Abstract

A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. In the proposed method, an external secret key is used to derive the initial conditions for the logistic chaotic maps which are employed to generate weights and biases matrices of the multilayer perceptron (MLP). During the learning process with the backpropagation algorithm, ANN determines the weight matrix of the connections. The plain image is divided into four subimages which are used for the first diffusion stage. The subimages obtained previously are divided into the square subimage blocks. In the next stage, different initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the subimage blocks. Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate the key space of the proposed algorithm which is large enough to make brute force attacks infeasible. Computing validation using experimental data with several gray images has been carried out with detailed numerical analysis, in order to validate the high security of the proposed encryption scheme.

1. Introduction

Many applications like military images databases, confidential video, medical imaging systems, cable TV image, and online personal photograph album require reliable, fast, and robust security system to store and transmit digital images [1]. To secure transmitted information, cryptography techniques are needed. Cryptography is the science of protecting the privacy of information during communication, under hostile conditions. The digital images have certain characteristics such as redundancy of data, strong correlation among adjacent pixels, robustness against perturbations (i.e., a tiny change in the attribute of any pixel of the image does not drastically degrade the quality of the image), and bulk capacity of data [1]. Consequently, traditional encryptions methods like IDEA, AES, DES, and RSA have limitation in encrypting image such as low efficiency, bulky data, and high correlation among pixels [26]. To face these challenges, a wide variety of cryptographic protocols have been proposed in the literature [725]. In the last decade, chaos-based encryption techniques are considered suitable for practical applications since they have good combination of speed, high security, complexity, reasonable computational overheads, and computational power. Moreover, chaos-based and other dynamical systems based algorithms have many important properties such as the sensitive dependence on initial conditions and system parameters, pseudorandom properties, ergodicity, and nonperiodicity [3, 2628]. These properties meet some requirements such as a sensitivity to keys, diffusion, and mixing in the sense of cryptography. Therefore, chaotic dynamics are expected to provide a fast and easy way for building superior performance cryptosystems. But most of them have been cryptanalysed successfully due to finite computing precision used to represent the floating point output of chaotic system as it introduces cycles in the behavior of chaotic systems and hence becomes vulnerable to attacks [4, 23]. The development of artificial neural network (ANN) approach is widely used by soft computing techniques that have the capability to capture and model complex input/output relationships of any system. The advantages of ANN are the ability to generalize results obtained from known situations to unforeseen situations, the fast response time in operational phase, the high degree of structural parallelism, reliability, and efficiency [29]. A number of chaos- and ANN-based image encryption schemes have been developed in recent years [2933]. Pareek et al. in [1] have proposed a new image encryption scheme based on two chaotic logistic maps and external secret key of 80 bits to encrypt the colour image. In [34], a chaos-based image encryption algorithm with variable control parameters is introduced to improve the deficiency usually obtained by using fixed parameters in the permutation stage which is vulnerable to attacks. Mazloom and Eftekhari-Moghadam in [35] have proposed a novel chaos-based cryptosystem for color image encryption operating as a symmetric stream-cipher where the objective is to design a new chaotic algorithm which has the properties of nonlinearity and coupled structure. Patidar et al. in [36] have proposed a new substitution-diffusion approach based on chaotic standard and logistic maps, which is very fast and possesses most of the confusion and diffusion properties that any good cryptosystem should have. In [2], a modified substitution-diffusion image cipher using chaotic standard and logistic maps is proposed to improve some of the weakness obtained by Patidar et al. [36] in order to make it more robust against attacks. In [37], a new algorithm which utilizes the single logistic map against the four maps used by Nien et al. [38] is described. They used Hénon map and Lorentz map for pixel shuffling and measured correlation coefficient and key sensitivity for finding the best suited map for this algorithm. But only pixel location is changed to shuffle the whole image which is not sufficient to make the proposed algorithm robust against attacks [5, 27, 39]. In [40], a novel chaos-based bit-level