Brought to you by:
Paper

Memristive chaotic system-based hybrid image encryption application with AES and RSA algorithms

Published 15 June 2023 © 2023 IOP Publishing Ltd
, , Citation M Emin Sahin 2023 Phys. Scr. 98 075216 DOI 10.1088/1402-4896/acdba0

1402-4896/98/7/075216

Abstract

The widespread use of information and communication tools today facilitates information access and highlights the significance of information and data security. In recent years, chaos-based encryption systems have emerged as a promising approach for protecting the confidentiality of transmitted images. In particular, memristor-based hyperchaotic systems have attracted significant attention because of their robustness and complexity. In this paper, we propose an image encryption model that employs a two-stage encryption method using various chaotic systems, including the logistic map, Lorenz chaotic system, and memristor-based hyperchaotic system, with AES and RSA encryption algorithms. The proposed hybrid scheme applies bit-based pixel diffusion and confusion techniques to improve the security of encrypted images. Statistical and security tests are conducted to compare the performance of the different encryption systems and algorithms and to present the measurement values obtained from the analysis. Our experimental results demonstrate the effectiveness of the proposed image encryption scheme in terms of security, speed, and reliability and provide valuable insights for the development of future chaos-based encryption systems.

Export citation and abstract BibTeX RIS

1. Introduction

In the past few years, there has been a significant increase in the interest in image encryption, mainly due to the exponential advancement of multimedia technology. Secure and robust methods of image encryption have become crucial for protecting sensitive information and preventing unauthorized access. One approach that has gained attention in this field is the use of chaotic systems for digital image encryption. Chaos theory, which deals with systems that are highly sensitive to initial conditions, has shown promise in generating complex and pseudorandom patterns that can be utilized for encryption. Moreover, it exhibits high sensitivity to initial conditions, meaning that even slight changes in the encryption key can result in significant alterations in the resulting ciphertext. Data security involves safeguarding data from unauthorized access, and encryption serves as an effective approach to achieving this [1, 2]. The strong connection between chaos theory and cryptology has been employed in the design process and continues to be utilized today. The widespread utilization of chaos in encryption and its ability to produce superior outcomes compared to other encryption methods have recently increased the interest in chaotic applications [3]. Chaotic systems have been employed as an entropy source with the support of a protocol, and this entropy source has been utilized in cryptographic techniques such as image encryption algorithms [46], hash functions [79], s-box designs [10, 11], and key generators [12, 13]. When the researchers' hypotheses are reviewed in the context of these investigations, it is clear that the researchers' theories are based on the notion that the complexity of the entropy source contributes positively to the cryptological protocol design. In other words, the more complex the chaotic system used as the entropy source, the more secure the cryptological protocol becomes [5, 1416].

Image encryption applications commonly employ chaotic systems, which have demonstrated favorable results in terms of performance and security [17, 18]. The design of various chaotic systems, their sensitivity to initial values, and utilization of numerous parameters in encryption collectively contribute to a significant enhancement in security. This approach makes it extremely difficult for unauthorized individuals to analyze encrypted images without knowledge of encryption parameters. The permutation and diffusion requirements used in image encryption literature are typically applied independently when constructing chaos-based encryption systems [19, 20]. A single output from a chaotic system can be utilized for both permutation and diffusion, streamlining the encryption process for large-scale data. Researchers have been exploring different approaches to design new and robust chaotic systems with the increasing demand for secure and efficient image encryption methods. In recent years, the memristor, a circuit element with nonlinear properties arising from its structural characteristics, has garnered significant attention as a potential component for developing chaotic and hyperchaotic systems in image encryption applications. The existence of memory resistor (memristor), proposed by Chua in 1971, completed the symmetry of the four fundamental circuital variables (current, voltage, charge, and magnetic flux) alongside resistors, inductors, and capacitors, thus being recognized as the fourth basic circuit element [21]. The memristor, along with the resistor, inductor, and capacitor, completed the symmetry of the four fundamental circuital variables (current I voltage v, charge q, and magnetic flux v), thus it is recognized as the fourth basic circuital element [2224]. As a result, chaotic and hyper-chaotic systems in confidential communication and information encryption will provide sufficient pattern selectivity with the use of memristor element. Chaotic and hyperchaotic systems utilizing memristor elements are expected to provide sufficient pattern selectivity for confidential communication and information encryption. Hence, further research into the dynamics of memristive systems is warranted [2328]. Several studies have been published in recent years on memristor-based chaotic systems and their applications in image encryption [2934]. Chaotic systems, such as the logistic map, Lorenz system, and Chua circuit, are the focus of cryptography research in the literature [3537]. However, the use of memristor-based chaotic circuits for data encryption is relatively rare. In this study, alongside the existing chaotic systems commonly used in chaos-based image encryption applications, a memristor-based hyperchaotic system is employed. The systems utilized are encrypted using AES and RSA encryption algorithms, and security analyses are conducted and compared. The contributions of this study to the literature are as follows:

  • ✓  
    The study proposes an image encryption scheme that utilizes various chaotic systems, including the memristor-based hyperchaotic system, to ensure the confidentiality of transmitted images.
  • ✓  
    The proposed hybrid scheme employs a two-stage encryption method that incorporates bit-based pixel confusion and diffusion techniques, as well as AES and RSA encryption algorithms.
  • ✓  
    Statistical and security tests are conducted to compare the performance of the different encryption systems and algorithms, and measurement values are obtained to evaluate the effectiveness of the proposed scheme.
  • ✓  
    The experimental results indicate the security and dependability effectiveness of the proposed picture encryption system.
  • ✓  
    The work highlights the significance of data security in the context of information and communication technologies by providing essential information for the development of future chaos-based encryption solutions.

