An 8-bit precision cipher for fast image encryption

Implementing chaos based ciphers usually involves 32-bit floating-point arithmetics that is hardware resources costly. The limitation of the computational precision is hardware imposed and transforms chaotic orbits into limit cycles with short periods, hence alters their randomness. In cryptographic applications, short period dynamics and weak randomness result in security issues. In order to address this concern, we propose an 8-bit precision cipher that can be implemented with low-end microprocessors running 8-bit integer arithmetics. The cipher includes a quantized pseudo-random number generator (QPRNG) based on a 16-dimensional quantized Arnold’s cat map (QACM). We used entropy measure, statistical, sensitivity and key space analyses to evaluate its security level under limited computational precision. Simulation results attest that it is as highly secure as those involving real-number arithmetics, even for only 8-bit precision. We also showed that the period of the proposed QACM can be chosen such that Tx > 1027, which is very large as compared to existing QACM. Such a large period implies a high randomness of the derived QPRNG that is confirmed by statistical NIST tests. Contrary to existing ciphers that include other chaotic systems than the QACM for strengthening the security level, ours is exclusively based on the QACM and is fast, despite the included high-dimensional QACM.

random numbers are derived from chaotic systems due to their ergodicity and sensitivity to initial conditions [16,30]. These chaotic systems usually involve real-number arithmetic, while data to be encrypted usually are integer encoded characters (image pixels, text characters. . .). Moreover, in some special cases, the target hardware implementing the chaotic system is precision limited [7,20]. Although there is no need for converting realnumbers into integers in some chaos based ciphers to generated permutation keys [15,16], the generation of the diffusion keys inevitably imposes the chaotic numbers to fit the phase space and the precision of the plaintext. For ASCII symbols for example, the values used for the diffusion operation need to be 8-bit encoded for the ciphertext to remain an ASCII symbol. In the case of a gray-level image, the diffusion values should be 8-bit encoded for the encrypted image to preserve its initial format.
The orbits generated from a chaotic system using finite precision are no longer chaotic, but limit cycles with a finite period length [2,4,5,13,14,20,27,34]. Thus, the randomness of the discrete chaotic sequence is altered by the limited computational precision [12,19,20,28], which seriously affects the security level of the cipher. Some investigations have been made to evaluate the impact of the data precision on the randomness of some wellknown chaotic systems [32]. Indeed, using finite computational precision transforms chaotic sequences into periodic orbits with short period lengths, which does not meet requirements of cryptography. It is well known that longer periods and flat period distribution allow to overcome the limited range in the number representation of digital systems, which is very important in constructing high quality PRNGs [39]. Therefore, most of the algorithms proposed in the literature have been implemented under more than 8-bit precision condition. Wafaa et al. in [37] presented a fixed-point hardware realization of the logistic map experiencing a trade-off between computational efficiency and accuracy. They showed that the minimum bus size for the pseudo-random number generator (PRNG) to pass all the NIST tests is 45. Nagaraj et al. in [32] proposed a PRNG in which the average period length is increased by switching between robust chaotic maps. There are several works in the literature that have been carried out in order to increase the period of digital chaotic systems realized under limited precision conditions. Chunlei et al. recently investigated the effects of limited computational precision on discrete chaotic sequences [14]. They proposed a new PRNG that exhibits random sequences with period lengths longer than those of the logistic and tent maps under the same precision, but they didn't give an estimate of this period. As it is the case for many digital PRNG, the period of the exhibited orbits is usually much smaller than the number of non-trivial points of the system.
