Abstract
Compared with integer order chaotic systems, fractional order chaotic systems can reflect natural phenomena more accurately, which are more suitable for chaotic cryptosystems. In order to explore the application of fractional order chaotic system in cryptography, a novel fractional order hyperchaotic system is constructed and implemented on DSP platform. More progressively, based on Adomian decomposition method, the dynamic behavior is studied by phase diagram, bifurcation diagram, Lyapunov exponent spectrum and spectral entropy (SE) complexity. It is found that each parameter and order have a large range of intervals that can keep the system in a hyperchaotic state. Therefore, the hyperchaotic sequences generated by the constructed fractional order hyperchaotic system have sufficient randomness and are well suited for applications in secure communications. In addition, a color image encryption scheme is designed based on the fractional order hyperchaotic system and DNA dynamic coding. Firstly, the improved Arnold algorithm is used to scramble the original image, then the column cyclic shift method is applied for secondary scrambling, and finally the pixel value is diffused by DNA sequence operation. The security analysis results indicate that the designed encryption algorithm can not only encrypt images effectively, but also has high security and can resist various common attacks.
Export citation and abstract BibTeX RIS
1. Introduction
With the rapid development of multimedia technology, network has gradually become the main way of information dissemination. There are also some hidden dangers of information leakage while it brings a lot of convenience. As a result, data information encryption has become a hot topic of research. As an aspect of communication information, digital image has special attributes different from text information, such as huge amounts of data, high correlation between adjacent pixels, large data redundancy and so on. The Data Encryption Standard (DES) and Advanced Encryption Standard (AES), which are applicable to text encryption, cannot meet the security requirements of digital image encryption [1]. Consequently, new algorithms applicable to image encryption need to be proposed.
In 1963, Lorenz [2] proposed the concept of chaos theory. Since then, scholars began to study various chaotic models, such as continuous chaotic system [3–5], discrete chaotic system [6, 7], complex chaotic system [8–10], time-delay chaotic system [11, 12] and fractional chaotic system [13–15]. Due to the unpredictability, ergodicity and extremely sensitivity to initial conditions of chaotic system [16], it is eminently suitable for chaotic cryptography. So far, scholars have proposed quite a lot of image encryption schemes based on chaotic systems [17–28]. For example, Ali et al [17] designed a new image encryption scheme based on the constructed 2D hyperchaotic system derived from Henon map, logistic map and iterative infinite folding chaotic map. The encryption process mainly depends on changing the eigenvalues and eigenvectors of the original image. A new super multi-stable memristor chaotic system is proposed and applied to encryption by Sun et al [18]. In order to improve security and save storage and transmission costs, Yang et al [19] designed a scheme combining image compression and encryption. An encryption algorithm based on quantum chaotic mapping and four wing composite system is designed by Xu et al [20]. Chai et al [24] introduced a secure color image encryption mechanism related to plaintext, which is based on the generation and selection of chaotic sequences.
In recent years, fractional order chaotic system has been widely studied because it is more accurate in describing natural phenomena than integer order system. In addition, Adomian decomposition method (ADM) is preferred when solving fractional order chaotic systems, because of its fast convergence speed, low resource consumption and fast calculation speed [29]. At present, a large number of fractional order systems are studied through ADM [30–32]. For example, He et al [30] investigated the fractional-order simplest memristor chaotic circuit by the novel conformable Adomian decomposition method (CADM). Based on the definition of fractional-order differential and ADM, the numerical solution of fractional-order 4D hyperchaotic memristor circuit is analyzed by Mou et al [31]. Moreover, a great deal of image encryption schemes based on fractional chaotic system are designed [33–41]. For example, a fractional order complex system is constructed and applied in encryption by Yang et al [34]. In reference [38], Chen et al explored a double color image encryption method, which can save information and make the encryption more reliable. Based on the fractional four-dimensional hyperchaotic memristor system, a color image encryption scheme is designed by Li et al [39]. Dong et al [40] introduced a compression encryption algorithm based on fractional hyperchaotic system. The algorithm converts the color image data to the frequency domain by a two-dimensional discrete cosine transform, and then reduces the amount of encrypted data by quantization processing. It is worth mentioning that this method of data compression can also be applied to the medical field [42, 43].
Furthermore, DNA sequence manipulation is introduced to improve the security of encryption process [44–53]. For example, Ouyang et al [50] studied a color image encryption method based on the memristor hyperchaotic system and DNA sequence manipulation. The pseudo-random sequence is related to the memristor hyperchaotic system and the original plaintext image, which improves the sensitivity of the algorithm. A bit level color image encryption algorithm combining DNA computing with double chaotic system is researched by Liu et al [51], and plaintext information is embedded in the encryption process to realize one-time encryption. Zhu et al [52] proposed an image encryption algorithm based on three-dimensional DNA horizontal substitution replacement scheme. In the encryption scheme, dynamic and random DNA coding are designed, which improves the randomness. By combining DNA operation and spatiotemporal chaotic system, a color image encryption scheme is described by Kang et al [53]. The keystream of the algorithm is associated with the key and ordinary image, which improved the ability to resist known plaintext or selective plaintext attacks.
