Have a personal or library account? Click to login

New Compression–Encryption Algorithm Using Chaos-Based Dynamic Session Key

Open Access
|Mar 2018

Figures & Tables

Figure 1

The proposed compression–encryption model.
The proposed compression–encryption model.

Figure 2

Symmetric Key Generation Algorithm.
Symmetric Key Generation Algorithm.

Figure 3

DWT decomposition 2D (a) one level (b) two levels.
DWT decomposition 2D (a) one level (b) two levels.

Figure 4

Formation of matrix B from the result of LL sub-band element scrambling using ACM method.
Formation of matrix B from the result of LL sub-band element scrambling using ACM method.

Figure 5

Formation of symmetric keys K1, K2, K3, and K4.
Formation of symmetric keys K1, K2, K3, and K4.

Figure 6

(a) Initial cipher block of size 5×5, (b) session key KG3 which is formed using the proposed algorithm.
(a) Initial cipher block of size 5×5, (b) session key KG3 which is formed using the proposed algorithm.

Figure 7

Example of key session KG4 which is randomly generated from the value of symmetric key K4 using the proposed algorithm.
Example of key session KG4 which is randomly generated from the value of symmetric key K4 using the proposed algorithm.

Figure 8

Detailed proposed image compression–encryption model on the sender side.
Detailed proposed image compression–encryption model on the sender side.

Figure 9

Illustration of quantization result in binary form The bits are then grouped into 8 bit sized blocks, which produces 71 179 1 (in decimal), as shown in Figure 10.
Illustration of quantization result in binary form The bits are then grouped into 8 bit sized blocks, which produces 71 179 1 (in decimal), as shown in Figure 10.

Figure 10

Illustrated by data coding results.
Illustrated by data coding results.

Figure 11

The process of resizing the encrypted LL, LH, HL, and HH sub-bands data from the column vector to a matrix of size m × n 4) Divide the matrix produced in Step 4 into b × k blocks to do the process of block permutation cipher using session key KG3. The goal is to randomize the element.
The process of resizing the encrypted LL, LH, HL, and HH sub-bands data from the column vector to a matrix of size m × n 4) Divide the matrix produced in Step 4 into b × k blocks to do the process of block permutation cipher using session key KG3. The goal is to randomize the element.

Figure 12

Detailed propoed image decryption–reconstruction model on the receiver side.
Detailed propoed image decryption–reconstruction model on the receiver side.

Figure 13

Symmetric key values of Lena images with different intensities. (a) Without using the proposed algorithm and (b) using the proposed algorithm.
Symmetric key values of Lena images with different intensities. (a) Without using the proposed algorithm and (b) using the proposed algorithm.

Figure 14

Symmetric keys generated in 30 experiments using Artichare, Pool, Lena, and Boat images.
Symmetric keys generated in 30 experiments using Artichare, Pool, Lena, and Boat images.

Figure 15

Result of visual analysis to cipher image.
Result of visual analysis to cipher image.

Figure 16

Average value of (a) NPCR, (b) UACI using the four testing images.
Average value of (a) NPCR, (b) UACI using the four testing images.

Figure 17

The average value of entropy from four testing images.
The average value of entropy from four testing images.

Figure 18

Average value of (a) PSNR, (b) compression ratio of the four testing images.
Average value of (a) PSNR, (b) compression ratio of the four testing images.

Result of Run-Test test to evaluate the randomness of the symmetric keys_

Test Image DataSymmetric KeyP-ValueConclusionTest Image DataSymmetric KeyP-ValueConclusion
ArtichareK10.930RandomLenaK10.168Random
K20.154Random K21.000Random
K30.930Random K30.670Random
K41.000Random K40.624Random
PoolK10.145RandomBoatK10.727Random
K21.000Random K20.593Random
K30.565Random K30.353Random
K40.234Random K40.098Random

Comparison of PSNR and CR values between images produced using the proposed and image produced by Hamdi et al_ (2017), and Kumar and Vaish (2017)_

PSNRCR
CitraSizeClassificationProposedRef (Hamdi et al., 2017)Ref (Kumar and Vaish, 2017)ProposedRef (Kumar and Vaish, 2017)
peppers512×512High contrast34.3206 32.690037.304730.0400
boat512×512High contrast34.3238 31.030037.304730.3200
baboon512×512Moderate contrast35.0083 24.800037.304731.7100
Lena512×512Moderate contrast35.7503 33.270037.304729.9500
barbara512×512Moderate contrast35.0709 26.260037.304731.3400
Average35.7752 29.610037.304730.6720
house512×512Moderate contrast37.686639.674
airplane256×256Bright image36.314738.013
Average37.000738.8435

Comparison of NPCR and UACI values between the proposed method and the method in Belazi et al_ (2017), Hamdi et al_ (2017), and Zhang and Tong (2017)_

NPCRUACI
CitraSizeClassificationProposedRef (Hamdi et al., 2017)Ref (Belazi et al., 2017)Ref (Zhang and Tong, 2017)ProposedRef (Hamdi et al., 2017)Ref (Belazi et al., 2017)Ref (Zhang and Tong, 2017)
peppers512×512High contrast99.739199.9676-99.610034.327033.3208-33.4700
Lena512×512Moderate contrast99.748299.9150-99.590034.765033.5107-33.4200
barbara512×512Moderate contrast99.760499.3656-99.570032.637433.4989-33.2900
Average99.749299.7494-99.590033.909833.4435-33.3933
Lena256×256Moderate contrast99.736099.881799.5895-34.725833.686033.4646-
house256×256Moderate contrast99.774298.994899.6353-35.547433.962233.4534-
airplane256×256Bright image99.783399.668099.5989-46.254833.270533.4396-
Average99.764599.514899.6079-38.842733.639633.4525-

Comparison of entropy value between our proposed model with Belazi et al_ (2017) and Zhang and Tong (2017)_

Entropy
CitraSizeClassificationProposedRef (Belazi et al., 2017)Ref (Zhang and Tong, 2017)
Airplane512×512Bright image7.99887.90247.9931
house512×512Moderate contrast7.99907.90277.9931
Lena512×512Moderate contrast7.99897.90307.9929
barbara512×512Moderate contrast7.99897.90257.9917
Average7.99897.902657.9927

The average of PSNR, UACI, entropy, CR, PSNR values and encryption and decryption process times using 30 different keys_

FileClassificationNPCRUACIEntropyCRPSNRTencryption (seconds)Tdecryption (seconds)
ArtichareBright image99.755459.92667.998837.250036.018612.836118.1816
PoolDark image99.754630.74417.998537.075736.462611.245514.7797
LenaModerate contrast image99.753534.77437.998937.304735.797814.864019.8693
BoatHigh contrast image99.754834.67317.998937.304734.323814.943019.8642
Language: English
Page range: 1 - 19
Published on: Mar 28, 2018
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2018 Emy Setyaningsih, Retantyo Wardoyo, Anny Kartika Sari, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.