American Journal of Signal Processing
p-ISSN: 2165-9354 e-ISSN: 2165-9362
2015; 5(1): 13-21
doi:10.5923/j.ajsp.20150501.03
Hung-I Hsiao, Junghsi Lee
Department of Electrical Engineering, Yuan Ze University, Taiwan
Correspondence to: Hung-I Hsiao, Department of Electrical Engineering, Yuan Ze University, Taiwan.
| Email: | ![]() |
Copyright © 2015 Scientific & Academic Publishing. All Rights Reserved.
In this paper, we propose a novel chaos-based cryptographic system for enhancing color image security by using chaotic amplitude phase frequency model nonlinear adaptive filter. The advantage of the proposed scheme is that it possesses the ability of “adjustable secret key space” in order to get the enough security strength to protect color image. Furthermore, the experimental results and security analyses demonstrate that the proposed method has a fine security performance. The “adjustable secret key space” can overcome the security strength issue for obtaining enough secret key length, which can use external signal to adjust the required secret key space without changing the original cryptographic infrastructure.
Keywords: Color image encryption, Adjustable secret key space, Chaos
Cite this paper: Hung-I Hsiao, Junghsi Lee, A Novel Cryptographic System with Adjustable Secret Key Space for Color Image Security Using Nonlinear Adaptive Filter, American Journal of Signal Processing, Vol. 5 No. 1, 2015, pp. 13-21. doi: 10.5923/j.ajsp.20150501.03.
[10]. This weakness could make the ciphers fragile to be brute-force attacked, so DES is later replaced by AES. AES, the current encryption standard which is a symmetric-key block cipher published by NIST in 2001, has three different secret key lengths: 128, 192, and 256 bits, i.e., the corresponding secret key spaces are
,
, and
, respectively [11]. Clearly, the secret key length and its corresponding secret key space decide the security strength of the cryptographic system. Table 1 shows the recommendations of security-strength time frames published by NIST Special Publication 800-57 in 2012 [12], which is a schedule of the security strength for different secret key lengths that provide five types of lengths including 80, 112, 128, 192, and 256 bits. As shown in Table 1, because the two types of security strength, 80 and 112 bits, are not strong enough to protect data, both of the secret key lengths are placed in the “Disallowed” after 2013 and 2030, respectively. On the contrary, the secret key lengths 128, 192, and 256 bits are “Acceptable” from 2011-2031 and beyond, and the minimum of the secret key length for “Acceptable” is 112 bits of security strength, which is acceptable until 2030. We can find that the change of time frame is an important factor for obtaining the enough security strength of secret key length. Based on the above discussions, we propose a new cryptographic system possessing adjustable secret key space, which also means that the secret key length is adjustable, and it is designed by chaotic APFM nonlinear adaptive filter whose input signal can control the size of secret key space. That is, the proposed scheme can use external signal to adjust the required secret key space without altering the original cryptographic infrastructure, so the security strength is sufficient to protect color images even it is way beyond the indicated time frames given in Table 1.
|
![]() | (1) |
and
refer to amplitude, frequency, phase angle of the desired component, and input signal, respectively. The parameters
are the filter step sizes for controlling the speed of the filter,
is the filter output, and ![]() | (2) |

, for
simulated time interval, and initial values for the APFM nonlinear adaptive filter to generate chaotic trajectories. The APFM nonlinear adaptive filter could produce chaos in accordance with the numerical simulation results by Matlab tools using the ordinary differential equation (ODE) solver and solving on a simulated time interval
, when 
with an arbitrarily small initial values
, computed precision is
, and
chooses the following three cases:
As depicted in Figs. 1-3, which respectively refer to above Cases 1-3,
is a controlled parameter, also known as bifurcation parameter, for the APFM nonlinear adaptive filter. The chaotic diagrams of this APFM nonlinear adaptive filter are shown in Figs. 1-3, whose sub-Figs. (a)-(c) denote the
plane,
plane, and
plane, respectively.![]() | Figure 1. APFM nonlinear adaptive filter chaotic trajectories for Case 1, the parameters are ![]() ![]() ![]() ![]() |
![]() | Figure 2. APFM nonlinear adaptive filter chaotic trajectories for Case 2, the parameters are |
![]() | Figure 3. APFM nonlinear adaptive filter chaotic trajectories for Case 3, the parameters are ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
, h and i denote the width and height, respectively. We randomly choose three pixels named
and
in the original image. Compute the value
by![]() | (3) |
by ![]() | (4) |
are the given initial values.Step 2: Giving the encrypted parameters for APFM nonlinear adaptive filter :
, initial values
.Step 3: acquiring the APFM nonlinear adaptive filter 3 solutions
, then preprocess by Eqs. (5)~(7), for
.![]() | (5) |
![]() | (6) |
![]() | (7) |
. Step 5: Generating three
cipher keys
,
obtained by ![]() | (8) |
![]() | (9) |
![]() | (10) |
.Step 6: Executing the exclusive-or operation between gray images and cipher keys, and then get three
gray cipher images
, which are computed by as follows:![]() | (11) |
![]() | (12) |
![]() | (13) |
gray cipher images
and
into
color cipher image.The decryption algorithm is opposite to the encryption scheme due to the decrypted operation is reversed to the process for encryption, and the decrypted parameters are all the same encrypted parameters [14].
