Abstract
Most of existing image encryption schemes are proposed in the spatial domain which easily destroys the correlation between pixels. This paper proposes an image encryption scheme by employing discrete cosine transform (DCT), quantum logistic map and substitution-permutation network (SPN). The DCT is used to transform the images in the frequency domain. Meanwhile, the SPN is used to provide the security properties of confusion and diffusion. The SPN provides fast encryption as compared to the asymmetric based image encryption since operations with low computational complexity are used (e.g., exclusive-or and permutation). Different statistical experiments and security analysis are performed against six grayscale and color images to justify the effectiveness and security of the proposed image encryption scheme.
Similar content being viewed by others
Introduction
With the advancement of social media and the development of Internet, transmission of images becomes a new normal given that images are more visual and informative. Thus, it raises the need for image encryption techniques to protect the confidentiality of images. When proposing an image encryption technique, it is necessary to consider the unique attributes of digital images, such as high redundancy and strong correlation between adjacent pixels. Due to the unique attributes, traditional cryptographic techniques are no longer suitable for image encryption1.
Different techniques were introduced to resolve the problems arisen from the unique image characteristics. The techniques are based on chaos theory2,3,4, compressed sensing5,6,7, DNA coding8,9,10 and quantum communication11,12,13. Out of these techniques, chaos theory introduced by Lorenz14 is widely used for image encryption due to the states of chaotic systems are apparently random and irregular under the control of highly sensitive initial values. The chaotic maps widely used for image encryption are logistic map, logic-sine-coupling map, sine map and Chebyshev map.
Along the direction of chaos theory, Sui et al.15 proposed a double-image encryption method based on optical interference and logistic map, which effectively avoids the contour problem in the interference encryption method. Hua et al.16 proposed a two-dimensional logic-sine-coupling map and applied the proposed map to a classical confusion-diffusion framework for image encryption. Other than two-dimensional chaotic map, Pak and Huang17 proposed a new color image encryption algorithm by utilizing three one-dimensional chaotic maps including logistic, sine and Chebyshev. Even though low-dimensional chaotic map is simple and easy to implement, it suffers from the drawback of limited range of chaotic behavior and smaller key space. Thus, multiple low-dimensional or high-dimensional chaotic maps are exploited to form an image encryption scheme with higher security by enlarging the key space18,19,20,21,22. For example, Chen et al.19 proposed an optical image encryption scheme combining image scrambling and random coding based on the three-dimensional chaotic system to solve the shortcomings of typical image scrambling codes. Besides, Chai et al.23 proposed an efficient image compression and encryption scheme by combining hyperchaos system with two-dimensional compressive sensing, and realized the functions of compression and encryption at the same time, which overcame the risk of using nonlinear transformation in low-dimensional chaos system. Recently, low-dimensional chaotic system is used to construct a parallelizable image encryption scheme as the computational cost is lower24,25.
Due to the breakthrough of quantum teleportation and quantum computing, quantum image processing has also received increasing attention in the field of information security. The image types will be first mapped to quantum domain before performing quantum computation. Zhou et al.26 designed a quantum version of the generalized Arnold transform. Subsequently, a quantum image encryption algorithm was proposed based on the generalized Arnold transform and double random phase encoding technique. Meanwhile, Luo et al.27 proposed an image encryption scheme based on quantum coding. The classical digital image data is mapped to the quantum state, which ensures the accurate extraction of the classical image. At the same time, quantum adjacency switching reduces computational complexity.
The aforementioned image encryption algorithms are constructed in the spatial domain which easily destroys the correlation between pixels28. The frequency domain based image encryption scheme is more efficient, more robust and preserve the information of image even though going through the inverse process. Frequency domain based image encryption normally involves fractional Fourier transform, discrete wavelet transform, discrete cosine transform and Gabor transform. Kong and Shen29 proposed a multiple-image encryption scheme based on multichannel fractional Fourier transform and wavelet transform. The increase of the number of encrypted images solves the problem of insufficient capacity and improves the flexibility and variability of the scheme. To reduce the amount of encrypted images and tolerate a certain range of noise intensity, Zhou et al.30 proposed an efficient dual image encryption scheme based on discrete wavelet transform and discrete fractional random transformation. On the other hand, Chen et al.31 proposed an image encryption method in fractional domain through singular value decomposition and Arnold conversion.
Different from other symmetric key based image encryption schemes, Dong32 designed an asymmetric color image encryption scheme based on the discrete mapping. The hash value and the initial number of iterations are used as keys in the encryption process. In the decryption process, the three initial values of piecewise linear chaotic map and the initial number of iterations are used as keys. Along the same direction, Wu et al.5 combined compressed sensing and cylindrical diffraction techniques to propose an asymmetric multiple-image encryption algorithm to prevent information leakage and phase retrieval attacks. Besides, the use of compressed sensing aims to compress the amount of data in multiple-image encryption schemes. Lastly, Liu et al.33 proposed an asymmetric color image encryption scheme based on a four-wing complex chaotic system. The 512-bit hash of the image is used to generate one-time initial conditions, and then the red, green and blue components of the odd and even indexes are encrypted respectively. It can be observed that the aforementioned asymmetric image encryption schemes are all based on the frequency domain.