permutation scheme for digital image encryption is proposed. In that work, the scheme introduced a significant diffusion effect in permutation procedure through a two-stage bit-level shuffling algorithm by chaotic sequence sorting algorithm and Arnold cat map. Ye in [6] has presented a novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. In the permutation process, he used one generalized Arnold map to generate a chaotic orbit. To improve the diffusion effect, a two-way diffusion process is presented, where one generalized Arnold map and one generalized Bernoulli shift map are utilized to generate two pseudorandom gray value sequences. Wang and He in [28] have developed cryptanalysis on a novel image encryption method based on total shuffling scheme to enhance the security of the scheme based on a novel image encryption method proposed by Zhang and Liu [41]. Wang et al. in [42] introduced a new image encryption algorithm based on chaos theory. The proposed algorithm realizes fast encryption and decryption of both gray-scale image and true color image by using the pseudorandom sequence generated by a group of chaotic maps. In [43], a bit-level image encryption algorithm based on spatiotemporal chaotic system which is self-adaptive is proposed. They used a bit-level encryption scheme to reduce the volume of data during encryption and decryption in order to reduce the execution time. They also used the adaptive encryption scheme to make the ciphered image dependent on the plain image to improve performance. In [44], an image encryption method based on total shuffling is presented to improve some of the deficiency obtained by Zhang and Liu [41]. Liu et al. in [45] have proposed optical color image encryption based on computer generated hologram and chaotic theory to reduce the amount of information and facilitate network transmission. Behnia et al. in [46] have presented a novel image encryption algorithm based on the Jacobian elliptic maps to overcome some fundamental drawbacks in the chaotic cryptosystems such as small key space and weak security [47]. Bhatnagar and Wu in [48] have presented an efficient yet simple selective encryption technique based on Saw-Tooth space filling curve, pixels of interest, nonlinear chaotic map, and singular value decomposition. The core idea of that proposed scheme is to scramble the pixel positions by the means of Saw-Tooth space filling curve followed by the selection of significant pixels using pixels of interest method. Then the diffusion selective encryption process is done on the significant pixels using a secret image key obtained from nonlinear chaotic map space filling curve and singular value decomposition. Recently, Pareek et al. in [4] have proposed an efficient encryption algorithm for gray image using a secret key of 128 bits without using chaos. In that algorithm, sixteen rounds are used in the encryption scheme. Likewise Wang et al. in [49] have proposed cryptanalysis of an image encryption algorithm using Chebyshev generator to overcome some drawbacks in chaotic cryptosystem that threat the security. Bahrami and Naderi in [50] have proposed a simple and lightweight stream encryption algorithm for image encryption. Wang and Luan in [3] have combined cellular automata (CA) with chaos to propose a new image encryption. In the confusion stage, they shuffle image on unit-level which is a smaller level than pixels by using chaotic maps. The reversible cellular automata have many advantages such as large evolution rule spaces. However, it is performed on higher half pixel bits several times in diffusion stage to substitute pixels. In [51], an improved method for fast encryption of images using chaos method is introduced. In [27] a rapid and efficient method for generating large permutation is proposed by introducing the combination operation on permutation. In that work, a large permutation has been generated by combining several small permutations in order to improve the work of Yoon and Kim [52]. Chen and Cai in [53] proposed a neural network-based authentication scheme, which can provide a dynamic and secure remote user authentication over a completely in-secure communication channel. In [32], a novel image authentication scheme based on hyperchaotic cell neural network (HCCNN) is proposed. Bigdeli et al. in [31] have presented a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green, and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where three well-known chaotic systems, that is, Chua, Lorenz, and Lü’s systems, participate in generating weights and biases matrices of this layer. In that work, a 160-bit-long authentication code is used to generate the initial conditions and the parameters of the CNL and PNL and provide satisfactory performance. In [33] an efficient neural chaotic generator for image encryption is proposed. In that work, neural network can act as an efficient source of perturbation in the chaotic generator which increases the cycle’s length and thus avoids the dynamical degradation due to the used finite dimensional space. On the other hand, the use of neural network enlarges the key space of the chaotic generator in an enormous way.

