Abstract

This paper presents a three-dimensional autonomous chaotic system with high fraction dimension. It is noted that the nonlinear characteristic of the improper fractional-order chaos is interesting. Based on the continuous chaos and the discrete wavelet function map, an image encryption algorithm is put forward. The key space is formed by the initial state variables, parameters, and orders of the system. Every pixel value is included in secret key, so as to improve antiattack capability of the algorithm. The obtained simulation results and extensive security analyses demonstrate the high level of security of the algorithm and show its robustness against various types of attacks.

1. Introduction

With rapid development of communications, network security of information has become increasingly important for many applications. While high redundancy for image and multimedia information is challenging traditional cryptography algorithms [1, 2], chaotic attractors have orbital pseudorandom properties, good unpredictability, highly sensitivity for initial conditions, topological transitivity features, and so on. These characters indicate that chaos-based cryptosystem is a research hotspot in multimedia security area [3]. In 1949, Shannon created confusion and diffusion in the world of cryptography [4]. To overcome high redundancies and strong correlations of digital images, chaos has been widely applied in traditional encryption algorithm [513]. Research proposed that one-dimensional chaotic system has low security [14, 15]. With higher dimension, chaotic attractor occupies more space and winding complexly. The most complex attractor has much more complex output signals so that encryption effect would be better, whereas three-dimensional autonomous chaotic systems with higher fractal dimension are rare [16].

Comparing with integer-order chaotic system, the fractional-order chaotic system is not only related to parameters of the system, but also closely linked with fractional orders of system. Improper fractional-order chaotic system, therefore, has strong nonlinear characters and complexity. In secret communication, it can enhance the density and security so as to enormously increase the difficulty of unmasking signals. The algorithm shows greater application value in communication field [17, 18].

The rest of this paper is organized as follows: Section 2 describes a novel complex attractor. In Section 3, the chaos-based encryption algorithm is proposed. The numerical experimental results of performance analysis are given in Section 4. Finally, Section 5 contains conclusion and perspectives.

2. Improper Fractional-Order Chaotic Flow

A new three-dimensional autonomous chaotic system with high fraction dimension is constructed, of which the governing fractional-order equation iswhere are state variables and are parameters. Three fractional orders are ; if , system (1) is a true fractional-order system, if , system (1) is an integer-order system, and if , system (1) is an improper fractional-order system. Based on stability theory and numerical analysis of fractional-order system, when and , the Lyapunov dimension is shown in Figure 1(a) with varying parameter in interval . Almost all of chaotic attractors are larger than 2.5. With increasing control parameters, reaches as high as 2.9336 at some special parameters. As shown in Figure 1(b), the Poincaré section of the maximally complex attractor has hierarchical structure composed of dense points. When , the improper fractional-order chaos presents interesting and complex dynamic behavior represented in Figure 2.

3. Image Encryption Algorithm

Algorithm process is shown in Figure 3.

Encryption Procedure. Image encryption algorithm mainly consists of two processes: confusion and diffusion.

Step 1 (pixel confusion). Suppose that the size of plaintext image is . Scanning the plaintext image line by line in order to obtain pixel matrix is as follows:In confusion procedure, the wavelet function map is taken as follows [21]:where is the number of iterations. For numerical simulations, we take the initial value of the discrete system (3) as , parameter , and . The chaotic characteristics of wavelet function map are shown in Figure 4(a), and its interesting bifurcation diagram varying with is displayed in Figure 4(b).
To improve the sensitivity of original image to encryption image, secret keys are distracted by plain image. In confusion procedure, is initial vector of wavelet function map. Sequence is rearranged by wavelet function map so as to engender position matrix . Then is used to confuse position of image pixels and get matrix . Finally matrix is transformed into permutation image of size .

Step 2 (pixel diffusion). Confusion only changes the position of pixel point while the pixel value is fixed, so the attacker may break down the algorithm though the statistics.

In diffusion, is used to disturb parameter of system (1). Then the chaos generates chaotic sequences and makes times preiteration to eliminate some harmful effect of chaos transient process. Matrix is created and initialized as an empty sequence. State vector is generated in every iteration and a parameter is derived. Then, matrix is assigned according to parameter . When , when , and when .

In every interaction, sequence has strong randomness after times iteration. Then is preprocessed in the following form:where , is absolution of , and expresses downrounding. The positive integer . The autocorrelation of sequence focuses on the interval and is shown in Figure 5(a), whereas the autocorrelation of sequence after the pretreatment focuses on a smaller interval processed in Figure 5(b).

During diffusion, first pixel of permutation image is encrypted as follows:However, for pixel at position , pixel substitution is made according toThen sequence is conversed into matrix with size of .

Decryption is inverse operation of encryption process. Decryption image is scanned line by line to get sequence .

Then, inverse scrambling operation for matrix is made. Firstly, sequence is generated by wavelet function map to produce position matrix . Then is arranged by the same law so as to get position matrix . At last we use to confuse pixel position of image to get matrix and change matrix into two-dimension matrix to observe final decrypted image.

4. Numerical Simulation and Performance Analysis

The proposed encryption technique is implemented in MATLAB 7.1. In the experiment, different types of digital images are tested, such as gray image, binary image, and color image.

4.1. 3D Histogram Analysis

Histogram is a graphical representation of the pixels intensity distribution of an image, and it can measure the capacity of resisting attack. The gray Lena image of size 256 × 256 is encrypted as shown in Figure 6(c) and the 3D histogram of the encrypted Lena image is shown in Figure 6(d). The binary image has only two colors and is sensitive to the change of pixel. 3D histograms of a binary image are encrypted and encrypted binary images are demonstrated in Figures 7(b) and 7(d), respectively. Figure 8(a) shows the color image and its RGB histograms; Figure 8(b) shows the encrypted color image of Figure 8(a) and its RGB histograms. The histogram of the encrypted image is fairly uniform and significantly different from that of the original image, so the information is unpredictable and histogram attack can be avoided.

