1 Introduction
2 Related work
2.1 Encryption algorithms using the chaos system
2.2 AES-based encryption algorithms
3 Primarily: AES and chaos system
3.1 AES algorithm
3.2 Chaos system
4 The proposed image encryption method
-
The algorithm must be simple enough to be evaluated and analyzed easily and completely.
-
An encryptor must provide security margin more than the required value against the known attacks.
-
Well-known, well-examined and reliable instruments and ideas must be used for the design.
4.1 Generating the round key using the chaos system
4.2 Encryption process
5 Results and discussion
5.1 Histogram analysis of the encrypted image
Chi-square | Lena | Cameraman | F16 | Pepper |
---|---|---|---|---|
Image before encryption | 29,384 | 179,819 | 176,403 | 30,810 |
Ref. [21] | 263 | 257 | 265 | 274 |
CCAES algorithm | 238.6719 | 236.6953 | 241.7656 | 253.2969 |
5.2 Information entropy analysis
5.3 The analysis of the adjacent pixels correlation
Correlation of two adjacent pixels | Ref. [22] | Ref. [24] | AES algorithm | CCAES algorithm | |
---|---|---|---|---|---|
Lena | Horizontal | 0.0055002 | 0.0047 | 0.2724 | 0.0027 |
Vertical | 0.0041189 | 0.0015 | 0.2681 | 0.0012 | |
Diagonal | 0.0002136 | 0.0030 | 0.0765 | 0.0003105 | |
Cameraman | Horizontal | 0.0046892 | 0.0047 | 0.2729 | 0.0002267 |
Vertical | 0.0147580 | 0.0054 | 0.2723 | 0.0007220 | |
Diagonal | 0.0139760 | 0.0016 | 0.0682 | 0.0048 | |
F16 | Horizontal | 0.004492 | 0.0033 | 0.2740 | 0.0077 |
Vertical | 0.0005435 | 0.0002 | 0.2691 | 0.0005899 | |
Diagonal | 0.0032230 | 0.0019 | 0.0815 | 0.0026 | |
Pepper | Horizontal | 0.0114200 | 0.0023 | 0.2704 | 0.0020 |
Vertical | 0.0045059 | 0.0021 | 0.2709 | 0.0080 | |
Diagonal | 0.0081210 | 0.0003 | 0.0736 | 0.0008398 | |
Baboon | Horizontal | 0.2656 | 0.0009269 | ||
Vertical | 0.2734 | 0.0047 | |||
Diagonal | 0.0723 | 0.0050 | |||
Barbara | Horizontal | 0.01818 | 0.0033 | 0.1868 | 0.0094 |
Vertical | 0.0091 | 0.0032 | 0.3561 | 0.0028 | |
Diagonal | 0.0072 | 0.0025 | 0.0659 | 0.0014 | |
Tank | Horizontal | 0.0033 | 0.0049 | 0.0012 | |
Vertical | 0.0002 | 0.2635 | 0.0006086 | ||
Diagonal | 0.0019 | 0.0186 | 0.0076 | ||
Fishing boot | Horizontal | 0.0077 | 0.0042 | ||
Vertical | 0.0086 | 0.0037 | |||
Diagonal | 0.0171 | 0.0046 | |||
House | Horizontal | 0.0015 | 0.0004 | 0.0519 | 0.0048 |
Vertical | 0.0016 | 0.0012 | 0.3393 | 0.0039 | |
Diagonal | 0.0039 | 0.0006 | 0.0651 | 0.0002507 | |
Dog | Horizontal | 0.1794 | 0.0068 | ||
Vertical | 0.4199 | 0.0054 | |||
Diagonal | 0.0845 | 0.0010 | |||
Flower | Horizontal | 0.0212 | 0.0021 | ||
Vertical | 0.1401 | 0.0027 | |||
Diagonal | 0.0213 | 0.0032 |
5.4 Algorithm’s sensitivity analysis to the original image
5.5 Comparing the run time of the CCAES algorithm with that of the original AES
Run time of encryption + decryption | Pepper | F16 | Cameraman | Lena |
---|---|---|---|---|
CCAES algorithm | 2.88S | 2.9S | 2.9S | 2.9S |
AES | 452.3S | 515.2S | 446.8S | 454.1S |
Symbols and notations | Description |
---|---|
≪< | Cyclic shift |
≪ | Ordinary shift |
⊕ | XOR operation |
AES | Advanced encryption standard |
ECC | Elliptic curve cryptography |
NIST | National Institute Of Standards And Technology |
NPCR | Number of pixels change rate |
UACT | Unified average changing intensity |