Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System

  • Magfirawaty Magfirawaty Cryptographic Hardware Engineering, Cryptography Department, National Cyber and Crypto Polytechnic, Bogor, Jawa Barat 16120, Indonesia
  • Ariska Allamanda Cryptographic Hardware Engineering, Cryptography Department, National Cyber and Crypto Polytechnic, Bogor, Jawa Barat 16120, Indonesia
  • Malika Ayunasari Cryptographic Hardware Engineering, Cryptography Department, National Cyber and Crypto Polytechnic, Bogor, Jawa Barat 16120, Indonesia
  • Muhammad Nadhif Zulfikar Cryptographic Hardware Engineering, Cryptography Department, National Cyber and Crypto Polytechnic, Bogor, Jawa Barat 16120, Indonesia
Keywords: Face Recognition, Arnold’s Cat Map, Logistic Map, Bernoulli Map, Tent Map

Abstract

Face recognition uses biometric technologies to identify humans based on their facial characteristics. This method is commonly used to restrict information access control. The benefits of face recognition systems encompass their ease of use and security. The human face recognition process consists of face detection, face tracking, and face recognition. The process uses some algorithms: the Viola-Jones for face detection, the Kanade-Lucas-Tomasi (KLT) for face tracking, and the principal component analysis (PCA) for face recognition. Furthermore, this research proposed face recognition with an encryption process to protect the data stored in a database. The encryption process consists of two main processes: confusion and diffusion. The confusion process is randomizing the position of the original image pixels. This research utilized the Arnold’s cat map (ACM) for the confusion process, and the diffusion process was performed using the XOR operation with the key generated from the 1D chaos system. Three different 1D chaos systems, namely logistic map, Bernoulli map, and tent map, were compared to see which chaos system had the best encryption results. Tests were conducted by comparing various parameters on the three proposed 1D chaos systems, including correlation coefficient, histogram analysis, entropy value, number of pixel rate changes (NPCR), and unified average change intensity (UACI). Based on testing the image encryption results, the diffusion process utilizing the tent map produced the best image encryption compared to other chaotic systems.

References

Q. Xiao, “Technology review - Biometrics-technology, application, challenge, and computational intelligence solution,” IEEE Comput. Intell. Mag., vol. 2, no. 2, pp. 5–10, May 2007, doi: 10.1109/MCI.2007.353415.

M.S. Obaidat, I. Traore, and I. Woungang, Biometric-Based Physical and Cybersecurity Systems. Cham, Switzerland: Springer, 2018.

F. Gong, Y.M. Zhang, and X.Z. Jiang, “Application research of face recognition algorithm based on MATLAB,” J. Phys., Conf. Ser., vol. 2290, pp. 1–6, Jun. 2022, doi: 10.1088/1742-6596/2290/1/012102.

L.A. Ibrahim, Nasser, and M. Ali, “Face recognition based on statistical texture features,” Embedded Selforganising Syst., vol. 7, no. 1, pp. 10–15, Feb. 2020, doi: 10.14464/ess.v7i1.471.

U. Jain, K. Choudhary, S. Gupta, and M.J.P. Privadarsini, “Analysis of face detection and recognition algorithms using Viola Jones algorithm with PCA and LDA,” 2018. 2nd Int. Conf. Trends Electron. Informat. (ICOEI), 2018, pp. 945–950, doi: 10.1109/ICOEI.2018.8553811.

L. Liying and H. Yue, “Study on access control system based on face recognition,” 2008 Int. Conf. Comput. Sci. Softw. Eng., 2008, pp. 876–878, doi: 10.1109/CSSE.2008.451.

R. Boda and M.J.P. Priyadarsini, “Face detection and tracking using KLT and Viola Jones,” ARPN J. Eng. Appl. Sci., vol. 11, no. 23, pp. 13472–13476, Dec. 2016.

E. Abusham, B. Ibrahim, K. Zia, and M. Rehman, “Facial image encryption for secure face recognition system,” Electron., vol. 12, no. 3, pp. 1–26, Feb. 2023, doi: 10.3390/electronics12030774.

M. Magfirawaty et al., “Principal component analysis and data encryption model for face recognition system,” 2022 2nd Int. Conf. Electron. Electr. Eng. Intell. Syst. (ICE3IS), 2022, pp. 381–386, doi: 10.1109/ICE3IS56585.2022.10010080.

K. Padmavathi and K. Thangadurai, “Implementation of RGB and grayscale images in plant leaves disease detection - Comparative study,” Indian J. Sci. Technol., vol. 9, no. 6, pp. 1–6, Feb. 2016, doi: 10.17485/ijst/2016/v9i6/77739.

