Design of cryptosystems based on dynamical systems
for image confidentiality preservation
Amina Souyah
Advisor:
Pr. Kamel Mohamed Faraoun
Computer Science Department
University of UDL
September 15, 2016
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 1 / 22
Outline
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
2 Second proposal
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
2 Second proposal
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Outline
1 Introduction
Scope of this Thesis
Motivations
2 Research Background
Non-linear dynamical systems (NLDS)
1 Cellular automata (CA)
2 Chaos theory
3 Literature Review
4 Contributions
1 First proposal
2 Second proposal
5 Conclusions and future work
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 2 / 22
Intoduction Scope of this Thesis
Scope of this Thesis
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22
Intoduction Scope of this Thesis
Scope of this Thesis
This Thesis studies some non classical and innovative ways to
enhance image-content preservation.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22
Intoduction Scope of this Thesis
Scope of this Thesis
This Thesis studies some non classical and innovative ways to
enhance image-content preservation.
Novel proposals based on dynamical systems.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22
Intoduction Scope of this Thesis
Scope of this Thesis
This Thesis studies some non classical and innovative ways to
enhance image-content preservation.
Novel proposals based on dynamical systems.
These proposals are: designed, implemented and evaluated in terms
of security level , the structure of complexity and Execution-time.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22
Intoduction Scope of this Thesis
Scope of this Thesis
This Thesis studies some non classical and innovative ways to
enhance image-content preservation.
Novel proposals based on dynamical systems.
These proposals are: designed, implemented and evaluated in terms
of security level , the structure of complexity and Execution-time.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 3 / 22
Intoduction Motivations
Motivations
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22
Intoduction Motivations
Motivations
With the advancement in digital communication technology and the
growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22
Intoduction Motivations
Motivations
With the advancement in digital communication technology and the
growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Traditional encryption means (DES,AES, IDEA , ...etc) are not
adapted to deal with modern multimedia requirements.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22
Intoduction Motivations
Motivations
With the advancement in digital communication technology and the
growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Traditional encryption means (DES,AES, IDEA , ...etc) are not
adapted to deal with modern multimedia requirements.
Application of dynamical systems for multimedia encryption is
obviously one of the main actual research directions.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22
Intoduction Motivations
Motivations
With the advancement in digital communication technology and the
growth of computer power and storage, the difficulties in ensuring
sensitive-content privacy become increasingly challenging.
Traditional encryption means (DES,AES, IDEA , ...etc) are not
adapted to deal with modern multimedia requirements.
Application of dynamical systems for multimedia encryption is
obviously one of the main actual research directions.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 4 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Xi , Xi+1 are the states of the system at time t , t + 1 respectively.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Xi , Xi+1 are the states of the system at time t , t + 1 respectively.
F is a parametric function that describes the evolution of the system.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Non-linear dynamical systems (NLDS)
A dynamical system is a physical phenomenon that evolves in time.
In mathematical terms: the system’s states are described by a set of
variables, and its evolution is given by: an equation and initial state’s
value.
For digital cryptographic applications, we put a focus on discrete-time
NLDS, and it is defined as follows:
1 Xi+1 = Fi (Xi , ϕ)
Xi , Xi+1 are the states of the system at time t , t + 1 respectively.
F is a parametric function that describes the evolution of the system.
ϕ is the vector of parameters that control the evolution of the system.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 5 / 22
Research Background Non-linear dynamical systems (NLDS)
Cellular automata
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22
Research Background Non-linear dynamical systems (NLDS)
Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22
Research Background Non-linear dynamical systems (NLDS)
Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
They are a mathematical, physical and biological models.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22
Research Background Non-linear dynamical systems (NLDS)
Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
They are a mathematical, physical and biological models.
Their use in cryptography as a base to design new proposals for image
encryption refers firstly to the works of Steven Wolfram [Wol85].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22
Research Background Non-linear dynamical systems (NLDS)
Cellular automata
Cellular automata (CAs) are a kind of discrete dynamical systems.
