A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption

被引:135
|
作者
Patidar, Vinod [1 ]
Pareek, N. K. [2 ]
Purohit, G. [1 ]
Sud, K. K. [1 ]
机构
[1] Sir Padampat Singhania Univ, Sch Engn, Dept Phys, Udaipur 313601, Rajasthan, India
[2] MLS Univ, Univ Comp Ctr, Udaipur 313002, Rajasthan, India
关键词
Chaos; Cryptography; Image encryption; Ergodicity; Confusion-diffusion; Pseudorandom;
D O I
10.1016/j.optcom.2011.05.028
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A novel and robust chaos-based pseudorandom permutation-substitution scheme for image encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for the color images but may also be used for the gray scale images. A secret key of 161-bit, comprising of the initial conditions and system parameter of the chaotic map (the standard map), number of iterations and number of rounds, is used in the algorithm. The whole encryption process is the sequential execution of a preliminary permutation and a fix number of rounds (as specified in the secret key) of substitution and main permutation of the 2D matrix obtained from the 3D image matrix. To increase the speed of encryption all three processes: preliminary permutation, substitution and main permutation are done row-by-row and column-by-column instead of pixel-by-pixel. All the permutation processes are made dependent on the input image matrix and controlled through the pseudo random number sequences (PRNS) generated from the discretization of chaotic standard map which result in both key sensitivity and plaintext sensitivity. However each substitution process is initiated with the initial vectors (different for rows and columns) generated using the secret key and chaotic standard map and then the properties of rows and column pixels of input matrix are mixed with the PRNS generated from the standard map. The security and performance analysis of the proposed image encryption has been performed using the histograms, correlation coefficients, information entropy, key sensitivity analysis, differential analysis, key space analysis, encryption/decryption rate analysis etc. Results suggest that the proposed image encryption technique is robust and secure and can be used for the secure image and video communication applications. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:4331 / 4339
页数:9
相关论文
共 50 条
  • [1] A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
    Arif, Jameel
    Khan, Muazzam A.
    Ghaleb, Baraq
    Ahmad, Jawad
    Munir, Arslan
    Rashid, Umer
    Al-Dubai, Ahmed Y.
    IEEE ACCESS, 2022, 10 : 12966 - 12982
  • [2] Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain
    Noha Ramadan
    HossamEldin H. Ahmed
    Said E. El-khamy
    Fathi E. Abd El-Samie
    Journal of Central South University, 2017, 24 : 2049 - 2057
  • [3] Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain
    Noha, Ramadan
    HossamEldin, Ahmed H.
    Said, El-khamy E.
    Fathi, Abd El-Samie E.
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2017, 24 (09) : 2049 - 2057
  • [4] Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain
    Ramadan Noha
    Ahmed HossamEldin H
    El-khamy Said E
    Abd El-Samie Fathi E
    JournalofCentralSouthUniversity, 2017, 24 (09) : 2049 - 2057
  • [5] Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
    H.T. Panduranga
    S.K. Naveen Kumar
    The European Physical Journal Special Topics, 2014, 223 : 1663 - 1677
  • [6] Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher
    Panduranga, H. T.
    Kumar, S. K. Naveen
    Kiran
    EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (08): : 1663 - 1677
  • [7] Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
    Ahmad, Musheer
    Ahmad, Faiyaz
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 481 - 488
  • [8] An image encryption scheme with a pseudorandom permutation based on chaotic maps
    Yoon, Ji Won
    Kim, Hyoungshick
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (12) : 3998 - 4006
  • [9] A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos
    Wang, Xing-Yuan
    Zhang, Ying-Qian
    Bao, Xue-Mei
    ENTROPY, 2015, 17 (06): : 3877 - 3897
  • [10] A Novel Color Image Encryption Scheme Based on Permutation-substitution Architecture
    Ye, Rui-Song
    Ye, Ming
    Shi, Xiao-Yun
    Ye, Wen-Hao
    Li, Ya-Fang
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 212 - 218