Entropy-based image encryption using Orthogonal Variable Spreading Factor (OVSF)
Cifrado de imágenes basado en la entropía utilizando el Factor de Propagación Variable Ortogonal (OVSF)
DOI:
https://doi.org/10.15446/ing.investig.v40n3.81421Keywords:
entropy, OVSF, image encryption, security, privacy, ciphered data (en)entropía, OVSF, cifrado de imágenes, seguridad, privacidad, datos cifrados (es)
The purpose of image encryption is to provide data privacy and security. The former ensures that only authorized personnel can access the original content, while the latter implies that there is no evident relationship between the encrypted and the original content, and that the key space is equally likely and large enough. In the current state of the field, there are several proposals of image encryption techniques with very high privacy (in terms of entropy) but weak in terms of security (i.e., small key space). Recently, a new encoding-based method that provides a long key space (namely 8,57 × 10506) with a middle value of entropy (87%) was proposed. Our proposal preserves the strength of the image encryption methods based on encoding, but with a higher value placed on security than the preliminary works. Every pixel of an image is mapped into an orthogonal code based on 256 bits. The 8-OVSF codes are selected to encode the image, given that the entropy of the inter-symbol is near the possible maximum. Numerous test results verify that our ciphered data have a very high value of entropy (98,5%) with an equally likely and long key space (8,57 × 10506), thus providing an adequate balance between privacy and security.
El objetivo del cifrado de imágenes es proporcionar privacidad y seguridad a los datos. La primera garantiza que solo el personal autorizado pueda acceder al contenido original, mientras que la otra implica que no exista relación evidente entre el contenido cifrado y el original, y que el conjunto de claves tenga igualdad de probabilidad y sea lo suficientemente grande. En el estado del arte existen numerosas propuestas de técnicas de cifrado de imágenes con alta privacidad (en términos de entropía), pero con deficiencia en términos de seguridad (es decir, un conjunto de claves pequeño). Recientemente, se propuso un método basado en codificación que proporciona un espacio de clave grande (específicamente, 8,57 × 10506) con un valor intermedio de entropía (87 %). Nuestra propuesta conserva la fortaleza de los métodos de cifrado de imágenes basados en codificación, pero con mayor valor de seguridad que los trabajos anteriores. Cada píxel de una imagen es mapeado a un código ortogonal de 256 bits. Los códigos 8-OVSF se seleccionan para codificar la imagen, debido a que la entropía del inter-símbolo es cercana al máximo posible. Los resultados de numerosas pruebas demuestran que nuestros datos cifrados tienen un valor de entropía muy alto (98,5 %) con un conjunto de claves grande (8,57 × 10506) e igualmente probable, lo que proporciona un equilibrio adecuado entre privacidad y seguridad.
References
Akhavan, A., Samsudin, A., and Akhshani, A. (2017). Cryptanalysis of an image encryption algorithm based on DNA encoding. Optics and Laser Technology, 95, 94-99. https://doi.org/10.1016/j.optlastec.2017.04.022
Asgari-Chenaghlu, M., Balafar, M. A., and Feizi-Derakhshi, M. R. (2019). A novel image encryption algorithm based on poly-nomial combination of chaotic maps and dynamic function generation. Signal Processing, 157, 1-13. https://doi.org/10.1016/j.sigpro.2018.11.010
Ballesteros, D. M., Peña, J., and Renza, D. (2018). A Novel Im-age Encryption Scheme Based on Collatz Conjecture. Entropy, 20(12), 901. https://doi.org/10.3390/e20120901
Belmeguenai, A., Ahmida, Z., Ouchtati, S., and Djemii, R. (2017). A novel approach based on stream cipher for selective speech encryption. International Journal of Speech Technology, 20(3), 685-698. https://doi.org/10.1007/s10772-017-9439-8
Broumandnia, A. (2019). Designing digital image encryption using 2D and 3D reversible modular chaotic maps. Journal of Information Security and Applications, 47, 188-198. https://doi.org/10.1016/j.jisa.2019.05.004
Chai, X., Gan, Z., Yuan, K., Chen, Y., and Liu, X. (2019). A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing and Applications, 31(1), 219-237. https://doi.org/10.1007/s00521-017-2993-9
Feng, W., He, Y., Li, H., and Li, C. (2019). Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access, 7, 12584-12597. https://doi.org/10.1109/ACCESS.2019.2893760
Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and cha-os, 8(06), 1259-1284. https://doi.org/10.1142/S021812749800098X
Hameed, Y. and Ali, N. (2018). An efficient audio encryption based on chaotic logistic map with 3D matrix. Journal of Theoretical and Applied Information Technology, 96, 5142-5152.
