A Novel Image Encryption Scheme Based on Collatz Conjecture

被引:17
作者
Ballesteros, Dora M. [1 ]
Pena, Jimmy [1 ]
Renza, Diego [1 ]
机构
[1] Univ Mil Nueva Granada, Telecommun Engn, Carrera 11 101-80, Bogota 110111, Colombia
来源
ENTROPY | 2018年 / 20卷 / 12期
关键词
image encryption; Collatz conjecture; ciphered audio; scrambling; diffusion; ALGORITHM; CRYPTANALYSIS; CHAOS; COMBINATION; DNA;
D O I
10.3390/e20120901
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to <mml:semantics>8.57x10506</mml:semantics>). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.
引用
收藏
页数:18
相关论文
共 38 条
[1]  
Ballesteros L, 2016, J INF HIDING MULTIME, V7, P233
[2]   A proof of the Collatz conjecture [J].
Bruckman, Paul S. .
INTERNATIONAL JOURNAL OF MATHEMATICAL EDUCATION IN SCIENCE AND TECHNOLOGY, 2008, 39 (03) :403-407
[3]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[4]   Cryptanalysis of image encryption scheme based on a new 1D chaotic system [J].
Dhall, Sakshi ;
Pal, Saibal K. ;
Sharma, Kapil .
SIGNAL PROCESSING, 2018, 146 :22-32
[5]  
Dora M, 2018, J Inf Hiding Multim Signal Process, V9, P796
[6]   Cryptanalysis of a DNA and chaos based image encryption algorithm [J].
Dou, Yuqiang ;
Liu, Xiumin ;
Fan, Haiju ;
Li, Ming .
OPTIK, 2017, 145 :456-464
[7]  
Faragallah O., 2013, IMAGE ENCRYPTION COM
[8]   Phase Interrogation of Diaphragm-Based Optical Fiber Acoustic Sensor Assisted by Wavelength-Scanned Spectral Coding [J].
Fu, Xin ;
Lu, Ping ;
Ni, Wenjun ;
Liao, Hao ;
Jiang, Xinyue ;
Liu, Deming ;
Zhang, Jiangshan .
IEEE PHOTONICS JOURNAL, 2018, 10 (03)
[9]   2D Logistic-Sine-coupling map for image encryption [J].
Hua, Zhongyun ;
Jin, Fan ;
Xu, Binxuan ;
Huang, Hejiao .
SIGNAL PROCESSING, 2018, 149 :148-161
[10]   Image encryption algorithm using chaotic Chebyshev generator [J].
Huang, Xiaoling .
NONLINEAR DYNAMICS, 2012, 67 (04) :2411-2417