This paper aims to propose a secure yet sensitive image encryption scheme for the secure transmission of images. To achieve this aim, we first apply public key cryptosystem to generate the initial values of the quantum logistic map. The initial value generation method can be extended to other image encryption schemes too. For illustration purposes, RSA cryptosystem34 is selected as the underlying public key cryptosystem. With the knowledge of initial values, pseudo-random keystream sequences can be generated using the chaotic map. A three-dimensional quantum logistic map is utilized to ensure a sufficient large key space to prevent the brute force attack. The keystream generated will then be utilized to provide the properties of confusion and diffusion by using a substitution–permutation network that consists of row permutation, column permutation and substitution. Besides, the discrete cosine transform is used to transform the images into the frequency domain. To improve the security of the proposed image encryption scheme, the quantum logistic map is employed due to its larger key space and better chaotic behaviour. Besides, SPN needs to be iterated for 5 rounds in total to resist against differential-like attacks. Different statistical experiments and security analysis are performed on different grayscale and color images to justify the effectiveness and the security of the proposed image encryption scheme.
The rest of this paper is organized as follows. Section 2 briefly introduces some basic knowledge of public key cryptosystem, discrete cosine transform and quantum logistic chaotic map. Section 3 presents the proposed image encryption scheme. Section 4 presents the experimental results and its analysis against different attacks or security concerns. Finally, Section 5 gives the concluding remarks.
Preliminaries
Public key cryptosystem
Public key cryptosystem is an asymmetric encryption consisting of the following three algorithm:
-
Key generation, Gen(\(1^k\)): Given a security parameter k, outputs a pair of keys, namely public key pk and secret key sk respectively.
-
Encryption, Enc(pk, m): Given the input pk and message m, outputs the ciphertext c.
-
Decryption, Dec(sk, c): Given the input sk and ciphertext c, outputs the message m.
A public key cryptosystem is said to fulfill correctness if \(\forall m,pk,sk\), Dec(sk, Enc(pk, m)) \(= m\) where (pk, sk) \(\leftarrow \) Gen(\(1^k\)). For illustration purposes and full description, RSA cryptosystem34 is selected as the underlying public key cryptosystem.
Quantum logistic map
Goggin et al.35 derived a logistic map with quantum corrections by coupling a kicked quantum system to a bath of harmonic oscillators. The proposed quantum logistic map was applied to image encryption by Akhshani et al.36 as follows:
where \(x=\langle a \rangle ,y=\langle \delta a^\dagger \delta a\rangle ,z=\langle \delta a \delta a\rangle \) and \(\beta \) is dissipation parameter. Besides, \(x_n,y_n\) and \(z_n\) are complex numbers with \(x_n^*\) being the complex conjugate of \(x_n\). The same notation applies to \(x_n\). However, the initial values \(x_n\), \(y_n\) and \(z_n\) are set as real numbers to meet the requirement of communication.
Meanwhile, the logistic map is written as follows:
where \(x_n\in [0,1]\) and \(u\in [0,4]\). We analyse both logistic map and quantum logistic map in terms of bifurcation, Lyapunov exponent and phase diagram. Bifurcation is a qualitative change in the dynamics of a given chaotic system due to the change of the control parameter. In the bifurcation diagram, the dotted line shows the chaotic behavior of the system, while the solid line shows that the system has changed to be periodic. Figure 1a shows that the logistic map has chaotic behavior when u is in the interval of 3.57–4. In Fig. 1b, when we fix \( r=3.99 \), the quantum logistic map has a wider chaotic region as the data outputs of the chaotic sequence fully occupies the interval of 0 to 1, when the control parameter \( \beta > 4\). As compared with the logistic map, the quantum logistic map has many good properties: (1) Larger key space with a three-dimensional system; (2) Larger continuous interval; (3) More uniform distribution for the output. Therefore, the non-periodicity and randomness of chaotic sequences are enhanced. We like to note that Fig. 1 is drawn by author Wun-She Yap.
Lyapunov Exponent (LE) is a tool to measure the sensitivity of the chaotic map to the slight changes in the initial conditions and control parameters. The LE of a differentiable non-linear system \(x_{i+1}=f(x_i)\) can be calculated as:
The chaotic map with a positive LE demonstrates good chaotic behavior. The higher the LE value indicates a better sensitivity of the map to its initial value. Figure 2 shows that logistic map only have positive LE when \( u\in [3.57,4] \) while quantum logistic map has positive LE when \( \beta >6 \). Therefore, it shows that quantum logistic map has better chaotic behavior than the logistic map. We like to note that Fig. 2 is drawn by author Wun-She Yap.
For a dynamical system, the distribution of the trajectory on the phase plane demonstrates the randomness of the outputs. Figure 3b shows the phase diagrams of quantum logistic map with the parameters \( r=3.99 \) and \( \beta =7 \). As compared to the phase diagram of the logistic map with \( u=3.58 \) shown in Fig. 3a, the trajectory of quantum logistic map disperses widely on the \( x-y \) plane with high density, which indicates that it has a good ergodicity property. We like to note that Fig. 3 is drawn by author Wun-She Yap.