Arnold's cat map (ACM) is known to be chaotic, area-preserving, ergodic and mixing, and invertible [9,23,28]. It has a unique hyperbolic fixed point and the linear transformation defining it is hyperbolic. Its quantized version also forms short limit cycles whose lengths do not exceed 3m, m being the modulo value. In the case of n-bit precision (m = 2 n ) which is convenient for digital applications, the period of the quantized Arnold cat map (QACM) is only equal to 3 · 2 n−2 , n ≥ 2, which is effectively smaller than 3m. Therefore, for the security level of ciphers including the QACM to be enhanced, its period needs to be increased [3,13,39]. The other properties of this interesting map can be found in the literature [3,9,13,23,28]. The ACM is used in cryptography, in digital tattoo applications, in watermarking and for random number generation to cite a few [9,10,29]. The QACM is particularly used for image scrambling due to its periodic nature [8]. In such a case, it is combined with another chaotic map to increase the security level of the cipher [6,31,31], which involves floating-point arithmethics. The QACM has been also used for the implementation of public key ciphers [24], but the latter are not secure when dealing with QACM with weak periods [26]. When the QACM is not combined with another chaotic map, to overcome the security issue caused by its weak period, most ciphers are based on its continuous phase space version that corresponds to m = 1 and which also involves floatingpoint arithmetics [18,41]. As floating-point arithmetics is hardware resource costly, another alternative is to increase the dimensionality of the QACM, as high dimensional maps provide more complicated dynamics than lower ones for some appropriate parameter setting. In addition, highly complex dynamics enhance the confusion and diffusion properties in cryptographic applications [38]. In [39], Ta et al. proposed an approach to extend the dimension of the basic 2-dimensional (2D) QACM by using the fast pseudo-Hadamard transform. The resulted Cat-Hadamard map presents a period that is not so large for enhancing diffusion and confusion properties in cryptographic applications.
In this paper, we propose an 8-bit precision cipher that can be implemented with lowend microprocessors running 8-bit integer arithmetics. The cipher includes exclusively a quantized pseudo-random number generator (QPRNG) based on a 16-dimensional (16D) QACM that exhibits a large period. In order to considerably increase both the period and the complexity of the proposed QPRNG, we suggest to switch between different 2D QACM by defining coupling methods that allow to easily extend the dimension of the system as the number of switches increases. As the period of the set of switches is the least common multiple (LCM) of the periods of the individual switches, the switching instants are chosen as distinct prime numbers for the period of the switches set to be the product of all the individual periods. For the QPRNG to include both initial conditions and control parameters, we suggest to control an 8D time switching based QACM by another 8D time switching based QACM with amplitude-controlled switching instants. Thus, the first 8D QACM is time-controlled using prime numbers, while the second one is space-controlled. We verify that the period and the complexity of the proposed PRNG is strongly related to the number of 2D QACM and switches under interplay. Considering the large period and the complexity of the resulting QPRNG, the proposed 8-bit precision cipher involves exclusively integer arithmetics, and combines the confusion and diffusion operations in a single loop.
The rest of the paper is organized as follows: Section 2 is devoted to the generation of random integers, Section 3 presents the new cipher, Section 4 is devoted to the performance analysis of the proposed cipher, while Section 5 summarizes the paper.

Generation of random integers
Our purpose is to design a PRNG exhibiting as much as possible complex dynamics for multimedia encryption. In practice, chaotic systems are complex as their dynamics is nearby brownian. The particularity of the system we are going to propose is that it generates integers, instead of real numbers as it is the case for many chaotic systems.