It can be found that the security of some existing image encryption algorithms are still not ideal. For example, the key space is not large enough, the ability to destroy the correlation is weak, the robustness is poor, or there is still a certain gap between the information entropy and the ideal value. To solve these problems, a color image encryption algorithm based on the newly constructed fractional order hyperchaotic system and DNA sequence operation is designed in this paper. Firstly, the color plaintext image is divided into R, G and B channels, and the pixel position is changed by Arnold algorithm. After that, the image is dislocated again using the column cyclic shift method and the pixel value is diffused by DNA sequence operation. Finally, the recovered decrypted image is obtained by recombining the three channels.
The contributions and novelties of this paper are described below.
- (1)A new fractional-order hyperchaotic system was constructed, which has a simple structure containing two quadratic terms and six linear terms.
- (2)The results of the dynamical analysis show that the constructed fractional-order hyperchaotic system has rich dynamical behavior and a large range of parameters that can keep the system in a hyperchaotic state, which is suitable for applications in image encryption.
- (3)A color image encryption algorithm based on the constructed fractional-order hyperchaotic system is designed. The scheme uses two different permutation processes, the first of which is the Arnold method and then DNA dynamic coding is used in the diffusion process. And the results of the safety analysis verify the effectiveness and superiority of the scheme.
The rest of this paper is arranged as follows. The mathematical model of the fractional hyperchaotic system is introduced and its numerical solution is obtained in section 2. Section 3 analyzes the dynamic behaviors of the system and implements it on DSP platform. A color image encryption algorithm based on the constructed system and DNA dynamic encoding is designed in section 4. Section 5 comprehensively analyzes the security performance of the designed encryption scheme. Finally, some conclusions of the study are presented in section 6.
2. The novel fractional-order hyperchaotic system
2.1. Mathematical model
By adding an additional state and modifying the structure and parameters of 3D chaotic system [5], we introduce the following 4D quadratic smooth autonomous system:
where is positive real parameters, and is the state vector. It is worth noting that the introduced state vector can be considered as a simple external feedback controller which is connected with the system state Consequently, from the view of anticontrol of chaos, can enhance the chaotic dynamical behaviors.
Based on the definition of the Caputo fractional-order differentiation, system (1) can be expressed by
where is the fractional-order, and represent the state variables, is the system parameters. It is worthy of note that the system is exactly an integer-order system when And when the system is an improper fractional order system. In this paper, we mainly discuss the case of true fractional order, that is,
2.2. Numerical solution
2.2.1. ADM
ADM is the latest proposed time-domain approximation algorithm suitable for solving fractional-order systems and is capable of handling linear and nonlinear problems excellently [54]. This algorithm can obtain high precision and fast convergent numerical approximate solution. Most importantly, it requires neither large amounts of computer memory nor discretization.
For the system
where is the Caputo differential operator of order includes the linear and nonlinear parts, is the given function variable. And when system is autonomous, is constant.
The system (3) is divided into three parts as follows
where and are the linear and nonlinear parts respectively. represents the initial values.
By integrating both sides of one can get
where is the initial condition.
According to the principle of ADM, the solution of system (3) can be shown as
Decompose the nonlinear term according to the following formula
where Then the nonlinear part is obtained by
As a result, the solution of equation (3) is
and the corresponding derivation relation is
2.2.2. Numerical solution
According to ADM, the system (2) can be decomposed as
According to equation (7), decomposing the nonlinear terms and and intercepting the first 6 terms, one can get
Assume that the initial condition of the system (2) is
Let According to in equation (10) and the properties of fractional calculus, it follows that
The coefficients in equation (15) are denoted as the corresponding variables, as follows
Then, can be expressed as where
Similarly, the coefficients of the other four terms of are
To sum up, the solution of system (2) can be expressed as
where is the time step.
3. Dynamic analysis of the fractional-order hyperchaotic system
3.1. Dynamic characteristics
Dynamic behaviors of fractional-order chaotic systems are usually not only sensitive to system parameters but also closely related to the order. Consequently, the dynamic behaviors of system (2) are explored by using phase diagrams, bifurcation diagrams, Lyapunov exponential spectrum (LEs) and SE complexity varying with different parameters and order.
3.1.1. Phase diagram
In the finite phase space, the larger the space occupied by the system trajectory, the higher the randomness of the system and the better the ergodicity. Take the base parameters value as initial values order and time step is Then iterate the system (2) 50000 times and remove the first 60 percent. Some typical attractors of the constructed fractional-order hyperchaotic system with different planes are shown in figure 1. As is shown in the figure, the attractors of the system (2) are distributed over a considerable area, which indicates that the system has superior ergodicity and then sequences with better random characteristics can be obtained.
3.1.2. Bifurcation diagram
The bifurcation diagram shows that the motion state of the system will change substantially with different control parameters, so the variation of system state with parameters can be observed intuitively. Let system parameters order then keep initial condition and time step the same as above. Figure 2 shows the bifurcation diagram with different parameters intervals. From the figure, it can be seen that the system (2) has a rich dynamical behavior and a large chaotic cross section in different parameter ranges.
Download figure:
Standard image High-resolution image3.1.3. LEs
LEs of a system can effectively characterize the sensitivity of the system to initial values as it evolves in time. A positive Lyapunov exponent indicates that the phase volume of the system is expanding and collapsing in some direction such that the otherwise neighboring tracks in the attractor become increasingly uncorrelated, thus forming a chaotic attractor. In addition, hyperchaotic systems have at least two Lyapunov exponents greater than zero.
