DOI QR코드

DOI QR Code

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong (School of Software and Communication Engineering, Jiangxi University of Finance and Economics) ;
  • Jia, Xiaoyang (Changchun China Optical Science & Technology Museum)
  • Received : 2017.12.27
  • Accepted : 2018.05.08
  • Published : 2018.09.30

Abstract

A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.

Keywords

References

  1. Y. Zhou, L. Bao and C. L. P. Chen, "A new 1D chaotic system for image encryption," Signal Processing, vol. 97, no. 7, pp. 172-182, April 2014. https://doi.org/10.1016/j.sigpro.2013.10.034
  2. X. Li, G. Zhang and X. Zhang, "Image encryption algorithm with compound chaotic maps," Journal of Ambient Intelligence and Humanized Computing, vol. 6, no. 5, pp. 563-570, May 2015. https://doi.org/10.1007/s12652-013-0217-4
  3. A. Akif, M. Irene, P. Ihsan and S. Vaidyanathan, "A new four-scroll chaotic attractor and its engineering applications," Optik, vol. 127, no. 13, pp. 5491-5499, July 2016. https://doi.org/10.1016/j.ijleo.2016.02.066
  4. E. Chen, L. Min and G. Chen, "Discrete chaotic systems with one-line equilibria and their application to image encryption," International Journal of Bifurcation and Chaos, vol. 27, no. 3, pp. 1750046 (17 pages), March 2017. https://doi.org/10.1142/S0218127417500468
  5. N. B. Slimane, K. Bouallegue and M. Machhout, "Designing a multi-scroll chaotic system by operating Logistic map with fractal process," Nonlinear Dynamics, vol. 88, no. 3, pp. 1655-1675, March 2017. https://doi.org/10.1007/s11071-017-3337-0
  6. T. Sivakumar and R. Venkatesan, "A novel image encryption using calligraphy based scan method and random number," KSII Transactions on Internet & Information Systems, vol. 9, no. 6, pp. 2317-2337, June 2015. https://doi.org/10.3837/tiis.2015.06.020
  7. J. S. A. E. Fouda, J. Y. Effa, S. L. SamratL and M. Ali, "A fast chaotic block cipher for image encryption," Communications in Nonlinear Science & Numerical Simulation, vol. 19, no. 3, pp. 578-588, March 2014. https://doi.org/10.1016/j.cnsns.2013.07.016
  8. X. Wang and D. Xu, "A novel image encryption scheme using chaos and Langton's Ant cellular automaton," Nonlinear Dynamics, vol. 79, no. 4, pp. 2449-2456, March 2015. https://doi.org/10.1007/s11071-014-1824-0
  9. Y. Zhang, "A chaotic system based image encryption scheme with identical encryption and decryption algorithm," Chinese Journal of Electronics, vol. 26, no. 5, pp. 1022-1031, October 2017. https://doi.org/10.1049/cje.2017.08.022
  10. P. Li and Y. Zhao, "A simple encryption algorithm for quantum color image," International Journal of Theoretical Physics, vol. 56, no. 6, pp. 1961-1982, June 2017. https://doi.org/10.1007/s10773-017-3341-7
  11. C. Li, "Cracking a hierarchical chaotic image encryption algorithm based on permutation," Signal Processing, vol. 118, no. C, pp. 203-210, January 2016. https://doi.org/10.1016/j.sigpro.2015.07.008
  12. J. A. Jolfaei, X. Wu and V. Muthukkumarasamy, "On the security of permutation-only image encryption schemes," IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235-246, February 2016. https://doi.org/10.1109/TIFS.2015.2489178
  13. D. S. Laiphrakpam and M. S. Khumanthem, "Cryptanalysis of symmetric key image encryption using chaotic Rossler system," Optik, vol. 135, no. 4, pp. 200-209, April 2017. https://doi.org/10.1016/j.ijleo.2017.01.062
  14. B. Norouzi and S. Mirzkuchaki, "Breaking a novel image encryption scheme based on an improper fractional order chaotic system," Multimedia Tools & Applications, vol. 76, no. 2, pp. 1817-1826, February 2017. https://doi.org/10.1007/s11042-015-3085-4
  15. W. Wen, Y. Zhang, M. Su, R. Zhang, J. Chen and M. Li, "Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture," Nonlinear Dynamics, vol. 87, no. 1, pp. 383-390, January 2017. https://doi.org/10.1007/s11071-016-3049-x
  16. Y. Zhang and Y. Tang, "A plaintext-related image encryption algorithm based on chaos," Multimedia Tools and Applications, vol. 77, no. 6, pp. 6647-6669, March 2018. https://doi.org/10.1007/s11042-017-4577-1
  17. X. Chai, Z. Gan, K. Yang, Y. Chen and X. Liu, "An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations," Signal Processing: Image Communication, vol. 52, no. C, pp. 6-19, March 2017. https://doi.org/10.1016/j.image.2016.12.007
  18. A. V. Diaconu, "Circular inter-intra pixels bit-level permutation and chaos-based image encryption," Information Sciences, vol. 355-356, pp. 314-327, August 2016. https://doi.org/10.1016/j.ins.2015.10.027
  19. H. Fan and M. Li, "Cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation," Mathematical Problems in Engineering, vol. 2017, pp. 1-11, July 2017.
  20. W. Zhang, H. Yu, Y. Zhao and Z. Zhu, "Image encryption based on three-dimensional bit matrix permutation," Signal Processing, vol. 118, no. 1, pp. 36-50, January 2016. https://doi.org/10.1016/j.sigpro.2015.06.008
  21. J. Wu, X. Liao and B. Yang, "Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation," Signal Processing, vol. 142, no. 1, pp. 292-300, January 2018. https://doi.org/10.1016/j.sigpro.2017.06.014
  22. X. Wang and H. Zhang, "A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems," Nonlinear Dynamics, vol. 83, no. 1-2, pp. 333-346, February 2016. https://doi.org/10.1007/s11071-015-2330-8
  23. T. Ueta and G. Chen, "Bifurcation analysis of Chen's equation," International Journal of Bifurcation & Chaos, vol. 10, no. 8, pp. 1917-1931, August 2000. https://doi.org/10.1142/S0218127400001183
  24. National Institute of Standards and Technology, "Federal Information Processing Standard FIPS PUB 140-2, Security requirements for cryptographic modules," 2002.
  25. J. Daemen and V. Rijmen, "The design of Rijndael: AES - the Advanced Encryption Standard," Springer-Verlag, Berlin, 2002.
  26. G. Chen, Y. Mao and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos Solitons & Fractals, vol. 21, no. 3, pp. 749-761, July 2004. https://doi.org/10.1016/j.chaos.2003.12.022
  27. Z. Hua, Y. Zhou, C. Pun and C. L. P. Chen, "2D Sine Logistic modulation map for image encryption," Information Sciences, vol. 297, no. C, pp. 80-94, March 2015. https://doi.org/10.1016/j.ins.2014.11.018
  28. Unal Cavusoglu, S. Kacar, I. Pehlivan I and A. Zengin, "Secure image encryption algorithm design using a novel chaos based S-Box," Chaos Solitons & Fractals, vol. 95, no. 2, pp. 92-101, February 2017. https://doi.org/10.1016/j.chaos.2016.12.018
  29. G. Ye, H. Zhao and H. Chai, "Chaotic image encryption algorithm using wave-line permutation and block diffusion," Nonlinear Dynamics, vol. 83, no. 4, pp. 2067-2077, April 2016. https://doi.org/10.1007/s11071-015-2465-7