品国产网| 精品国产免费观看一区| 99热这里只有精品免费国产| 亚洲浓毛av| 久久先锋资源| 日韩一区精品视频一区二区| 亚洲乱码视频| 玖玖免费视频在线观看| 97在线国产视频| 台湾AV国片精品女同性| 无码aⅴ精品一区二区三区| 欧美成人免费一区在线播放| 全午夜免费一级毛片| www中文字幕在线观看| 欧美国产综合色视频| 五月婷婷伊人网| 国产成人精品日本亚洲| a级毛片网| 亚洲视频二| 亚洲中文无码av永久伊人| 99re在线观看视频| 亚洲天堂网2014| 国产午夜福利片在线观看| 一本一道波多野结衣av黑人在线| av性天堂网| 伊人久久婷婷五月综合97色| 午夜电影在线观看国产1区| 亚洲精品无码AV电影在线播放| 99久久精彩视频| 成人精品亚洲| 欧美三級片黃色三級片黃色1| 欧美精品v欧洲精品| 久久99国产乱子伦精品免| 2021国产乱人伦在线播放| 国产在线八区| h网站在线播放| 国产永久免费视频m3u8| 国产成人资源| 免费一级无码在线网站| 国产又色又刺激高潮免费看| 黄色福利在线| www.99精品视频在线播放| 精品人妻无码中字系列| 999国产精品永久免费视频精品久久| 日本久久网站| 精品欧美视频| 亚洲最新地址| 女人毛片a级大学毛片免费| 中文字幕人成人乱码亚洲电影| 国产一区在线视频观看| 亚洲国产亚综合在线区| 亚洲色图综合在线| 国产男人的天堂| 精品国产免费观看| 中国黄色一级视频| www.91在线播放| 农村乱人伦一区二区| AV在线天堂进入| 啊嗯不日本网站| 人人艹人人爽| 免费人成在线观看视频色|