The subsequent sections of the paper are organized as follows: section 2 discusses the chaos-based cryptosystems employed, providing an overview of the chaotic and hyperchaotic systems used, as well as details of the encryption and decryption processes utilizing AES and RSA algorithms. Section 3 presents the performance analysis of the proposed cryptosystem, including security analysis and experimental results. Section 4 discusses the findings of the systems. Finally, section 5 concludes the study and provides future perspectives. Figure 1 illustrates the block diagram of the proposed system as a whole.

Figure 1.

Figure 1. Block diagram of proposed system.

Standard image High-resolution image

2. Material and methods

2.1. Chaos based encryption

In image encryption applications, chaos theory has frequently been utilized as a means of enhancing the security of encrypted images, primarily due to the inherent properties of chaotic systems, such as their unpredictability and sensitivity to initial conditions. In this study, memristor-based chaotic systems are integrated with various chaotic systems to further augment the security of encrypted images. The study explores different chaotic systems described in the literature, which are then combined with different encryption methods, including AES and RSA. The use of memristor-based chaotic systems provides an additional layer of security by exploiting the non-linear characteristics of memristor to generate complex and unpredictable patterns, which can further enhance the encryption process.

2.2. Chaotic systems

Many chaotic systems have been applied to image encryption algorithms in the literature. While chaotic sequences obtained from these systems exhibit random-like behavior, they are sensitively dependent on the initial conditions of the system. These chaotic generators can exist in both discrete and time-dependent systems. Some generators and system dynamics used in image encryption are given below. All chaotic systems are designed on the MATLAB platform and produce chaotic sequences for image encryption. In this study, the logistic map, Lorenz chaotic system, and memristor-based chaotic system are used to obtain chaotic sequences for image encryption.

2.2.1. Logistic map

The logistic map is given as follows in equation (1) [35]:

Equation (1)

where R is limited to the range (0.4]. The solution of function with the iteration method is as follows in equation (2):

Equation (2)

It is used to generate a chaotic signal with an initial value of ${x}_{0}.$ Parameters are ${x}_{0}=0.32\,{\rm{and}}\,R=3.99.$

2.2.2. Lorenz chaotic system

The chaotic system which is coined by Lorenz in the literature consists of three nonlinear, first-order differential equations (equation (3)),

Equation (3)

Where x, y and z are state variables, σ, a, and b are scalar parameters. For the solution of this system, Lorenz drew the attractors of the x, y, and z variables (X, Y, and Z) in three-dimensional space by computer when the time changes by Δt ≈ dt. Lorenz performed an analysis as in equation (4), assuming $dt=0.02,\,\sigma =5,\,a=15,\,b=1.$

Equation (4)

The used parameters and initial conditions are as follows ; $S=10,\,P=28,$ $B=2.667,\,DT=0.01,$ ${x}_{0}=0.6,\,{x}_{1}=0.6,\,{x}_{2}=3.09.$ In this study, image encryption is also used by obtaining chaotic sequences from the third state variable of the Lorenz chaotic.

2.2.3. Memristor based chaotic system

In recent years, the rapid development of dynamic analysis, image encryption, and circuit applications has been facilitated by the versatile and effective properties of memristor-based chaotic systems. These systems have found wide usage in these areas [29, 38, 39]. In this part, image encryption procedures are conducted using the flux-controlled memristor-based 5D hyperchaotic system, which is derived from Wang's 5D hyperchaotic system as described in the literature. The corresponding equations are provided in equation (5) [40].

Equation (5)

where $W\left(u\right)=m+3n{u}^{2}$ and k, m, n, g are parameters are; $a=14;b=78;c=30;m=0.1;n\,=0.01;k=0.02;g=0.3$ and initial conditions are; [x y z w u] = [4 1.2 0.5–3.6 6]. In this study, image encryption is also used by obtaining chaotic sequences from the third state variable of the memristor-based hyperchaotic system.

2.3. Encryption algorithms

2.3.1. AES

The Data Encryption Standard (DES) Symmetric Encryption Algorithm, known for its simplicity, became vulnerable to security threats as powerful computers enabled brute force attacks to discover the secret key. In response, the Advanced Encryption Standard (AES) Encryption Algorithm was developed by Belgian scientists Joan Daemen and Vincent Rijmen through a competition organized by the National Standards Institute (NIST) in 2001. The AES algorithm offers enhanced reliability compared to DES while also being convenient to implement. Unlike DES, the AES algorithm supports different key and block lengths. However, the AES standard specifies a fixed 128-bit data block and allows for key lengths of 128-bit, 192-bit, or 256-bit [41].