Discrete cosine transform
Discrete cosine transform (DCT) is widely used for image and video compression standards including JPEG and MPEG. In this paper, the two-dimensional forward DCT37 is used. Given an image P consisting M rows and N columns and P(i, j) denotes the pixel value of image P at row i and column j, the DCT of image P is defined as follows:
where \(\sigma (u)\) and \(\sigma (v)\) are defined as follows:
After the DCT transformation, the low-frequency coefficient reflects the outline and gray distribution characteristics of the target in the image while the high-frequency coefficient reflects the detailed information of the target shape. Finally, the image P can be restored by the inverse DCT as follows:
The proposed image encryption scheme
The proposed image encryption generates the initial values \(x_0,y_0\) and \(z_0\) based on a plain image P, a secret (denoted as message m) and ciphertext c generated by a secure public key encryption scheme. The proposed initial value generation method removes the need for a secure channel for the transmission of secrets. Besides, the initial value generation method is dynamic since it relies on the ciphertext and image to be encrypted. The proposed image encryption scheme mimics one-time pad38 if different secret m is selected in each image encryption process. The encryption structures is a substitution-permutation network that iterates for five rounds. Each round consists of permutation (i.e. row and column permutations) and substitution (i.e. exclusive-or operation) to provide the properties of confusion and diffusion.
Assume the recipient B with his public and secret keys \((pk_B,sk_B)\) respectively. A wishes to encrypt an image P containing \(M \times N\) pixels. As shown in Fig. 4, the image encryption process consists of the following steps:
-
1.
Generation of initial values \((x_0,y_0,z_0)\):
-
(a)
A computes \(r = \sum _{i=1}^M\sum _{j=1}^N \root 5 \of {(P(i,j)+i+j)^2}\).
-
(b)
For \(k=1,2,3\), A randomly selects three secret messages \(m_k\) and generates ciphertexts \(c_k=Enc(pk_B,m_k)\). Notice that \(m_k\in \{0,1\}^n\) and n depends on the public key encryption used.
-
(c)
A generates the initial values for quantum logistic maps as follows:
-
(a)
-
Compute \(x_0 = \dfrac{1}{|m_1-c_1|+r}\) where \(|\cdot |\) is the modulus function.
-
Compute \(y_0 = \dfrac{1}{|m_2-c_2|+r}\).
-
Compute \(z_0 = \dfrac{1}{|m_3-c_3|+r}\).
-
(d)
A computes \(x_{500}, y_{500}\) and \(z_{500}\) by iterating Eqs. (1), (2) and (3) 500 times with the initial values of \((x_0,y_0,z_0)\). Notice that The first 500 iterations are discarded for each sequence.
-
2.
Encryption round: Let \(X_0 = P\). For \(rk=0,1,2,3,4\), do:
-
(a)
A computes \(x_{500+rk(MN)+1}, x_{500+rk(MN)+2}, \ldots , x_{500+rk(MN)+MN}\) by applying \(x_{500+rk(MN)}\) to Eq. (1).
-
(b)
A computes \(y_{500+rk(MN)+1}, y_{500+rk(MN)+2}, \ldots , y_{500+rk(MN)+MN}\) by applying \(y_{500+rk(MN)}\) to Eq. (2).
-
(c)
A computes \(z_{500+rk(MN)+1}, z_{500+rk(MN)+2}, \ldots , z_{500+rk(MN)+MN}\) by applying \(z_{500+rk(MN)}\) to Eq. (3).
-
(d)
A computes \(x'_k = \text {floor}(x_{k+500+rk(MN)} \times 10^{14})\text {mod} \, N +1\) for \(k=1,2,\ldots , M\).
-
(e)
A computes \(y'_k = \text {floor}(y_{k+500+rk(MN)} \times 10^{14})\text {mod} \, M +1\) for \(k=1,2,\ldots , N\).
-
(f)
A compute \(z'_k = \text {floor}((z_{k+500+rk(MN)}\times 0.6 + x_{k+500+rk(MN)}\times 0.4) \times 10^{14}) \text {mod} \, N +1\) for \(k=1,2,\ldots , M\).
-
(g)
A compute \(w'_k = \text {floor}((z_{k+500+rk(MN)}\times 0.6 + y_{k+500+rk(MN)}\times 0.4) \times 10^{14}) \text {mod} \, M +1\) for \(k=1,2,\ldots , N\).
-
(h)
A computes \(s_{k} = \text {fix}(x_{500+k+rk(MN)}+y_{500+k+rk(MN)}+z_{500+k+rk(MN)})\times 10^{14} \text {mod}\, 256\) for \(k=1,2,\ldots , M\times N\).
-
(i)
A performs the row permutations (i.e. rotate right by \(x'_i\) positions for each row i) by computing \(X'_{rk}(i,j) \leftarrow X_{rk}(i, (j+x'_i-1)\, \text {mod} \, N+1)\) for \(i=1,2,\ldots M\) and \(j=1,2,\ldots N\).
-
(j)
A performs the column permutations (i.e. rotate down by \(y'_i\) positions for each column j) by computing \(X''_{rk}(i,j) \leftarrow X'_{rk}((i+y'_i-1)\, \text {mod} \, M+1, j)\) for \(i=1,2,\ldots M\) and \(j=1,2,\ldots N\).