Take the base parameter value, then the Lyapunov exponents are obtained through numerical calculation as = and the Lyapunov dimension is It is obvious that system (2) is a hyperchaotic system. In addition, figure 3 shows the LEs with different parameters intervals. It is interesting to note that the fourth exponential spectra with different parameters are always less than zero, so they are not shown in the figure. It can be observed from the figure that the system (2) has two positive Lyapunov exponents which illustrates that the extension and folding characteristics of its evolution orbit are more complex than conventional chaotic systems. Consequently, it can be inferred that the system is sensitive to initial conditions and the generated hyperchaotic sequences are quite random to be applied in secure communication. Furthermore, it can be observed that the LEs and the bifurcation diagr
Download figure:
Standard image High-resolution image3.1.4. SE complexity
The SE complexity algorithm adopts Fourier transform, and the corresponding spectral entropy value is obtained through the energy distribution in the Fourier transform domain and Shannon entropy. The specific calculation details are as follows.
Step 1. To make the spectrum reflect the signal energy information more effectively, remove the direct current portion of as
Step 2 . Discrete Fourier transformation of as
where
Step 3. Take the first half of the transformed sequence for calculation. According to Parseval theorem, the power spectrum value of a certain frequency point is
where and the total power can be defined as
The relative power spectrum probability is
where
Step 4 . Combing and the concept of Shannon entropy, the spectral entropy of the signal is obtained as
If then It can be shown that the magnitude of spectral entropy converges to To facilitate comparative analysis, the normalized is shown below
Take the base parameters and initial values, and then the complexity of chaotic sequence is obtained through numerical simulation, as shown in figure 4. For two-dimensional complexity diagram, the lighter the image color, the simpler the system. On the contrary, the darker the image color, the more complex the system. It is obvious from the figure that the constructed fraction-order hyperchaotic system (2) has rich dynamical behaviors and the chaotic state occupies a large interval window, which indicates that generated sequences have excellent randomness to be applied to chaotic cryptography. In addition, it is important to note that the values of system parameters and order should avoid light color region to improve security.
Download figure:
Standard image High-resolution image3.2. DSP implementation
The hardware implementation of chaotic systems is of great significance in practical application. Compared with analog devices, DSP has been widely used in practical applications because of its unique stability, repeatability, large-scale integration, especially programmability and easy implementation.
The DSP chip can be either fixed-point or floating-point according to the system requirements. Its main frequency affects the speed of the operation, which in turn affects the speed of chaotic sequence generation. The width of the data bus has an impact on the numerical accuracy of the generated chaotic sequence, and the peripheral interface of the DSP chip needs to be considered, which is best to facilitate interfacing with other parts of the system. This section uses the typical TMS320F28335 DSP chip, the 16-bit dual channel DAC8552 chip as the D/A converter and the MAX3232 chip as the interface. Among them, TMS320F28335 is a floating-point 32-bit chip with a main frequency up to 150MHz and rich peripherals. The serial interface UART transmits the generated chaotic sequence to the computer accurately and for communication with DSP in real time. The D/A replacement part converts the chaotic sequence generated by DSP calculation into analog signal, and then the attractor phase diagram can be observed on the oscilloscope. Therefore, the D/A conversion part is required to have a dual-channel conversion function with synchronous output, and also has excellent conversion speed and conversion accuracy. In addition, figure 5 is a software flow chart of the system (2) based on DSP.
Download figure:
Standard image High-resolution imageFurthermore, data processing is the key to DSP implementation. In order to realize the fractional hyperchaotic system better, some data processing should be carried out and figure 6 shows the flow chart. Some specific steps are as follows. Because some of the generated hyperchaotic sequences are negative, the binary sequence calculated by DSP will be signed. In order to correct D/A conversion, a sufficiently large positive number needs to be added to all output chaotic sequence values, which is equivalent to translating the system output. The DAC8552 acts as a 16-bit D/A converter, the converted digital quantity must be a positive integer between 0 and 65535. Most of the values generated by DSP are decimal, which need to be multiplied by a positive integer to enlarge the sequence value in equal proportion, so as to make the digital quantity distributed in the whole installation and replacement range.
Download figure:
Standard image High-resolution imageTake the base parameters and initial values, then the DSP hardware implementation platform and some typical hyperchaotic attractors of the system (2) implemented on DSP platform are shown in figures 7 and 8. It is clear from figure 8 that the hyperchaotic attractor realized based on DSP platform and the numerical simulation results are in a consistent manner, which provides certain reference values for the system to be applied in the field of secure communication.
Download figure:
Standard image High-resolution imageDownload figure:
Standard image High-resolution image4. Image encryption and decryption algorithm
4.1. Preliminary knowledge
4.1.1. DNA encoding and decoding rules
The DNA sequence consists of four nucleic acid bases, which are adenine (A), thymine (T), cytosine (C), and guanine (G). As a matter of fact, the nucleic acid bases A and T are complementary, while C and G are complementary. In computer theory, information is usually represented in binary, whereas by A, T, C, and G in DNA coding theory. Since 0 and 1 are complementary in binary, it can be inferred that 00 and 11 are complementary, 01 and 10 are complementary. As a result, there are 24 coding rules when 00, 01, 10 and 11 are used to encode A, T, C and G. But only 8 coding rules conform to Watson-Crick complementary rule [55], as shown in table 1. Moreover, the DNA decoding rules are the reverse of encoding rules.
Table 1. DNA encoding rules.