2.3.2. RSA

The asymmetric encryption algorithm RSA is widely considered the most popular of its kind. It is based on the algorithmic difficulty of factoring integers. Its security increases according to the size of the prime number selected in the key generation stage. It consists of three stages: key generation, encryption and decryption [42]. The security of the RSA Algorithm depends on the difficulty of the algorithm separating integers. In these cryptographic algorithms, it is used as the public key and another value is selected by multiplying it by two large prime numbers. The public key can be used to encrypt the message, but if it is sufficiently large, the message can only be decoded if the prime number is known.

2.4. Security analysis

In the literature, several security tests have been presented to measure the reliability of image encryption systems and whether attacks in different ways weaken the system. Some of tests are described in the following sections.

2.4.1. Correlation analysis

There is a relationship between the pixels of any original image. The correlation of two adjacent pixels in an encrypted image should be minimal to deal with statistical attacks. The correlation coefficient x, y of each even pixel in the encrypted image is calculated by equations (6)–(8) given below [43]:

Equation (6)

Equation (7)

Equation (8)

Here x and y are the values of two adjacent pixels in the image on the gray legend chart. N represents the number of pixels selected from the image. If the correlation coefficient calculated for any pixel group selected from the encrypted image is close to or below 0, it indicates that the correlation between the pixels is very low. This makes the encryption system resistant to statistical attacks.

2.4.2. Histogram analysis

Histogram analysis of the encrypted image is one of the straightforward approaches to demonstrate the quality of image encryption. A successful image encryption method should encode the original image in a manner that resembles randomness, resulting in an evenly distributed histogram in the encrypted image [44]. It is important for the pixel values in the encrypted image to be uniformly distributed across the image. By analyzing the histogram, we can assess whether the image encryption method is resistant to statistical attacks [45].

2.4.3. Differential attack

The differential attack is essentially a selected plaintext attack. In this attack, the attacker continuously modifies the plaintext images and analyzes the corresponding encrypted images in an attempt to retrieve the secret key. It is desirable for a minimal change in the plaintext image to result in a completely different encrypted image to assess the resistance against differential attacks.

In the literature, NPCR (number of pixels change rate) [46] and UACI (unified average changing intensity) [47] are used to measure this difference, in other words, to analyze differential attack. How to calculate the NPCR and UACI values is expressed with the following formula in equations (9)–(11) with 1C and 2C being the encrypted state of the plain image and the encrypted state of the plain image with a very slight change, and the width of the image is W and the height is H:

Equation (9)

Equation (10)

$D\left(i,j\right)$ is calculated as follows:

Equation (11)

2.4.4. Information entropy (IE)

Information entropy, also known as Shannon entropy, is a measure of the uncertainty or randomness in a set of data [48, 49]. In the context of digital images, it can be used to quantify the degree of randomness in the distribution of pixels. . A higher entropy value suggests a more random distribution of pixel values, while a lower entropy value signifies a more uniform distribution. The equation for calculating information entropy, denoted as IE, is expressed in equation 13:

Equation (12)

where IE is the entropy, $p(i)$ is the probability of a pixel having a particular value (ranging from 0 to 255 for 8-bit images), and $lo{g}_{2}$ is the base-2 logarithm. In practice, information entropy is often used as a measure of the quality of encryption in image processing. A well-encrypted image should have a high entropy value, indicating a significant degree of randomness in the pixel distribution.

3. Experimental results

This section presents a process wherein chaotic/hyperchaotic systems are encrypted on various images using AES and RSA encryption algorithms. The objective is to evaluate the performance of these encryption algorithms and compare their outcomes. The section begins by introducing the encryption algorithms, followed by an explanation of the encryption and decryption system procedure presented in table 1. This table likely provides a step-by-step guide on how to encrypt and decrypt the chaotic/hyperchaotic systems on the images using AES and RSA algorithms. Subsequently, the section mentions that performance tests will be conducted on these encryption algorithms, and the results will be reported. The purpose of these tests is to assess the speed, reliability, and security of the algorithms in encrypting and decrypting the chaotic/hyperchaotic systems. The obtained results will help in determining the most suitable encryption algorithm for this specific application.

Table 1. Procedure of encryption and decryption system.