M. Gao and T.-F. Lu, “Image processing and analysis for autonomous grapevine pruning,” 2006 Int. Conf. Mechatronics Autom., 2006, pp. 922–927, doi: 10.1109/ICMA.2006.257748.

V. Goel, S. Singhal, T. Jain, and S. Kole, “Specific color detection in images using RGB modelling in MATLAB,” Int. J. Comput. Appl., vol. 161, no. 8, pp. 38–42, Mar. 2017, doi: 10.5120/ijca2017913254.

P.S. Sneha, S. Sankar, and A.S. Kumar, “A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–Tent maps,” J. Ambient Intell. Humanized Comput., vol. 11, no. 3, pp. 1289–1308, Mar. 2020, doi: 10.1007/s12652-019-01385-0.

R. Munir, “Algoritma enkripsi citra digital berbasis chaos dengan penggabungan teknik permutasi dan teknik substitusi menggunakan Arnold cat map dan logistic map,” J. Nas. Pendidik. Tek. Inform., JANAPATI, vol. 1, no. 3, pp. 166–181, Dec. 2012, doi: 10.23887/janapati.v1i3.9814.

W. Zhang, Z. Zhu, and H. Yu, “A symmetric image encryption algorithm based on a coupled logistic-Bernoulli map and cellular automata diffusion strategy,” Entropy, vol. 21, no. 5, pp. 1–23, May 2019, doi: 10.3390/e21050504.

J. Khan et al., “SMSH: Secure surveillance mechanism on smart healthcare IoT system with probabilistic image encryption,” IEEE Access, vol. 8, pp. 15747–15767, Jan. 2020, doi: 10.1109/ACCESS.2020.2966656.

D. Elmaci and N.B. Catak, “An efficient image encryption algorithm for the period of Arnold’s cat map,” Int. J. Intell. Syst. Appl. Eng., vol. 6, no. 1, pp. 80–84, Jan.-Mar. 2018, doi: 10.18201/ijisae.2018637935.

R. Ye, “A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism,” Optics Commun., vol. 284, no. 22, pp. 5290–5298, Oct. 2011, doi: 10.1016/j.optcom.2011.07.070.

A.P. Kari, A.H. Navin, A.M. Bidgoli, and M. Mirnia, “A new image encryption scheme based on hybrid chaotic maps,” Multimedia Tools Appl., vol. 80, no. 2, pp. 2753–2772, Jan. 2021, doi: 10.1007/s11042-020-09648-1.

Y. Niu and X. Zhang, “A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation,” IEEE Access, vol. 8, pp. 22082–22093, Jan. 2020, doi: 10.1109/ACCESS.2020.2970103.

C. Irawan and E.H. Rachmawanto, “Implementasi kriptografi dengan menggunakan algoritma Arnold’s cat map dan Henon map,” J. Masy. Inform., vol. 13, no. 1, pp. 15–32, May 2022, doi: 10.14710/jmasif.13.1.43312.

P. Sankhe, S. Pimple, S. Singh, and A. Lahane, “An image cryptography using Henon map and Arnold cat map,” Int. Res. J. Eng. Technol., vol. 5, no. 4, pp. 1900–1904, Apr. 2018.

M. Tang, G. Zeng, Y. Yang, and J. Chen, “A hyperchaotic image encryption scheme based on the triple dislocation of the Liu and Lorenz system,” Optik, vol. 261, pp. 1–22, Jul. 2022, doi: 10.1016/j.ijleo.2022.169133.

S. Kanwal et al., “An effective color image encryption based on Henon map, tent chaotic map, and orthogonal matrices,” Sensors, vol. 22, no. 12, pp. 1–17, Jun. 2022, doi: 10.3390/s22124359.

W. Alexan et al., “Color image encryption through chaos and KAA map,” IEEE Access, vol. 11, pp. 11541–11554, Feb. 2023, doi: 10.1109/ACCESS.2023.3242311.

P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” Proc. 2001 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. (CVPR 2001), 2001, pp. I-511–I-518, doi: 10.1109/CVPR.2001.990517.

N.H. Barnouti, M.H.N. Al-Mayyahi, and S.S.M. Al-Dabbagh, “Real-time face tracking and recognition system using Kanade-Lucas-Tomasi and two-dimensional principal component analysis,” 2018 Int. Conf. Adv. Sci. Eng. (ICOASE), 2018, pp. 24–29, 2018, doi: 10.1109/ICOASE.2018.8548818.

Published
2024-05-30
How to Cite
Magfirawaty Magfirawaty, Ariska Allamanda, Malika Ayunasari, & Muhammad Nadhif Zulfikar. (2024). Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System. Jurnal Nasional Teknik Elektro Dan Teknologi Informasi, 13(2), 93-100. https://doi.org/10.22146/jnteti.v13i2.9623
Section
Articles