Research Article  Open Access
Color Image Encryption Algorithm Based on TDERCS System and Wavelet Neural Network
Abstract
In order to solve the security problem of transmission image across public networks, a new image encryption algorithm based on TDERCS system and wavelet neural network is proposed in this paper. According to the permutation process and the binary XOR operation from the chaotic series by producing TDERCS system and wavelet neural network, it can achieve image encryption. This encryption algorithm is a reversible algorithm, and it can achieve original image in the rule inverse process of encryption algorithm. Finally, through computer simulation, the experiment results show that the new chaotic encryption algorithm based on TDERCS system and wavelet neural network is valid and has higher security.
1. Introduction
With the rapid growth and application of multimedia based on the Internet system, image security becomes an important issue. Since the size of digital image is always much greater than text file and the digital images contents are strongly correlated, the traditional encryption algorithms such as Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and Advanced Encryption Standard (AES) have the weakness of lowlevel efficiency [1, 2].
Chaos is a ubiquitous phenomenon in nature and chaotic system is also a complex nonlinear, nonequilibrium dynamic process. Chaos theory is established since 1970s from many different research areas, such as physics, mathematics, biology, and chemistry [3]. The chaotic systems are characterized by sensitive dependence on initial conditions and system parameters, similarity to random behavior, no periodicity, and continuous broadband power spectrum [4]. Most properties can meet some requirements of encryption. Therefore, image encryption technique based on chaotic system has more useful and practical applications in the recent years [5, 6]. However, many of the proposed schemes show some deficiencies, such as small key space and weak security [7]. TDERCS system is a new class of discrete chaotic map systems based on the physical model of ellipse reflecting activity. Many researchers have proposed that TDERCS system is a discrete chaotic system with the steady complexity, and the pseudorandom sequences generated by TDERCS are suitable for use in information encryption [8, 9].
In computer science field, an artificial neural network (ANN) is massively parallel distributed processor made up of simple processing units that has a natural propensity for storing experiential knowledge and making it available for use. As ANNs have many important properties, such as massively parallel, highly connected structures consisting of a number of simple and nonlinear processing elements [10], artificial neural networks (ANNs) have already been applied to solve the image encryption. Many encryption methods based on ANNs have been suggested in research literature and can deal with the intractable problem of fast and highly secure encryption [11, 12].
A new color image encryption algorithm is designed in the paper. In Section 2, the mapping equation of TDERCS system is given. In Section 3, wavelet neural networks algorithm is presented in detail. In Section 4, the image encryption algorithm based on TDERCS system and wavelet neural network is proposed. Finally, experimental results and some conclusions are given in Section 5.
2. TangentDelay Ellipse Reflecting CavityMap System
In 2004, LiYuan et al. found a new chaotic system bearing the name of TangentDelay Ellipse Reflecting CavityMap System (TDERCS) [13]. TDERCS system is a discrete chaotic system and has many properties such as the maximum Lyapunov exponent which is over zero, unchangeable equiprobability distribution, and zero correlation in total field [14]. TDERCS is described bywhere are called TDERCS seed parameters. In TDERCS seed parameters, , initial , , and tangentdelay parameters . Figure 1 shows the time responses of TDERCS chaotic systems, for TDERCS seed parameters (, , , ), iterations in (1).
3. Wavelet Neural Networks
3.1. The Wavelet Base Function
A cluster of functions which are got by time shift and scale stretchout and drawback of mother wavelet function are called the wavelet base functions. The wavelet base function is shown as follows [15]:where are the scale and translation parameters, respectively. The mother wavelet function is satisfied using the following equation:where is Fourier transform of .
3.2. The Model of Wavelet Neural Networks
Wavelet neural networks (WNNs) have emerged as new feed forward neural network based on wavelet transform, in which discrete wavelet function is used as the node activation function [16]. Since wavelet neural networks combine selfstudying of neural network and the function of timefrequency localization of wavelet transform, they have strong ability to approximate and robust [17].
The architecture of the WNNs is presented in Figure 2. Wavelet neural networks commonly consist of three layers: input layer, hidden layer, and output layer. All the neurons in the layer are connected to the neurons in the next layer [18].
