Research Article
BibTex RIS Cite

Performance Analysis of Chaotic Neural Network and Chaotic Cat Map Based Image Encryption

Year 2022, , 37 - 47, 30.04.2022
https://doi.org/10.35377/saucis...1002582

Abstract

Nowadays, chaotic systems are used quite often, especially in image encryption applications. Hypersensitivity to the initial conditions, limited field-changing signs and irregular movements make these systems one of the critical elements in scientific matters such as cryptography. These systems are divided in two parts as discrete time and continuous time in terms of their dimensions and properties. Gray level image encryption applications generally use one-dimensional and color image encryption applications generally use multi-dimensional chaotic systems. In this study, Tent Map, Cat Map, Lorenz, Chua, Lu chaotic systems were used for chaotic neural network based image coding application and Logistic Map and 3D Cat Map chaotic systems were used for 3D chaotic Cat Map based image encryption application. The encrypted image and the original image were examined by various analysis methods. As a result of these analyzes, it was seen that both applications gave very successful results. Analyzes have shown that the chaotic neural network based image coding algorithm is more secure and successful.

References

  • [1] A.K. Prusty, A. Pattanaik, S. Mishra, “An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Arnold Cat Map & Henon Map”, International Conference on Advanced Computing and Communication Systems, 1-6, 2013.
  • [2] J. Li, Y.Xing, C.Qu, J. Zhang, “An Image Encryption Method Based on Tent and Lorenz Chaotic Systems”, Software Engineering and Service Science (ICSESS), 582-586, 2015.
  • [3] H. Liu, X. Wang, “Triple-image encryption scheme based on one-time key stream generated by chaos and plain images”, The Journal of Systems and Software, 86:826-834, 2013.
  • [4] Y. Wang , K.Wong, Liao, X., Xiang, T., Chen, G., “A chaos-based image encryption algorithm with variable control parameters”, Chaos, Solitons and Fractals, 41:1773-1783, 2009.
  • [5] K. Wong, B.S. Kwok, W.S. Law, “A fast image encryption scheme based on chaotic standard map”, Elsevier Physics Letter A, 372(15):2645-2652, 2008.
  • [6] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R.Tourki, “A Modified AES Based Algorithm for Image Encryption”, International Journal of Computer Science and Engineering, 1(1):70-75, 2007.
  • [7] D. Xiao, X. Liao, P. Wei, “Analysis and improvement of a chaos-based image encryption Algorithm”, Chaos, Solitons and Fractals, 40:2191–2199, 2009.
  • [8] L. Hongjun, W. Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”, Computers and Mathematics with Applications, 59:3320-3327, 2010.
  • [9] Ü. Çavuşoğlu, H. Al-Sanabani, “The Performance Comparison of Lightweight Encryption Algorithms”, Sakarya University Journal of Computer And Information Sciences, 2(3):158-169, December 2019.
  • [10] H. Demirci, N. Yurtay, “Effect of the Chaotic Crossover Operator on Breeding Swarms Algorithm”, Sakarya University Journal of Computer And Information Sciences, 4(1):120-130, April 2021.
  • [11] A.A. Süzen, B. Duman, “Blockchain-Based Secure Credit Card Storage System for E-Commerce”, Sakarya University Journal of Computer And Information Sciences, 4(2):204-215, August 2021.
  • [12] N. Bigdeli, Y. Farid Y, K. Afshar, “A novel image encryption/decryption scheme based on chaotic neural networks”, Engineering Applications of Artificial Intelligence 25:753–765, 2012.
  • [13] N. Masuda, K. Aihara, ”Cryptosystems With Discretized Chaotic Maps”, IEEE Transactions On Circuits And Systems: Fundamental Theory And Applications, 49(1):28-40, 2002.
  • [14] G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps”, Elsevier Chaos, Solitons and Fractals, (21):749–761, 2004.
  • [15] E.N. Lorenz, “Deterministic Nonperiodic Flow”, Journal of the Athmosferic Sciences, 20:130-141, 1963.
  • [16] O.A. González, G. Han, J.P. de Gyvez, and Edgar, “CMOS Cryptosystem Using a Lorenz Chaotic Oscillator”, Proceedings of the IEEE International Symposium on Circuits and Systems, ISCAS '99, 5:442-445, 1999.
  • [17] D. Li, Z. Yin, “Connecting the Lorenz and Chen systems via nonlinear control”, Commun. Nonlinear Sci. Numerical Simulation, 14(3):655–667, 2009.
  • [18] T. Botmart, P. Niamsup, “Adaptive control and synchronization of the perturbed Chua’s system”, Math. Comput. Simulation, 75(1–2):37–55, 2007.
  • [19] J. Lü, G. Chen, S. Zhang, “The compound structure of a new chaotic attractor” Chaos Solitons Fractals, 14(5):669–672, 2002.
  • [20] G. Chen, T. Ueta, “Yet another chaotic attractor”, Int J Bifurcat Chaos, 9(7):1465–6, 1999.
Year 2022, , 37 - 47, 30.04.2022
https://doi.org/10.35377/saucis...1002582

