0% found this document useful (0 votes)
196 views105 pages

Cryptography

This document outlines Amina Souyah's PhD thesis defense presentation. The thesis studies novel ways to enhance image content preservation using proposals based on nonlinear dynamical systems. The scope is to design, implement, and evaluate the proposals in terms of security level, complexity structure, and execution time. The motivations are that traditional encryption methods are not well-suited for modern multimedia needs, and applying dynamical systems to multimedia encryption is an important research area. The presentation covers background on nonlinear dynamical systems and cellular automata, as well as the contributions and conclusions of the thesis.

Uploaded by

Have No Idea
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views105 pages

Cryptography

This document outlines Amina Souyah's PhD thesis defense presentation. The thesis studies novel ways to enhance image content preservation using proposals based on nonlinear dynamical systems. The scope is to design, implement, and evaluate the proposals in terms of security level, complexity structure, and execution time. The motivations are that traditional encryption methods are not well-suited for modern multimedia needs, and applying dynamical systems to multimedia encryption is an important research area. The presentation covers background on nonlinear dynamical systems and cellular automata, as well as the contributions and conclusions of the thesis.

Uploaded by

Have No Idea
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Design of cryptosystems based on dynamical systems

for image confidentiality preservation

Amina Souyah
Advisor:
Pr. Kamel Mohamed Faraoun

Computer Science Department


University of UDL

September 15, 2016

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 1 / 22


Outline

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
2 Second proposal

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
2 Second proposal

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Outline

1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
2 Second proposal
5 Conclusions and future work

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22


Intoduction Scope of this Thesis

Scope of this Thesis

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22


Intoduction Scope of this Thesis

Scope of this Thesis

This Thesis studies some non classical and innovative ways to


enhance image-content preservation.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22


Intoduction Scope of this Thesis

Scope of this Thesis

This Thesis studies some non classical and innovative ways to


enhance image-content preservation.
Novel proposals based on dynamical systems.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22


Intoduction Scope of this Thesis

Scope of this Thesis

This Thesis studies some non classical and innovative ways to


enhance image-content preservation.
Novel proposals based on dynamical systems.
These proposals are: designed, implemented and evaluated in terms
of security level , the structure of complexity and Execution-time.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22


Intoduction Scope of this Thesis

Scope of this Thesis

This Thesis studies some non classical and innovative ways to


enhance image-content preservation.
Novel proposals based on dynamical systems.
These proposals are: designed, implemented and evaluated in terms
of security level , the structure of complexity and Execution-time.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22


Intoduction Motivations

Motivations

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22


Intoduction Motivations

Motivations

With the advancement in digital communication technology and the


growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22


Intoduction Motivations

Motivations

With the advancement in digital communication technology and the


growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Traditional encryption means (DES,AES, IDEA , ...etc) are not
adapted to deal with modern multimedia requirements.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22


Intoduction Motivations

Motivations

With the advancement in digital communication technology and the


growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Traditional encryption means (DES,AES, IDEA , ...etc) are not
adapted to deal with modern multimedia requirements.
Application of dynamical systems for multimedia encryption is
obviously one of the main actual research directions.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22


Intoduction Motivations

Motivations

With the advancement in digital communication technology and the


growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Traditional encryption means (DES,AES, IDEA , ...etc) are not
adapted to deal with modern multimedia requirements.
Application of dynamical systems for multimedia encryption is
obviously one of the main actual research directions.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.


In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.


In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.


In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.


In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Xi , Xi+1 are the states of the system at time t , t + 1 respectively.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.


In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Xi , Xi+1 are the states of the system at time t , t + 1 respectively.
F is a parametric function that describes the evolution of the system.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Non-linear dynamical systems (NLDS)

A dynamical system is a physical phenomenon that evolves in time.


In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Xi , Xi+1 are the states of the system at time t , t + 1 respectively.
F is a parametric function that describes the evolution of the system.
ϕ is the vector of parameters that control the evolution of the system.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22


Research Background Non-linear dynamical systems (NLDS)

Cellular automata

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22


Research Background Non-linear dynamical systems (NLDS)

Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22


Research Background Non-linear dynamical systems (NLDS)

Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
They are a mathematical, physical and biological models.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22


Research Background Non-linear dynamical systems (NLDS)

Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
They are a mathematical, physical and biological models.
Their use in cryptography as a base to design new proposals for image
encryption refers firstly to the works of Steven Wolfram [Wol85].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22


Research Background Non-linear dynamical systems (NLDS)

Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
They are a mathematical, physical and biological models.
Their use in cryptography as a base to design new proposals for image
encryption refers firstly to the works of Steven Wolfram [Wol85].
Cellular Automata (CA) are a regular lattice of grids that change their states
synchronously , according to a local rule that specifies the new state of each
cell based on the old state of the cell itself and its neighbors.

