Advertisement

A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation

  • Lin YouEmail author
  • Ersong Yang
  • Guangyi Wang
Methodologies and Application
  • 12 Downloads

Abstract

Since chaotic maps have the excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, they are quite suitable for generating chaotic sequences for securing communication systems and are also especially useful for securing images, and a lot of chaotic map-based image encryption algorithms have been proposed. But some existing image encryption algorithms were proved that their security, encryption efficiency or computational speeds are not quite satisfactory for practical applications. Some of them using only one type of chaotic system may suffer from low key space, and some others using two or more types of chaotic system may suffer from high computational overheads. In this paper, based on the classic 1D logistic map, a 2D one-coupling logistic dynamics system and OpenCL, a novel parallel image encryption algorithm HCMO is proposed. Our algorithm consists of a confusion phase and a diffusion phase using four sub-key matrices based on the hybrid logistic dynamics systems, the linear transformation and the enlarging operation. In the confusion phase, the image’s pixel positions are first scrambled by performing row-wise and column-wise permutation operations using two sub-key matrices; then, in its diffusion phase, both the bit XOR operation and the bit cyclic shifting are applied onto the scrambled intermediate image matrix using the other two sub-key matrices. In order to reduce the whole encrypting execution time, we speed up our HCMO on an OpenCL’s heterogeneous and parallel characteristics. Compared to the implementation of Vihari’s algorithm and some other chaotic map-based algorithms referred in this paper with the OpenCL-based implementation on the CPU and on the GPU, respectively, our algorithm’s simulation demonstrates remarkable improvement in the operational speedup, and the experimental result analyses have also shown that HCMO has a higher-level security than some other referred algorithms.

Keywords

Hybrid chaotic maps Image encryption Parallel computing OpenCL GPU 

Notes

Acknowledgements

The authors wish to thank the anonymous reviewers for their insightful comments and suggestions which help improve this paper. This work is partially supported by the Key Program of the Nature Science Foundation of Zhejiang province of China (No. LZ17F020002) and the National Science Foundation of China (No. 61772166).

Compliance with ethical standards

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

References

  1. Askar S, Karawia A, Alshamrani A (2015) Image encryption algorithm based on chaotic economic model. Math Probl Eng 2015:1–10zbMATHGoogle Scholar
  2. Bhogal RS, Li BH, Gale A, Chen Y (2018) Medical image encryption using chaotic map improved advanced encryption standard. I. J Inf Technol Comput Sci 8:1–10Google Scholar
  3. Chen M, Ping XJ (2006) Image steganography based on Arnold transform. Appl Res Comput 1:235–238Google Scholar
  4. Eklund A, Dufort P, Forsberg D, LaConte SM (2013) Medical image processing on the GPU—past, present and future. Med Image Anal 17(8):1073–1094CrossRefGoogle Scholar
  5. Farajallah M, Assad SE, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. Int J Bifurc Chaos 26(2):1–21zbMATHCrossRefGoogle Scholar
  6. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259–1284MathSciNetzbMATHCrossRefGoogle Scholar
  7. Fu C, Meng WH, Zhan YF, Zhu ZL et al (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010CrossRefGoogle Scholar
  8. Gupta R, Pachauri R, Singh AK (2018) An effective approach of secured medical image transmission using encryption method. Mol Cell Biomech 15(2):63–83Google Scholar
  9. Hanis S, Amutha R (2019) A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure. Nonlinear Dyn 95:4210–432CrossRefGoogle Scholar
  10. Hu JK, Han FL (2009) A pixel-based scrambling scheme for digital medical images protection. J Netw Comput Appl 32(4):788–794CrossRefGoogle Scholar
  11. Lee J, Yi FL, Saifullah R, Moon I (2014) Graphics processing unit-accelerated double random phase encoding for fast image encryption. Opt Eng 53(11):139–152Google Scholar
  12. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos Solitons Fractals 26(1):117–129zbMATHCrossRefGoogle Scholar
  13. Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed Tools Appl 77:31177–31198CrossRefGoogle Scholar
  14. Munshi A, Gaster B, Mattson TG, Fung J, Ginsburg D (2011) OpenCL programming guide. Pearson Education, BostonGoogle Scholar
  15. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934CrossRefGoogle Scholar
  16. Pareek NK, Patidar V, Sud KK (2013) Diffusion-substitution based gray image encryption scheme. Digit Signal Process 23(8):894–901MathSciNetCrossRefGoogle Scholar
  17. Patidar V, Pareek NK, Sud KK (2009) A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075CrossRefGoogle Scholar
  18. Qiu DY (2011) GPGPU programming techniques—from GLSL, CUDA to OpenCL. Mechanical Industry Press, BeijingGoogle Scholar
  19. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769CrossRefGoogle Scholar
  20. Rodrguez-Vzquez J, Romero-Snchez S, Crdenas-Montes M (2012) Speeding up a chaos-based image encryption algorithm using GPGPU. In: Eurocast 2011. LNCS 6927, pp 592–599Google Scholar
  21. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MathSciNetzbMATHCrossRefGoogle Scholar
  22. Vihari P, Manoj M (2012) Chaotic image encryption on GPU. In: Proceedings of the CUBE international information technology conference, New York, pp 753–758Google Scholar
  23. Wang Y, Wong KW, Liao XF, Xiang T (2009) A block cipher with dynamic S-boxes based on tent map. Commun Nonlinear Sci Numer Simul 14(7):3089–3099MathSciNetzbMATHCrossRefGoogle Scholar
  24. Wong KW, Bernie SK, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652zbMATHCrossRefGoogle Scholar
  25. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):1–15CrossRefGoogle Scholar
  26. Xiang DS, Xiong YS (2005) Digital image scrambling based on Josephus traversing. Comput Eng Appl 10:44–46Google Scholar
  27. Ye GD (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354CrossRefGoogle Scholar
  28. You L, Yang L, Yu WK, Wu ZD (2017) A cancelable fuzzy vault algorithm based on transformed fingerprint features. Chin J Electron 26(2):236–243CrossRefGoogle Scholar
  29. Zhang W, Wong KW, Yu H, Zhu Z (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18(8):2066–2080MathSciNetzbMATHCrossRefGoogle Scholar
  30. Zhao JF, Wang S, Chang YX, Li XF (2015) A novel image encryption scheme based on an improper fractional-order chaotic system. Nonlinear Dyn 80(4):1721–1729MathSciNetCrossRefGoogle Scholar
  31. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Authors and Affiliations

  1. 1.School of CybersecurityHangzhou Dianzi UniversityHangzhouChina
  2. 2.School of Communication EngineeringHangzhou Dianzi UniversityHangzhouChina
  3. 3.School of Electronic InformationHangzhou Dianzi UniversityHangzhouChina

Personalised recommendations