Encryption
Step 1: The image to be used for encryption is converted from two dimensions to one.
Step 2: The keys to be used in AES and RSA algorithms are determined.
Step 3: Assuming the size of the picture used is MXN, a random M*N dimensional array is obtained from chaotic systems for creating the private key.
Step 4: Random numbers generated in chaotic maps for the confusion stage are ordered from smallest to largest. The indices of the ordered numbers (i from 0 to NXM) are mixed with this k-array of the image.
If the image pixel values are pi, the mixing process is performed so that the ki value would be the new position of pi.
Step 5: The new pi values mixed for the diffusion stage are subjected to bitwise XOR operation with the newly generated key from the chaotic sequence and chaotic maps produced for the diffusion process.
${C}_{i}={P}_{i}\,\oplus \,mod\left(C{h}_{i}* {10}^{8,256}\right)\oplus \,Ke{y}_{i}$
Step 6: where C is the NM size image with confusion and diffusion, P is our blended image, Ch is the sequence generated from the chaotic map for the mixing part, and Key is the key generated from the chaotic map.
Step 7: The generated C array is given to AES and RSA algorithm.
Step 8: The encrypted array is converted back to two dimensions.
Decryption
Step 1: The image to be used for encryption is converted from two dimensions to one.
Step 2: Encrypted sequence and keys are given to AES and RSA.
Step 3: The same chaotic sequences are produced by giving the initial parameters given to the chaotic maps again.
${P}_{i}={C}_{i}\,\oplus \,mod\left(C{h}_{i}* {10}^{8,256}\right)\oplus \,Ke{y}_{i}$
Step 4: XOR operation is performed for the reverse of the diffusion stage.
Step 5: The new pi values mixed for the diffusion stage are subjected to bitwise XOR operation with the newly generated key from the chaotic sequence and chaotic maps produced for the diffusion process.
${C}_{i}={P}_{i}\,\oplus \,mod\left(C{h}_{i}* {10}^{8,256}\right)\oplus \,Ke{y}_{i}$
Step 6: For the reverse of the confusion stage, our pixel value, which is pi from the diffusion stage, is restored with the same chaotic map indices.
In the same way, the position of the Pi value with respect to the Ki index has changed and has been restored.
Step 7: The original image is obtained by converting the one-dimensional array into two dimensions.

3.1. A genaral overview of the binaryzation method of chaotic sequence

  • 1.  
    Choose a chaotic system and set the initial conditions. This could be a map, such as the logistic map or a continuous-time system, such as the Lorenz system or memristive system. Set the initial conditions for the system, such as the initial state vector or the initial value of the system variable.
  • 2.  
    Iterate the chaotic system for a large number of time steps to generate a long sequence of real-valued numbers. This sequence should have the desired statistical properties of a chaotic system, such as sensitivity to initial conditions and a broad range of values.
  • 3.  
    Choose a threshold value to use for binarization. This value will determine the boundary between the two binary values, such as 0 and 1.
  • 4.  
    Apply the threshold value to the real-valued sequence to create a binary sequence. Each element of the binary sequence will be 0 if the corresponding element of the real-valued sequence is less than the threshold value, and 1 if it is greater than or equal to the threshold value.
  • 5.  
    Optionally, post-process the binary sequence to remove any patterns or biases that may be present. This could involve techniques such as filtering or shuffling the sequence.

3.2. NIST tests

Statistical tests are employed to confirm the randomness and safety of generated random number sequences. In general, the randomness of the number sequences is accepted when they pass all statistical tests. NIST 800–22 and FIPS 140–2 are the most commonly employed randomization tests in the literature [50]. In this work, the NIST 800–22 test is utilized to assess the unpredictability of the chaotic sequences produced by the proposed encryption scheme. Table 1 provides a comparison of the chaotic sequences' test results. NIST test results for three different datasets are given in table 2. Symbols S and F in the table indicate successful and unsuccessful test results, respectively. The symbol P is the calculated probability value of the test. Examining the table, the logistic and memristive systems passed seven tests while the Lorenz system only passed six. For the NIST 800–22 test, it is recommended to execute randomization testing using at least 1 million bits of data to ensure accurate and dependable results. The NIST 800–22 exam is comprised of fifteen distinct subtests, and a p-value is calculated for each subtest. Each p-value must be greater than 0.01 in order for the tests to be judged successful. Comparing the p-values obtained from the proposed chaotic systems to the threshold value of 0.01 demonstrates the randomness and safety of the created chaotic sequences.

Table 2. NIST test results of each chaotic system.

 Logistic mapLorenz systemMemristive system
Statistical test p-valueResult p-valueResult p-valueResult
Frequency9.34790F3.70357F7.87397F
Block Frequency (m = 128)0.99981S9.52281F7.57397F
Cusom-Forward4.24035F1.84914F3.84436F
Cusom-Reverse4.45189F1.20198F3.89279F
Runs0F0F0F
Long Runs of Ones0.00807F0.07699S0.22136S
Rank0.63414S0.43998S0.80545S
Spectral DFT0.83283S0.10431S0.58190S
NonOverlapping Templates (m = 9, B = 000000001)6.53984F4.29564F3.07960F
Overlapping Templates (m = 9)1.38085F3.53195F1.12446F
universal0.86845S0.00166F0.07085S
Approximate Entropy (m = 10)0F1.84914F4.68584F
Random Excursions a 0.31942S0.30541S0.36632S
Random Excursions Variant a 0.23931S0.44965S0.54871S
Linear Complexity (M = 500)0.38407S0.71948S0.08903S
Serial (m = 16) p-value10F0F0F
p-value20 0 0 

a Average value of multiple tests.

