An image encryption scheme with a pseudorandom permutation based on chaotic maps

نویسندگان

  • Ji Won Yoon
  • Hyoungshick Kim
چکیده

Many research efforts for image encryption schemes have elaborated for designing nonlinear functions since security of these schemes closely depends on inherent characteristics of non-linear functions. It is commonly believed that a chaotic map can be used as a good candidate of a nonlinear component for image encryption schemes. We propose a new image encryp-tion algorithm using a large pseudorandom permutation which is combinatorially generated from small permutation matrices based on chaotic maps. The random-like nature of chaos is effectively spread into encrypted images by using the permutation matrix. The experimental results show that the proposed encryption scheme provides comparable security with that of the conventional image encryption schemes based on Baker map or Logistic map. With the rapid developments in the multimedia industry and communications, a great deal of concerns have been raised in the security of multimedia data transmitted or stored over open channels. A major challenge is to protect confidentiality for multimedia data in digital distribution networks. The most effective method is to encrypt multimedia data so that the only authorized entities with the key can decrypt them. In practice Advanced Encryption Standard (AES) [1] has been widely recognized as de facto standard in multimedia industry. However, it is known that conventional encryption schemes such as AES have obvious limitations on the multimedia specific requirements [2] as follows: Perceptual quality control: An encryption algorithm can be used to intentionally degrade the quality of perception, but still keep the multimedia data visually perceivable. Codec/format compliant: It could be desired that the encryption algorithm preserves compression format of the multimedia data, so that the standard decoders can still decode the encrypted data without crashing. Real-time constraint: In many multimedia applications, it is important that the encryption and decryption algorithms are very efficient to access multimedia data in real time similar to unprotected data. As one of speed up techniques, some important parts of multimedia data can be selectively encrypted. To meet these challenges, many multimedia encryption schemes have been proposed [2,3]. A common design principle is to use nonlinear functions as fundamental building blocks for encryption [4]. Nonlinear components are essential to every strong cryptographic primitive. In conventional block cipher algorithms such as AES nonlinear functions are generally implemented as S-box which is a table-driven nonlinear substitution operation [1].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption

A great many chaos-based image encryption schemes have been proposed in the past decades. Most of them use the permutation-diffusion architecture in pixel level, which has been proved insecure enough as they are not dependent on plain-images and so cannot resist chosen/known plain-image attack usually. In this paper, we propose a novel image encryption scheme comprising of one permutation proce...

متن کامل

A Chaos-based Image Encryption Scheme Using Multimodal Skew Tent Maps

Chaotic multimodal skew tent maps are constructed to design an efficient chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the grey values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a multimodal skew tent map is utili...

متن کامل

Image encryption based on chaotic tent map in time and frequency domains

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

متن کامل

A novel chaotic encryption scheme based on pseudorandom bit padding

Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be ...

متن کامل

Symmetric Ciphers Based on Two-dimensional Chaotic Maps

In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes. A chaotic map is first generalized by introducing parameters and then discretized to a finite square lattice of points which represent pixels or some other data items. Although the discretized map is a permutation and thus cannot be ch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010