Rule | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 |
---|---|---|---|---|---|---|---|---|
00 | A | A | T | T | G | G | C | C |
01 | C | G | C | G | T | A | T | A |
10 | G | C | G | C | A | T | A | T |
11 | T | T | A | A | C | C | G | G |
In the process of image encryption, the image pixel value can be changed according to the DNA coding rules. For example, assuming that the pixel value of the original plaintext image is 179, it is converted into [10110011], and then encoded by DNA coding rule 1 to obtain [GTAT]. Furthermore, it is decoded and converted to [11100110] by rule 8, and then converted to decimal number 230. To sum up, the normal image can be encoded with r1 rule and then decoded with r2 rule, thus changing the image pixel value and hide the original pixel information.
4.1.2. DNA addition and subtraction rules
The addition and subtraction operations of DNA sequences are performed based on that of binary numbers 0 and 1. Consequently, 8 kinds of DNA addition and subtraction rules can be obtained according to the above DNA encoding rules, as shown in table 2.
Table 2. DNA addition and subtraction rules.
+ | A | C | G | T | — | A | C | G | T |
---|---|---|---|---|---|---|---|---|---|
A | A | C | G | T | A | A | T | G | C |
C | C | G | T | A | C | C | A | T | G |
G | G | T | A | C | G | G | C | A | T |
T | T | A | C | G | T | T | G | C | A |
4.1.3. DNA complementary rule
For each nucleotide the DNA complementary rule [56] is subject to the following equation
where and are a pair of complementary nucleic acid bases, following single mapping. Six complementary base pairs can be obtained according to equation (29), as follows:
- (1)
- (2)
- (3)
- (4)
- (5)
- (6)
where is the ith complement rule. It is worth mentioning that after basic DNA coding, a complementary principle is randomly selected to carry out diffusion of pixel values deeply in this paper.
4.1.4. The improved Arnold algorithm
Expand the plaintext image into one-dimensional row vector with size of Then the Arnold transformation is performed on any coordinate position of vector to obtain the new coordinate position as shown in the following equation:
Then,
The improved Arnold algorithm [19] only considers the above equation (32) and can realize the transformation between pixel points and through and without considering the role of Furthermore, is regarded as a new random number and is still denoted as Finally, equation (32) becomes as shown in equation (33):
4.2. Encryption algorithm
In this section, a color image encryption algorithm based on the novel fractional-order hyperchaotic system and DNA sequences operations is designed. Figure 9 shows the main process of the designed encryption scheme which includes two scrambling processes and DNA diffusion parts. Some specific details are described as follows.
Step 1. Input an original color image with the size of and decompose it into red, green and blue parts to obtain R, G and B matrices with the size of
Step 2. Set the parameters and initial values of the constructed system, and iterate it times. Then the former values are removed to avoid the transient effect and the hyperchaotic sequence is obtained.
Step 3. Transform all elements of the sequence through equation (34) to obtain the pseudo-random sequence
where represents the ith element of chaotic sequence means to calculate the absolute value of and gives the maximum integer less than or equal to
Step 4. The pseudo-random number vectors and are expressed by
where and are the ith and jth element of vectors and respectively,
Step 5. R, G and B are transformed into one-dimensional row vectors, and then the element at position is exchanged with that at position according to the improved Arnold algorithm, where
Step 6. Restore the vectors R, G and B to the matrix of size to obtain the result matrices R1, G1 and B1 of the first scrambling.
Step 7. Input the parameters and initial values again, iterate the system (2) times, and remove the former values. Then the hyperchaotic sequences are obtained and they are recombined into a new chaotic sequence with length by the following formula.
Step 8. The chaotic sequence is quantized by
where is the ith element of chaotic sequence
Step 9. Restore the vector to the matrix with size of then the matrix is obtained by arranging each column of matrix in descending order. The scrambling matrices R1, G1 and B1 obtained in step 5 are scrambled for the second time by the following formula to obtain matrices R2, G2 and B2.
Step 10. The scrambling matrices R2, G2 and B2 with size of are transformed into binary matrices DR2, DG2 and DB2 with size of Then, the binary matrices are transformed into DNA matrices DNA_R2, DNA_G2 and DNA_B2 through DNA coding rule r1 and the size is
Step 11. According to the DNA complementary rule, the sequence is obtained by
Download figure:
Standard image High-resolution imageIf then
If then
If then
If then
If then
If then
If then
If then
where is the ith element of the sequence is the ith element after the DNA matrix DNA_R2 is expanded into a one-dimensional row vector and is any DNA complementarity principle.
Step 12. As in step 10, the other two sequences and are obtained.
Step 13. Input the parameters and initial values again, iterate the system (2) times, and remove the former values. Then the hyperchaotic sequences and are obtained.
Step 14. Transform all elements of the sequences in step 12 through the following equations to obtain the pseudo-random sequences and
where and are the ith element of chaotic sequences and
Step 15. Transform the pseudo-random sequences and into binary sequences and with size of and then transform them into DNA sequences and with size of by DNA coding rule r2.
Step 16. The DNA sequences DNA_R3, DNA_G3 and DNA_B3 are obtained by the following formula.
where and '+' represents DNA addition.
Step 17. Finally, the DNA sequences DNA_R3, DNA_G3 and DNA_B3 are restored to matrices, which are converted to binary matrices through the DNA decoding rule r3. And then restored to decimal matrices and which are combined to obtain the final encryption image matrix with size of
It is worth noting that, a symmetric encryption scheme is used in this paper, so the decryption algorithm is the inverse process of the encryption. That is to say, inverse diffusion and inverse dislocation are performed on the ciphertext image in turn.