Figure: CA’s principale


Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22
Research Background Cellular automata

Cellular automata

Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so


that :

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22


Research Background Cellular automata

Cellular automata

Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so


that :
Q is the set of possible states.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22


Research Background Cellular automata

Cellular automata

Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so


that :
Q is the set of possible states.
d is the dimension

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22


Research Background Cellular automata

Cellular automata

Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so


that :
Q is the set of possible states.
d is the dimension
N represents the neighborhood.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22


Research Background Cellular automata

Cellular automata

Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so


that :
Q is the set of possible states.
d is the dimension
N represents the neighborhood.
f is the transition rule.

CA = {d, {0, 1}, {Xi−1 , Xi , Xi+1 }}

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22


Research Background Cellular automata

Chaos theory

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22


Research Background Cellular automata

Chaos theory

Chaos theory refers to some dynamical phenomena considered to be


complex and unpredictable.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22


Research Background Cellular automata

Chaos theory

Chaos theory refers to some dynamical phenomena considered to be


complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22


Research Background Cellular automata

Chaos theory

Chaos theory refers to some dynamical phenomena considered to be


complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
What is the relationship between chaos and cryptography ?

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22


Research Background Cellular automata

Chaos theory

Chaos theory refers to some dynamical phenomena considered to be


complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
What is the relationship between chaos and cryptography ?
It is about the inherent properties of chaotic systems such as:
dependency to initial conditions/control parameter and ergodicity,
that have their counterparts of confusion and diffusion as good
cryptographic properties.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22


Research Background Cellular automata

Chaos theory

Chaos theory refers to some dynamical phenomena considered to be


complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
What is the relationship between chaos and cryptography ?
It is about the inherent properties of chaotic systems such as:
dependency to initial conditions/control parameter and ergodicity,
that have their counterparts of confusion and diffusion as good
cryptographic properties.
This interesting connectivity traces the beginning of chaotic
cryptography as a new promising area of research.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22


Research Background Cellular automata

Chaos theory

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22


Research Background Cellular automata

Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22


Research Background Cellular automata

Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Permutation: pixels are relocated using 2D chaotic map.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22


Research Background Cellular automata

Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Permutation: pixels are relocated using 2D chaotic map.
Diffusion: pixels’ values are changed sequentially by any chaotic map.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22


Research Background Cellular automata

Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Permutation: pixels are relocated using 2D chaotic map.
Diffusion: pixels’ values are changed sequentially by any chaotic map.
Based on this architecture which has an origin to the traditional
confusion-diffusion architecture of Shannon, various works are
proposed in the scientific literature.

Figure: Classical architecture of chaos-based image encryption cryptosystems


Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22
Literature Review Cellular automata

Cellular automata

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22


Literature Review Cellular automata

Cellular automata

The concept of CAs was introduced at first by Stanislaw Ulam and


John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22


Literature Review Cellular automata

Cellular automata

The concept of CAs was introduced at first by Stanislaw Ulam and


John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
It was initially the idea of Steven Wolfram who suggested for the first
time the use of CA in Cryptography [Wol85].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22


Literature Review Cellular automata

Cellular automata

The concept of CAs was introduced at first by Stanislaw Ulam and


John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
It was initially the idea of Steven Wolfram who suggested for the first
time the use of CA in Cryptography [Wol85].
Afterwards, they have captured the attention of several researchers,
leading to an extensive body of work.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22


Literature Review Cellular automata

Cellular automata

The concept of CAs was introduced at first by Stanislaw Ulam and


John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
It was initially the idea of Steven Wolfram who suggested for the first
time the use of CA in Cryptography [Wol85].
Afterwards, they have captured the attention of several researchers,
leading to an extensive body of work.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22


Literature Review Chaos Theory

Chaos Theory

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
4 Applications of plain image related parameters
[WWL+ 09, CZFY13, ZXSL13].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
4 Applications of plain image related parameters
[WWL+ 09, CZFY13, ZXSL13].
5 Enhanced key-stream generators
[Zhu12, PZ08, GC08, GHG05, SMRY14, PPS06].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Literature Review Chaos Theory

Chaos Theory

The typical permutaton-diffusion architecture for chaos-based image


encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
4 Applications of plain image related parameters
[WWL+ 09, CZFY13, ZXSL13].
5 Enhanced key-stream generators
[Zhu12, PZ08, GC08, GHG05, SMRY14, PPS06].