System modeling
We consider the basic model of the QACM, which is known to be chaotic and reversible. It is also known to be periodic, according to its finite state space, and that its period depends on the initial conditions [3,11]. The basic 2D QACM is modeled by where m ∈ N >1 , x i ∈ N, i = 1, 2, and t ∈ N. While taking m = 2 p , p ∈ N, the minimal period of the corresponding QACM is with (1) = (2) = 3, while its upper bound is 3m [3,9,13]. For relatively small values of m, such a short period needs to be increased to improve the performance of QACM based ciphers [17]. Working in this direction, we propose to couple four two-dimensional (2D) QACM to obtain an 8D QACM. The proposed 8D QACM is supposed to provide a large key space for data encryption . We assume that variables x 1 and x 2 in (1) describe respectively the momentum and the position of a particle. For extending this assumption to the 8D system, let us assume that x i , 1 ≤ i ≤ 4, are the momenta of four particles and x i , 5 ≤ i ≤ 8 the corresponding positions. Then the behavior of the first particle (or first QACM) is described by (x 1 , x 5 ), the second one by (x 2 , x 6 ), the third particle by (x 3 , x 7 ) and the fourth one by (x 4 , x 8 ).
The state of the system is described by T is the transpose of (·). In order to increase the basic period of the 8D QACM, one can switch between different configurations, i.e., systems with different initial conditions. Such a switching process can be seen as shock occurrences between particles. We assume that there are two shock occurrences that can suddenly change the behavior of each variable x i (four shocks per particle) and that these shocks periodically occur in time. Therefore, there are 16 shock occurrences or shock instants d i that influence the behavior of the whole system. The corresponding shock instants vector is noted as d = (d 1 , d 2 , · · · , d 16 ) T . We can also consider more than four shocks per particle without modifying the dimension of the phase space of the system: the dimension of the shock space is independently chosen of that of the system state space. Now considering a linear coupling between particles for describing interactions and including shocks between particles, we define the following general coupling term: where 1 ≤ i = j = k = l ≤ 8, a i = δ (t mod d i ), τ j = 0 (resp. τ k = 0, τ l = 0) if i < j, (resp. i < k, i < l), and τ j = 1 (resp. τ k = 1, τ l = 1) if i > j (resp. i > k, i > l). δ(t) is the Dirac function and the coefficients a i (t) are defined such that There are many coupling possibilities and we set the following (5) which can be put into matrix form as where the matrix A(t) is defined as with The matrix of the system at iteration t is equal to the product of the first t matrices of occurring shocks. As each coefficient a k , 1 ≤ k ≤ 16, can either be 0 or 1, the maximum number of distinct matrices is N A = 2 16 . The distribution of the matrices is periodic and its period T A is equal to the least common multiple (LCM) of {d k } k=1,2,..., 16 . While setting d k as distinct prime numbers, T A takes its maximum value, that is The behavior of the whole system is thus the modulation of the behaviors of the individual 2D QACM. Therefore, the period T x of the system is then This period depends on the choice of d k once p has been fixed. We choose d = Although the QACM period (p) is multiplied by the T A factor in the proposed system, the orbit length still depends on the initial conditions, and it could be too small for some initial condition values. For the system to be used as a pseudo-random number generator, it is better to get full length orbits. Such a requirement is satisfied by considering an external force temporarily acting on the system as where for example. By this approach, the system does no longer present a steady state within the interval [0, 2 p − 1], and the number of non-trivial points that an orbit may contain is N p = 2 8p . For p = 2 and x(0) = (0, 0, 0, 0, 2, 0, 0, 2) T for example, the orbit lengths are respectively 252 for the unforced system and 65536 for the forced one, which clearly corresponds to N p = 2 16 . Forcing the system thus considerably increases the orbit length, hence acts as a pseudo-random number generator. Figure 1 shows the corresponding first return maps of the system state x = 2 7p One can observe that the unforced system presents a fractal aspect while the forced one is behaving like brownian motion.