3.3. AES

A 128-bit array is created using the logistic map, Lorenz, and the memristive system. This array is used for key expansion and encryption. The image is encrypted in 128-bit chunks because a 128-bit AES is used, and normally ten rounds of AES are reduced to one round for faster encryption. Encryption and decryption block diagrams with the AES algorithm are given in figures 2 and 3.

Figure 2.

Figure 2. Encryption block diagram with AES algorithm.

Standard image High-resolution image
Figure 3.

Figure 3. Decryption block diagram with AES algorithm.

Standard image High-resolution image

In this part, encryption is applied to the images shown in figure 4, namely 1.jpg and 2.jpg, using the logistic map, Lorenz and memristive hyperchaotic systems in combination with the Advanced Encryption Standard (AES) algorithm.

Figure 4.

Figure 4. Images used in encryption (a) 1.jpg (b) 2.jpg.

Standard image High-resolution image

Figure 5 displays the encrypted images using the AES algorithm with different chaotic systems. A histogram, which represents the distribution of colour values in a numerical image, is used to obtain brightness or tone information about the image. This graph provides insights into the image characteristics. Figures 611 depict the logistic maps obtained by blending the 256 × 256 1.jpg and 2.jpg images, which are created using the Lorenz and memristive chaotic systems, through bit-based and pixel-based approaches. These figures display the original, encrypted, and decrypted versions of the 1.jpg and 2.jpg images.

Figure 5.

Figure 5. (a), (e) are the original images in gray scale of 1.jpg and 2.jpg (b), (f) are the images encrypted using the logistic map with the AES algorithm. (c), (g) are images encrypted using Lorenz system with AES algorithm. (d), (h) are images encrypted using the AES algorithm and memristive chaotic system.

Standard image High-resolution image
Figure 6.

Figure 6. Histogram plots generated using AES and logistic map for 1.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 7.

Figure 7. Histogram plots generated using AES and logistic map for 2.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 8.

Figure 8. Histogram plots created using AES and Lorenz system for 1.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 9.

Figure 9. Histogram plots created using AES and Lorenz system for 2.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 10.

Figure 10. Histogram plots created using AES and memristive chaotic system for 1.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 11.

Figure 11. Histogram plots created using AES and memristive chaotic system for 2.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image

As can be seen from the histogram graphs, although there is no change in the histogram information of the plain image in pixel-based mixing, the histogram graph of the encrypted image obtained by bit-based mixing is close to linear character and regularity. Mixing only the pixels in the confusion phase does not remove some of the statistical properties of the original image. In bit-based hashing, since the pixel values change, secure encryption can be achieved with fewer cycles during the confusion and diffusion stage. It is understood that the image encryption method in this study with bit-based hashing is more effective in the diffusion stage. In order to completely remove the statistical properties of the plain image, encryption systems apply the sequential diffusion on the image pixels. With a general expression, it is understood from the graphics that the methods compared are hiding the histogram information of the original image.

The figures (figures 1217) depict correlation scatter plots for two different images, 1.jpg and 2.jpg, which were encrypted and decrypted using three different chaotic systems: the logistic map, the Lorenz system, and the memristive system. The purpose of these plots is to visually demonstrate the degree of correlation between adjacent pixels in the original and encrypted images. Upon examining the correlation scatter plots for the original photos, as mentioned in the section, it becomes apparent that neighboring pixels in the photographs exhibit a very strong correlation with each other. This can be observed by analyzing the plots. This strong correlation is likely due to the presence of uniform colour or texture regions in the photographs, causing nearby pixels to have similar values.

Figure 12.

Figure 12. Horizontal, vertical and diagonal correlation scatter plots of original and encrypted images generated using AES and logistic map for 1.jpg.

Standard image High-resolution image
Figure 13.

Figure 13. Horizontal, vertical and diagonal correlation scatter plots of original and encrypted images generated using AES and logistic map for 2.jpg.

Standard image High-resolution image
Figure 14.

Figure 14. Horizontal, vertical, and diagonal correlation scatter plots of original and encrypted images generated using AES and Lorenz system for 1.jpg.

Standard image High-resolution image
Figure 15.

Figure 15. Horizontal, vertical, and diagonal correlation scatter plots of original and encrypted images generated using AES and Lorenz system for 2.jpg.

Standard image High-resolution image
Figure 16.

Figure 16. Horizontal, vertical and diagonal correlation scatter plots of original and encrypted images created using AES and memristive chaotic system for 1.jpg.

Standard image High-resolution image
Figure 17.

Figure 17. Horizontal, vertical and diagonal correlation scatter plots of original and encrypted images created using AES and memristive chaotic system for 2.jpg.