-
(k)
A computes the discrete cosine transform coefficient matrix F by applying Eq. (6) on \(X''_{rk}(i,j)\).
-
(l)
A performs the row permutations (i.e. rotate right by \(z'_i\) positions for each row i) by computing \(F'(i,j) \leftarrow F(i, (j+z'_i-1)\, \text {mod} \, N+1)\) for \(i=1,2,\ldots M\) and \(j=1,2,\ldots N\).
-
(m)
A performs the column permutations (i.e. rotate down by \(w'_i\) positions for each column j) by computing \(F''(i,j) \leftarrow F'((i+w'_i-1)\, \text {mod} \, M+1, j)\) for \(i=1,2,\ldots M\) and \(j=1,2,\ldots N\).
-
(n)
A computes the inverse of discrete cosine transform coefficient matrix G by applying Eq. (8) on \(F''(i,j)\).
-
(o)
A generates the encrypted image for round rk by \((X_{rk+1})_i = G_i \oplus s_i \oplus (X_{rk+1})_{(i-1)}\), \(i=1,2,\ldots , MN\), where, \((X_{rk+1})_i\), \(G_i\), and \(s_i\) denote the i elements in \(X_{rk+1}\), G, and s respectively.
-
(a)
-
3.
A transmits \(c_1,c_2,c_3, r\) and the encrypted image \(X_{5}\) to B.
Remark. We ignore the description of the image decryption process as the decryption process is the inverse of the encryption process and straightforward.
Experimental results
For illustration purposes, RSA34 is selected as the public key encryption scheme. Besides, as shown in Fig. 5, six images are randomly selected (Images Grass, Pentagon and Earth are free from the USC-SIPI database, anyone can read the Copyright Information for these images at http://sipi.usc.edu/database/copyright.php. Image Tree is taken by author Kaixin Jiao. Images Art and Sun are taken by author Guodong Ye) for testing purposes. All the experiments are performed on MATLAB R2017b where the proposed algorithm consists of 5-round encryption process.
Correctness analysis
Table 1 shows the selected parameters for RSA cryptosystem. Details of RSA can be referred to Ref.34. Besides, the selected messages are \(m_1 = 5, m_2 = 11\) and \(m_3=20\) for illustration purposes. \(\beta \) and r of quantum logistic map is set as 6 and 3.99, respectively.
Figure 6 shows the encrypted images of plain images shown in Fig. 5. Notice that as shown in Fig. 7 the image encryption scheme fulfills the correctness properties where the decrypted images are similar to the plain image.
On the other hand, Table 2 presents the time needed by the proposed scheme to encrypt images with different sizes for the different number of rounds. The time measured includes the process to generate the initial value for the underlying quantum logistic map.
Security and key space analysis
A naive approach to break the proposed image encryption scheme is to guess the initial values \((x_0,y_0,z_0)\). As each initial value is of 14 decimal places with the range between 0 to 1, there exists \(10^{14}\) possible values for each of \((x_0,y_0,z_0)\). This contributes to \(2^{46.5}\) possible guesses of value \(x_0\). This applies to \(y_0\) and \(z_0\) as well. Thus, there are \(2^{139.5}\) possible values of \((x_0,y_0,z_0)\). This also indicates the key space is of 139.5-bit. Besides, the inclusion of c in generating initial values is to provide more possibilities by using subtraction and modulus operations. Notice that r is with the smaller range given that there exists a smaller number of pixels and each pixel is of 8-bit long39. Thus, the generation of initial values will not be greatly affected by r.
The second approach is to break the proposed image encryption scheme by breaking the underlying public key encryption scheme. Assuming a public key encryption is secure and with the 128-bit security level, then the second approach will not work.
Instead of recovering the initial values \((x_0,y_0,z_0)\), the adversary may recover the keystreams (also known as round keys). As shown in Fig. 4, the round keys affect the permutations (i.e. row and column) and substitution (i.e. exclusive-or operation). Instead of guessing \(x'_k,y'_k,z'_k\) and \(w'_k\), it is sufficient for the adversary to guess the permutation directly especially when the image contains a smaller number of pixels. Assuming the image is of \(M\times N\) pixels, there exists possible \((M\times N)!\) permutation since DCT and inverse DCT operations do not require the knowledge of round keys. Similarly, the substitution can be guessed by \(256^{M\times N}\) trials. Thus, the total guesses of round keys for one round is \((M\times N)! \times 256^{M\times N}\). If \(M=N=4\), the approach to guess round keys will be with complexity greater than \(2^{128}\). By increasing the number of rounds to 5 (for differential-like attack concern40,41,42), the proposed image encryption scheme shall provide sufficient security.
Histogram analysis
The histogram is a basic attribute of a digital image, which reflects the statistical characteristics of the relationship between image gray level and image frequency. A good image encryption algorithm should make the pixels of the encrypted image more evenly distributed to effectively resist against statistical attacks. To verify the effectiveness of the proposed image encryption scheme, different images are tested. Figure 8a–d is the histogram corresponding to the original image, and Fig. 8e–h is the histogram corresponding to the encrypted image.