Key space extension: inclusion of control parameters
The period of the system typically depends on the number of particles and the choice of the shock instants. The shock instants, while chosen as prime numbers, need to be all distinct, otherwise the period factor does no longer follow the rule in (8). Indeed, a redundant shock instant appears only once in the computation of T A as it corresponds to the LCM of {d k }, which contributes to reduce the predicted period. In order to extend the key space, we modify the architecture of the system by considering amplitude-dependent shock instants, that could be used as control parameters for the generation of random numbers. Therefore, we adopt a piece-wise coupling principle interacting two distinct systems, the controlling system with time-dependent shock instants and the controlled one with phase space-related shock instants. Indeed, particular phase space values of the controlling system are used as shock instants for another system of the same type (controlled system). We agree that the Similarly to the time-controlled system, we define {s k } k=1,2,..., 16 the set of control parameters or shock amplitudes. The dynamics of the amplitude-controlled system thus depends on the values of control parameters s k . The general coupling term of such a system can thus be written as where i = j = k = l, τ j = 0 (resp. τ k = 0, τ l = 0) if i < j, (resp. i < k, i < l), and τ j = 1 (resp. τ k = 1, τ l = 1) if i > j (resp. i > k, i > l). The coefficients b i are defined as and b i+8 (t) = 1, if x i < s i+8 ; 0, otherwise, .
For the system to exhibit full range orbits, we also consider a forcing term u y . The corresponding amplitude-controlled system can thus be put into the following form The elements of the matrix B(t) are similar to those of matrix A(t), except that the coefficients a i are replaced by b i . The main advantage of this approach is that the two systems can be run in parallel, which can easily allow to speed up the generation of random numbers. Moreover, the precision of the two systems are completely independent, which also means that the amplitude-controlled system can be seen as a converter of the time-controlled system. Indeed, in the case the phase space of the time-controlled system is continuous, that of the amplitude-controlled one can be seen as its digitized version: it acts like an analogueto-digital converter. In the case p > 1 and q > 1, the complete system is a 16-dimensional time varying QACM, and can be written as where r = (p, q) T , p being the precision of the controlling system and q that of the controlled system. This system thus contains 48 key parameters, namely 16 initial conditions and 16 control parameters, 8 forcing parameters for the forcing system, and 8 other forcing parameters for the controlled system. Such a key length is large enough for designing secure ciphers. As the controlling system is periodic, the controlled system also is periodic, knowing that it is quantized.

Evaluation of the randomness of the system
The NIST-800-22 test suite is useful for evaluating statistical properties and conclude on the randomness of our system. Such an evaluation is required for the system to be used as PRNG for data encryption. Therefore, we applied the NIST test to our time varying QACM for various initial conditions, control parameters and precisions r. For simplification purposes, we set s i = 2 p 3 and s i+8 = 2 2 p 3 , 1 ≤ i ≤ 8, u x , u y as in (11). Table 1 shows the results obtained with 21 different initial conditions (x = 0 to x = 20, and The sequence length is set as N = 10 6 for each initial condition. The results are presented for p = 8 and various values of q. It then appears that the controlling system passes all the We recall that in our case, a given test is successful as the corresponding P-value is greater than 0.01. The other tests that are not successful fail for some initial values, but not for all. Such results were observed only for q = 1. For the rest of the paper, we are going to consider both systems (controlling and controlled) in the proposed cipher, with p = q = 8.

Proposed encryption algorithm
The algorithm we are proposing includes the QACM above presented as PRNG. It combines the confusion and diffusion steps in a single loop. Both permutation and diffusion keys are image dependent, which contribute to reinforce the security level of the cipher. We implemented it for color images for a more general use. The Algorithmic steps of the proposed cipher are given below in Algorithm 1.