Standard image High-resolution image

However, when analyzing the correlation scatter plots for the encrypted images, it is evident that the correlation between any two adjacent pixels is extremely low, almost non-existent. This is because the encryption process utilizing the chaotic systems introduced significant randomness and unpredictability to the pixel values, effectively disrupting any patterns or correlations that are present in the original image. Finally, the section also includes visual examples of the original, encrypted, and decrypted versions of the images, which are shown in the plots as vertical, horizontal, and diagonal images, respectively. This helps to give a sense of how the encryption process affects the appearance of the original image, and how the decrypted image compares to the original.

3.4. RSA

In the encryption phase of the RSA algorithm, two prime numbers, seventeen and nineteen, are selected as the public key. These numbers are used to generate a private key, which is kept secret by the sender. Procedure of encryption with RSA algorithms is given in table 3. The value of 'e', which is used to encrypt the message, is chosen as five in this study. After generating a 256 × 256 chaotic array using the selected chaotic system, the XORing process is applied to the image. This process involved performing an XOR operation between each pixel value of the image and the corresponding pixel value of the chaotic array. Encryption block diagram with RSA algorithm is shown in figure 18.

Table 3. Procedure of encryption with RSA algorithms.

Encryption
Step 1: Calculate the value of n by choosing the prime numbers p and q
Step 2: For RSA, the public key (e, n) and private key (d, n) are generated
Step 3: In this section, 6 positive integers are randomly selected (a1, a2, a3, a4, a5, a6) and a new value is generated for each (b1, b2, b3, b4, b5, b6) using the public key (e, n).
Step 4: Parameters for chaotic maps are calculated using equation (1).
$\left\{\begin{array}{c}{x}_{1}=\sqrt{\mathrm{log}({b}_{1}+{a}_{1})}\\ {x}_{2}=\,\sqrt{\mathrm{log}({b}_{2}+{a}_{2})}\\ {x}_{3}=\,\sqrt{\mathrm{log}({b}_{3}+{a}_{3})}\\ {x}_{4}=\sqrt{\mathrm{log}({b}_{4}+{a}_{4})}\\ {x}_{5}=\sqrt{\mathrm{log}({b}_{5}+{a}_{5})}\\ {x}_{6}=\,\sqrt{\mathrm{log}({b}_{6}+{a}_{6})}\end{array}\right.$
Step 5: The generated values (x1, x2, x3, x4, x5, x6) are given to chaotic maps and chaotic sequences are created.
 
Step 6: Arrays (k1, k2, k3) produced from the chaotic map are ordered from smallest to largest and their indexes are obtained. The image is mixed (confusion) using indices.
Step 7: Then the obtained values are converted to integers between 0–255 using equation given below.
$\left\{\begin{array}{c}nk1=mod(floor\left(k1\times {10}^{6}\right),\,256)\,\\ nk2=\,mod(floor\left(k2\times {10}^{6}\right),\,256)\\ nk3=mod(floor\left(k3\times {10}^{6}\right),\,256)\end{array}\right.$
Step 8: The resulting new sequences (nk1, nk2, nk3) are XORed with the scrambled image (confusion) for the diffusion step. Finally, the encrypted image is obtained.
Figure 18.

Figure 18. Encryption block diagram with RSA algorithm.

Standard image High-resolution image

In figures 19(a) and (e) are the original grayscale images of 1.jpg and 2.jpg, respectively; (b) and (f) are images encrypted using the logistic map and the RSA algorithm; (c) and (g) are images encrypted using the Lorenz system and the RSA algorithm, and (d) and (h) are images encrypted using the RSA algorithm and the memristive chaotic system.

Figure 19.

Figure 19. (a), e) (gray scale original images of 1.jpg, 2.jpg and 3.jpg, respectively, (b), (f) images encrypted using the logistic map with the RSA algorithm. (c), (g) Images encrypted using Lorenz system with RSA algorithm. (d), (h) Images encrypted using RSA algorithm and memristive chaotic system.

Standard image High-resolution image

Figures 2025 logistic map is obtained by bit-based and pixel-based mixing of 256 × 256 size 1.jpg and 2.jpg images created using Lorenz and memristive chaotic systems. Histogram graphs of encrypted images are given. The original, encrypted and decrypted images of the used 1.jpg and 2.jpg are shown in these figures.

Figure 20.

Figure 20. Histogram plots generated using RSA and logistic map for 1.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 21.

Figure 21. Histogram plots generated using RSA and logistic map for 2.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 22.

Figure 22. Histogram plots created using RSA and Lorenz system for 1.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 23.

Figure 23. Histogram plots created using RSA and Lorenz system for 2.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 24.

Figure 24. Histogram plots created using RSA and memristive chaotic system for 1.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image
Figure 25.

Figure 25. Histogram plots created using RSA and memristive chaotic system for 2.jpg (a) original, (b) encrypted and (c) decrypted.