Besides, we also perform chi-square test to further evaluate the uniformity of histogram as shown in Eq. (9):
where L is the intensity level, \(o_L\) and \(e_L\) are the observed reference and the expected reference of the gray level in the encrypted image, respectively. Table 3 shows the chi-square test results of the encrypted and plain images. Meanwhile, Table 4 presents the comparison of the chi-square value of the encrypted colour images between the proposed scheme with a recent proposed scheme43. The smaller the chi-square value, the more uniform the pixel distribution, thus the higher the safety.
Correlation analysis
Since the original image has a strong correlation between adjacent pixels, the attacker may obtain meaningful information through the correlation of the pixels in the horizontal direction, vertical direction or diagonal direction. To measure the correlation coefficient, 10,000 adjacent pixel pairs of the plain image and the encrypted image are randomly selected from three different directions using Eq. (10).
where \(R_{xy}\) represents the correlation coefficient, x and y are the gray values of two adjacent pixels, and N is the total pixels. Figure 9 shows the correlation of “Grass” grayscale image pixels and its encrypted image pixels in three different directions. Meanwhile, Figs. 10, 11 and 12 show the correlation of “Sun” color image pixels and its encrypted image pixels in three different directions and three different channels.
Tables 5 and 6 are the correlation coefficients of the grayscale and color images respectively. Table 7 compares the correlation coefficients of cipher images encrypted with different algorithms. It can be seen that the correlation coefficients of adjacent pixels in the plain images and encrypted images are close to 1 and 0 respectively, which indicates that the proposed scheme greatly reduces the correlation of adjacent pixels in the images. Besides, the pixels of the encrypted images are randomly distributed.
Information entropy
The information entropy reflects the average amount of information in an image, and the randomness of an image can be judged by the information entropy. For an image with 256 gray values, the ideal value of the global Shannon entropy is 8. The more uniform the gray value distribution, the stronger the randomness of the image. The information entropy can be computed using Eq. (14).
where \(p(x_i)\) is the probability of the occurrence of \(x_i\) and N is the total number of \(x_i\). The global information entropy of the test image is shown in Table 8. It can be seen that the information entropy of encrypted image is very close to the ideal value, so the proposed image encryption scheme has high randomness.
Local entropy
The global entropy of image is a common analysis method in image encryption. However, the traditional Shannon entropy method has some shortcomings. For example, global entropy may fail to measure the true randomness of the image. The pixel information of the whole image needs to be measured through the global entropy with higher time complexity when the mage is with larger size50. As shown in Eq. (15)51, local information entropy is another evaluation method of image randomness, which reflects the randomness of the whole image through the randomly selected local random information.
for an image S and randomly select k non-overlapping blocks \(S_i\). Besides, TB denotes the number of pixels in \(S_i\) and \(H(S_i)\) represents Shannon information entropy value. Table 9 shows the local information entropy value of the grayscale images and the color images (i.e. the mean value of the three different channels). It can be seen that the local information entropy of the image is above 7.95, which further reflects the randomness of the encrypted image.
Differential attack analysis
According to the principles of cryptography, the encryption algorithm should be sufficiently sensitive to the changes of plaintext. The stronger the sensitivity, the stronger the ability to resist differential attacks. The number of pixels change rate (NPCR) and the unified average changing intensity (UACI) are important indicators to measure the resistance of image encryption algorithms to differential attacks. NPCR reflects the change rate of the gray value of the corresponding encrypted text, and UACI reflects the average change of the gray value. NPCR and UACI can be computed using Eqs. (16) and (17).
where \(D(i,j) = 0\) if \(C_1(i,j) = C_2(i,j)\); otherwise, 1. Besides, \(C_1\) is the normal encrypted image, \(C_2\) is the encrypted image when the value of a pixel in the original image changes, and \(M\times N\) is the size of the image. Table 10 shows the NPCR and UACI values of grayscale encrypted images. Table 11 shows the comparison of NPCR and UACI values for different color images encrypted by different schemes. It can be seen from the table that both NPCR and UACI values pass the randomness test52, indicating that a modification of the pixel value will result in a completely different encrypted image. The results show that the proposed image encryption scheme can resist differential attack. Note that NPCR and UACR become two widely used metrics for the security analyses against differential attack in the image encryption community since these two metrics were introduced53,54.
Key sensitivity analysis
A good image encryption scheme should be highly sensitive to the changes of key. To measure the key sensitivity, assume two different initial value \(x_0\) (denoted as \(k_1\)) and \(x_0'\) (denoted as \(k_2\)) are selected to encrypt the image “Art”. Figure 13 shows the corresponding key sensitivity analysis results. It can be seen from Fig. 13d that there are great differences in the encrypted images with the changes of the initial value. As shown in Fig. 13e–g, only the correct key can recover the original image. Meanwhile, Fig. 14 shows the test results when the parameter of the quantum logistic map changes slightly. As a nutshell, the proposed image encryption scheme is sensitive to keys and can resist violent attacks.
Cropping attack analysis
When digital images are transmitted over the network, some data may be lost due to network congestion or malicious attack. When a part of the encrypted image is cropped, the pixel value of the corresponding part is replaced by zero. Figures 15 and 16 show the cropped decryption images with different data loss degrees. Although the decrypted image becomes more blur with the increase of crop area, the image is still visible. Therefore, the proposed image encryption scheme can resist shear attack to some extent.