Most of the above image encryption schemes developed are more complicated and may be difficult to implement in real time. This is the main motivation of the proposed algorithm in this paper where a simple and efficient method for gray image encryption scheme based on chaos and multilayer perceptron (MLP) ANN techniques is investigated. The proposed algorithm satisfies the requirements of secure image encryption. Firstly, we use an external secret key on chaotic logistic map to initialize biases and weights matrices of the MLP. During the training process with the backpropagation algorithm, the MLP determines the weights matrix of connections which will be used for the first diffusion stage. Secondly, a chaotic sequence is generated from the chaotic logistic map to permutate the pixels positions on the subimage. Finally, we use the same chaotic logistic map with different parameters and different initial conditions to diffuse the subimage of the whole image. In the last two stages, the initial conditions of chaotic logistic maps are variable among subimages. The resulting cryptosystem algorithm possesses most of the diffusion and confusion properties. The computing results provide better performances compared to those obtained in [4, 51]. In addition, we use simple logistic map instead of complex ones proposed in [5, 32, 51, 54, 55]. Therefore the proposed algorithm is easily implementable and more suitable for image encryption applications.

The rest of the paper is organized as follows. Section 2 presents the proposed encryption algorithm. Section 3 describes the comparative results and security analysis of the proposed algorithm. Finally, in Section 4, some concluding remarks are reported.

2. Description of the Proposed Image Encryption Algorithm

In this section, we present the new step-by-step image encryption algorithm. In the proposed encryption scheme, the image is encrypted using chaos and ANN as shown in Figure 1. Image to be encrypted is firstly divided into four nonoverlapping subimages . Every subimage is divided into several nonoverlapping blocks. The size of the new block and the number of rounds are decided by an external secret key. The proposed encryption algorithm uses substitution and diffusion mechanisms. In the following section, the role of different steps used in the algorithm as well as complete details of encryption algorithm is discussed.

2.1. External Secret Key

The proposed image encryption algorithm utilizes an external secret key of thirty-two decimal numbers. Let “ABCDEFGHIJKLMNOPQRSTUVWZ” be an external key.(i)ABCDE refers to the parameter of the first chaotic logistic map.(ii)FGHIJ refers to the parameter of the second chaotic logistic map.(iii)KLM gives the initial condition of the input biases of MLP.(iv)NOP gives the initial condition of the input weight of MLP.(v)QRS gives the initial condition of the output biases of MLP.(vi)TUV gives the initial condition of the output weight of MLP.(vii)WZ is the total number of hidden layers in MLP.(viii) is used to determine the initial condition of the second chaotic logistic map.(ix) is the total round.(x) gives the initial condition of the first chaotic logistic map.(xi) determines the size of the squared nonoverlapping blocks.(xii) is used to determine the training step of MLP.

2.2. Generating Chaotic Number Using Chaotic Map

In the proposed algorithm, two chaotic logistic maps are used to achieve the goal of image encryption which are as follows: where , and the initial conditions , are produced by an external secret key. Therefore, is derived from sequence. Depending on the step, .

2.3. Artificial Neural Network Process

The aim of this part is to generate the matrix code from the plain image which would be used in the first step of diffusion operation. At the end of the training process, the ANN produces the biases and weights matrices code , which are used in the first diffusion step.

The type of neural network used in this paper is multilayer perceptron (MLP) trained with the well-known backpropagation algorithm. This structure is composed of one neuron in input layer, eight neurons in the hidden layer, and one node in output layer as as shown in Figure 2.

In Figure 2, is the vector of the input signal, is the output signal vector, , are the input/output weights, and , are the input/output biases.

The process of the forward propagation of the training algorithm is given as follows: where is a linear function defined by (7) and is the output of hidden layer defined by (8) where is a hyperbolic tangent function given by (9). This output pattern is then compared to the desired output, and an error signal is computed by (10).

