† Corresponding author. E-mail:
Project supported by the National Natural Science Foundation of China (Grant Nos. 61672124, 61370145, and 61173183), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund, China (Grant No. MMJJ20170203), the Program for New Century Excellent Talents in Fujian Province University, and the Natural Science Foundation of Fujian Province of China (Grant No. 2018J01100).
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM (LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box (S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images.
Spatiotemporal chaos is a complex phenomenon in the study of turbulence, not only in fluid dynamics but also in solid-state physics, optics, chemical reaction with diffusion, and possibly in biology.[1,2] The coupled map lattice (CML) is a model of chaotic spatial and dynamical structures, which has been investigated by many researchers and a large number of related theories are obtained. Khellat et al.[3] proposed a globally nonlocal couple map lattice (GNCML) of spatiotemporal chaos. A one-way coupled map lattice (OCML) of spatiotemporal chaos is presented by Meherzi et al.[4] Guedes et al.[5] investigated the spatiotemporal dynamics of coupled logistic maps. Most of the previous spatiotemporal chaotic systems are spatial linear coupling between lattices. Each map lattice is influenced by its adjacent lattices. Therefore, the chaotic sequences generated in the adjacent two lattices have a high correlation. To break this characteristic, three coupling connect methods are investigated: spatial random coupling, spatial nonlinear coupling, and spatial linear–nonlinear mixed coupling. Poria et al. developed a lattice of coupled chaotic maps whose coupling connections are dynamically rewired to random sites with probability p.[6] The connect methods with connections rewired randomly by varying probability p and period t are employed to create a randomly coupled spatiotemporal chaos by Chen et al.[7] Zhang et al.[8] suggested a new spatiotemporal dynamics of Arnold coupled logistic map lattice (ACLML) based on the nonlinear coupling method.
The MLNCML system used linear–nonlinear mixed coupling method and achieved better chaotic performance than CML.[9] However, those spatiotemporal chaos in this spatial random coupling method cannot be reproduced again in the same parameters, which means that it is unsuitable for use in cryptography. The ACLML and MLNCML systems changed the neighborhood coupling into non-neighborhood coupling by using the nonlinear chaotic map coupling method, although they still have the characteristic that one lattice is limited by another two lattices. Based on this above work, we employed a novel pseudo-random coupling method to design a new spatiotemporal chaotic system that we named PCLML. Two coupling lattices are selected by the chaotic sequences, which are generated with chaotic system. Hence, chaos behavior in one lattice can quickly spread to the whole space and the data in one lattice can affect all of the lattices.
These spatiotemporal chaotic systems are based on the classical logistic map, which is proven to be unsafe.[10–12] Logistic chaotic orbits are quite simple and may be predicted easily. It has three security issues: blank windows, smaller parameter value space, and the non-uniform data distribution of output chaotic sequences.[11] Hence, it has unsuitable to be adopted in spatiotemporal chaos. In this paper, we design a new one-dimensional (1D) modulation chaos named logistic-PWLCM (LP) by using a combination of two existing 1D chaotic maps: logistic map and PWCLM map. In contrast to the logistic map, our simulations and performance evaluations show that the proposed LP system has larger chaotic parameter space from 0 to 4, higher Lyapunov exponent, and uniform distributed data. Consequently, we suggested LP chaotic system as f(x) in PCLML spatiotemporal chaos instead of logistic map.
The motivation of our work in this paper is not only to discover the new features of spatiotemporal chaotic systems in pseudo-random coupling with LP chaotic map but also to study new characters which are suitable for image cryptography. The CML system is widely applied to image encryptions,[13–15] but the behavior of periodic window and the high values of the mutual information reduce the randomness of space and time series and restraint the design of current encryptions schemes.[16,17] Compared with the CML system, our experimental results prove that the chaotic dynamic behavior of PCLML system is more complex and it owns some new features, such as larger range of parameters for chaotic behaviors, no periodic windows in bifurcation diagrams, and higher entropy universality to overcome those drawbacks in CML. Therefore, we use PCLML system to encrypt image combining some new methods such as adding random pixels, self-generating matrix model M, and dynamic substitution box (S-Box) technology. By adding random pixels, we can ensure that each encryption result is different, even for the case of encrypting a plain-image several times with the same secret key. Matrix model M operation speeds up the encryption and can change the same pixels into different values after computing, which makes the histogram of the image uniform and able to effectively resist statistical attacks. The S-Box is one of the core nonlinear components in encryption algorithms and it is widely applied to image encryption. Liu et al. designed a chaos-based color image encryption scheme using bijection and S-Box.[18] Guesmi et al. presented a strong S-Box by using logistic chaotic and Boolean functions.[19] By calculation, they compared all of S-Boxes and selected the highest nonlinearity S-Box as the final one. Hussain et al. constructed chaotic linear fractional transformation (LFT) S-Boxes and made the cipher more resistant against cryptanalyst attacks.[20] In addition, we construct four dynamic S-Boxes by using chaotic sequences sort method, which has been proven to be effective.[21] We use several different kinds of analysis measures, including key space, sensitivity, information entropy, histogram, and robustness to noise, data loss, and differential attacks. The security analysis and simulation results prove that our new algorithm has large key space, is robust against potential attacks, and has excellent encryption performance.