Standard image High-resolution image

Figures 2631 display correlation scatter plots for 1.jpg and 2.jpg using the logistic map, Lorenz system, and memristive system. These figures showcase the original, encrypted, and decrypted versions of both 1.jpg and 2.jpg images, represented vertically, horizontally, and diagonally.Upon analyzing the graphics, it becomes evident that adjacent pixels in the original image exhibit a significantly high correlation with each other. In contrast, the correlation between neighboring pixels in the encrypted image is notably small and almost negligible. Furthermore, table 4 presents a comparison of the correlation coefficients calculated based on the AES encryption standard for the horizontal, vertical, and diagonal neighborhoods of the encrypted images. According to the correlation results you provided, it appears that for the original image, all three systems yield similar correlation values in the horizontal, vertical, and diagonal directions. However, for the encrypted image, the correlation values are considerably lower and closer to zero across all three systems and directions. This observation suggests that the encryption systems have effectively reduced the correlation between adjacent pixels in the encrypted image.

Figure 26.

Figure 26. Horizontal, vertical, and diagonal correlation scatter plots of original and encrypted images generated using RSA and Logistic system for 1.jpg.

Standard image High-resolution image
Figure 27.

Figure 27. Horizontal, vertical, and diagonal correlation scatter plots of original and encrypted images generated using RSA and Logistic system for 2.jpg.

Standard image High-resolution image
Figure 28.

Figure 28. Horizontal, vertical, and diagonal correlation scatter plots of original and encrypted images generated using RSA and Lorenz system for 1.jpg.

Standard image High-resolution image
Figure 29.

Figure 29. Horizontal, vertical, and diagonal correlation scatter plots of original and encrypted images generated using RSA and Lorenz system for 2.jpg.

Standard image High-resolution image
Figure 30.

Figure 30. Horizontal, vertical and diagonal correlation scatter plots of original and encrypted images created using RSA and the memristive chaotic system for 1.jpg.

Standard image High-resolution image
Figure 31.

Figure 31. Horizontal, vertical and diagonal correlation scatter plots of original and encrypted images created using RSA and the memristive chaotic system for 2.jpg.

Standard image High-resolution image

Table 4. Correlation values by using chaotic systems for AES.

  Logistic mapLorenz systemMemristive chaotic system
ImagesClassHorizontal correlationVertical correlationDiagonal correlationHorizontal correlationVertical correlationDiagonal correlationHorizontal correlationVertical correlationDiagonal correlation
1.jpgOriginal image0.62830.61790.50440.62830.61790.50440.62830.61790.5044
 Encrypted Image-1.4 × 10–3 2.2 × 10-5 2.2 × 10−3 3.01 × 10−4 3.7 × 10−3 2.7 × 10−3 −1.4 × 10−3 4.7 × 10−4 −7.7 × 10−4
2.jpgOriginal image0.78540.84780.71310.78540.84780.71310.78540.84780.7131
 Encrypted Image−6.1 × 10−3 −3.9 × 10−3 −2.7 × 10−3 −1.17 × × 10−4 −1.6 × 10−3 −4.0 × 10−3 −7.5 × 10−5 1.4 × 10−3 −1.3 × 10−4

When examining the NPCR (Number of Pixel Change Rate) and UACI (Unified Average Change Intensity) values presented in table 5, it can be observed that the memristive system performs better for 1.jpg, while the logistic map demonstrates better results for 2.jpg. Information entropy serves as a valuable metric for assessing the effectiveness of encryption techniques in digital image processing, ensuring the security and privacy of sensitive image data. Table 6 provides the Information Entropy (IE) values for the original images, while table 7 presents the IE values for the encrypted images obtained using chaotic systems with the AES algorithm. According to current results, the IE values of the encrypted images are nearly equal to eight, indicating a high level of security. Among the chaotic systems, the memristive chaotic system exhibits the highest IE value, implying a higher degree of information randomness and encryption effectiveness.

Table 5. NPCR and UACI values by using chaotic systems for AES.

 Logistic mapLorenz systemMemristive chaotic system
Images (256 × 256)UACINPCR (%)UACINPCR (%)UACINPCR (%)
1.jpg Encrypted image33.2199.5895433.1899.5971733.2999.60022
2.jpg Encrypted image32.9999.6383733.0399.5986933.1799.59259

Table 6. IE of the original images.

Images (256 × 256)Entropy
1.jpg Encrypted Image6.6469
2.jpg Encrypted Image7.3454

Table 7. IE of the encrypted images of chaotic systems by using AES algorithm.

 Logistic mapLorenz systemMemristive chaotic system
Images (256 × 256)EntropyEntropyEntropy
1.jpg Encrypted image7.99687.99737.9975
2.jpg Encrypted image7.99707.99677.9976

At the same time, the comparison of the correlation coefficients of the RSA encryption standard calculated according to the horizontal, vertical and diagonal neighborhoods of the encrypted image are shown in table 8. In the table 9, the NPCR and UACI values by using chaotic systems for RSA are given. In this part, while the NPCR values of the Lorenz system are better for the 1.jpg image, the memristive system for the 2.jpg outperforms the other chaotic systems.

Table 8. Correlation coefficients by using chaotic systems for RSA.