The process of the backward propagation of the training algorithm is given as follows: Based on the error signal received, connection weights and biases are updated for each unit until convergence of the neural network using the following equations: with and the maximum iteration.

2.3.1. Process of Neural Network Training

The different steps of the algorithm are described as follows.

Step 1 (preprocessing stage). The image to be encrypted is divided into two sets. % of the original image is used for pattern training and the rest of the image (%) is used for patterns test. Since the pixel value is relatively high, each pattern is normalized. The process can be done using the function “mapminmax” of the MATLAB signal processing toolbox. This function processes original image by normalizing the minimum and maximum values of each row to .

Step 2 (initialization). One fundamental issue is how to adapt the weights of the MLP to achieve a given input/output map and choose reasonable network learning parameters (learning rate ). The initial values of network connection weights (, ) and biases (, ) are random numbers generated using chaotic logistic map as shown in (1) where the parameter and the initial condition for the first sequence are given by (3) and (5), respectively. The next initial condition is taken in the previous sequence. The parameters , , , , , , , and are provided by an external secret key as indicated in Section 2.1.
The learning rate is given by (13) and the total neurons of the hidden layer are denoted by where and are produced by an external secret key:

Step 3 (feedforward computation). The size of training set is . Each column of the training set , is presented to the network and each sample computes the actual output sample using   (6).

Step 4 (feedback computation). The output sample is used to compute the errors as shown in (10) and (11).

Step 5 (modification of the network connection). The weights and biases connection are updated using (12).

Step 6 (evaluation of the training accuracy). A root mean square error (RMSE) is used as a performance index to evaluate a training accuracy as follows: If , repeat Steps 36, where is a given accuracy threshold.

Step 7 (validation test). The actual outputs can be calculated using the weights and biases obtained in the training stage (Steps 26), and then the overall accuracy of the network can be measured by a testing RMSET given by where and represent the desired outputs and actual output of the set test and is the number of pattern tests.

Step 8 (posttreatment). At the end of the test process, the inverse transformation of  “mapminmax” function (see Step 1) is applied for the reconstruction of the original image and the ANN produces the biases and weights matrices code , which are used in the first diffusion step.

2.4. Masking with MLP Matrix Code

This step is the first step of substitution in the encryption process. Here, we used the matrix code given by ANN process to change the pixel value by utilizing logical XOR operation. The plain image is divided into four subimages . Every subimage is divided into several blocks of size . To change the value of the pixel, the corresponding code in the matrix code is selected and XORed with . For the next block, the code for logical XOR operation is the block resulting from the last XOR operation. The process is done on the whole subimage and we continue with the next step of encryption algorithm.

2.5. Permutation with Chaotic Code

The change of the pixel location is a second step of our encryption image algorithm. Equation (1) is used to generate the sequence of permutation. The technique used for pixel permutation is based on the ascending sorting of the chaotic sequence. The subencrypted image (obtained from Section 2.4) is divided into several squared nonoverlapping blocks. The size of each block is decided by a secret key. For the first subimage block, the initial condition of the chaotic logistic map is derived from the external key. For the other subimage blocks, is provided by the last sequence generated. In the permutation process, sort the element of the sequence generated in ascending order and compare the index between the original and sorted elements of the sequence generated and tabulate the index change. Apply this index change to the block considered to rearrange the location of each pixel within the same block.

2.6. Masking with Chaotic Code

In this step, we change the pixel value of the subencrypted block (obtained from Section 2.5). The chaotic sequence used to mask each pixel value in this part is generated from (2). The initial condition is derived from the last sequence obtained from (1), . As the numbers generated from (2) are not integer, the chaotic sequence is transformed into integer sequence as follows: The selected block is XORed with a block obtained from (17).