The logistic and PWLCM maps are two commonly used 1D classical chaotic maps. Their structure seems to be very simple and deterministic but they have excellent chaotic behaviors. The mathematical definition can be described by, respectively,
The logistic map and PWLCM map share some common problems, such as blank windows, weak parameter space, and uneven distribution of sequences.[22] These properties limit their application in some of the high security requirements of the scenes. According to a nonlinear combination structure,[22] a new 1D LP map is proposed and is developed from two simple chaotic systems. This can be defined by
The LP map has more complex structures than a logistic map and this makes its chaotic orbits much harder to predict. To qualify the performance of LP system, Lyapunov exponent, bifurcation, and distribution of output sequences are investigated. Figure
The CML is investigated as a classical model for spatiotemporal chaos and it considers a grid of L logistic maps. The definition of CML in discrete time n is given as
Now, we randomly rewire the coupling connections of the above system in varying lattices; namely, we change the coupling lattices from i − 1 and i + 1 to j, k, respectively. A novel spatiotemporal chaos entitled PCLML system is designed as
Without loss of generality, we supposed that the size of L on the system of PCLML is 100. To verify the effectiveness of the proposed PCLML model, we did a comparison experiment with the CML system, which also assigned L = 100. All of our simulations are conducted assuming ε ∈ [0,1] and u ∈ (0,4). j and k are different in every iteration and they represent different kinds of couplings, changing from neighbor coupling to random non-neighbor coupling.
The Kolmogorov–Sinai entropy density of proposed PCLML chaos is the average of positive Lyapunov exponents in all lattices. The Lyapunov exponent is one of the most important geometrical invariants to measure the dynamic characteristics of a chaotic system.[8] In general, the larger the Lyapunov exponents are, the more complex the chaotic dynamical behavior is. According to the calculation method in Ref. [9], we can get the Kolmogorov–Sinai entropy density and universality. Kolmogorov–Sinai entropy universality is the percentage of lattices in chaos, which depicts the space complexity in L dimensions of dynamics.
The experimental results of Kolmogorov–Sinai entropy density for different parameters ε and u in the proposed PCLML model and the CML system are shown in Fig.
The values of Kolmogorov–Sinai entropy universality (hu) for different parameter values represent the space chaotic behaviors of the PCLML system and the CML system, as shown in Fig.
The comparison between the PCLML and the CML systems in Kolmogorov–Sinai entropy indicates that the PCLML system contains more intensive and extensive chaotic behaviors.
It is important to predict an essential aspect of chaotic behavior by considering its bifurcation of the coupled system. In the CML system and proposed PCLML model, the bifurcation diagrams with different u and fixed ε are shown in Fig.
The bifurcation of PCLML model when u ∈ (0,4) with ε = 0.1, ε = 0.3, and ε = 0.5 is drawn in Figs.
In this section, using PCLML and LP systems, an image encryption scheme based on self-generating matrix model M and dynamic S-Box methods are presented. The secret keys related to plaintext are considered as the initial values of LP and PCLML systems. Chaotic sequences generated by PCLML map are applied to construct matrix model M and S-Boxes. Before encryption, several random values are added to plain image which can ensure that encrypted cipher images are different. Without loss of generality, we suppose that the number of PCLML lattice i is 100 and the size of the plain image F is W × H. The running environment of the algorithm is 8.00 GB RAM, Intel (R) Core (TM) Intel (R) Xeon (R) CPU @2.67 Hz. The encryption algorithm time complexity is O(m3). The process of encryption is shown in Fig.
The key space should be large enough to make brute-force attack infeasible and it should be larger than 2100.[23] To satisfy this requirement, we set the secret key as 256 random bits K and the average value of a plaintext image r. In the real application, r can be represented by 32 bits. Therefore, the total key space is 2288. To resist chosen-plaintext attacks, we combine K and r together to generate the initial values and control parameters of LP and PCLML systems. The generation procedures of initial values are shown in Algorithm
In our algorithm, we add some random values to the plain image before encryption. These random values can influence all the pixels after matrix model M transform and diffusion operations. Since these pixels are generated randomly and are different in each encryption, the generated cipher-images are different even when a plain image is encrypted several times by the same secret key. This step enables the algorithm to strengthen the capability of resisting chosen-plaintext attack.