The output of threelayer WNNs is calculated in the formwhere is the neurons number in the input layer, is the neurons number in the output layer, is the neurons number in the hidden layer, and is the connection weight between the th neuron of hidden layer and the th neuron of output layer. is the connection weight between the th neuron of input layer and the th neuron of hidden layer. is the translation factor of the th neuron in hidden layer. is the expansion and contraction factor of the th neuron in hidden layer. is the th neuron of input layer; is the th neuron of output layer. In the hidden layer, the activation function of neuron is Morlet wavelet function in [19]
Let us define error function aswhere is the model actual output and is the desired output at time . Then the cost function can be defined as
Using the gradient descent algorithms, the weight vector for every neuron in wavelet neural networks is updated as follows [20]:where represents the backward step number and and are the learning and the momentum constants, differing in the ranges 0.01 to 0.1 and 0.1 to 0.9, respectively.
4. Image Encryption Based on TDERCS and Wavelet Neural Networks
4.1. Process of Permutation Cryptography
Let be a real set: . A permutation process of order refers to the operation of replacing an arrangement by a second arrangement denoted by the numerical order in the set in ascending or descending order, and . Permutations group is represented as
The reverse of this permutation process is specified aswhich retrieves the original arrangement.
Definition 1. A permutation of is a bijective function from to .
Based on Definition 1, the permutation cryptography process can be defined as follows.
Definition 2 (see [21]). If any data matrix is transformed to a ciphermatrix where is any permutation operation, then the original matrix can be obtained again from with the inverse operation of on it; that is, , as forms an identity operator.
For example, suppose that plaintext is
The permutations group in ascending order is
Permutation cipher is
The permutations group in ascending order is
Then
The ciphertext is
The decryption process is
4.2. Encryption Process
In the paper, the image encryption based TDERCS and WNNs mainly consist of two stages. The first stage of whole encryption system is chaotic sequence generation. In the chaotic sequence generation, a new chaotic sequence is generated by wavelet neural networks and TDERCS. The second stage of whole encryption system is the confusion stage. Since images are digital, a map is defined to transform the chaotic sequence to another sequence which consists of integers. Then the image can be encrypted by use of permutation operation and XOR with the integer sequence [22].
4.3. The Chaotic Sequence Generator
In this paper, we used chaotic sequences generated by TDERCS system and wavelet neural networks. Since wavelet neural networks have good capacity to approach arbitrary nonlinear mapping, they can possess chaotic state through studying of TDERCS chaotic sequence and modeling. The model system structure of chaotic sequences generator based on wavelet neural networks is shown in Figure 3. The feedback from the WNNs output end to input end shaped closedloop structure and makes the output chaotic sequence feedback to input end as the initial value for next output sequence, so as to output the chaotic sequences continuously. The training data of WNNs are given by the TDERCS sequence. After the weights of WNNs are determined by learning algorithm, chaotic sequence has been produced.
4.4. Encryption Algorithm
Assume a square image consists of pixels aswhere denotes pixel of image. The steps involved in the implementation of our encryption algorithm based on TDERCS and WNNs can be summarized as shown below.
Step 1. Set TDERCS seed parameters and generate TDERCS chaotic sequences , , .
Step 2. Utilize WNNs to practice the chaotic sequences , , and determine the weights of WNNs. The weights of WNNs and TDERCS seed parameters are the key and are transmitted to the receiver by secure channel.
Step 3. Calculate the size of the image , and image is changed to onedimensional vector in the order of rank [23]:
Step 4. Use the chaotic sequence generator to produce chaotic sequence .
Step 5. Select as permutation ciphers and calculate image vector by the permutation cryptography process.
Step 6. Generate a new chaotic sequence :where binary forms are , , and use sequence to produce :
Step 7. Calculate encrypted image vector :where the means XOR. The encryption process is finished.
The encryption algorithm is a reversible algorithm and the original image can be obtained by applying the inverse process of the encryption algorithm. The secret communication model based on TDERCS system and wavelet neural network is shown in Figure 4.
5. Experimental Results and Analysis
In the paper, experimental analysis of the proposed image encryption algorithm has been done. The experiment has been implemented in the Matlab 2009a in Figure 5(a). The original image is 256 level grayscale and size. The structure of WNNs was a threelayer wavelet neural network, in which the number of input layer neurons is three, the number of output layer neurons is one, and the number of hidden layer neurons is six. TDERCS system seed parameters are 0.1256, 0.8130, 0.5325, and 2. After 100 times iterations, the cost function of wavelet neural network was 0.1696. The connection weights of wavelet neural network between input layer and hidden layer are given by
(a) The original image
(b) The encrypted image
(c) The correct decryption image
(d) The wrong decryption image
The connection weights between hidden layer and output layer are given by
The translation factors vector is given by
The expansion and contraction factors vector is given by
Lyapunov exponent is a useful way to characterize and quantify chaotic phenomena arising in dynamical systems, which describe the temporal evolution of small perturbations of the initial conditions [24]. The maximum Lyapunov exponent of chaotic sequence is 0.6312 by Wolf’s algorithm, and the result shows that the system is chaotic system [25]. The encrypted image is shown in Figure 5(b), which is roughandtumble and unrecognizable. As Figure 5(c) shows the decrypted image using the same encryption key is an exact version of the original image. Figure 5(d) shows the error between the original image and decrypted image, which is zero.