They are a mathematical, physical and biological models.
Their use in cryptography as a base to design new proposals for image
encryption refers firstly to the works of Steven Wolfram [Wol85].
Cellular Automata (CA) are a regular lattice of grids that change their states
synchronously , according to a local rule that specifies the new state of each
cell based on the old state of the cell itself and its neighbors.
Figure: CA’s principale
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 6 / 22
Research Background Cellular automata
Cellular automata
Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so
that :
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22
Research Background Cellular automata
Cellular automata
Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so
that :
Q is the set of possible states.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22
Research Background Cellular automata
Cellular automata
Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so
that :
Q is the set of possible states.
d is the dimension
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22
Research Background Cellular automata
Cellular automata
Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so
that :
Q is the set of possible states.
d is the dimension
N represents the neighborhood.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22
Research Background Cellular automata
Cellular automata
Formally , we can define elemantary CA as a quadruple <Q, d, N, f >, so
that :
Q is the set of possible states.
d is the dimension
N represents the neighborhood.
f is the transition rule.
CA = {d, {0, 1}, {Xi−1 , Xi , Xi+1 }}
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 7 / 22
Research Background Cellular automata
Chaos theory
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22
Research Background Cellular automata
Chaos theory
Chaos theory refers to some dynamical phenomena considered to be
complex and unpredictable.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22
Research Background Cellular automata
Chaos theory
Chaos theory refers to some dynamical phenomena considered to be
complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22
Research Background Cellular automata
Chaos theory
Chaos theory refers to some dynamical phenomena considered to be
complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
What is the relationship between chaos and cryptography ?
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22
Research Background Cellular automata
Chaos theory
Chaos theory refers to some dynamical phenomena considered to be
complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
What is the relationship between chaos and cryptography ?
It is about the inherent properties of chaotic systems such as:
dependency to initial conditions/control parameter and ergodicity,
that have their counterparts of confusion and diffusion as good
cryptographic properties.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22
Research Background Cellular automata
Chaos theory
Chaos theory refers to some dynamical phenomena considered to be
complex and unpredictable.
It is a mathematical model and another kind of discrete dynamical
systems.
What is the relationship between chaos and cryptography ?
It is about the inherent properties of chaotic systems such as:
dependency to initial conditions/control parameter and ergodicity,
that have their counterparts of confusion and diffusion as good
cryptographic properties.
This interesting connectivity traces the beginning of chaotic
cryptography as a new promising area of research.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 8 / 22
Research Background Cellular automata
Chaos theory
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22
Research Background Cellular automata
Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22
Research Background Cellular automata
Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Permutation: pixels are relocated using 2D chaotic map.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22
Research Background Cellular automata
Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Permutation: pixels are relocated using 2D chaotic map.
Diffusion: pixels’ values are changed sequentially by any chaotic map.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22
Research Background Cellular automata
Chaos theory
The Fridrich’s classical design of chaos based image encryption
scheme based on two stages : permutation and diffusion.
Permutation: pixels are relocated using 2D chaotic map.
Diffusion: pixels’ values are changed sequentially by any chaotic map.
Based on this architecture which has an origin to the traditional
confusion-diffusion architecture of Shannon, various works are
proposed in the scientific literature.
Figure: Classical architecture of chaos-based image encryption cryptosystems
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 9 / 22
Literature Review Cellular automata
Cellular automata
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22
Literature Review Cellular automata
Cellular automata
The concept of CAs was introduced at first by Stanislaw Ulam and
John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22
Literature Review Cellular automata
Cellular automata
The concept of CAs was introduced at first by Stanislaw Ulam and
John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
It was initially the idea of Steven Wolfram who suggested for the first
time the use of CA in Cryptography [Wol85].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22
Literature Review Cellular automata
Cellular automata
The concept of CAs was introduced at first by Stanislaw Ulam and
John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
It was initially the idea of Steven Wolfram who suggested for the first
time the use of CA in Cryptography [Wol85].