Generating permutation and diffusion keys
The permutation and diffusion keys are directly derived from the QACM using the external key. In this paper, we used a 256-bit key S, hence a set of 32 ASCII symbols S = S 1 S 2 . . . S 32 to derive initial conditions and control parameters. The corresponding decimal values are set as K = (K 1 , K 2 , . . . K 32 ). There are sixteen initial conditions to be derived from the external key. For the time-controlled sub-system, these initial conditions are determined as while those of the amplitude-controlled sub-system are determined as where 1 ≤ i ≤ 8. K k is the decimal value of the k-th ASCII symbol S k of the external key.
Similarly to the initial conditions, the control parameters also are set from the external key. For this purpose, we first sort into ascending order values K 17 to K 32 and obtain a sorted vector Q of sixteen values ranged from 0 to 255. Thereafter, the control parameters are set as The above initial conditions and control parameters are then included in the QACM to generate the permutation and diffusion keys. For this purpose, we remove the first t = 100 iterates for transient die out and consider the following N ones to form N -length random sequences. Sequence X = (x 1 (t + 1), x 1 (t + 2), . . . , x 1 (t + N)) T is sorted into ascending order and the corresponding time index sequence is considered as our initial permutation key I x . Similarly, sequence Y = (y 1 (t + 1), y 1 (t + 2), . . . , y 1 (t + N)) T is used as the initial diffusion key. The generation of the permutation and diffusion keys includes steps 2 to 4 of our algorithm, and combines only integer operations. The confusion and diffusion processes are respectively realized by applying the permutation key to the plaintext sequence U as and XOR-ing the diffusion key with the shuffled sequence U s as U c is a one-round encrypted sub-image and ⊕ is the bitwise XOR operation. Once a subimage has been confused and diffused, the permutation and diffusion keys need to be updated before encrypting the following sub-image.

Updating permutation and diffusion keys
From a sub-image to another one are used different permutation and diffusion keys. However, all of them are related and the process to move from the previous key to the new one is called updating. For the updating of the permutation key, eight random integers are generated; in the previous sequence X , the first eight values are discarded, then the sequence is eight steps left shifted while the eight newly generated integers are placed at the end of the sequence. Indeed, let X = (X (1), X (2), . . . , X (N )) T be the previous sequence, then the updated sequence is X = X (9), X (10), . . . , X (N ), x 1 (1), x 2 (1), . . . , x 8 (1) T , where x i (1), 1 ≤ i ≤ 8 are the newly generated integers. Note that only one iteration of the PRNG is necessary for generating the 8 integers. The updated sequence X is thereafter sorted into ascending order and the corresponding time index sequence is considered as the updated permutation key.
For the generation of the eight new random integers, updated initial conditions also are required. These initial conditions are image dependent. We set the first fifteen updated initial conditions as The last initial condition completely depends on the image and is set as According to this updating process, the initial conditions change with the sub-image. The diffusion key also needs to be updated for the cipher to be secure. Thus, we consider the previous diffusion key D y and set Y = D y ; then update eight values in Y as it was the case for X . The updated sequence is then Y = (Y (9), Y (10), . . . , Y (N ), y 1 (1), y 2 (1), . . . , y 8 (1)) T , and the updated diffusion key is obtained as where I x is the updated permutation key.

Results and security analysis
The performance of the algorithm is evaluated with RGB test images of size 512 × 512 and 256 gray levels to show the color image encryption ability of the algorithm. We also consider as sub-image length N = 2 n , n ∈ {4, 5, 6, 7, 8, 9, 10}. The encryption scheme should resist all kinds of known attacks: known-plaintext, ciphertext-only, statistical, differential and brute-force attacks. We present in this section some security analysis results for the proposed cipher, including: key-space analysis, statistical analysis, differential analysis, number of pixel change rate (NP CR) and unified average changing intensity (UACI ) for one pixel difference in the plain-text image. The 256-bit external encryption key used for our simulation is set as S = azertyuiopqsdfgjazertyuiopqsdfg0.