4.3. Simulation result
In this paper, MATLAB R2018b is used to verify the designed encryption algorithm in a personal computer with memory 8.00GB, processor AMD A9-9410, CPU 2.90 GHz and the operating system is Windows 7. In addition, color images Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 with size of are used for simulation experiments. Set the key of the proposed algorithm, in which the parameters are initial values order and iteration numbers are and Furthermore, the initial nucleic acid base is selected as and DNA encoding rules are
After numerical simulation, figure 10(a) shows the plaintext images of Sailboat, Fruits, and Pepper, figures 10(b) and (c) are the corresponding encrypted and decrypted results respectively. It is clear from the figure that the encrypted images are all noise-like images, hiding the effective information of the original plaintext images perfectly, which indicates the effectiveness of encryption. In addition, the decrypted images are all no different from the original plaintext images, which illustrates the effectiveness and feasibility of the decryption algorithm.
Download figure:
Standard image High-resolution image5. Security analysis
The security performances of an excellent encryption scheme should be substantial. Consequently, in this section, security of the designed encryption algorithm is studied through key space, key sensitivity, histogram, correlation, information entropy, differential attack and robustness analysis.
5.1. Key space analysis
Key space refers to the total number of various keys that can be used in the encryption process. Generally, the larger the key space, the better the security. For the designed encryption algorithm, the key mainly includes: system parameters ( ), initial values( ), order the initial nucleic acid base(), DNA encoding rule(), and DNA complementary rule(). The maximum error range of each parameter and initial value in the decryption process is obtained by numerical simulation, where is (), are and are Therefore, the key space is which is much larger than the theoretical key space value [58] of the cryptosystem. In addition, the key space size of the designed scheme is compared with that in the existing literature [22, 23, 40], and the results are shown in table 3. It is clear that the encryption algorithm designed in this paper has a larger key space and is resistant to exhaustive attacks effectively.
5.2. Key sensitivity analysis
Key sensitivity is a prominent index to detect whether encryption algorithms can resist violent attacks. For an excellent encryption scheme, it should be sensitive enough to the key. That is to say, when the key is changed slightly, the decrypted image will change greatly. In this section, Sailboat in figure 10(a) is selected for testing. With other keys unchanged, a small difference is added to the initial values and parameters The corresponding decryption images are obtained as shown in figure 11. One can see that the decrypted image obtained after slightly changing the key is completely different from that obtained by the correct key, which indicates that the designed algorithm is extremely sensitive to the key so that it can resist violent attacks effectively.
Download figure:
Standard image High-resolution image5.3. Histogram analysis
The histogram reflects distributions of image pixel values, which is mainly used to evaluate the ability of an algorithm to resist statistical attacks. In the encryption process, the closer the digital transmission distance of the encrypted data, the better the encryption performance. Through numerical simulations, histograms of plaintext Sailboat, Fruits and Pepper images in R, G and B channels are obtained, as shown in figure 12(a). In addition, figure 12(b) shows the corresponding histograms of encrypted images in each channel. It is clear that those histograms of the encrypted images are unified and do not expose any valuable data. Consequently, it is quite difficult for an attacker to obtain any statistical information.
Download figure:
Standard image High-resolution imageIn addition, chi-square statistics (unilateral hypothesis test) are commonly used to measure the difference between plaintext and ciphertext image histograms numerically. For an image with gray level of 256 and size of the chi-square statistics are calculated by
where represents the frequency of each gray value and is the corresponding theoretical frequency distribution. When the significance level is 0.05, After calculation, the chi-square statistics of color Sailboat, Fruits, Pepper plaintext images and the corresponding ciphertext images in each channel are shown in table 4. One can see that the calculated values of the chi-square statistics of plaintext images are significantly greater than and that of the corresponding ciphertext images in each channel are all less than Therefore, it can be considered that ciphertext image histograms are approximately evenly distributed, indicating that the designed algorithm can withstand statistical attacks effectively.
Table 4. The analysis results of chi-square statistics.
Image | Sailboat | Fruits | Pepper | |
---|---|---|---|---|
R | plaintext | 5.0087 × 104 | 3.7694 × 104 | 5.7114 × 104 |
ciphertext | 251.6641 | 227.8438 | 258.2266 | |
G | plaintext | 3.3532 × 104 | 5.1614 × 104 | 5.2108 × 104 |
ciphertext | 232.6406 | 262.5938 | 240.5313 | |
B | plaintext | 8.5505 × 104 | 1.2947 × 105 | 1.0327 × 105 |
ciphertext | 228.6406 | 227.5781 | 261.2969 |
5.4. Correlation analysis between adjacent pixels
In general, the correlation between neighboring pixels in the original image is extremely high, so an excellent encryption scheme should minimize it.
In this section, pairs of adjacent pixels are randomly selected from the R, G and B channels of color images Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07. The corresponding gray values are denoted as then the correlation coefficient between and is
Let the coordinate of be If the coordinate of is then the correlation coefficient in the horizontal direction is calculated. Similarly, if the coordinate is or then the correlation coefficient in the horizontal or diagonal direction is calculated respectively.