4.2. Information Entropy

Information entropy, firstly proposed by Shannon in 1949, is a significant property that reflects the randomness and the unpredictability of an information source [4]. With bigger entropy image has more uniform gray distribution. The entropy is defined by the following formula: , where denotes the probability of symbol . When , the 256 × 256 gray image has maximum entropy of 8. Entropy of gray Lena image and binary image is 7.447144 and 0.593165, respectively, while its encryption is 7.988847 and 7.972069, respectively. Considering RGB components of color image Lena, average information entropy of the color Lena and encrypted color Lena is 7.198813 and 7.997281, respectively. It is obvious that the entropies of the cipher images are very close to the theoretical value of 8, which means that the encryption algorithm has ability of resisting statistical attack.

4.3. Correlation Coefficients of Adjacent Pixels

In the section, we aim at checking up the correlation of two adjacent pixels between the original image and encrypted image. In this simulation, randomly selected 1000 pairs of adjacent pixels (horizontally, vertically, and diagonally) are determined. The correlation coefficient between two adjacent pixels in an image is determined according to the following formula:where

Figure 9 displays correlation coefficients of adjacent pixels in four directions of Lena plain image and cipher image. The result emphasizes that there is hardly any correlation of adjacent pixels in encryption images. Correlation coefficients of the encrypted Lena image are smaller than other methods shown in Table 1. The statistical properties of original image have randomly spread to encryption image.

4.4. Resistance to Differential Attack

The attacker may observe the change of decryption by the tiny change of plaintext to find the correlation between plain image and cipher image. Based on principles of cryptology, a good encryption algorithm should be sensitive to plaintext sufficiently. In general, attacker makes a slight change (e.g., modify only one pixel) for plaintext to find out some relationships between plain image and encrypted image. If tiny change of original image can bring great changes to cipher image, the effect of differential attack will be reduced. Sensitivity of the plaintext encryption algorithm can be quantified by NPCR (number of pixels changing rate) and UACI (unified average changing intensity). They are defined as follows:where and indicate pixel value of two encryption images at location . and present number of rows and columns of the original image.

The ideal expectations of NPCR and UACI can be calculated by the following simplified formulas:where is the number of bits used to represent the different bit planes of an image. For gray scale image parameter (8 bits per pixel). Hence expected NPCR and expected UACI are (horizontal solid line in Figure 10(a)) and (horizontal solid line in Figure 10(b)), respectively. From the above formula we can see that relation , so any value of the ideal expectations can illustrate the capability of algorithm to attack resisting plaintext.

In this experiment, one hundred groups of Lena images are encrypted. In every group image, one is original image and the other is original image with only one changed pixel value (including border points and intermediate points, each time the changed amount is only 1). Then the test results are shown in Figure 10; every value fluctuates up and down near ideal value. The average values are (horizontal dotted line in Figure 10(a)) and (horizontal dotted line in Figure 10(b)), respectively. Obviously the given encryption algorithm greatly improves the sensitivity of plaintext, thereby enhancing capacity of resistance to differential attacks.

4.5. Key Sensitivity Test

Lena gray image is used to make experimental analysis. With right key, the decrypted image is clear and correct without any distortion in Figure 11(a). Decryption using keys with slight mismatch is performed so as to evaluate the key sensitivity. With a subtle change, the new key , and the decrypted image is incorrect, proposed in Figure 11(b). Subtle change of key yields greatly different decrypted images. It is fully convincing that the algorithm has steady and superior secure performance in the first encryption round and will well resist differential attack.

4.6. Algorithmic Complexity Analyses

The time complexity of an algorithm quantifies the amount of time taken by an algorithm to run as a function of the size of the input to the problem. The time complexity is commonly described using the big- notation, which suppresses multiplicative constants and lower order terms. Time complexity of generating key is . The maximum complexity chaos and wavelet function map generate chaos sequences with time complexities and , respectively. Pixel diffusion and substitution have the same time complexity . At each step, the worst total time complexity is where . and represent iterate numbers of maximum complexity chaos and wavelet function map, respectively.

5. Conclusion

This paper presents a novel fractional-order complex attractor with high fraction dimension, and the preprocessed chaotic sequence has good random character. Secret key is disturbed by every order and pixel value of plaintext; thus slight change of plaintext can bring vast differentness in encrypted image. Theoretical analysis and experimental results indicate that the encryption algorithm has some good characters, such as resistance for different attack, better information entropy, and low coefficient correlation. Comparing with some chaos-based algorithms, the estimated results demonstrate the strong capabilities and the effectiveness of the proposed algorithm. The time complexity of the algorithm is proposed and an example is investigated to verify its validity and practicability. Our future works will focus on video encryption using fractional-order chaotic system.

Conflicts of Interest

The authors declare that they have no competing interests.

Acknowledgments

This research is supported by NNSFs of China (Grant no. 11501525), Science & Technology Innovation Talents in Universities of Henan Province (Grant no. 16HASTIT040), Teacher Education Curriculum Reform of Henan Province (Grant no. 2017-JSJYYB-190), Project of Youth Backbone Teachers of College and Universities in Henan Province (Grant nos. 2013GGJS-142 and 2015GGJS-179), and Basic & Advanced Technological Research Project of Henan Province (Grant no. 162300410261).