Hayat, U. and Azam, N. A. (2019). A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, 391-402. https://doi.org/10.1016/j.sigpro.2018.10.011
Hua, Z., Jin, F., Xu, B., and Huang, H. (2018). 2D Logistic-Sine-coupling map for image encryption. Signal Processing, 149, 148-161. https://doi.org/10.1016/j.sigpro.2018.03.010
Kalpana, M., Ratnavelu, K., and Balasubramaniam, P. (2019). An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimedia Tools and Applications, 78(5), 5969-5988. https://doi.org/10.1007/s11042-018-6373-y
Khoirom, M. S., Laiphrakpam, D. S., and Themrichon, T. (2018). Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik, 168, 370-375. https://doi.org/10.1016/j.ijleo.2018.04.068
Kumar, R. and Quan, C. (2019). Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform. Optics and Lasers in Engineering, 120, 118-126. https://doi.org/10.1016/j.optlaseng.2019.03.024
Li, C., Xie, T., Liu, Q., and Cheng, G. (2014). Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dynamics, 78(2), 1545-1551. https://doi.org/10.1007/s11071-014-1533-8
Liu, J. M. and Qu, Q. (2010, October). Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map. In Qingling, l., Fei, Y., and Yun L. (Eds.) 2010 IEEE Third International Symposium on Information Pro-cessing (pp. 67-69), Qingdao, China: IEEE. https://doi.org/10.1109/ISIP.2010.33
Patidar, V., Pareek, N. K., and Sud, K. K. (2009). A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3056-3075. https://doi.org/10.1016/j.cnsns.2008.11.005
Renza, D. and Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62-69. https://doi.org/10.1016/j.jisa.2019.02.010
Robinson, D. W. (2008). Entropy and uncertainty. Entropy, 10(4), 493-506. https://doi.org/10.3390/e10040493
Saini, D. S. and Bhooshan, S. V. (2006, July). Adaptive assignment scheme for OVSF codes in WCDMA. In Dini, P., Christer, Å., Dini, C., and Borcoci, E. (Eds.) 2006 IEEE International Conference on Wireless and Mobile Communications (IC-WMC'06) (pp. 65-65), Bucharest, Romania: IEEE. https://doi.org/10.1109/ICWMC.2006.15
Saljoughi, A. S. and Mirvaziri, H. (2019). A new method for im-age encryption by 3D chaotic map. Pattern Analysis and Applications, 22(1), 243-257. https://doi.org/10.1007/s10044-018-0765-5
Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell system technical journal, 28(4), 656-715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
Telem, A. N. K., Segning, C. M., Kenne, G., and Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014. https://doi.org/10.1155/2014/602921
Wang, B., Wei, X., and Zhang, Q. (2013). Cryptanalysis of an image cryptosystem based on logistic map. Optik, 124(14), 1773-1776. https://doi.org/10.1016/j.ijleo.2012.06.020
Wen, H., Yu, S., and Lü, J. (2019). Breaking an image encryption algorithm based on DNA encoding and spatiotemporal cha-os. Entropy, 21(3), 246. https://doi.org/10.3390/e21030246
Ye, G. and Huang, X. (2017). An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing, 251, 45-53. https://doi.org/10.1016/j.neucom.2017.04.016
Zhang, J., Fang, D., and Ren, H. (2014). Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering, 2014. https://doi.org/10.1155/2014/917147
Zhu, H., Zhao, Y., and Song, Y. (2019). 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access, 7, 14081-14098. https://doi.org/10.1109/ACCESS.2019.2893538
How to Cite
APA
ACM
ACS
ABNT
Chicago
Harvard
IEEE
MLA
Turabian
Vancouver
Download Citation
CrossRef Cited-by
1. Bahram Rashidi. (2025). A High Secure Image Encryption Method Based on an Efficient and Low‐Cost Cryptographic System. SECURITY AND PRIVACY, 8(6) https://doi.org/10.1002/spy2.70130.
2. Bahram Rashidi. (2024). An Image Encryption Method Based on a High-performance and Efficient Block Cipher. Journal of Signal Processing Systems, 96(10), p.601. https://doi.org/10.1007/s11265-024-01937-4.
Dimensions
PlumX
Article abstract page views
Downloads
License
Copyright (c) 2020 Dora M. Ballesteros, Diego Renza, Jimmy Peña

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors or holders of the copyright for each article hereby confer exclusive, limited and free authorization on the Universidad Nacional de Colombia's journal Ingeniería e Investigación concerning the aforementioned article which, once it has been evaluated and approved, will be submitted for publication, in line with the following items:
1. The version which has been corrected according to the evaluators' suggestions will be remitted and it will be made clear whether the aforementioned article is an unedited document regarding which the rights to be authorized are held and total responsibility will be assumed by the authors for the content of the work being submitted to Ingeniería e Investigación, the Universidad Nacional de Colombia and third-parties;
2. The authorization conferred on the journal will come into force from the date on which it is included in the respective volume and issue of Ingeniería e Investigación in the Open Journal Systems and on the journal's main page (https://revistas.unal.edu.co/index.php/ingeinv), as well as in different databases and indices in which the publication is indexed;
3. The authors authorize the Universidad Nacional de Colombia's journal Ingeniería e Investigación to publish the document in whatever required format (printed, digital, electronic or whatsoever known or yet to be discovered form) and authorize Ingeniería e Investigación to include the work in any indices and/or search engines deemed necessary for promoting its diffusion;
4. The authors accept that such authorization is given free of charge and they, therefore, waive any right to receive remuneration from the publication, distribution, public communication and any use whatsoever referred to in the terms of this authorization.