5.1. Key Space Analysis
For a secure image encryption algorithm, the key space should be large enough to make bruteforce attacks infeasible [26]. In our algorithm, the TDERCS seed parameters and the connection weights of wavelet neural network can be used as keys. If the precision is 10^{−4} in the above test, the key space size is at least 10^{195}. The key space is large enough so that it can resist the exhaustive attack effectively.
5.2. Histograms Analysis
The image histogram is an important statistical characteristic of digital image and can illustrate how pixels in an image are distributed by graphing the number of pixels at each color intensity level [27]. The histograms of the original image and the encrypted image are shown in Figure 6. It is shown that the histogram of the encrypted image is fairly uniform and the encryption algorithm has covered up all the characters of the original image.
5.3. Correlation Coefficient Analysis
In the image data, each pixel is in neighborhood with eight adjacent pixels and is highly correlated with its adjacent pixels [28]. To test the correlation between two vertically adjacent pixels, two horizontally adjacent pixels, and two diagonally adjacent pixels in the encryption image, we randomly select 3015 pairs of two adjacent (in horizontal, vertical, and diagonal direction) pixels from the original and encryption image. Then, calculate their correlation coefficient using the following four formulas [29, 30]:where is the expected value and is the number of pixels. is the estimation of variance of , and is the estimation of covariance between and , where and are grayscale values of two adjacent pixels in the image. The correlation of two adjacent (in horizontal, vertical, and diagonal direction) pixels from the original and encryption image is shown in Figures 7, 8, and 9. Table 1 gives the correlation coefficients of the original image and the encrypted image. The experiment data show that there is a high correlation between the adjacent pixels of the original image. The correlation coefficients of the encrypted image are almost zero, and the adjacent pixels of the encrypted image are almost irrelevant.

(a) Original image
(b) Encryption image
(a) Original image
(b) Encryption image
(a) Original image
(b) Encryption image
5.4. Differential Analysis
In image encryption, the cipher resistance to differential attacks is commonly analyzed via the Number of Pixels Change Rate (NPCR) and the Unified Average Changing Intensity (UACI) tests [31]. NPCR and UACI can be mathematically defined bywhere , are ciphertext images before and after one pixel change in a plaintext image, respectively. are the pixel value at grid in . are the pixel value at grid in . It is clear that NPCR concentrates on the absolute number of pixels which changes value in differential attacks, while the UACI focuses on the averaged difference between two paired ciphertext images [32]. In this paper, the NPCR between the original image and the encryption image is 0.00132%, and the UACI is 0.0000005%. The results demonstrate that the proposed scheme can survive differential attack.
5.5. Key Sensitivity Test
An ideal image encryption scheme has to be keysensitive, meaning that a tiny change in the key will produce completely different encrypted image. For testing the key sensitivity of encryption algorithm, this paper has performed sensitivity analysis according to the following steps [33].
(1) An original image in Figure 5(a) is encrypted by using TDERCS system seed parameters (0.1256, 0.8130, 0.5325, and 2) and the resultant image is referred to as encrypted image A as shown in Figure 5(b).
(2) The same original image is encrypted by making the slight modification in the seed parameters (0.12559, 0.8130, 0.5325, and 2). The encrypted image is shown in Figure 10(a) and the decrypted image of image A using seed parameters (0.12559, 0.8130, 0.5325, and 2) is shown in Figure 9(b).
(a) The encrypted image using seed parameters (0.1256, 0.8130, 0.5325, and 2)
(b) The decrypted image of Figure 5(b) using seed parameters (0.12559, 0.8130, 0.5325, and 2)
(c) The encrypted image using seed parameters (0.1256, 0.81299, 0.5325, and 2)
(d) The decrypted image of Figure 5(b) using seed parameters (0.1256, 0.81299, 0.5325, and 2)
(e) The encrypted image using seed parameters (0.1256, 0.8130, 0.53249, and 2)
(f) The decrypted image of Figure 5(b) using seed parameters (0.1256, 0.8130, 0.53249, and 2)
(3) The same original image is encrypted by making slight modification in the seed parameters (0.1256, 0.81299, 0.5325, and 2) and the encrypted image is shown in Figure 10(c). Figure 10(d) has shown the decrypted image of image A using seed parameters (0.1256, 0.81299, 0.5325, and 2).
