A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption

被引:135
|
作者
Patidar, Vinod [1 ]
Pareek, N. K. [2 ]
Purohit, G. [1 ]
Sud, K. K. [1 ]
机构
[1] Sir Padampat Singhania Univ, Sch Engn, Dept Phys, Udaipur 313601, Rajasthan, India
[2] MLS Univ, Univ Comp Ctr, Udaipur 313002, Rajasthan, India
关键词
Chaos; Cryptography; Image encryption; Ergodicity; Confusion-diffusion; Pseudorandom;
D O I
10.1016/j.optcom.2011.05.028
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A novel and robust chaos-based pseudorandom permutation-substitution scheme for image encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for the color images but may also be used for the gray scale images. A secret key of 161-bit, comprising of the initial conditions and system parameter of the chaotic map (the standard map), number of iterations and number of rounds, is used in the algorithm. The whole encryption process is the sequential execution of a preliminary permutation and a fix number of rounds (as specified in the secret key) of substitution and main permutation of the 2D matrix obtained from the 3D image matrix. To increase the speed of encryption all three processes: preliminary permutation, substitution and main permutation are done row-by-row and column-by-column instead of pixel-by-pixel. All the permutation processes are made dependent on the input image matrix and controlled through the pseudo random number sequences (PRNS) generated from the discretization of chaotic standard map which result in both key sensitivity and plaintext sensitivity. However each substitution process is initiated with the initial vectors (different for rows and columns) generated using the secret key and chaotic standard map and then the properties of rows and column pixels of input matrix are mixed with the PRNS generated from the standard map. The security and performance analysis of the proposed image encryption has been performed using the histograms, correlation coefficients, information entropy, key sensitivity analysis, differential analysis, key space analysis, encryption/decryption rate analysis etc. Results suggest that the proposed image encryption technique is robust and secure and can be used for the secure image and video communication applications. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:4331 / 4339
页数:9
相关论文
共 50 条
  • [31] A Secure and Efficient Color Image Encryption Scheme based on Two Chaotic Systems and Advanced Encryption Standard
    Nayak, Pragyanshree
    Nayak, Sanjeet Kumar
    Das, Satyabrata
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 412 - 418
  • [32] Colour Image Encryption Scheme Based on Permutation and Substitution Techniques
    Pareek, Narendra K.
    Patidar, Vinod
    Sud, Krishan K.
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 413 - +
  • [33] An image encryption scheme based on cross chaotic map
    Wang, Ling
    Ye, Qun
    Xiao, Yaoqiang
    Zou, Yongxing
    Zhang, Bo
    CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, : 22 - +
  • [34] Adaptive image encryption scheme based on chaotic map
    邱劲
    Liao Xiaofeng
    Xiao Di
    Xiang Tao
    High Technology Letters, 2013, 19 (01) : 76 - 81
  • [35] An image encryption scheme based on chaotic tent map
    Li, Chunhu
    Luo, Guangchun
    Qin, Ke
    Li, Chunbao
    NONLINEAR DYNAMICS, 2017, 87 (01) : 127 - 133
  • [36] Toward a Fully Secure Authenticated Encryption Scheme from a Pseudorandom Permutation
    Choi, Wonseok
    Lee, Byeonghak
    Lee, Jooyoung
    Lee, Yeongmin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT III, 2021, 13092 : 407 - 434
  • [37] An image encryption scheme based on chaotic tent map
    Chunhu Li
    Guangchun Luo
    Ke Qin
    Chunbao Li
    Nonlinear Dynamics, 2017, 87 : 127 - 133
  • [38] A new image encryption scheme based on chaotic map
    Liu Niansheng
    Li Yongmei
    Guo Donghui
    ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 652 - 655
  • [39] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Bhaskar Mondal
    Prabhakar Kumar
    Shrey Singh
    Multimedia Tools and Applications, 2018, 77 : 31177 - 31198
  • [40] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Mondal, Bhaskar
    Kumar, Prabhakar
    Singh, Shrey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 31177 - 31198