DOI QR코드

DOI QR Code

A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps

  • Hanchinamani, Gururaj (Department of Computer Science and Engineering, BVB College of Engineering & Technology) ;
  • Kulakarni, Linganagouda (Department of Computer Science and Engineering, BVB College of Engineering & Technology)
  • Received : 2014.08.04
  • Accepted : 2014.11.05
  • Published : 2014.12.30

Abstract

In this paper an efficient image encryption scheme based on cyclic rotations and multiple blockwise diffusions with two chaotic maps is proposed. A Sin map is used to generate round keys for the encryption/decryption process. A Pomeau-Manneville map is used to generate chaotic values for permutation, pixel value rotation and diffusion operations. The encryption scheme is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage performs four operations on the image: row shuffling, column shuffling, cyclic rotation of all the rows and cyclic rotation of all the columns. This stage reduces the correlation significantly among neighboring pixels. The second stage performs circular rotation of pixel values twice by scanning the image horizontally and vertically. The amount of rotation is based on $M{\times}N$ chaotic values. The last stage performs the diffusion four times by scanning the image in four different ways: block of $8{\times}8$ pixels, block of $16{\times}16$ pixels, principal diagonally, and secondary diagonally. Each of the above four diffusions performs the diffusion in two directions (forwards and backwards) with two previously diffused pixels and two chaotic values. This stage makes the scheme resistant to differential attacks. The security and performance of the proposed method is analyzed systematically by using the key space, entropy, statistical, differential and performance analysis. The experimental results confirm that the proposed method is computationally efficient with high security.

Keywords

References

  1. A. A. A. El-Latif, L. Li, T. Zhang, N. Wang, X. Song, and Niu, X, "Digital image encryption scheme based on multiple chaotic systems," Sensing and Imaging: An International Journal, vol. 13, no. 2, pp. 67-88, 2012. https://doi.org/10.1007/s11220-012-0071-z
  2. G. Ye and K. W. Wong, "An efficient chaotic image encryption algorithm based on a generalized Arnold map," Nonlinear Dynamics, vol. 69, no. 4, pp. 2079-2087, 2012. https://doi.org/10.1007/s11071-012-0409-z
  3. G. Hanchinamani and L. Kulakarni, "Image encryption based on 2-D Zaslavskii chaotic map and pseudo hadmard transform," International Journal of Hybrid Information Technology, vol. 7, no. 4, pp. 185-200, 2014. https://doi.org/10.14257/ijhit.2014.7.4.16
  4. I. S. Sam, P. Devaraj, and R. S. Bhuvaneswaran, "An intertwining chaotic maps based image encryption scheme," Nonlinear Dynamics, vol. 69, no. 4, pp. 1995-2007, 2012. https://doi.org/10.1007/s11071-012-0402-6
  5. A. A. A. El-Latif, L. Li, and X. Niu, "A new image encryption scheme based on cyclic elliptic curve and chaotic system," Multimedia Tools and Applications, vol. 70, no. 3, pp. 1559-1584, 2012.
  6. C. K. Huang, C. W. Liao, S. L. Hsu, and Y. C. Jeng, "Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system," Telecommunication Systems, vol. 52, no. 2, pp. 563-571, 2013.
  7. N. Taneja, B. Raman, and I. Gupta, "Combinational domain encryption for still visual data," Multimedia Tools and Applications, vol. 59, no. 3, pp. 775-793, 2012. https://doi.org/10.1007/s11042-011-0775-4
  8. M. Francois, T. Grosges, D. Barchiesi, and R. Erra, "A new image encryption scheme based on a chaotic function," Signal Processing: Image Communication, vol. 27, no. 3, pp. 249-259, 2012. https://doi.org/10.1016/j.image.2011.11.003
  9. X. Huang, "Image encryption algorithm using chaotic Chebyshev generator," Nonlinear Dynamics, vol. 67, no. 4, pp. 2411-2417, 2012. https://doi.org/10.1007/s11071-011-0155-7
  10. L. Zhao, A. Adhikari, D. Xiao, and K. Sakurai, "On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption," Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 8, pp. 3303-3327, 2012. https://doi.org/10.1016/j.cnsns.2011.12.015
  11. J. W. Yoon and H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 12, pp. 3998-4006, 2010. https://doi.org/10.1016/j.cnsns.2010.01.041
  12. D. Chattopadhyay, M. K. Mandal, and D. Nandi, "Symmetric key chaotic image encryption using circle map," Indian Journal of Science and Technology, vol. 4, no. 5, pp. 593-599, 2011.
  13. A. Akhshani, S. Behnia, A. Akhavan, H. A. Hassan, and Z. Hassan, "A novel scheme for image encryption based on 2D piecewise chaotic maps," Optics Communications, vol. 283, no. 17, pp. 3259-3266, 2010. https://doi.org/10.1016/j.optcom.2010.04.056
  14. C. Cokal and E. Solak, "Cryptanalysis of a chaos-based image encryption algorithm," Physics Letters A, vol. 373, no. 15, pp. 1357-1360, 2009. https://doi.org/10.1016/j.physleta.2009.02.030
  15. S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, and A. Akhavan, "A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps," Physics Letters A, vol. 366, no. 4, pp. 391-396, 2007. https://doi.org/10.1016/j.physleta.2007.01.081
  16. G. Alvarez and S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006. https://doi.org/10.1142/S0218127406015970
  17. V. Patidar, N. K. Pareek, and K. K. Sud, "A new substitution-diffusion based image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 7, pp. 3056-3075, 2009. https://doi.org/10.1016/j.cnsns.2008.11.005
  18. N. K. Pareek, V. Patidar, and K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, vol. 24, no. 9, pp. 926-934, 2006. https://doi.org/10.1016/j.imavis.2006.02.021
  19. J. Hu and F. Han, "A pixel-based scrambling scheme for digital medical images protection," Journal of Network and Computer Applications, vol. 32, no. 4, pp. 788-794, 2009. https://doi.org/10.1016/j.jnca.2009.02.009
  20. G. Ye, "Image scrambling encryption algorithm of pixel bit based on chaos map," Pattern Recognition Letters, vol. 31, no. 5, pp. 347-354, 2010. https://doi.org/10.1016/j.patrec.2009.11.008
  21. T. Gao and Z. Chen, "A new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008. https://doi.org/10.1016/j.physleta.2007.07.040
  22. R. Ye, "A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism," Optics Communications, vol. 284, no. 22, pp. 5290-5298, 2011. https://doi.org/10.1016/j.optcom.2011.07.070