Noise attack
Other than cropping attack, images are mainly polluted by noise during transmission. For example, pepper and salt noise (SPN), Gaussian noise (GN) and speckle noise (SN), which makes image recovery more difficult. Different noises with a mean value of 0 and variance of 0.006 are added to the encrypted image respectively, and the decrypted images are shown in Fig. 17. Although the quality of decrypted images decreases after affected by noise, the proposed image encryption scheme still resist noise attack to some extent.
Comparison of information entropy
The encryption algorithm proposed in this paper is also applicable to color images. For the color image, it is divided into R, G, B channels where each channel is encrypted separately. Table 12 shows the information entropy of the proposed scheme as compared with other systems in three-channel color encrypted images. The results show that the gray value distribution of the proposed scheme is more uniform.
Conclusion
An image encryption scheme based on public key cryptosystems, quantum logistic map, discrete cosine transform and substitution–permutation network has been proposed. The public key cryptosystem is used to generate the initial values for the underlying quantum logistic map and avoid the need for a secure channel as compared to pure symmetric based image encryption. Meanwhile, DCT transforms the images into the frequency domain. SPN with five rounds provides adequate security against differential-like attacks and fast encryption which involves operations with lower computational complexity as compared to the asymmetric based image encryption. From the experimental results and various security analysis, it can be seen that the proposed image encryption is suitable for grayscale and color images, has a high sensitivity to plain text and keys, and secure against various attacks.
Change history
14 April 2021
A Correction to this paper has been published: https://doi.org/10.1038/s41598-021-87427-0
References
Shahna, K. U. & Mohamed, A. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 90, 106162. https://doi.org/10.1016/j.asoc.2020.106162 (2020).
Alghafis, A., Firdousi, F., Khan, M., Batool, S. I. & Amin, M. An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math. Comput. Simul. 177, 441–466. https://doi.org/10.1016/j.matcom.2020.05.016 (2020).
Ye, G., Pan, C., Huang, X. & Mei, Q. An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn. 94, 745–756. https://doi.org/10.1007/s11071-018-4614-2 (2018).
Luo, Y., Yu, J., Lai, W. & Liu, L. A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed. Tools Appl. 78, 22023–22043. https://doi.org/10.1007/s11042-019-7453-3 (2019).
Wu, C., Wang, Y., Chen, Y., Wang, J. & Wang, Q. Asymmetric encryption of multiple-image based on compressed sensing and phase-truncation in cylindrical diffraction domain. Opt. Commun. 431, 203–209. https://doi.org/10.1016/j.optcom.2018.09.034 (2019).
Ponuma, R. & Amutha, R. Encryption of image data using compressive sensing and chaotic system. Multimed. Tools Appl. 78, 11857–11881. https://doi.org/10.1007/s11042-018-6745-3 (2019).
Chai, X. et al. An efficient chaos-based image compression and encryption scheme using block compressive sensing and elementary cellular automata. Neural Comput. Appl. 32, 4961–4988. https://doi.org/10.1007/s00521-018-3913-3 (2020).
Huo, D. et al. Novel image compression-encryption hybrid scheme based on DNA encoding and compressive sensing. Appl. Phys. B 126, 45. https://doi.org/10.1007/s00340-020-7397-3 (2020).
Enayatifar, R., Guimarães, F. G. & Siarry, P. Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt. Lasers Eng. 115, 131–140. https://doi.org/10.1016/j.optlaseng.2018.11.017 (2019).
Guesmi, R., Farah, M. A. B., Kachouri, A. & Samet, M. A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm sha-2. Nonlinear Dyn. 83, 1123–1136. https://doi.org/10.1007/s11071-015-2392-7 (2016).
Jiang, D., Chen, Y., Gu, X., Xie, L. & Chen, L. Efficient and universal quantum key distribution based on chaos and middleware. Int. J. Mod. Phys. B 31, 1650264. https://doi.org/10.1016/j.asoc.2020.1061621 (2017).
Abd EL-Latif, A. A., Abd-EI-Atty, B. & Venegas-Andraca, S. E. ,. Controlled alternate quantum walk-based pseudo-random number generator and its application to quantum color image encryption. Phys. A Stat. Mech. Appl. 547, 123869. https://doi.org/10.1016/j.physa.2019.123869 (2020).
Waseem, H. M. & Khan, M. Image encryption using quantum 3-d baker map and generalized gray code coupled with fractional chen’s chaotic system. Quantum Inf. Process. 19, 220. https://doi.org/10.1007/s11128-020-02724-3 (2020).
Lorenz, E. & Haman, K. The essence of chaos. Pure Appl. Geophys. 147, 598–599 (1996).
Sui, L., Du, C., Zhang, X., Tian, A. & Asundi, A. Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt. Lasers Eng. 122, 113–122. https://doi.org/10.1016/j.asoc.2020.1061622 (2019).
Hua, Z., Jin, F., Xu, B. & Huang, H. 2d logistic-sine-coupling map for image encryption. Sig. Process. 149, 148–161. https://doi.org/10.1016/j.asoc.2020.1061623 (2018).
Pak, C. & Huang, L. A new color image encryption using combination of the 1d chaotic map. Sig. Process. 138, 129–137. https://doi.org/10.1016/j.asoc.2020.1061624 (2017).
