A Chaos-based Pseudorandom Permutation and Bilateral Diffusion Scheme for Image Encryption
نویسندگان
چکیده
A great many chaos-based image encryption schemes have been proposed in the past decades. Most of them use the permutation-diffusion architecture in pixel level, which has been proved insecure enough as they are not dependent on plain-images and so cannot resist chosen/known plain-image attack usually. In this paper, we propose a novel image encryption scheme comprising of one permutation process and one diffusion process. In the permutation process, the image sized M N is expanded to one sized 2 M N by dividing the plainimage into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits. The permutation operations are done row-by-row and column-by-column to increase the speed of permutation process. The chaotic cat map is utilized to generate chaotic sequences, which are quantized to shuffle the expanded image. The chaotic sequence for permutation process is dependent on plainimage and cipher keys, resulting in good key sensitivity and plain-image sensitivity. To achieve more avalanche effect and larger key space, a chaotic Bernoulli shift map based bilateral (i.e., horizontal and vertical) diffusion function is applied as well. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.
منابع مشابه
A Chaos-based Image Encryption Scheme Using Multimodal Skew Tent Maps
Chaotic multimodal skew tent maps are constructed to design an efficient chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, in which permuting the positions of image pixels incorporates with changing the grey values of image pixels to confuse the relationship between cipher-image and plain-image. In the permutation process, a multimodal skew tent map is utili...
متن کاملA Novel Chaos-based Image Encryption Scheme with an Improved Permutation Process
Confidentiality is an important issue when digital images are transmitted over public networks, and encryption is the most useful technique employed for this purpose. Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among adjacent pixels, which are generally difficult to handle by conventional algor...
متن کاملA Plain- Image Dependent Image Encryption Scheme Using Half-pixel-level Interchange Permutation Operation
In this paper, a chaos-based image encryption scheme with half-pixel-level interchange permutation strategy and plain-image dependence is proposed. The proposed image encryption scheme consists of a confusion process and a diffusion process. In the confusion process, a pixel-swapping operation between higher bit planes and lower bit planes is employed to replace the traditional confusion operat...
متن کاملA Novel Image Encryption Scheme Using Chaos and Hybrid Cellular Automata
This paper presents a novel image encryption scheme based on cellular automata (CA) and chaotic logistic mapping. The logistic chaotic mapping is used for shuffling the pixels which results in permutation. This permuted image is converted into a binary stream image where each rows of the image are converted into binary streams. Then a hybrid cellular automata (HCA) is used to provide diffusion ...
متن کاملA novel chaotic encryption scheme based on pseudorandom bit padding
Cryptography is always very important in data origin authentications, entity authentication, data integrity and confidentiality. In recent years, a variety of chaotic cryptographic schemes have been proposed. These schemes have typical structure which performed the permutation and the diffusion stages, alternatively. The random number generators are intransitive in cryptographic schemes and be ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014