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
3 The transition rules are devided from the secret key using an efficient
key scheming mechanism.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
3 The transition rules are devided from the secret key using an efficient
key scheming mechanism.
4 the process of subdivision/applying MCA is continued until achieving
the lowest size limit (i.e., 4 × 4 pixels block).

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22


Contributions First proposal

Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
3 The transition rules are devided from the secret key using an efficient
key scheming mechanism.
4 the process of subdivision/applying MCA is continued until achieving
the lowest size limit (i.e., 4 × 4 pixels block).
5 At that level a XOR operation is carried out with the final generated
sub-key (128 bits).
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal

Souyah et al.[SF15]:

The proposed scheme is performed under one encryption round.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22


Contributions First proposal

Souyah et al.[SF15]:

The proposed scheme is performed under one encryption round.


The proposed scheme satisfies all the searched cryptographic
properties.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22


Contributions First proposal

Souyah et al.[SF15]:

The proposed scheme is performed under one encryption round.


The proposed scheme satisfies all the searched cryptographic
properties.
It performes a randomized encryption (RE); and CPA secure.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22


Contributions First proposal

Souyah et al.[SF15]:

The proposed scheme is performed under one encryption round.


The proposed scheme satisfies all the searched cryptographic
properties.
It performes a randomized encryption (RE); and CPA secure.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22


Contributions First proposal

Souyah et al.[SF15]:

The proposed scheme is performed under one encryption round.


The proposed scheme satisfies all the searched cryptographic
properties.
It performes a randomized encryption (RE); and CPA secure.

Figure: The design of the proposed cryptosystem.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
The scheme is CPA secure.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
The scheme is CPA secure.
Confusion phase :

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:

A new image encryption scheme combining chaos-Memory CA and


Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
The scheme is CPA secure.
Confusion phase :
1 A permutation at a bit level is governed by means of the generated
one-time key-streams using LTS chaotic system.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22


Contributions Second proposal

Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22


Contributions Second proposal

Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22


Contributions Second proposal

Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
2 The second sub phase is ruled by means of 2D RMCA in incorporation
with QTD strategy.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22


Contributions Second proposal

Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
2 The second sub phase is ruled by means of 2D RMCA in incorporation
with QTD strategy.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22


Contributions Second proposal

Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
2 The second sub phase is ruled by means of 2D RMCA in incorporation
with QTD strategy.
The obtained results validates the robustness of the proposed scheme
against the commonly used types of attacks, besides to its
effectiveness in term of execution-time.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22


Contributions Second proposal

Conclusions and future works

Within this thesis, we mainly study the problem of achieving the confiden-
tiality of the transmitted multimedia data over open networks, by using
CA-based cryptosystems, chaos-based cryptosystems and joint chaos-CA
cryptosystems. These systems are designed and implemented for real-time
applications with a very high security level.
As a future work, we mainly address the accomplishement of the remaining
parts of this thesis.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 16 / 22


Contributions Second proposal

Guanrong Chen, Yaobin Mao, and Charles K Chui. A symmetric image encryption
scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals, 21(3):749–761,
2004.
Jun-xin Chen, Zhi-liang Zhu, Chong Fu, and Hai Yu. An improved
permutation-diffusion type image cipher with a chaotic orbit perturbing
mechanism. Optics express, 21(23):27873–27890, 2013.

Chong Fu, Jun-jie Chen, Hao Zou, Wei-hong Meng, Yong-feng Zhan, and Ya-wen
Yu. A chaos-based digital image encryption scheme with an improved diffusion
strategy. Optics Express, 20(3):2363–2378, 2012.

Chong Fu, Bin-bin Lin, Yu-sheng Miao, Xiao Liu, and Jun-jie Chen. A novel
chaos-based bit-level permutation scheme for digital image encryption. Optics
communications, 284(23):5415–5423, 2011.

Jiri Fridrich. Symmetric ciphers based on two-dimensional chaotic maps.


International Journal of Bifurcation and chaos, 8(06):1259–1284, 1998.

Tiegang Gao and Zengqiang Chen. A new image encryption algorithm based on
hyper-chaos. Physics Letters A, 372(4):394–400, 2008.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 17 / 22


Contributions Second proposal

Zhi-Hong Guan, Fangjun Huang, and Wenjie Guan. Chaos-based image encryption
algorithm. Physics Letters A, 346(1):153–157, 2005.