Patro, K. A. K., Acharya, B. & Nath, V. A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption. Microsyst. Technol. 25, 2331–2338. https://doi.org/10.1016/j.asoc.2020.1061625 (2019).
Chen, J., Zhu, Z., Fu, C. & Yu, H. Optical image encryption scheme using 3-d chaotic map based joint image scrambling and random encoding in gyrator domains. Opt. Commun. 341, 263–270. https://doi.org/10.1016/j.optcom.2014.12.045 (2015).
Chai, X., Fu, X., Gan, Z., Lu, Y. & Chen, Y. A color image cryptosystem based on dynamic DNA encryption and chaos. Sig. Process. 155, 44–62. https://doi.org/10.1016/j.sigpro.2018.09.029 (2018).
Broumandnia, A. The 3d modular chaotic map to digital color image encryption. Future Gen. Comput. Syst. 99, 489–499. https://doi.org/10.1016/j.future.2019.04.005 (2019).
Bouslehi, H. & Seddik, H. Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation. Multimed. Tools Appl. 77, 30841–30863. https://doi.org/10.1007/s11042-018-5997-2 (2018).
Chai, X. et al. Color image compression and encryption scheme based on compressive sensing and double random encryption strategy. Sig. Process. 176, 107684. https://doi.org/10.1016/j.matcom.2020.05.0160 (2020).
Rostami, M. J., Shahba, A., Saryzadi, S. & Nezamabadipour, H. A novel parallel image encryption with chaotic windows based on logistic map. Comput. Electr. Eng. 62, 384–400. https://doi.org/10.1016/j.compeleceng.2017.04.004 (2017).
Lee, W.-K., Phan, R.C.-W., Yap, W.-S. & Goi, B.-M. Spring: A novel parallel chaos-based image encryption scheme. Nonlinear Dyn. 92, 575–593. https://doi.org/10.1007/s11071-018-4076-6 (2018).
Zhou, N., Hua, T., Gong, L., Pei, D. & Liao, Q. Quantum image encryption based on generalized arnold transform and double random-phase encoding. Quantum Inf. Process. 124, 105836. https://doi.org/10.1016/j.matcom.2020.05.0163 (2014).
Luo, Y., Tang, S., Liu, J., Cao, L. & Qiu, S. Image encryption scheme by combining the hyper-chaotic system with quantum coding. Opt. Lasers Eng. 124, 105836. https://doi.org/10.1016/j.matcom.2020.05.0164 (2020).
Wu, X., Wang, D., Kurths, J. & Kan, H. A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf. Sci. 349–350, 137–153. https://doi.org/10.1016/j.matcom.2020.05.0165 (2016).
Kong, D. & Shen, X. Multiple-image encryption based on optical wavelet transform and multichannel fractional fourier transform. Opt. Laser Technol. 57, 343–349. https://doi.org/10.1016/j.matcom.2020.05.0166 (2014).
Zhou, N., Yang, J., Tan, C., Pan, S. & Zhou, Z. Double-image encryption scheme combining DWT-based compressive sensing with discrete fractional random transform. Opt. Communi. 354, 112–121. https://doi.org/10.1016/j.optcom.2015.05.043 (2015).
Chen, L. & Zhao, D. Image encryption based on singular value decomposition and arnold transform in fractional domain. Opt. Commun. 291, 98–103. https://doi.org/10.1016/j.optcom.2012.10.080 (2013).
Dong, C. Asymmetric color image encryption scheme using discrete-time map and hash value. Optik 126, 2571–2575. https://doi.org/10.1016/j.matcom.2020.05.0168 (2015).
Liu, H., Kadir, A. & Li, Y. Asymmetric color pathological image encryption scheme based on complex hyper chaotic system. Optik 127, 5812–5819 (2016).
Rivest, R., Shamir, A. & Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126. https://doi.org/10.1016/j.matcom.2020.05.0169 (1978).
Goggin, M. E., Sundaram, B. & Milonni, P. W. Quantum logistic map.. Phys. Rev. A 41, 5705–5708. https://doi.org/10.1007/s11071-018-4614-20 (1990).
Akhshani, A., Akhavan, A., Lim, S.-C. & Hassan, Z. An image encryption scheme based on quantum logistic map. Commun. Nonlinear Sci. Numer. Simul. 17, 4653–4661. https://doi.org/10.1007/s11071-018-4614-21 (2012).
Arunkumar, S., Subramaniyaswamy, V., Vijayakumar, V., Chilamkurti, N. & Logesh, R. SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images. Measurement 139, 426–437. https://doi.org/10.1016/j.measurement.2019.02.069 (2019).
Bellovin, S. M. Frank miller: Inventor of the one-time pad. Cryptologia 35, 203–222. https://doi.org/10.1007/s11071-018-4614-23 (2011).
Yap, W.-S., Phan, R.C.-W., Goi, B.-M., Yau, W.-C. & Heng, S.-W. On the effective subkey space of some image encryption algorithms using external key. J. Vis. Commun. Image Represent. 40, 51–57. https://doi.org/10.1007/s11071-018-4614-24 (2016).
Yap, W.-S., Phan, R.C.-W., Yau, W.-C. & Heng, S.-W. Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn. 80, 1483–1491. https://doi.org/10.1007/s11071-018-4614-25 (2015).
