Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application

被引:79
作者
Ayubi, Peyman [1 ]
Setayeshi, Saeed [2 ]
Rahmani, Amir Masoud [3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
[2] Amirkabir Univ Technol, Dept Med Radiat Engn, Tehran, Iran
[3] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
关键词
Digital image encryption; Region of interest; Deterministic chaos game; security; ENCRYPTION; CRYPTANALYSIS; COMBINATION; SYSTEMS; MAP;
D O I
10.1016/j.jisa.2020.102472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a digital image encryption algorithm is proposed based on the generalized model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo-random number generator (PRNG) in the proposed encryption algorithm. The foundation of the chaos game is based on basic points and its distance ratio that determine the basis of how they distribute random values in 2D or 3D space. These basic points are entered by the user interface and are the result of an encrypted image with a fractal structure. The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems. In the proposed method, the region of interest is determined by a number of Bases, and the fractal mechanism of chaos game for the encryption process is performed on the image. This process is very sensitive to any changes in keys and refers to confusion. The evaluation results of security and performance analysis on standard images confirm the efficiency of the proposed method and demonstrate that the proposed method is robust against attacks. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 77 条
[1]   An image encryption approach using particle swarm optimization and chaotic map [J].
Ahmad M. ;
Alam M.Z. ;
Umayya Z. ;
Khan S. ;
Ahmad F. .
International Journal of Information Technology, 2018, 10 (3) :247-255
[2]   Cryptanalysis of an Image Encryption Algorithm Based on Combined Chaos for a BAN System, and Improved Scheme Using SHA-512 and Hyperchaos [J].
Ahmad, Musheer ;
Al Solami, Eesa ;
Wang, Xing-Yuan ;
Doja, M. N. ;
Beg, M. M. Sufyan ;
Alzaidi, Amer Awad .
SYMMETRY-BASEL, 2018, 10 (07)
[3]   Cryptanalysis of an image encryption algorithm based on PWLCM and inertial delayed neural network [J].
Ahmad, Musheer ;
Alam, Mohammad Zaiyan ;
Ansari, Subia ;
Lambic, Dragan ;
AlSharari, Hamed D. .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 34 (03) :1323-1332
[4]   Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series [J].
Ahmad M. ;
Doja M.N. ;
Beg M.M.S. .
3D Research, 2017, 8 (04)
[5]   Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys [J].
Ahmad, Musheer ;
Ahmad, Tanvir .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 12 (01) :113-128
[6]   Pseudo random number generator based on quantum chaotic map [J].
Akhshani, A. ;
Akhavan, A. ;
Mobaraki, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) :101-111
[7]   An image encryption scheme based on quantum logistic map [J].
Akhshani, A. ;
Akhavan, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (12) :4653-4661
[8]   A new hybrid digital chaotic system with applications in image encryption [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je ;
Alkhawaldeh, Rami S. .
SIGNAL PROCESSING, 2019, 160 :45-58
[9]   Sine-Cosine Optimization-Based Bijective Substitution-Boxes Construction Using Enhanced Dynamics of Chaotic Map [J].
Alzaidi, Amer Awad ;
Ahmad, Musheer ;
Ahmed, Hussam S. ;
Al Solami, Eesa .
COMPLEXITY, 2018,
[10]   A New 1D Chaotic Map and β-Hill Climbing for Generating Substitution-Boxes [J].
Alzaidi, Amer Awad ;
Ahmad, Musheer ;
Doja, M. N. ;
Al Solami, Eesa ;
Beg, M. M. Sufyan .
IEEE ACCESS, 2018, 6 :55405-55418