Based on the above equations, take to obtain the correlation coefficient among R, G and B channels of Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 plaintext and ciphertext images in each direction. Figure 13 shows the pixel distributions of color Lena image and one can see clearly that the pixels of the original image are concentrated near while that of the ciphertext image are evenly distributed in the whole pixel value range. That is to say, the proposed algorithm can destroy the correlation of original images effectively and the statistical information cannot be obtained through the pixel distribution. Table 5 lists the correlation coefficients of plaintext and the corresponding ciphertext images in different directions. In addition, the comparison results between the correlation coefficients of Lena ciphertext image in this paper and the existing literature [33, 38, 39] are shown in table 6. Apparently, the correlation coefficient between adjacent pixels of ciphertext image calculated by our scheme is closer to 0, which indicates that the designed scheme can weaken the correlation better and resist statistical attacks effectively.
Download figure:
Standard image High-resolution imageTable 5. Correlation coefficients in different channel.
Plaintext | Ciphertext | ||||||
---|---|---|---|---|---|---|---|
Channel | Direction | R | G | B | R | G | B |
Sailboat | H | 0.9191 | 0.9268 | 0.9307 | −0.0035 | 0.0024 | 0.0067 |
V | 0.918 | 0.9209 | 0.9338 | 0.0002 | −0.0019 | −0.0067 | |
D | 0.8808 | 0.882 | 0.8986 | 0.0026 | −0.0022 | 0.0015 | |
Fruits | H | 0.9879 | 0.9732 | 0.8683 | −0.0039 | −0.003 | −0.006 |
V | 0.9867 | 0.9715 | 0.862 | 0.0032 | 0.0024 | −0.0258 | |
D | 0.9791 | 0.9558 | 0.7889 | −0.0006 | −0.0001 | 0.0027 | |
Pepper | H | 0.9651 | 0.9702 | 0.9572 | 0.0017 | −0.0001 | 0.0026 |
V | 0.9682 | 0.9755 | 0.9642 | −0.0044 | −0.0044 | −0.0088 | |
D | 0.9413 | 0.9509 | 0.9299 | −0.003 | −0.0037 | 0 | |
Lena | H | 0.9556 | 0.9442 | 0.9279 | 0 | −0.0014 | 0.0032 |
V | 0.978 | 0.971 | 0.9575 | −0.0026 | 0.0014 | 0.0169 | |
D | 0.9434 | 0.9301 | 0.9093 | −0.0017 | −0.0009 | 0.0018 | |
4.1.04 | H | 0.9786 | 0.9659 | 0.9523 | −0.0048 | 0.0019 | 0.005 |
V | 0.9878 | 0.982 | 0.9717 | −0.0027 | 0.0021 | 0.0175 | |
D | 0.9685 | 0.951 | 0.935 | −0.0011 | 0.0024 | −0.0025 | |
4.1.05 | H | 0.967 | 0.9805 | 0.9819 | 0 | −0.0014 | −0.0017 |
V | 0.9352 | 0.9473 | 0.9749 | −0.0002 | 0.0006 | 0.0169 | |
D | 0.9126 | 0.9316 | 0.9627 | 0.001 | −0.0016 | 0.002 | |
4.1.06 | H | 0.9589 | 0.9686 | 0.9612 | −0.0029 | 0.007 | −0.0046 |
V | 0.936 | 0.9457 | 0.9405 | 0.0081 | 0.0045 | 0.012 | |
D | 0.9107 | 0.9269 | 0.9222 | 0.0018 | −0.0052 | 0.0013 | |
4.1.07 | H | 0.9744 | 0.9756 | 0.989 | −0.0049 | 0.0025 | 0.0031 |
V | 0.9762 | 0.9801 | 0.988 | −0.0001 | −0.0026 | 0.0041 | |
D | 0.9541 | 0.96 | 0.9807 | 0.0009 | 0.0001 | 0.006 |
Table 6. The comparison results of Lena images in different algorithms.
Algorithm | Direction | R | G | B |
---|---|---|---|---|
Ours | H | 0 | −0.0014 | 0.0032 |
V | −0.0026 | 0.0014 | 0.0169 | |
D | −0.0017 | −0.0009 | 0.0018 | |
Ref. [33] | H | −0.002 | −0.0022 | 0.0069 |
V | −0.0013 | −0.0041 | 0.0059 | |
D | −0.0059 | 0.0014 | 0.0035 | |
Ref. [38] | H | −0.0067 | −0.005 | 0.0071 |
V | −0.0065 | 0.0003 | 0.002 | |
D | 0.0006 | 0.0011 | 0.0015 | |
Ref. [39] | H | −0.0025 | 0.0058 | −0.0058 |
V | 0.0913 | −0.0372 | 0.0036 | |
D | 0.0011 | −0.0014 | −0.0002 |
Tables 7 and 8 lists the correlation coefficients of Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 at the identical and adjacent positions respectively. Moreover, the comparison results under different circumstances of Lena ciphertext image in this paper and the existing literature [26, 39, 44] are shown in table 9. It is clear that the correlation coefficients between each channel of the ciphertext image at the same and adjacent positions are all closer to 0, indicating that the designed scheme has a strong ability to destroy the correlation between different channels.
Table 7. Identical-position correlation coefficients.