Yap, W.-S., Phan, R.C.-W. & Goi, B.-M. Cryptanalysis of a high definition image encryption based on AES modification. Wireless Pers. Commun. 88, 685–699. https://doi.org/10.1007/s11277-016-3192-1 (2016).
Yap, W.-S. & Phan, R.C.-W. Commentary on “a block chaotic image encryption scheme based on self-adaptive modelling” [applied soft computing 22 (2014) 351–357]. Appl. Soft Comput.52, 501–504. https://doi.org/10.1016/j.asoc.2016.10.018 (2017).
Hu, G. & Li, B. Coupling chaotic system based on unit transform and its applications in image encryption. Sig. Process. 178, 107790. https://doi.org/10.1007/s11071-018-4614-27 (2021).
Waseem, H. M. & Khan, M. A new approach to digital content privacy using quantum spin and finite-state machine. Appl. Phys.B 125, 27. https://doi.org/10.1007/s00340-019-7142-y (2019).
Wang, X., Qin, X. & Liu, C. Color image encryption algorithm based on customized globally coupled map lattices. Multimed. Tools Appl. 78, 6191–6209. https://doi.org/10.1007/s11042-018-6326-5 (2019).
Patro, K. A. K. & Acharya, B. An efficient colour image encryption scheme based on 1-d chaotic maps. J. Inf. Secur. Appl. 46, 23–41. https://doi.org/10.1016/j.jisa.2019.02.006 (2019).
Gan, Z., Zhang, M. & Lu, Y. A double color image encryption scheme based on three-dimensional brownian motion. Multimed. Tools Appl 77, 27919–27953. https://doi.org/10.1007/s11042-018-5974-9 (2018).
Majid, K. & Tariq, S. An efficient chaotic image encryption scheme. Neural Comput. Appl. 26, 1137–1148. https://doi.org/10.1007/s11042-019-7453-32 (2015).
Kang, X. & Guo, Z. A new color image encryption scheme based on dna encoding and spatiotemporal chaotic system. Sig. Process. Image Commun. 80, 115670. https://doi.org/10.1007/s11042-019-7453-33 (2020).
Wu, Y. et al. Local shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342. https://doi.org/10.1007/s11042-019-7453-34 (2013).
Mansouri, A. & Wang, X. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf. Sci. 520, 46–62. https://doi.org/10.1007/s11042-019-7453-35 (2020).
Wu, Y., Noonan, J. P. & Agaian, S. NPCR and UACI randomness tests for image encryption. J. Sel. Areas Telecommun.April 2011, 31–38, http://www.cyberjournals.com/Papers/Apr2011/05.pdf (2011).
Chen, G., Mao, Y. & Chui, C. A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21, 749–761. https://doi.org/10.1016/j.chaos.2003.12.022 (2004).
Mao, Y., Chen, G. & Lian, S. A novel fast image encryption scheme based on 3d chaotic baker maps. Int. J. Bifurc. Chaos 14, 3613–3624. https://doi.org/10.1142/S021812740401151X (2004).
Zhang, Y., He, Y., Li, P. & Wang, X. A new color image encryption scheme based on 2dnlcml system and genetic operations. Opt. Lasers Eng. 128, 106040. https://doi.org/10.1007/s11042-019-7453-39 (2020).
Valandar, M. Y., Barani, M. J. & Ayubi, P. A fast color image encryption technique based on three dimensional chaotic map. Optik 193, 162921. https://doi.org/10.1016/j.optcom.2018.09.0340 (2019).
Tariq, S., Khan, M., Alghafis, A. & Amin, M. A novel hybrid encryption scheme based on chaotic lorenz system and logarithmic key generation. Multimed. Tools Appl. 79, 23507–23529. https://doi.org/10.1007/s11042-020-09134-8 (2020).
Alghafis, A., Munir, N., Khan, M. & Hussain, I. An encryption scheme based on discrete quantum map and continuous chaotic system. Int. J. Theor. Phys. 59, 1227–1240. https://doi.org/10.1016/j.optcom.2018.09.0342 (2020).
Munir, N. et al. Circuit implementation of 3d chaotic self-exciting single-disk homopolar dynamo and its application in digital image confidentiality. Wirel. Netw.https://doi.org/10.1007/s11276-020-02361-9 (2020).
Acknowledgements
This work was supported in part by the National Natural Science Foundations of China (No.61972103, No.61702116), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), the Project of Enhancing School with Innovation of Guangdong Ocean University of China (No.Q18306), the Postgraduate Education Innovation Project of Guangdong Ocean University of China (No.202031), the Guangdong Postgraduate Education Innovation Project of China (No.2020JGXM059), and the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064).
Author information
Authors and Affiliations
Contributions
G.Y. conducted the whole idea and designed solutions. K.J. wrote the manuscript and did the experiments. X.H. gave the useful comments for improving the quality. B.-M.G. and W.-S.Y. performed security analysis and revised the manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Ye, G., Jiao, K., Huang, X. et al. An image encryption scheme based on public key cryptosystem and quantum logistic map. Sci Rep 10, 21044 (2020). https://doi.org/10.1038/s41598-020-78127-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-020-78127-2
- Springer Nature Limited