(4) The same original image is encrypted by making the slight modification in the seed parameters (0.1256, 0.8130, 0.53249, and 2) and the encrypted image is shown in Figure 10(e). Figure 10(f) has shown the decrypted image of image A using seed parameters (0.1256, 0.8130, 0.53249, and 2).
Figure 10 clearly shows that the image A is not correctly decrypted by using TDERCS system seed parameters (0.12559, 0.8130, 0.5325, and 2), (0.1256, 0.81299, 0.5325, and 2), and (0.1256, 0.8130, 0.53249, and 2), which has also only one bit difference between the correct key and the wrong key.
6. Conclusion
The TDERCS system is a highly complex nonlinear dynamic system based on the physical model of ellipse reflecting cavity. In this paper, an image encryption scheme based on TDERCS system and wavelet neural networks is presented. All parts of the proposed encryption algorithm were simulated using computer code. Theoretical and experimental results indicate that the image encryption algorithm based on TDERCS system and wavelet neural networks has advantages of large key space and highlevel security, while maintaining acceptable efficiency. Finally, the proposed image encryption is suitable for any size digital image and can be widely applied in other information security fields.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This research was partially supported by the National Natural Science Foundation of China (no. 11261001).
References
 F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni, and M. Reginelli, “A new chaotic algorithm for video encryption,” IEEE Transactions on Consumer Electronics, vol. 48, no. 4, pp. 838–844, 2002. View at: Publisher Site  Google Scholar
 Y. Huang, R. Xu, and W. Lin, “An algorithm for JPEG compressing with chaotic encrypting,” in Proceedings of the International Conference on Computer Graphics, Imaging and Visualisation (CGIV '06), pp. 137–140, IEEE, July 2006. View at: Publisher Site  Google Scholar
 H. BaiLin, Starting with Parabolas: An Introduction to Chaotic Dynamics, Shanghai Scientific and Technological Education Publishing House, Shanghai, China, 1993, (Chinese).
 L. Kocarev, M. Sterjev, A. Fekete, and G. Vattay, “Publickey encryption with chaos,” Chaos, vol. 14, no. 4, pp. 1078–1082, 2004. View at: Publisher Site  Google Scholar  MathSciNet
 R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. View at: Publisher Site  Google Scholar  MathSciNet
 F. Dachselt and W. Schwarz, “Chaos and cryptography,” IEEE Transactions on Circuits and Systems. I. Fundamental Theory and Applications, vol. 48, no. 12, pp. 1498–1509, 2001. View at: Publisher Site  Google Scholar  MathSciNet
 G. Alvarez and S. Li, “Breaking an encryption scheme based on chaotic baker map,” Physics Letters A, vol. 352, no. 12, pp. 78–82, 2006. View at: Publisher Site  Google Scholar
 S. KeHui, T. GuoQiang, and S. LiYua, “The complexity analysis of TDERCS discrete chaotic pseudorandom sequence,” Acta Physica Sinica, vol. 57, pp. 3359–3366, 2008. View at: Google Scholar
 L.Y. Sheng, G.Q. Li, and Z.W. Li, “Oneway Hash function construction based on tangentdelay ellipse reflecting cavitymap system,” Acta Physica Sinica, vol. 55, no. 11, pp. 5700–5706, 2006. View at: Google Scholar  MathSciNet
 N. F. Güler, E. D. Übeyli, and I. Güler, “Recurrent neural networks employing Lyapunov exponents for EEG signals classification,” Expert Systems with Applications, vol. 29, no. 3, pp. 506–514, 2005. View at: Publisher Site  Google Scholar
 L. Chen and K. Aihara, “Chaotic simulated annealing by a neural network model with transient chaos,” Neural Networks, vol. 8, no. 6, pp. 915–930, 1995. View at: Publisher Site  Google Scholar
 L. Chen and K. Aihara, “Strange attractors in chaotic neural networks,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 47, no. 10, pp. 1455–1468, 2000. View at: Publisher Site  Google Scholar  MathSciNet
 S. LiYuan, S. KeHui, and L. ChuanBing, “Study of a discrete chaotic system based on tangentdelay for elliptic reflecting cavity and its properties,” Acta Physica Sinica, vol. 53, no. 9, pp. 2871–2876, 2004. View at: Google Scholar