Statistical analysis
The statistical analysis concerns the histogram, the correlation of adjacent pixels and the information entropy of the ciphered image. The statistical analysis of several 256 grayscale color images having different contents were evaluated and we present here the results obtained for the image of Lena (Fig. 7(a)). We evaluate the statistical parameters for different values of N . We first evaluate the entropy of image encryption using our algorithm. The entropy is determined as where 0 ≤ v i ≤ 255 are pixel values and p(v i ) the probability of v i . Figure 2  Similarly, the correlation of horizontally, vertically and diagonally adjacent pixels is evaluated. For this purpose, we used Pearson's correlation coefficient defined as where E(·) is the expectation value; μ and σ are mean value and standard deviation, respectively; A and B are images to be compared. Figure 3 shows the behavior of the correlation coefficients of horizontally adjacent pixels as a function of N for various values of R. This figure also shows that the correlation coefficients of adjacent pixels do not depend on N and R. The correlation coefficients of adjacent pixels in the plain-image are, respectively, ρ Red = 0.9798, ρ Green = 0.9691 and ρ Blue = 0.9327, while the corresponding values for one round ciphered image are ρ Red = −0.0045, ρ Green = 0.0008 and ρ Blue = −0.0004 with N = 16; and ρ Red = 0.0002, ρ Green = 0.0030 and ρ Blue = 0.0019 with N = 1024. Similar results were obtained with vertically and diagonally adjacent pixels. This result proves that the proposed cipher satisfies the zero co-correlation property that is necessary to resist statistical attacks even for N = 16 only. Figure 4 shows the histograms of one round ciphered image of Lena with N = 16. It appears that the histogram of each component of the ciphered image is fairly uniform and significantly different from that of the corresponding plain-image component. According to this result, deducing the secret key from the cipher-text during the known/chosen plaintext attacks is a hard task.

Differential attack
The sensitivity of the cipher to small changes in the plain-image (single pixel change) is required for the cipher to resist differential attacks. The metrics commonly used to evaluate the robustness against the differential attacks are the NP CR and UACI . The NP CR between two ciphered images A and B of size m × n is defined by: where Similarly, the UACI is defined as: The result in Fig. 5 shows that the cipher is sensitive to one pixel change for R > 1. Indeed, the cipher is secure as NP CR > 99.5810 and 33.3445 ≤ UACI ≤ 33.5826 (α = 0.01 significance level) for gray images of size 512 × 512 [21]. In the case R = 1, the maximal values of NPCR and UACI were obtained for N = 16. We found NP CR Red = 97.8458, NP CR Green = 97.8394 and NP CR Blue = 97.8325; and UACI Red = 32.8434, UACI Green = 32.8836 and UACI Blue = 32.8228, thus attesting that the cipher is not secure for R = 1. All these values are far less than the target values that are necessary for the cipher to be secure. When R > 1, the cipher becomes much more secure as observed in Fig. 5. The number of rounds that are necessary for the cipher to be secure increases with N . We observed that the minimal number of rounds required is R min = 2 for N = 2 4 and that the system is secure with R min = 3 for all the values of N chosen on simulation. The dependency of the security level on N and R is justified by the fact that during the first round, the impact of the single changed pixel value does not affect the overall image; We also evaluated the impact of the step size δ (used to perform a right circular shift) on the security level. Figure 6 shows the behavior of the NPCR and UACI of the red component of the image of Lena in terms of δ. We set N = 128 and R = 3 for this experiment. It appears that the NPCR approaches its reference value as δ → N .

The key space
We designed the cipher with a 256-bit key corresponding to 32 ASCII symbols, as such a key length is known to be sufficiently large for resisting all presently known kinds of bruteforce attacks. The key space is the number of effective combinations of 32 symbols that can be built from the set of ASCII symbols, i.e 2 256 while using the whole set of ASCII symbols. This key space can easily be extended to 2 384 (48 ASCII symbols) by also considering the forcing terms u x and u y as parameters of the 16D QACM. The key space can also be extended by increasing the dimension of the PRNG.

Sensitivity of the key
A high key sensitivity allows to prevent adaptive chosen-plaintext attacks and linear cryptanalysis. In order to evaluate the sensitivity of our cipher to the external key, we considered two slightly different keys S1 = azertyuiopqsdfghazertyuiopqsdfg0 and S2 = azertyuiopqsdfghazertyuiopqsdfg1 to encrypt the same image. Table 2 summarizes the sensitivity of the key of the proposed cipher, for various test images. Values of NP CR and UACI confirm the high sensitivity of the proposed scheme to one bit change in the external key.
In Fig. 7 is presented an example of ciphering/deciphering. The ciphered image is successfully deciphered when using the same key for both the encryption and decryption processes, whilst the decryption fails for a different key.