  Logistic mapLorenz systemMemristive chaotic system
ImagesClassHorizontal correlationVertical correlationDiagonal correlationHorizontal correlationVertical correlationDiagonal correlationHorizontal correlationVertical correlationDiagonal correlation
1.jpgOriginal image0.62830.61790.50440.62830.61790.50440.62830.61790.5044
 Encrypted Image0.0011−0.0108−0.0044−0.00920.00590.0019−0.0056−0.0022−0.0041
2.jpgOriginal image0.78540.84780.71310.78540.84780.71310.78540.84780.7131
 Encrypted Image−0.000630.000270.0038−0.00390.00340.0044−0.00620.0015−0.0073

Table 9. NPCR and UACI values by using chaotic systems RSA.

 Logistic mapLorenz systemMemristive chaotic system
Images (256 × 256)UACINPCR (%)UACINPCR (%)UACINPCR (%)
1.jpg Encrypted Image33.420.995533.430.996133.340.9960
2.jpg Encrypted Image33.520.996133.410.996333.440.9965

The information entropy of encrypted images of chaotic systems by using RSA algorithm are given in table 10. The proposed system's information entropy value of nearly eight suggests that it has a high degree of randomness and unpredictability. This is an essential characteristic of an effective encryption system as it ensures that the encrypted data remains confidential and secure from potential attackers.

Table 10. IE of the encrypted images of chaotic systems by using RSA algorithm.

 Logistic mapLorenz systemMemristive chaotic system
Images (256 × 256)EntropyEntropyEntropy
1.jpg Encrypted Image7.99727.99757.9974
2.jpg Encrypted Image7.99717.99727.9971

4. Discussion

The results of current study strongly support the effectiveness of the proposed image encryption scheme, which utilizes chaotic systems to ensure the confidentiality of transmitted images. Particularly noteworthy is the successful application of memristor-based hyperchaotic systems, which have demonstrated robustness and complexity in securing the encrypted data. The statistical and security tests conducted on the encrypted images have yielded highly favourable outcomes, as the correlation between adjacent pixels in the encrypted image is virtually non-existent. This essential feature makes it exceedingly challenging for potential attackers to recover the original image. Moreover, our study highlights the significance of incorporating both confusion and diffusion techniques in the encryption process to enhance the overall security of the encrypted images. By employing bit-based pixel confusion and diffusion techniques, our proposed scheme effectively reduces the predictability of the encrypted images, thereby significantly bolstering the security of the encryption scheme.

In addition, recent comparative analysis of various chaotic systems and encryption algorithms used in the proposed scheme in this study provides valuable insights for the development of future chaos-based encryption systems. The study reveals that the choice of chaotic system and encryption algorithm can have a profound impact on both the security and speed of the encryption scheme. As a result, future research efforts in this area should be directed towards the development of more resilient and efficient encryption schemes that leverage advanced chaotic systems and encryption algorithms. Our research underscores the critical importance of data security within the context of information and communication technologies, and offers a potential strategy for securing the confidentiality of transmitted images through the utilization of chaotic systems.

5. Conclusion

In this study, we implemented an image encryption approach using different chaotic systems in conjunction with the AES and RSA algorithms. Our approach utilizes the bit-based chaotic pixel diffusion method, which is a common technique in chaotic image encryption, along with a developed permutation technique.

The properties of the chaotic systems used in the encryption method have been examined, with particular emphasis on the usability of memristor-based chaotic systems in digital systems. This study is important as it explores the use of memristor-based chaotic systems in image encryption applications, similar to other chaotic systems. In addition to the memristor-based chaotic system, we have also encrypted and analyzed two other chaotic systems, namely the Lorenz and logistic map, using two different algorithms, AES and RSA. Necessary security and statistical analyses have been conducted and the results are presented in a comparative manner to demonstrate the reliability of the encryption method. The test results of the image encryption application utilizing the memristor-based chaotic system have been particularly satisfactory, suggesting that memristor-based applications may become more prevalent in the future. The advantages of the two-stage encryption method using chaotic systems and encryption algorithms include strong resistance against attacks, a high level of security, and robustness against noise and data loss during transmission. Additionally, the use of chaotic systems provides a higher degree of randomness and unpredictability, making it challenging for attackers to break the encryption.

However, it is important to acknowledge some disadvantages of this approach. These include the high computational complexity and slower encryption and decryption speeds compared to other encryption methods. Furthermore, the security of chaotic systems can also depend on the specific parameters used, and if these parameters are not carefully selected, the encryption may be vulnerable to attacks. Looking ahead, we believe that the widespread use of memristor elements in image coding applications, due to their non-linear properties and nano dimensions, will enable the design of more diverse and compact chaotic systems in the future.

Acknowledgments

This work is part of a research project supported by TUBITAK 3501 (Grant number: 122E004).

Data availability statement

The data cannot be made publicly available upon publication because no suitable repository exists for hosting data in this field of study. The data that support the findings of this study are available upon reasonable request from the authors.

Please wait… references are loading.
10.1088/1402-4896/acdba0