is served as the color original image whose red, green, and blue components are separately shown in Figs. 4(b)-4(d), and the corresponding histograms are shown in Figs. 4(e)-4(g), respectively. The encrypted parameters of APFM nonlinear adaptive filter are 
, given initial values
computed precision is
, choosing three different u(t), which are the same as the three cases of u(t) shown in Section 2 except the parameter
that ranges in
, and the three cases are as follows:
The encrypted images and corresponding histograms are depicted in Figs. 5-7, which separately refer to Cases 1-3, in which the sub-fig. (a) denotes the color cipher image, sub-figs. (b)-(d) show the red, green, and blue components of color cipher image, respectively, and sub-figs. (e)-(g) depict the histograms of red , green, and blue components of color cipher image, separately.
etc.) for explaining the decryption. (1) uccessful decryptionThe decrypted parameters are all the same as the encrypted parameters of Case 1, which are given in Section 4.1. As depicted in Fig. 8(a), the decrypted image is successful to recover the color Lena image from color cipher image (Fig. 5(a)) due to the correct decrypted parameters.(2) ailed decryptionThe decrypted parameters are also same as the encrypted parameters of Case 1, which are shown in Section 4.1, except the input signal
that are chosen as
As shown in Figs. 8(b)-8(d), which refer to above 3 different u(t), the decrypted images for color cipher image (Fig. 5(a)) are not successful due to the incorrect input signal
of APFM nonlinear adaptive filter.
for
The total secret key space
is![]() | (14) |
. The value n depends on the input signal u(t) of APFM nonlinear adaptive filter. We can choose three different u(t) to control the size of secret key space, i.e., the proposed scheme possesses the characteristic of adjustable secret key space. This means that the proposed scheme can use outer signal to adjust the desired secret key space without changing original cryptographic architecture. The size of secret key space
depends on input signal u(t) of the APFM nonlinear adaptive filter. If the computed precision is
, calculate the secret key space for three different cases of u(t) by Eq. (14), which are
The above three secret key spaces
(i.e., the corresponding secret key lengths are 512, 651, 1209 bits, respectively.) are enough to prevent all kinds of brute-force attacks [15]. Furthermore, the three different input signal u(t) of APFM nonlinear adaptive filter can control the size of secret key space in order to acquire required security strength. Table 2 shows the comparison of secret key space with the proposed method and other scheme, in which the secret key space of proposed method is superior to the other schemes.
|
![]() | (15) |
![]() | (16) |
![]() | (17) |
![]() | (18) |
and
respectively denote gray level values of two different pixels in the image itself or between two different images, cov(x, y) indicates the covariance, D(x), D(y) represents the variance, and E(x), E(y) denotes the mean.Table 3 gives the correlation coefficients of two adjacent pixels, in which we use the sample data that are randomly selected for 3000 pairs of two adjacent pixels from red, green, and blue components of color plain image and three color cipher images in the direction mixing horizontal, vertical, and diagonal direction simultaneously. Table 3 depicts the 3 correlation coefficient average values for three cipher images (i.e., item 5) are very small (they are close to ideal value 0.0) compared with those of color plain image (i.e., item 1 whose 3 correlation coefficient values are close to 1.0). Similar to Table 3, Tables 4 and 5 respectively show the correlation coefficients of the same position and adjacent position among red, green, and blue components of color plain image and color cipher images, in which the 3 correlation coefficient average values (i.e., item 5 for Tables 4 and 5) for three cipher images are much smaller (they also approach to ideal value 0.0) than those of color plain image (i.e., item 1 for Tables 4 and 5). Tables 3-5 display the nice encryption property on proposed method, in which it gives the near zero correlation between color plain image and color cipher image. Tables 4-5 depict the proposed method can effectively reduce the correlations among red, green, blue components of color cipher image. Table 6 shows the correlation coefficients of all pixels of three components between color plain image and decrypted images, in which the three correlation coefficient values of three components between plain image and successful decrypted image are 1.0 (i.e., item 1) denoting the successful decrypted image (Fig. 8(a)) is all the same as the original color image (Fig. 4(a)). The result represents that the successful decrypted image possesses the property of no distortion. Conversely, in the item 5 of Table 6, the three correlation coefficient average values of three components between plain image and failed decrypted images are much smaller (they are near to ideal value 0.0), which denotes the failed decrypted image and original color image are almost uncorrelated, and it also shows the nice cryptographic characteristic in ciphers.
|
|
|
|