Abstract

References

  • [1] A.K. Prusty, A. Pattanaik, S. Mishra, “An Image Encryption & Decryption Approach Based on Pixel Shuffling Using Arnold Cat Map & Henon Map”, International Conference on Advanced Computing and Communication Systems, 1-6, 2013.
  • [2] J. Li, Y.Xing, C.Qu, J. Zhang, “An Image Encryption Method Based on Tent and Lorenz Chaotic Systems”, Software Engineering and Service Science (ICSESS), 582-586, 2015.
  • [3] H. Liu, X. Wang, “Triple-image encryption scheme based on one-time key stream generated by chaos and plain images”, The Journal of Systems and Software, 86:826-834, 2013.
  • [4] Y. Wang , K.Wong, Liao, X., Xiang, T., Chen, G., “A chaos-based image encryption algorithm with variable control parameters”, Chaos, Solitons and Fractals, 41:1773-1783, 2009.
  • [5] K. Wong, B.S. Kwok, W.S. Law, “A fast image encryption scheme based on chaotic standard map”, Elsevier Physics Letter A, 372(15):2645-2652, 2008.
  • [6] M. Zeghid, M. Machhout, L. Khriji, A. Baganne, R.Tourki, “A Modified AES Based Algorithm for Image Encryption”, International Journal of Computer Science and Engineering, 1(1):70-75, 2007.
  • [7] D. Xiao, X. Liao, P. Wei, “Analysis and improvement of a chaos-based image encryption Algorithm”, Chaos, Solitons and Fractals, 40:2191–2199, 2009.
  • [8] L. Hongjun, W. Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”, Computers and Mathematics with Applications, 59:3320-3327, 2010.
  • [9] Ü. Çavuşoğlu, H. Al-Sanabani, “The Performance Comparison of Lightweight Encryption Algorithms”, Sakarya University Journal of Computer And Information Sciences, 2(3):158-169, December 2019.
  • [10] H. Demirci, N. Yurtay, “Effect of the Chaotic Crossover Operator on Breeding Swarms Algorithm”, Sakarya University Journal of Computer And Information Sciences, 4(1):120-130, April 2021.
  • [11] A.A. Süzen, B. Duman, “Blockchain-Based Secure Credit Card Storage System for E-Commerce”, Sakarya University Journal of Computer And Information Sciences, 4(2):204-215, August 2021.
  • [12] N. Bigdeli, Y. Farid Y, K. Afshar, “A novel image encryption/decryption scheme based on chaotic neural networks”, Engineering Applications of Artificial Intelligence 25:753–765, 2012.
  • [13] N. Masuda, K. Aihara, ”Cryptosystems With Discretized Chaotic Maps”, IEEE Transactions On Circuits And Systems: Fundamental Theory And Applications, 49(1):28-40, 2002.
  • [14] G. Chen, Y. Mao, C.K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps”, Elsevier Chaos, Solitons and Fractals, (21):749–761, 2004.
  • [15] E.N. Lorenz, “Deterministic Nonperiodic Flow”, Journal of the Athmosferic Sciences, 20:130-141, 1963.
  • [16] O.A. González, G. Han, J.P. de Gyvez, and Edgar, “CMOS Cryptosystem Using a Lorenz Chaotic Oscillator”, Proceedings of the IEEE International Symposium on Circuits and Systems, ISCAS '99, 5:442-445, 1999.
  • [17] D. Li, Z. Yin, “Connecting the Lorenz and Chen systems via nonlinear control”, Commun. Nonlinear Sci. Numerical Simulation, 14(3):655–667, 2009.
  • [18] T. Botmart, P. Niamsup, “Adaptive control and synchronization of the perturbed Chua’s system”, Math. Comput. Simulation, 75(1–2):37–55, 2007.
  • [19] J. Lü, G. Chen, S. Zhang, “The compound structure of a new chaotic attractor” Chaos Solitons Fractals, 14(5):669–672, 2002.
  • [20] G. Chen, T. Ueta, “Yet another chaotic attractor”, Int J Bifurcat Chaos, 9(7):1465–6, 1999.
There are 20 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Articles
Authors

Sefa Tunçer 0000-0001-6672-3605

Cihan Karakuzu 0000-0003-0569-098X

Publication Date April 30, 2022
Submission Date September 30, 2021
Acceptance Date February 23, 2022
Published in Issue Year 2022

Cite

IEEE S. Tunçer and C. Karakuzu, “Performance Analysis of Chaotic Neural Network and Chaotic Cat Map Based Image Encryption”, SAUCIS, vol. 5, no. 1, pp. 37–47, 2022, doi: 10.35377/saucis...1002582.

29070    The papers in this journal are licensed under a Creative Commons Attribution-NonCommercial 4.0 International License