×

An asymmetric image cryptosystem based on the adaptive synchronization of an uncertain unified chaotic system and a cellular neural network. (English) Zbl 1320.94061

Summary: Chaotic dynamics provide a fast and simple means to create an excellent image cryptosystem, because it is extremely sensitive to initial conditions and system parameters, pseudorandomness, and non-periodicity. However, most chaos-based image encryption schemes are symmetric cryptographic techniques, which have been proven to be more vulnerable, compared to an asymmetric cryptosystem. This paper develops an asymmetric image cryptosystem, based on the adaptive synchronization of two different chaotic systems, namely a unified chaotic system and a cellular neural network. An adaptive controller with parameter update laws is formulated, using the Lyapunov stability theory, to asymptotically synchronize the two chaotic systems. The synchronization controller is embedded in the image cryptosystem and generates a pair of asymmetric keys, for image encryption and decryption. Using numerical simulations, three sets of experiments are conducted to evaluate the feasibility and reliability of the proposed chaos-based image cryptosystem.

MSC:

94A60 Cryptography
37D45 Strange attractors, chaotic dynamics of systems with hyperbolic behavior
93D21 Adaptive or robust stabilization
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Sathyanarayana, S.; Kumar, M.; Bhat, K., Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points, Int J Network Security, 12, 3, 137-150 (2011)
[2] Zeghid, M.; Machhout, M.; Khriji, L.; Baganne, A.; Tourki, R., A modified AES based algorithm for image encryption, Proc World Acad Sci Eng Technol, 21, 206-211 (2007)
[3] Rivest, R.; Shamir, A.; Adleman, L., A method for obtaining digital signature and public-key cryptosystems, Commun ACM, 21, 120-126 (1978) · Zbl 0368.94005
[4] Matthews, R., On the derivation of a chaotic encryption algorithm, Cryptologia, XIII, 1, 29-42 (1989)
[5] Chen, G.; Mao, Y.; Chui, C., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solitons & Fractals, 21, 3, 749-761 (2004) · Zbl 1049.94009
[6] Masuda, N.; Jakimoski, G.; Aihara, K.; Kocarev, L., Chaotic block ciphers: from theory to practical algorithms, IEEE Trans Circ Syst I: Fundam Theory Appl, 53, 6, 1341-1352 (2006) · Zbl 1374.94796
[7] Pisarchik, A.; Zanin, M., Image encryption with chaotically coupled chaotic maps, Physica D, 237, 20, 2638-2648 (2008) · Zbl 1148.94431
[8] Akhshani, A.; Behnia, S.; Akhavan, A.; Abu Hassan, H.; Hassan, Z., A novel scheme for image encryption based on 2D piecewise chaotic maps, Optics Commun, 283, 3259-3266 (2010)
[9] Cheng, H.; Li, X., Partial encryption of compressed images and video, IEEE Trans Sig Process, 48, 8, 2439-2451 (2000)
[10] Krikor, L.; Baba, S.; Arif, T.; Shaaban, Z., Image encryption using DCT and stream cipher, Eur J Scient Res, 32, 1, 47-57 (2009)
[11] Xiao, D.; Liao, X.; Wei, P., Analysis and improvement of a chaos-based image encryption algorithm, Chaos Solitons & Fractals, 40, 2191-2199 (2009) · Zbl 1198.94132
[12] Gao, T.; Chen, Z., A new image encryption algorithm based on hyper-chaos, Phys Lett A, 372, 394-400 (2008) · Zbl 1217.94096
[14] Guan, Z. H.; Huang, F.; Guan, W., Chaos-based image encryption algorithm, Phys Lett A, 346, 1-3, 153-157 (2005) · Zbl 1195.94056
[15] Li, C.; Li, S.; Chen, G.; Halang, W. A., Cryptanalysis of an image encryption scheme based on a compound chaotic sequence, Image Vision Comput, 27, 8, 1035-1039 (2009)
[16] Wang, Y.; Wong, K. W.; Liao, X.; Chen, G., A new chaos-based fast image encryption algorithm, Appl Soft Comput, 11, 1, 514-522 (2011)
[17] Rhouma, R.; Solak, E.; Belghith, S., Cryptanalysis of a new substitution-diffusion based image cipher, Commun Nonlinear Sci Numer Simul, 15, 7, 1887-1892 (2010) · Zbl 1222.94038
[18] Pecora, L.; Carroll, T., Synchronization in chaotic systems, Phys Rev Lett, 64, 821-824 (1990) · Zbl 0938.37019
[19] Chen, M.; Han, Z., Controlling and synchronizing chaotic Genesio system via nonlinear feedback control, Chaos Solitons & Fractals, 17, 4, 709-716 (2003) · Zbl 1044.93026
[20] Liu, F.; Ren, Y.; Shan, X.; Qiu, Z., A linear feedback synchronization theorem for a class of chaotic systems, Chaos Solitons & Fractals, 13, 4, 723-730 (2002) · Zbl 1032.34045
[21] Hu, M.; Yang, Y.; Xu, Z., Impulsive control of projective synchronization on chaotic systems, Phys Lett A, 372, 3228-3233 (2008) · Zbl 1220.34079
[22] Lu, J.; Wu, X.; Han, X.; Lü, J., Adaptive feedback synchronization of a unified chaotic system, Phys Lett A, 329, 4-5, 327-333 (2004) · Zbl 1209.93119
[23] Mainieri, R.; Rehacek, J., Projective synchronization in three-dimensional chaotic systems, Phys Rev Lett, 82, 3042-3045 (1999)
[24] Cheng, C. J.; Liao, T. L.; Hwang, C. C., Exponential synchronization of a class chaotic neural networks, Chaos Solitons & Fractals, 24, 1, 197-206 (2005) · Zbl 1060.93519
[25] Lü, J.; Chen, G.; Cheng, D.; Celikovsky, S., Bridge the gap between the Lorenz system and the Chen system, Int J Bifurcat Chaos, 12, 2917-2926 (2002) · Zbl 1043.37026
[26] Cheng, C. J., Robust synchronization of uncertain unified chaotic systems subject to noise and its application to secure communication, Appl Math Comput, 219, 5, 2698-2712 (2012) · Zbl 1308.94065
[27] Chua, L.; Yang, L., Cellular neural networks: theory, IEEE Trans Circ Syst I, 35, 10, 1257-1272 (1999) · Zbl 0663.94022
[28] Yassen, M. T., Chaos synchronization between two different chaotic systems using active control, Chaos Solitons & Fractals, 23, 1, 131-140 (2005) · Zbl 1091.93520
[29] Khalil, H., Nonlinear Systems (1992), Macmillan Publishing Company: Macmillan Publishing Company New York
[30] Zhang, G.; Liu, Q., A novel image encryption method based on total shuffling scheme, Opt Commun, 284, 12, 2775-2780 (2011)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.