Cargando…

A Novel Image Encryption Scheme Based on Collatz Conjecture

Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have...

Descripción completa

Detalles Bibliográficos
Autores principales: Ballesteros, Dora M., Peña, Jimmy, Renza, Diego
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7512486/
https://www.ncbi.nlm.nih.gov/pubmed/33266625
http://dx.doi.org/10.3390/e20120901
_version_ 1783586169366249472
author Ballesteros, Dora M.
Peña, Jimmy
Renza, Diego
author_facet Ballesteros, Dora M.
Peña, Jimmy
Renza, Diego
author_sort Ballesteros, Dora M.
collection PubMed
description Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to [Formula: see text]). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications.
format Online
Article
Text
id pubmed-7512486
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-75124862020-11-09 A Novel Image Encryption Scheme Based on Collatz Conjecture Ballesteros, Dora M. Peña, Jimmy Renza, Diego Entropy (Basel) Article Image encryption methods aim to protect content privacy. Typically, they encompass scrambling and diffusion. Every pixel of the image is permuted (scrambling) and its value is transformed according to a key (diffusion). Although several methods have been proposed in the literature, some of them have been cryptanalyzed. In this paper, we present a novel method that deviates the traditional schemes. We use variable length codes based on Collatz conjecture for transforming the content of the image into non-intelligible audio; therefore, scrambling and diffusion processes are performed simultaneously in a non-linear way. With our method, different ciphered audio is obtained every time, and it depends exclusively on the selected key (the size of the key space equal to [Formula: see text]). Several tests were performed in order to analyze randomness of the ciphered audio signals and the sensitivity of the key. Firstly, it was found that entropy and the level of disorder of ciphered audio signals are very close to the maximum value of randomness. Secondly, fractal behavior was detected into scatter plots of adjacent samples, altering completely the behavior of natural images. Finally, if the key was slightly modified, the image could not be recovered. With the above results, it was concluded that our method is very useful in image privacy protection applications. MDPI 2018-11-25 /pmc/articles/PMC7512486/ /pubmed/33266625 http://dx.doi.org/10.3390/e20120901 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Ballesteros, Dora M.
Peña, Jimmy
Renza, Diego
A Novel Image Encryption Scheme Based on Collatz Conjecture
title A Novel Image Encryption Scheme Based on Collatz Conjecture
title_full A Novel Image Encryption Scheme Based on Collatz Conjecture
title_fullStr A Novel Image Encryption Scheme Based on Collatz Conjecture
title_full_unstemmed A Novel Image Encryption Scheme Based on Collatz Conjecture
title_short A Novel Image Encryption Scheme Based on Collatz Conjecture
title_sort novel image encryption scheme based on collatz conjecture
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7512486/
https://www.ncbi.nlm.nih.gov/pubmed/33266625
http://dx.doi.org/10.3390/e20120901
work_keys_str_mv AT ballesterosdoram anovelimageencryptionschemebasedoncollatzconjecture
AT penajimmy anovelimageencryptionschemebasedoncollatzconjecture
AT renzadiego anovelimageencryptionschemebasedoncollatzconjecture
AT ballesterosdoram novelimageencryptionschemebasedoncollatzconjecture
AT penajimmy novelimageencryptionschemebasedoncollatzconjecture
AT renzadiego novelimageencryptionschemebasedoncollatzconjecture