Speed performance analysis
The running speed of the algorithm is evaluated using Matlab 14b. The algorithm was not optimized and its performances were measured on a computer with Windows 10 operating system, Intel(R) Core(TM) i5-8250U CPU @ 1.60 GHz, and 8GB RAM. The average running time, for R = 3 and N = 1024, is about 146 ms for 512 × 512 gray-scale images. The corresponding average security parameters evaluated with 512 × 512 grayscale images of Lena, Baboon, Airplane, and Peppers are, respectively, NP CR = 99.6023, UACI = 33.4690 ρ h = −0.0003, ρ v = −0.0009 and ρ d = −0.0007, thus attesting that the algorithm is secure for the chosen parameter setting. ρ h , ρ v and ρ d are, respectively, the horizontal, vertical and diagonal correlation coefficients. Table 3 shows the average running time and security parameters for 3 ≤ R ≤ 8 and N = 1024.    that the proposed cipher and Ref. [16] are those presenting both a large NP CR and a UACI close to the ideal value. In the proposed cipher, all the permutation and diffusion keys used are N -length sequences, thus easy to implement, which is not the case for the cipher in Ref. [16]. The circular shift of the image is also performed by sequentially shifting N -length blocks, which allows all the shifting, permutation and diffusion operations to be combined in a single loop. This architecture also allows to reduce the memory space that is necessary for encrypting the entire image. Table 5 compares the running speed of the proposed algorithm with other chaos based ciphers. We used the gray-scale images of cameraman (256 × 256) and Lena (512 × 512) for this experiment. It appears that the running speed of the proposed algorithm can allow real-time data encryption.

Comparison with existing ciphers
From the overall comparison, it appears that the proposed cipher is faster compared to those in Ref. [1] and Ref. [40]. The one in Ref. [16] is 2.5 times faster than the proposed one, but it requires floating point arithmetics, which is more constraining than using 8-bit integer arithmetics. The proposed algorithm offers the advantage to combine only 8-bit integer operations, which is much better for its implementation with low-end microprocessors, without loss of security properties. The * symbol indicates references compared in the same environment. The average security parameters of the proposed cipher are obtained with R = 3, N = 1024 and S1 as encryption key The * symbol is used for algorithms compared in the same environment. The average running speeds of the proposed cipher are obtained with R = 3, N = 1024 and S1 as encryption key

Conclusion
We presented in this paper an 8-bit precision cipher involving exclusively integer arithmetics and that can be implemented with low-end microprocessors. Our cipher includes a PRNG that was obtained by coupling an 8D time varying with an 8D amplitude varying QACM to achieve a 16D system. Eight dimensional QACM themselves were obtained by considering a linear coupling between 2D QACM with shock occurrences to model interactions. Such a coupling method allowed us to considerably increase both the period and the complexity of the resulting system, thus achieving a minimal period T x > 10 27 , which is sufficiently large to predict the behavior of the QPRNG. Although it is a 16D system, the proposed PRNG runs fast as it combines only 8-bit integer operations. Its randomness was evaluated using the NIST suite tests. We particularly set the precision of the PRNG to 8 bits for the generated sequences of integers to be directly used for image encryption, without need of data conversion. We therefore evaluated the performance of the proposed cipher under 8-bit precision condition and verified that it runs fast and presents a high security level as compared to existing 32-bit precision chaos based ciphers. However, we need to consider a 16D QACM to achieve periods greater than 10 27 . Our intent in prospect is to reduce the dimensionality of the system while increasing its period. Such a reduction of the dimensionality will allow to gain computation time while reducing the hardware requirements. We also intend to develop a new confusion approach that does not imply the data sorting and which is much faster than the sorting process.