CK Huang and HH Nien. Multi chaotic systems based pixel shuffle for image
encryption. Optics Communications, 282(11):2123–2127, 2009.

Yaobin Mao, Guanrong Chen, and Shiguo Lian. A novel fast image encryption
scheme based on 3d chaotic baker maps. International Journal of Bifurcation and
Chaos, 14(10):3613–3624, 2004.

Omid Mirzaei, Mahdi Yaghoobi, and Hassan Irani. A new image encryption
method: parallel sub-image encryption with hyper chaos. Nonlinear Dynamics,
67(1):557–566, 2012.

John von Neumann and Arthur W Burks. Theory of self-reproducing automata.


1966.
Vinod Patidar, NK Pareek, G Purohit, and KK Sud. Modified substitution–diffusion
image cipher using chaotic standard and logistic maps. Communications in
Nonlinear Science and Numerical Simulation, 15(10):2755–2765, 2010.

Narendra K Pareek, Vinod Patidar, and Krishan K Sud. Image encryption using
chaotic logistic map. Image and Vision Computing, 24(9):926–934, 2006.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 18 / 22


Contributions Second proposal

Vinod Patidar, NK Pareek, and KK Sud. A new substitution–diffusion based image


cipher using chaotic standard and logistic maps. Communications in Nonlinear
Science and Numerical Simulation, 14(7):3056–3075, 2009.

AN Pisarchik and M Zanin. Image encryption with chaotically coupled chaotic


maps. Physica D: Nonlinear Phenomena, 237(20):2638–2648, 2008.

Amina Souyah and Kamel Mohamed Faraoun. Fast and efficient randomized
encryption scheme for digital images based on quadtree decomposition and
reversible memory cellular automata. Nonlinear Dynamics, pages 1–18, 2015.

Amina Souyah and Kamel Mohamed Faraoun. An image encryption scheme


combining chaos-memory cellular automata and weighted histogram. Nonlinear
Dynamics, 86(1):639–653, 2016.

Morteza SaberiKamarposhti, Dzulkifli Mohammad, Mohd Shafry Mohd Rahim, and


Mahdi Yaghobi. Using 3-cell chaotic map for image encryption based on biological
operations. Nonlinear Dynamics, 75(3):407–416, 2014.

Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law. A fast image
encryption scheme based on chaotic standard map. Physics Letters A,
372(15):2645–2652, 2008.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 19 / 22


Contributions Second proposal

Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Ching-Hung Yuen. An efficient


diffusion approach for chaos-based image encryption. Chaos, Solitons & Fractals,
41(5):2652–2663, 2009.

Xingyuan Wang and Dapeng Luan. A novel image encryption algorithm using chaos
and reversible cellular automata. Communications in Nonlinear Science and
Numerical Simulation, 18(11):3075–3085, 2013.

Stephen Wolfram. Cryptography with cellular automata. In Advances in


CryptologyCRYPTO85 Proceedings, pages 429–432. Springer, 1985.

Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang, and Guanrong Chen. A
chaos-based image encryption algorithm with variable control parameters. Chaos,
Solitons & Fractals, 41(4):1773–1783, 2009.

Congxu Zhu. A novel image encryption scheme based on improved hyperchaotic


sequences. Optics Communications, 285(1):29–37, 2012.

Wei Zhang, Kwok-wo Wong, Hai Yu, and Zhi-liang Zhu. An image encryption
scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Communications in Nonlinear Science and Numerical Simulation, 18(8):2066–2080,
2013.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 20 / 22


Contributions Second proposal

Wei Zhang, Kwok-wo Wong, Hai Yu, and Zhi-liang Zhu. A symmetric color image
encryption algorithm using the intrinsic features of bit distributions.
Communications in Nonlinear Science and Numerical Simulation, 18(3):584–600,
2013.
Yushu Zhang and Di Xiao. An image encryption scheme based on rotation matrix
bit-level permutation and block diffusion. Communications in Nonlinear Science
and Numerical Simulation, 19(1):74–82, 2014.

Yushu Zhang, Di Xiao, Yonglu Shu, and Jing Li. A novel image encryption scheme
based on a linear hyperbolic chaotic system of partial differential equations. Signal
Processing: Image Communication, 28(3):292–300, 2013.

Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, and Hai Yu. A chaos-based symmetric
image encryption scheme using a bit-level permutation. Information Sciences,
181(6):1171–1186, 2011.

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 21 / 22


Contributions Second proposal

Thank you for your attention!


Questions and comments are welcome!

Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 22 / 22

You might also like