Plaintext | Ciphertext | |||||
---|---|---|---|---|---|---|
Image | R-G | R-B | G-B | R-G | R-B | G-B |
Sailboat | 0.8957 | 0.8344 | 0.9600 | −0.0034 | −0.0038 | −0.0019 |
Fruits | 0.8753 | 0.4889 | 0.6874 | −0.0018 | 0.0015 | 0.0068 |
Pepper | 0.2702 | 0.3972 | 0.8514 | 0.0038 | −0.0093 | −0.0005 |
Lena | 0.8849 | 0.7013 | 0.9326 | 0.0022 | −0.0035 | 0.0012 |
4.1.04 | 0.6207 | 0.6880 | 0.9274 | −0.0026 | −0.0007 | 0.0011 |
4.1.05 | 0.6377 | 0.4823 | 0.9417 | −0.0004 | 0.0021 | −0.0062 |
4.1.06 | 0.8812 | 0.8342 | 0.9735 | 0.0004 | 0.0012 | −0.0047 |
4.1.07 | 0.7016 | 0.6477 | 0.8518 | 0.0048 | −0.0000 | −0.0016 |
Table 8. Adjacent-position correlation coefficients.
Plaintext | Ciphertext | |||||
---|---|---|---|---|---|---|
Image | R-G | R-B | G-B | R-G | R-B | G-B |
Sailboat | 0.8213 | 0.7631 | 0.8868 | 0.0051 | 0.0028 | −0.0058 |
Fruits | 0.8618 | 0.4587 | 0.6283 | −0.0080 | 0.0037 | 0.0021 |
Pepper | 0.2525 | 0.3773 | 0.8282 | 0.0022 | 0.0043 | −0.0142 |
Lena | 0.8569 | 0.6699 | 0.8933 | 0.0008 | −0.0037 | −0.0018 |
4.1.04 | 0.6093 | 0.6732 | 0.9056 | −0.0037 | −0.0003 | 0.0008 |
4.1.05 | 0.6092 | 0.4533 | 0.9146 | 0.0031 | 0.0011 | −0.0002 |
4.1.06 | 0.7996 | 0.7501 | 0.9073 | 0.0030 | −0.0028 | −0.0003 |
4.1.07 | 0.6791 | 0.6363 | 0.8445 | −0.0043 | −0.0010 | 0.0003 |
Table 9. Correlation coefficients of Lena at the same and adjacent positions in different algorithms.
Identical-position | Adjacent-position | ||||||
---|---|---|---|---|---|---|---|
Algorithm | R-G | R-B | G-B | Algorithm | R-G | R-B | G-B |
Ours | 0.0022 | −0.0035 | 0.0012 | Ours | 0.0008 | −0.0037 | −0.0018 |
Ref. [26] | 0.0028 | 0.0005 | 0.0024 | Ref. [39] | −0.0093 | 0.0072 | −0.0002 |
Ref. [39] | −0.0060 | −0.0035 | 0.0076 | Ref. [44] | −0.0015 | 0.0088 | −0.0072 |
5.5. Information entropy analysis
Information entropy is a prominent feature to evaluate the security performance of encryption schemes, which can reflect the uncertainty of image information. The higher the value of entropy, the less visual information obtained and the better the encryption effect. And it is calculated as shown below.
where represents the number of gray levels, and is the probability of occurrence of For an image with a gray level of 256, the theoretical value of is 8.
Table 10 lists the information entropy of the plaintext and corresponding ciphertext Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 images in each channel. One can see that the information entropy of ciphertext images in each channel is all very close to 8, while that of each plaintext image is far from 8. It can be inferred that the designed encryption algorithm seriously interferes with the pixel value of the original image, and the encryption effect is quite prominent. In addition, the comparison results between the information entropy of Lena image in this paper and the existing literature [33, 40, 51] are shown in table 11. It is clear that the information entropy of ciphertext images obtained by our scheme is closer to 8, which indicates that our algorithm has better security and can withstand information entropy attack effectively.
Table 10. Information entropy of test images.
Plaintext | Ciphertext | |||||
---|---|---|---|---|---|---|
Image | R | G | B | R | G | B |
Sailboat | 7.3089 | 7.649 | 7.2351 | 7.9972 | 7.9974 | 7.9975 |
Fruits | 7.5071 | 7.3231 | 6.7437 | 7.9975 | 7.9971 | 7.9975 |
Pepper | 7.3006 | 7.5576 | 7.0916 | 7.9971 | 7.9974 | 7.9971 |
Lena | 7.1655 | 7.5578 | 6.8571 | 7.9971 | 7.9979 | 7.9972 |
4.1.04 | 7.2549 | 7.2704 | 6.7825 | 7.9976 | 7.9972 | 7.9972 |
4.1.05 | 6.4311 | 6.5389 | 6.232 | 7.9974 | 7.997 | 7.9972 |
4.1.06 | 7.2104 | 7.4136 | 6.9207 | 7.9972 | 7.9972 | 7.9972 |
4.1.07 | 5.2626 | 5.6947 | 6.5464 | 7.9969 | 7.9971 | 7.9971 |
5.6. Differential attack analysis
Differential attack analysis refers to encrypting two slightly different plaintext images with the same key and comparing the differences between two ciphertext images. The number of pixels change rate (NPCR) and the unified average changing intensity (UACI) are two important indicators to test whether a cryptosystem can withstand the differential attack. The corresponding calculation formula is as follows:
where and are the pixel values of the original ciphertext image and the encrypted image obtained by slightly changing the plaintext image, respectively. For an image with a gray level of 256, the theoretical values of NPCR and UACI are 99.6094% and 33.4635% respectively [59].
