A Novel Image Encryption Scheme Based on Collatz Conjecture

被引:17
作者
Ballesteros, Dora M. [1 ]
Pena, Jimmy [1 ]
Renza, Diego [1 ]
机构
[1] Univ Mil Nueva Granada, Telecommun Engn, Carrera 11 101-80, Bogota 110111, Colombia
来源
ENTROPY | 2018年 / 20卷 / 12期
关键词
image encryption; Collatz conjecture; ciphered audio; scrambling; diffusion; ALGORITHM; CRYPTANALYSIS; CHAOS; COMBINATION; DNA;
D O I
10.3390/e20120901
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to <mml:semantics>8.57x10506</mml:semantics>). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.
引用
收藏
页数:18
相关论文
共 38 条
  • [1] Ballesteros L, 2016, J INF HIDING MULTIME, V7, P233
  • [2] A proof of the Collatz conjecture
    Bruckman, Paul S.
    [J]. INTERNATIONAL JOURNAL OF MATHEMATICAL EDUCATION IN SCIENCE AND TECHNOLOGY, 2008, 39 (03) : 403 - 407
  • [3] A novel chaos-based image encryption algorithm using DNA sequence operations
    Chai, Xiuli
    Chen, Yiran
    Broyde, Lucie
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 88 : 197 - 213
  • [4] Cryptanalysis of image encryption scheme based on a new 1D chaotic system
    Dhall, Sakshi
    Pal, Saibal K.
    Sharma, Kapil
    [J]. SIGNAL PROCESSING, 2018, 146 : 22 - 32
  • [5] Dora M, 2018, J Inf Hiding Multim Signal Process, V9, P796
  • [6] Cryptanalysis of a DNA and chaos based image encryption algorithm
    Dou, Yuqiang
    Liu, Xiumin
    Fan, Haiju
    Li, Ming
    [J]. OPTIK, 2017, 145 : 456 - 464
  • [7] Faragallah O., 2013, IMAGE ENCRYPTION COM
  • [8] Phase Interrogation of Diaphragm-Based Optical Fiber Acoustic Sensor Assisted by Wavelength-Scanned Spectral Coding
    Fu, Xin
    Lu, Ping
    Ni, Wenjun
    Liao, Hao
    Jiang, Xinyue
    Liu, Deming
    Zhang, Jiangshan
    [J]. IEEE PHOTONICS JOURNAL, 2018, 10 (03):
  • [9] 2D Logistic-Sine-coupling map for image encryption
    Hua, Zhongyun
    Jin, Fan
    Xu, Binxuan
    Huang, Hejiao
    [J]. SIGNAL PROCESSING, 2018, 149 : 148 - 161
  • [10] Image encryption algorithm using chaotic Chebyshev generator
    Huang, Xiaoling
    [J]. NONLINEAR DYNAMICS, 2012, 67 (04) : 2411 - 2417