 L.Y. Sheng, L.L. Cao, K.H. Sun, and J. Wen, “Pseudorandom number generator based on TDERCS chaos and its statistic characteristics analysis,” Acta Physica Sinica, vol. 54, no. 9, pp. 4031–4037, 2005. View at: Google Scholar
 R. Q. Quiroga and H. Garcia, “Singletrial eventrelated potentials with wavelet denoising,” Clinical Neurophysiology, vol. 114, no. 2, pp. 376–390, 2003. View at: Publisher Site  Google Scholar
 Y. C. Pati and P. S. Krishnaprasad, “Analysis and synthesis of feedforward neural networks using discrete affine wavelet transformations,” IEEE Transactions on Neural Networks, vol. 4, no. 1, pp. 73–85, 1993. View at: Publisher Site  Google Scholar
 A. Subasi, M. Yilmaz, and H. R. Ozcalik, “Classification of EMG signals using wavelet neural network,” Journal of Neuroscience Methods, vol. 156, no. 12, pp. 360–367, 2006. View at: Publisher Site  Google Scholar
 N. Chauhan, V. Ravi, and D. Karthik Chandra, “Differential evolution trained wavelet neural networks: application to bankruptcy prediction in banks,” Expert Systems with Applications, vol. 36, no. 4, pp. 7659–7665, 2009. View at: Publisher Site  Google Scholar
 A. Grossmann and J. Morlet, “Decomposition of Hardy functions into square integrable wavelets of constant shape,” SIAM Journal on Mathematical Analysis, vol. 15, no. 4, pp. 723–736, 1984. View at: Publisher Site  Google Scholar  MathSciNet
 Q. Zhao, Z. Sun, F. Sun, and J. Zhu, “Appearancebased robot visual servo via a wavelet neural network,” International Journal of Control, Automation and Systems, vol. 6, no. 4, pp. 607–612, 2008. View at: Google Scholar
 A. Mitra, Y. V. S. Rao, and S. R. M. Prasanna, “A new image encryption approach using combinational permutation techniques,” World Academy of Science, Engineering and Technology, vol. 2, pp. 831–835, 2008. View at: Google Scholar
 H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solitons and Fractals, vol. 29, no. 2, pp. 393–399, 2006. View at: Publisher Site  Google Scholar
 K. Zhang and X.A. Fu, “Color image encryption algorithm based on tangentdelay ellipse reflecting cavity map system,” in Proceedings of the International Conference on Image Analysis and Signal Processing, pp. 25–27, 2012. View at: Google Scholar
 C. Dellago and H. A. Posch, “Lyapunov exponents of systems with elastic hard collisions,” Physical Review E, vol. 52, no. 3, pp. 2402–2406, 1995. View at: Publisher Site  Google Scholar  MathSciNet
 A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, “Determining Lyapunov exponents from a time series,” Physica D: Nonlinear Phenomena, vol. 16, no. 3, pp. 285–317, 1985. View at: Publisher Site  Google Scholar  MathSciNet
 T. Gao and Z. Chen, “A new image encryption algorithm based on hyperchaos,” Physics Letters A, vol. 372, no. 4, pp. 394–400, 2008. View at: Publisher Site  Google Scholar
 Y. Mao, G. Chen, and S. Lian, “A novel fast image encryption scheme based on 3D chaotic Baker maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 14, no. 10, pp. 3613–3624, 2004. View at: Publisher Site  Google Scholar  MathSciNet
 A. N. Pisarchik and M. Zanin, “Image encryption with chaotically coupled chaotic maps,” Physica D: Nonlinear Phenomena, vol. 237, no. 20, pp. 2638–2648, 2008. View at: Publisher Site  Google Scholar  MathSciNet
 G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at: Publisher Site  Google Scholar
 S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, and A. Akhavan, “A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps,” Physics Letters ِA, vol. 366, no. 45, pp. 391–396, 2007. View at: Publisher Site  Google Scholar
 S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408–419, 2008. View at: Publisher Site  Google Scholar  MathSciNet
 Y. Wu, J. P. Noonan, and S. Agaian, “NPCR and UACI randomness tests for image encryption,” Cyber Journals, pp. 31–38, 2011. View at: Google Scholar
 G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at: Publisher Site  Google Scholar  MathSciNet
Copyright
Copyright © 2015 Kun Zhang and Jianbo Fang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.