2.7. Pseudocode of the Proposed Encryption Algorithm

(1)Generate an external secret key.(2)Calculate , , and .(3)Generate the matrix code by an ANN training process.(4)Divide a plain image into four subimages.(5)Divide the matrix code into four submatrices .(6)Divide subimage into several blocks .(7)Take the first block and XOR it with .(8)The result obtained in Step 7 is now the code for a next block .(9)Repeat 7 and 8 on the whole subimage to obtain subencrypted image ’.(10)Divide ’ into several squared blocks .(11)Generate permutation sequence using (1). Permute the location of each pixel in as indicated in Section 2.5.(12)Generate masking sequence from (2) and XOR it with the block obtained from Step 11.(13)Repeat Steps 11 and 12 on the whole ’.(14)Repeat Steps round.(15)Repeat Steps on the whole image .

3. Computing Validation Using Experimental Data and Security Analysis

3.1. Computing Validation

Some computing results using experimental data are given in this section in order to demonstrate the efficiency of the proposed scheme. Several gray-scale images are evaluated. The duration of the training process in the case of Baboon image is one min (using Intel(R) core (TM) i3-2328M CPU 2.20 GHz, RAM 4Go). For the evaluation of encryption quality, the correlation coefficient (C.O) is used and is calculated as [1, 22] where and are gray-scale pixel values of the original and encrypted images and is the total number of pixels. We used the USC-SIPI image database which is a collection of digitized images available and maintained by the University of Southern California [1]. We used miscellaneous volume to measure the correlation coefficient of several USC-SIPI image databases (freely available at http://sipi.usc.edu/database/) [1]. The results are firstly compared with the encryption scheme presented by Fouda et al. [51], and an encrypted image scheme generated by the Pareek et al. [4] is applied secondly in the medical image. A striking example of the degree provided by the proposed cipher reveals patterns in the plain text as shown in Figure 3, where the plain images are encrypted by the secret key “23421100452972604309100881297041” (decimal). Computationally, it is clear that there is negligible correlation between the plain image and ciphered image, as shown in Tables 1 and 2 where the proposed scheme shows the smallest correlation coefficient (C.O). Thus, the proposed scheme provides better performances than those obtained by Fouda et al. (2014) [51] and Pareek et al. methods (2013) [4] (Table 1).

3.2. Security Analysis

A good encryption scheme should resist against all kinds of known attacks, such as known-plain-text attack, cipher text attack, statistical attack, and various brute force attacks [1, 4, 51]. Some security analyses on the proposed image encryption scheme, including the most important ones like key space analysis and statistical analysis, which demonstrated the satisfactory security of the proposed scheme, are described. Various images have been tested, and similar results are obtained. However, due to page limit, only the results for Lenna, Baboon, and medical images such as Taenia saginata and Toxocara canis (Figure 3) are used for illustration.

3.2.1. Key Space Analysis

A good image encryption algorithm should be sensitive to the cipher keys, and the key space should be large enough to make brute force attacks infeasible. For the proposed image encryption algorithm, key space analysis and testing have been performed and completely carried out and the results are summarized as follows.

(i) Key Space. The proposed image cipher has different combinations of secret keys.

(ii) Key Sensitivity Test. An ideal image encryption procedure should be sensitive with respect to the secret key; that is, the change of a single bit in the secret key should produce a completely different encrypted image. To test the sensitivity of the proposed image cipher with respect to the key, encrypted image corresponding to plain image is decrypted with a slightly different key compared to the original one. Further, we calculate correlation coefficient between the encrypted image and the image decrypted using a slightly different key. This procedure is described as follows. (a)The encrypted image (Figure 3(b)) is decrypted by making a slight modification in the original key “2342110045297260430910088” and the resultant encrypted image is shown in Figure 3(a). (b)The encrypted image (Figure 3(b)) is decrypted by making a slight modification in the original key “23421100452972604309100881297” and the resultant encrypted image is given in Figure 3(b). (c)The encrypted image (Figure 3(b)) is decrypted by making a slight modification in the original key “” and the resultant encrypted image is depicted in Figure 3(c). (d)The encrypted image (Figure 3(b)) is decrypted by making a slight modification in the original key “23421” and the resultant encrypted image is reported in Figure 3(d).