Afterwards, they have captured the attention of several researchers,
leading to an extensive body of work.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22
Literature Review Cellular automata
Cellular automata
The concept of CAs was introduced at first by Stanislaw Ulam and
John Von Neumann to study the biological processes as
self-reproduction, by giving its mathematical modes [NB66].
It was initially the idea of Steven Wolfram who suggested for the first
time the use of CA in Cryptography [Wol85].
Afterwards, they have captured the attention of several researchers,
leading to an extensive body of work.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 10 / 22
Literature Review Chaos Theory
Chaos Theory
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
4 Applications of plain image related parameters
[WWL+ 09, CZFY13, ZXSL13].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
4 Applications of plain image related parameters
[WWL+ 09, CZFY13, ZXSL13].
5 Enhanced key-stream generators
[Zhu12, PZ08, GC08, GHG05, SMRY14, PPS06].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Literature Review Chaos Theory
Chaos Theory
The typical permutaton-diffusion architecture for chaos-based image
encryption was firstly proposed by Fridrich [Fri98].
During the last decades, improvements of this architecture have been
extensively developed in various aspects such as :
1 Novel pixel-level confusion techniques
[MCL04, CMC04, MYI12, WKL08, HN09].
2 Bit-level permutation approaches
[ZZWY11, FLM+ 11, ZWYZ13b, WL13, ZX14].
3 Improved diffusion strategies
[PPS09, PPPS10, ZWYZ13a, WKY09, FCZ+ 12].
4 Applications of plain image related parameters
[WWL+ 09, CZFY13, ZXSL13].
5 Enhanced key-stream generators
[Zhu12, PZ08, GC08, GHG05, SMRY14, PPS06].
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 11 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
3 The transition rules are devided from the secret key using an efficient
key scheming mechanism.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
3 The transition rules are devided from the secret key using an efficient
key scheming mechanism.
4 the process of subdivision/applying MCA is continued until achieving
the lowest size limit (i.e., 4 × 4 pixels block).
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
A novel fast and efficient image encryption scheme based on memory
CA (MCA) in combination with quadtree decomposition (QTD)
Firstly, a random bit alteration is applied.
Secondly, a mixing phase is performed.
Thirdly, a QTD mechanism is carried out to the resulted image from
the previous step.
1 The image is subdivided successively to for equal quadrants (i.e., sub
images).
2 These 4 quadrants respresents the 4 initial configurations of the 4th
order reversible MCA.
3 The transition rules are devided from the secret key using an efficient
key scheming mechanism.
4 the process of subdivision/applying MCA is continued until achieving
the lowest size limit (i.e., 4 × 4 pixels block).
5 At that level a XOR operation is carried out with the final generated
sub-key (128 bits).
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 12 / 22
Contributions First proposal
Souyah et al.[SF15]:
The proposed scheme is performed under one encryption round.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22
Contributions First proposal
Souyah et al.[SF15]:
The proposed scheme is performed under one encryption round.
The proposed scheme satisfies all the searched cryptographic
properties.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22
Contributions First proposal
Souyah et al.[SF15]:
The proposed scheme is performed under one encryption round.
The proposed scheme satisfies all the searched cryptographic
properties.
It performes a randomized encryption (RE); and CPA secure.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22
Contributions First proposal
Souyah et al.[SF15]:
The proposed scheme is performed under one encryption round.
The proposed scheme satisfies all the searched cryptographic
properties.
It performes a randomized encryption (RE); and CPA secure.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22
Contributions First proposal
Souyah et al.[SF15]:
The proposed scheme is performed under one encryption round.
The proposed scheme satisfies all the searched cryptographic
properties.
It performes a randomized encryption (RE); and CPA secure.
Figure: The design of the proposed cryptosystem.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 13 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
The scheme is CPA secure.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
The scheme is CPA secure.
Confusion phase :
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
A new image encryption scheme combining chaos-Memory CA and
Weighted histogram (Wh).
the proposed scheme follows permutation-diffusion architecture, under
one encryption round.
