Deterministic chaos game: A new fractal based pseudo-random number generator and its cryptographic application

被引:81
作者
Ayubi, Peyman [1 ]
Setayeshi, Saeed [2 ]
Rahmani, Amir Masoud [3 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Urmia Branch, Orumiyeh, Iran
[2] Amirkabir Univ Technol, Dept Med Radiat Engn, Tehran, Iran
[3] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch, Tehran, Iran
关键词
Digital image encryption; Region of interest; Deterministic chaos game; security; ENCRYPTION; CRYPTANALYSIS; COMBINATION; SYSTEMS; MAP;
D O I
10.1016/j.jisa.2020.102472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a digital image encryption algorithm is proposed based on the generalized model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo-random number generator (PRNG) in the proposed encryption algorithm. The foundation of the chaos game is based on basic points and its distance ratio that determine the basis of how they distribute random values in 2D or 3D space. These basic points are entered by the user interface and are the result of an encrypted image with a fractal structure. The use of the bifurcation diagram and Lyapunov exponent analysis showed that the proposed chaos game has the dynamical behavior, and fully chaotic characteristic, and can be used as a secure PRNG in cryptography systems. In the proposed method, the region of interest is determined by a number of Bases, and the fractal mechanism of chaos game for the encryption process is performed on the image. This process is very sensitive to any changes in keys and refers to confusion. The evaluation results of security and performance analysis on standard images confirm the efficiency of the proposed method and demonstrate that the proposed method is robust against attacks. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:20
相关论文
共 77 条
[41]  
Hadi R. M., 2012, 2012 2nd International eConference on Computer and Knowledge Engineering (ICCKE 2012), P301, DOI 10.1109/ICCKE.2012.6395396
[42]   Color image encryption using chaotic nonlinear adaptive filter [J].
Hsiao, Hung-I ;
Lee, Junghsi .
SIGNAL PROCESSING, 2015, 117 :281-309
[43]   Image Encryption Using Josephus Problem and Filtering Diffusion [J].
Hua, Zhongyun ;
Xu, Binxuan ;
Jin, Fan ;
Huang, Hejiao .
IEEE ACCESS, 2019, 7 :8660-8674
[44]   Combined adjuvant-delivery system for new generation vaccine antigens: alliance has its own advantage [J].
Kaurav, Monika ;
Madan, Jitender ;
Sudheesh, M. S. ;
Pandey, Ravi Shankar .
ARTIFICIAL CELLS NANOMEDICINE AND BIOTECHNOLOGY, 2018, 46 :S818-S831
[45]  
Kocarev L, 2011, STUD COMPUT INTELL, V354, P1, DOI 10.1007/978-3-642-20542-2
[46]   A Survey of Image Encryption Algorithms [J].
Kumari, Manju ;
Gupta, Shailender ;
Sardana, Pranshul .
3D Research, 2017, 8 (04)
[47]  
L'Ecuyer P, 2007, ACM T MATH SOFTWARE, V33, DOI 10.1145/1268776.1268777
[48]   Security Analysis of the Efficient Chaos Pseudo-random Number Generator Applied to Video Encryption [J].
Lambic, Dragan ;
Jankovic, Aleksandar ;
Ahmad, Musheer .
JOURNAL OF ELECTRONIC TESTING-THEORY AND APPLICATIONS, 2018, 34 (06) :709-715
[49]   Integrated chaotic systems for image encryption [J].
Lan, Rushi ;
He, Jinwen ;
Wang, Shouhua ;
Gu, Tianlong ;
Luo, Xiaonan .
SIGNAL PROCESSING, 2018, 147 :133-145
[50]   When an attacker meets a cipher-image in 2018: A year in review [J].
Li, Chengqing ;
Zhang, Yun ;
Xie, Eric Yong .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48