With a slight change in the key, one is unable to find any clue about the original image from the decrypted image. To compare the decrypted images, we have calculated the correlation coefficient. The results are given in Table 3. We conclude from this table that one cannot find any clue about the plain image even if there is a little change in the key. The correlation coefficient is negligible. Having the right pair of secret key is an important part while decrypting the image, as a slight change in the secret key will not retrieve the exact original image. The above example shows that the decryption of the encrypted image with the wrong secret key will not reveal any information about the original image. These results confirm the effectiveness of the proposed algorithm.

3.2.2. Statistical Analysis

Statistical analysis on the proposed image encryption algorithm shows superior confusion and diffusion properties which strongly resist statistical attacks. This can be shown by a test on the histograms of the enciphered images and on the correlations of adjacent pixels in the ciphered image [36] as described in the next paragraph.

Histograms of Encrypted Images. Statistical analysis of Lenna images and their encrypted images yielded their gray-scale histogram given in Figure 5. This figure shows that the histogram of the ciphered image is fairly uniform and is significantly different from that of the original image. Also, it demonstrates that the encryption algorithm has covered up all the characters of the plain image.

Correlation of Two Adjacent Pixels. To test the correlation between two adjacent pixels in plain image and ciphered image, the following procedure was carried out. First, randomly select all pairs of two adjacent (in horizontal, vertical, and diagonal directions) pixels from an image. Then, referring to [1], calculate the correlation coefficient of each pair by (18). The results for horizontal, vertical, and diagonal directions were obtained and are shown in Table 4. These correlation analyses prove that the proposed encryption technique satisfies zero cocorrelation property; thus its robustness against statistical attacks is proved.

3.2.3. Entropy Information Analysis

Information entropy, introduced by Pareek et al. [4], is a common criterion that shows the randomness of the data. The expression of entropy information is given by where is the number of gray levels in the image and shows the probability of appearance of the symbol . In the case of 256 gray-scale images, truly random image entropy is equal to eight [51], which is the ideal value. The entropy of a practical source generating random messages is smaller than the ideal one. However, the entropy of encrypted messages should be equal to eight; otherwise there exists a certain degree of predictability which threatens its security. Table 2 gives the entropy of images encrypted by the proposed scheme. It appears that the entropy of ciphered images is almost close to eight. We can conclude that the proposed encryption method is robust against entropy attack.

3.2.4. Differential Attacks

Another desirable property for the proposed cipher is its sensitivity to small changes in the plain image (single bit change in plain image). To test the influence of one-pixel change on the plain image encrypted by the proposed cipher, two common measures may be used, number of pixels change rate (NPCR) and unified average changing intensity (UACI) [22, 51], which are calculated. Therefore, if and are the pixels in row and column of the encrypted images and , with only one-pixel difference between the respective plain images, then the NPCR is calculated by using the following formula: where and are the width and height of or . is produced by the following way: The second number (UACI) measures the average intensity of differences between the plain image and the encrypted image calculated by the following formula: Computing values of NPCR and UACI for a few images are shown in Table 5. According to the values of the NPCR over 99.60% for all images, the encryption scheme is very sensitive with respect to small changes in the plain image. The UACI in all cases is found close to the ideal values of 33.33% indicating that the rate of influence due to one-pixel change is very large. Generally, these obtained results for NPCR and UACI obtained after only one round encryption show that the proposed algorithm is very sensitive with respect to plain image (plain images have only one-pixel difference).

4. Conclusion

In this paper, a robust gray image encryption scheme based on chaotic logistic map combined with artificial neural network has been proposed. In the proposed image encryption scheme, an external key of 128 bits, two chaotic logistic maps, and multilayer perceptron have been used to confuse the relationship between the cipher image and the plain image. The main feature of this algorithm is that it is easily implementable and hence more suitable for image encryption applications. Computing results using experimental data and security analysis have shown that our proposed scheme provides better performance than some recent results of literature.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.