In this section, one pixel of the plaintext Sailboat, Fruits, Pepper, Lena and 4.1.04–4.1.07 in each channel is selected randomly and changed by 1. Twenty times tests were conducted, and the average values of NPCRs and UACIs are shown in table 12. It is clear that the average NPCRs and UACIs calculated by our scheme are all close to the theoretical value 99.6094 and 33.4635, which illustrates that the designed scheme can withstand differential attacks effectively. In addition, the comparison between the average NPCRs and UACIs values of Lena image calculated in this paper and the existing literature [27, 28, 39] are shown in table 13. Obviously, the average NPCRs and UACIs values of the designed scheme are closer to 99.6094 and 33.4635, the plaintext sensitivity is stronger, and the ability to withstand differential attacks is superior.
Table 12. NPCR and UACI results for test images.
Mean NPCRs (%) | Mean UACIs (%) | |||||||
---|---|---|---|---|---|---|---|---|
Images | R | G | B | Average | R | G | B | Average |
Sailboat | 99.6223 | 99.5761 | 99.5918 | 99.5967 | 33.4159 | 33.2395 | 33.4403 | 33.3652 |
Fruits | 99.5894 | 99.6118 | 99.6089 | 99.6034 | 33.1714 | 33.4542 | 33.2234 | 33.2830 |
Pepper | 99.6223 | 99.5857 | 99.6170 | 99.6083 | 33.4805 | 33.3225 | 33.3772 | 33.3934 |
Lena | 99.6017 | 99.6135 | 99.6464 | 99.6235 | 33.5358 | 33.3496 | 33.4203 | 33.4352 |
4.1.04 | 99.5860 | 99.6107 | 99.5831 | 99.5932 | 33.1492 | 33.3164 | 33.0001 | 33.1552 |
4.1.05 | 99.6376 | 99.5930 | 99.6340 | 33.2491 | 99.6215 | 33.0573 | 33.3812 | 33.2292 |
4.1.06 | 99.6133 | 99.6249 | 99.5549 | 99.5977 | 33.4500 | 33.1136 | 33.2657 | 33.2764 |
4.1.07 | 99.6206 | 99.5793 | 99.6168 | 99.6055 | 33.5965 | 33.2815 | 33.1792 | 33.3524 |
Table 13. NPCRs and UACIs of Lena in different algorithms.
Mean NPCRs (%) | Mean UACIs (%) | |||||||
---|---|---|---|---|---|---|---|---|
Algorithm | R | G | B | Average | R | G | B | Average |
Ours | 99.6017 | 99.6135 | 99.6464 | 99.6235 | 33.5358 | 33.3496 | 33.4203 | 33.4352 |
Ref. [27] | 99.6848 | 99.6672 | 99.7510 | 99.7010 | 33.5523 | 33.5210 | 33.5342 | 33.5358 |
Ref. [28] | 99.9969 | 99.9954 | 99.9923 | 99.9948 | 33.5037 | 33.1010 | 33.4802 | 33.3616 |
Ref. [39] | 99.6016 | 99.6205 | 99.6095 | 99.6105 | 33.2483 | 33.4977 | 33.3877 | 33.3779 |
5.7. Robustness analysis
5.7.1. Anti-noise performance
Since ciphertext images are easily disturbed by various noises during the communication transmission, an excellent cryptosystem should have enough ability to resist noise attack. To test the performance of the designed encryption scheme against noise attacks, Gaussian noise with intensities of 0.001, 0.003 and 0.005 are added to sailboat, fruit and pepper cipher images, respectively. Figure 14 shows the corresponding decrypted images. Moreover, salt and pepper noise with intensity of 0.1, 0.2 and 0.3 are added respectively, and figure 15 shows the decrypted images. The noise test results show that the quality of the recovered image gets worse as the noise intensity increases. However, the main information of original images can still be obtained. In conclusion, the designed algorithm can withstand Gaussian noise attack and salt and pepper noise attack perfectly.
Download figure:
Standard image High-resolution imageDownload figure:
Standard image High-resolution image5.7.2. Anti-shear performance
In addition to noise interference, ciphertext images are also easy to lose data in the process of transmission or storage. Therefore, a good encryption algorithm should also have sufficient resistance to clipping attack. To measure the ability of the designed algorithm to withstand shear attack, different degrees of data of Sailboat, Fruits and Pepper ciphertext images are cut out respectively. The ciphertext images with different degrees of data loss and the corresponding recovered images are given in figures 16 and 17, respectively. One can see that for different degrees of data loss, decrypted images can display main information of original images. The results show that the algorithm designed in this paper can withstand the clipping attack effectively and then can avoid the decryption difficulty caused by data loss perfectly.
Download figure:
Standard image High-resolution imageDownload figure:
Standard image High-resolution image6. Conclusion
In this paper, a fractional-order hyperchaotic system is constructed and its dynamic behavior is analyzed based on ADM algorithm. It is found that the system has rich dynamic characteristics and its hyperchaotic states are distributed in a large interval, which is well suited for chaotic cryptography. In addition, DSP implementation of the system provides a theoretical basis for its practical application. Then, a color image encryption scheme is designed based on the constructed fractional-order hyperchaotic system and DNA dynamic coding. The security analysis results demonstrate that the scheme has a large key space, and the average entropy of Lena ciphertext image reaches 7.9974. Furthermore, the algorithm can effectively withstand differential attacks, statistical attacks and other common attacks. Not only that, the scheme has good robustness against noise attacks and shear attacks. However, due to the complexity of iterative process and DNA manipulation, the encryption time of the designed algorithm is slightly longer. Therefore, in the future, we will improve the algorithm to design a more secure and efficient encryption scheme.
Acknowledgments
This work was supported by the National Natural Science Foundation (No. 11962012, 61863022).