An arbitrary plain image’s pixel is overwritten, by including Wh value
as a new metric to represent the plain image’s features.
All the generated key-streams are both plain image/ key related.
The scheme is CPA secure.
Confusion phase :
1 A permutation at a bit level is governed by means of the generated
one-time key-streams using LTS chaotic system.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 14 / 22
Contributions Second proposal
Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22
Contributions Second proposal
Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22
Contributions Second proposal
Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
2 The second sub phase is ruled by means of 2D RMCA in incorporation
with QTD strategy.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22
Contributions Second proposal
Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
2 The second sub phase is ruled by means of 2D RMCA in incorporation
with QTD strategy.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22
Contributions Second proposal
Souyah et al.[SF16]:
Diffusion phase : the iterative application of two sub-phases is
performed.
1 Each permuted image’s pixel value is changed sequentially using the
generated of chaotic sequences of 1D LTS chaotic map.
2 The second sub phase is ruled by means of 2D RMCA in incorporation
with QTD strategy.
The obtained results validates the robustness of the proposed scheme
against the commonly used types of attacks, besides to its
effectiveness in term of execution-time.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 15 / 22
Contributions Second proposal
Conclusions and future works
Within this thesis, we mainly study the problem of achieving the confiden-
tiality of the transmitted multimedia data over open networks, by using
CA-based cryptosystems, chaos-based cryptosystems and joint chaos-CA
cryptosystems. These systems are designed and implemented for real-time
applications with a very high security level.
As a future work, we mainly address the accomplishement of the remaining
parts of this thesis.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 16 / 22
Contributions Second proposal
Guanrong Chen, Yaobin Mao, and Charles K Chui. A symmetric image encryption
scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals, 21(3):749–761,
2004.
Jun-xin Chen, Zhi-liang Zhu, Chong Fu, and Hai Yu. An improved
permutation-diffusion type image cipher with a chaotic orbit perturbing
mechanism. Optics express, 21(23):27873–27890, 2013.
Chong Fu, Jun-jie Chen, Hao Zou, Wei-hong Meng, Yong-feng Zhan, and Ya-wen
Yu. A chaos-based digital image encryption scheme with an improved diffusion
strategy. Optics Express, 20(3):2363–2378, 2012.
Chong Fu, Bin-bin Lin, Yu-sheng Miao, Xiao Liu, and Jun-jie Chen. A novel
chaos-based bit-level permutation scheme for digital image encryption. Optics
communications, 284(23):5415–5423, 2011.
Jiri Fridrich. Symmetric ciphers based on two-dimensional chaotic maps.
International Journal of Bifurcation and chaos, 8(06):1259–1284, 1998.
Tiegang Gao and Zengqiang Chen. A new image encryption algorithm based on
hyper-chaos. Physics Letters A, 372(4):394–400, 2008.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 17 / 22
Contributions Second proposal
Zhi-Hong Guan, Fangjun Huang, and Wenjie Guan. Chaos-based image encryption
algorithm. Physics Letters A, 346(1):153–157, 2005.
CK Huang and HH Nien. Multi chaotic systems based pixel shuffle for image
encryption. Optics Communications, 282(11):2123–2127, 2009.
Yaobin Mao, Guanrong Chen, and Shiguo Lian. A novel fast image encryption
scheme based on 3d chaotic baker maps. International Journal of Bifurcation and
Chaos, 14(10):3613–3624, 2004.
Omid Mirzaei, Mahdi Yaghoobi, and Hassan Irani. A new image encryption
method: parallel sub-image encryption with hyper chaos. Nonlinear Dynamics,
67(1):557–566, 2012.
John von Neumann and Arthur W Burks. Theory of self-reproducing automata.
1966.
Vinod Patidar, NK Pareek, G Purohit, and KK Sud. Modified substitution–diffusion
image cipher using chaotic standard and logistic maps. Communications in
Nonlinear Science and Numerical Simulation, 15(10):2755–2765, 2010.