The number of random pixels depends on the size of the plain image. When the number of all pixels is less than 16, the algorithm needs to reach the number of total pixels to 16. When the number of all pixels is greater than 16, after adding random pixels, the number of all pixels is L, which needs satisfy the conditions
Matrix transform operation are often used in image encryption and the representative confusion algorithms are Arnold transform, magic cube transform, Fibonacci transform, and so on.[24] Chen et al. employed the 3D cat map to shuffle the positions of image pixels and used chaotic map to confuse the relationship between the cipher-image and the plain-image.[25] Ni et al. proposed a novel image encryption algorithm based on bit-level Arnold transform and hyper chaotic maps.[26] The above researches are focused on applying the matrix to change the location but not change the values of the pixels. Hence, attackers can compare the features in a histogram to get the meaningful information in the image. In this paper, we use the self-generated model M 4 × 4 matrix to multiply the value of pixels to improve the security of algorithm and M = 256. To resist the periodicity of matrix, we use four matrices to encrypt images alternately. After matrix transform, we apply the chaotic sequences to confuse the image at the row level. The method of generating model M matrix is shown as Algorithm
The steps of matrix model M’s transform and row confusion are described in Algorithm
S-Box structures have high cryptographic features to resist differential cryptanalysis and applying a strong S-Box structure in encryption helps to have a secure effect.[27] By applying the algorithm in Ref. [21], we were able to construct the S-Box dynamically through the nonlinear characteristics of PCLML system. The 256 chaotic values are arranged in ascending order, and thus we can achieve the new order of each value. For example, the index of chaotic data 0.2 is 160, while after ascending sorting, the new index of 0.2 is 20. So in the generated S-Box, 20 and 160 are the corresponding relationships. To further improve the security of encryption, we constructed 4S-Boxes to substitute the pixel’s value and alternated with the XOR diffuse operations. The details are shown in Algorithm
The decryption algorithm is the reverse process of encryption algorithm. We can get the decrypted image just by following the reverse steps. We need to achieve inverse matrix and inverse S-Box in decryption. The results of the encryption and decryption are shown in Fig.
In this section, several different kinds of analysis measures are used to demonstrate the security performance of the proposed image cryptosystem. Here, we only show the experimental results of nine images with different size. They are size of 256 × 256: Lena and Pepper, size of 512 × 512: Elaine512 and Boat512, and size of 1024 × 1024: Testpat1k.
As mentioned in Section
Information entropy is the most important feature to provide a qualitative standard of the image randomness. The formula for calculating information entropy is described by[27]
Meanwhile, the contrasting results with other algorithms in entropy are shown in Table
Histogram analysis gives a straightforward result to show how uniformly pixels of an image distribute. A good image algorithm should make the histogram of the cipher image as flat as possible. Histograms of plain image and cipher image are plotted in Fig.
The adjacent pixels of digital images have strong correlation in horizontal, vertical, and diagonal directions. A secure encryption algorithm should transform the original images into encrypted images with lower or no correlation between adjacent pixels. To analyze this feature, we choose 3000 pairs of adjacent pixels to illustrate the correlation coefficients (CC) rxy of each pair, calculated as[29]
During the transmission or storage through networks and the physical channel, the image is easily contaminated by noise or has the risk of the data loss.[27,28,30] A good cryptosystem should be robust against data loss or noise jamming. In Fig.
To resist differential attack, any tiny modification in the plain image should cause a substantial change in the cipher image. Two common quantitative measures are usually used: number of pixels change rate (NPCR) and unified average changing intensity (UACI). They are defined as
This paper designs a new spatiotemporal chaos PCLML, which we named pseudo-random coupled map lattices with logistic-PWLCM map under pseudo-random method for spatial coupling connections. The purpose of our proposed LP map is used to replace the logistic map. The results of our comparisons show that the LP system has larger key space, no blank windows, and more uniform data distribution. The criteria, such as the Kolmogorov–Sinai entropy density and universality, and bifurcation diagram analysis are employed to quantify the complexity of the system’s behaviors in the proposed PCLML model.[35,36] In comparison with the CML system, we obtain the new features in PCLML system, such as larger parameter space, better random sequences, and no periodic windows. These features ensure that it is more suitable for encryption. Furthermore, we use PCLML system to encrypt n image by combining some new methods of image preprocessing, such as adding random pixels, matrix model M transform, and dynamic S-Box technology. Several different kinds of analysis measures are used, including key space and sensitivity, information entropy, histogram, and robustness to noise, data loss, and differential attack. Our security analysis and simulation results prove that our new algorithm offers a powerful method against potential attacks and has excellent encryption performance.
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] |