Narendra K Pareek, Vinod Patidar, and Krishan K Sud. Image encryption using
chaotic logistic map. Image and Vision Computing, 24(9):926–934, 2006.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 18 / 22
Contributions Second proposal
Vinod Patidar, NK Pareek, and KK Sud. A new substitution–diffusion based image
cipher using chaotic standard and logistic maps. Communications in Nonlinear
Science and Numerical Simulation, 14(7):3056–3075, 2009.
AN Pisarchik and M Zanin. Image encryption with chaotically coupled chaotic
maps. Physica D: Nonlinear Phenomena, 237(20):2638–2648, 2008.
Amina Souyah and Kamel Mohamed Faraoun. Fast and efficient randomized
encryption scheme for digital images based on quadtree decomposition and
reversible memory cellular automata. Nonlinear Dynamics, pages 1–18, 2015.
Amina Souyah and Kamel Mohamed Faraoun. An image encryption scheme
combining chaos-memory cellular automata and weighted histogram. Nonlinear
Dynamics, 86(1):639–653, 2016.
Morteza SaberiKamarposhti, Dzulkifli Mohammad, Mohd Shafry Mohd Rahim, and
Mahdi Yaghobi. Using 3-cell chaotic map for image encryption based on biological
operations. Nonlinear Dynamics, 75(3):407–416, 2014.
Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Wing-Shing Law. A fast image
encryption scheme based on chaotic standard map. Physics Letters A,
372(15):2645–2652, 2008.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 19 / 22
Contributions Second proposal
Kwok-Wo Wong, Bernie Sin-Hung Kwok, and Ching-Hung Yuen. An efficient
diffusion approach for chaos-based image encryption. Chaos, Solitons & Fractals,
41(5):2652–2663, 2009.
Xingyuan Wang and Dapeng Luan. A novel image encryption algorithm using chaos
and reversible cellular automata. Communications in Nonlinear Science and
Numerical Simulation, 18(11):3075–3085, 2013.
Stephen Wolfram. Cryptography with cellular automata. In Advances in
CryptologyCRYPTO85 Proceedings, pages 429–432. Springer, 1985.
Yong Wang, Kwok-Wo Wong, Xiaofeng Liao, Tao Xiang, and Guanrong Chen. A
chaos-based image encryption algorithm with variable control parameters. Chaos,
Solitons & Fractals, 41(4):1773–1783, 2009.
Congxu Zhu. A novel image encryption scheme based on improved hyperchaotic
sequences. Optics Communications, 285(1):29–37, 2012.
Wei Zhang, Kwok-wo Wong, Hai Yu, and Zhi-liang Zhu. An image encryption
scheme using reverse 2-dimensional chaotic map and dependent diffusion.
Communications in Nonlinear Science and Numerical Simulation, 18(8):2066–2080,
2013.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 20 / 22
Contributions Second proposal
Wei Zhang, Kwok-wo Wong, Hai Yu, and Zhi-liang Zhu. A symmetric color image
encryption algorithm using the intrinsic features of bit distributions.
Communications in Nonlinear Science and Numerical Simulation, 18(3):584–600,
2013.
Yushu Zhang and Di Xiao. An image encryption scheme based on rotation matrix
bit-level permutation and block diffusion. Communications in Nonlinear Science
and Numerical Simulation, 19(1):74–82, 2014.
Yushu Zhang, Di Xiao, Yonglu Shu, and Jing Li. A novel image encryption scheme
based on a linear hyperbolic chaotic system of partial differential equations. Signal
Processing: Image Communication, 28(3):292–300, 2013.
Zhi-liang Zhu, Wei Zhang, Kwok-wo Wong, and Hai Yu. A chaos-based symmetric
image encryption scheme using a bit-level permutation. Information Sciences,
181(6):1171–1186, 2011.
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 21 / 22
Contributions Second proposal
Thank you for your attention!
Questions and comments are welcome!
Souyah Amina (UDL) PhD Thesis Defense September 15, 2016 22 / 22