A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture

Full Text (PDF, 725KB), PP.19-30

Views: 0 Downloads: 0

Author(s)

Ruisong Ye 1,* Shaojun Zeng 2 Junming Ma 2 Chuting Lai 2

1. Department of Mathematics, Shantou University Shantou, Guangdong, 515063, P. R. China

2. Department of Mathematics, Shantou University, Shantou, Guangdong, 515063, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2014.03.03

Received: 6 Dec. 2013 / Revised: 20 Jan. 2014 / Accepted: 15 Feb. 2014 / Published: 8 Mar. 2014

Index Terms

Chaotic system, skew tent map, image encryption, permutation-substitution architecture

Abstract

A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, then 2D skew tent map is utilized to generate chaotic sequences, which are used for both permutation process and substitution process. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plaintext sensitivity. The substitution process is first initiated with the initial vectors generated by the cipher keys and 2D skew tent map, then the gray values of row and column pixels of 2D image matrix are mixed with the pseudorandom number sequences via bitxoring operation. Both permutation process and substitution process are executed row-by-row and column-by-column instead of pixel-by-pixel to improve the speed of encryption. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption/decryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications.

Cite This Paper

Ruisong Ye, Shaojun Zeng, Junming Ma, Chuting Lai, "A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture", International Journal of Modern Education and Computer Science (IJMECS), vol.6, no.3, pp.19-30, 2014. DOI:10.5815/ijmecs.2014.03.03

Reference

[1]J. Fridrich, Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, 8(1998), 1259–1284.
[2]L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, 1(2001), 6–21.
[3]F. Huang, Z.-H. Guan, A modified method of a class of recently presented cryptosystems, Chaos, Solitons and Fractals, 23(2005), 1893–1899.
[4]N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image and Vision Computing, 24(2006), 926-934.
[5]G. J. Zhang, Q. Liu, A novel image encryption method based on total shuffling scheme, Optics Communications, 284(2011), 2775–2780.
[6]R. Ye, A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, Optics Communications, 284(2011), 5290–5298.
[7]B. Schiener, Applied Cryptography: Protocols, Algorithms and Source Code in C, John Wiley and sons, New York, 1996.
[8]N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image and Vision Computing, 24(2006), 926-934.
[9]N. Masuda, K. Aihara, Cryptosystems with discretized chaotic maps, IEEE Trans. Circuits Syst. I, 49(2002), 28–40.
[10]H. Liu, X. Wang, Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Optics Communications, 284(2011), 3895–3903.
[11]S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, A. Akhavan, A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps, Phys. Lett. A, 366(2007), 391–396.
[12]R. Ye, H. Huang, Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking, I. J. Image, Graphics and Signal Processing, 1(2010), 19–29.
[13]S. Lian, J. Sun, Z. Wang, A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons and Fractals, 26 (2005), 117–129.
[14]V. Patidar, N. K. Pareek, K. K. Sud, A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 14 (2009), 3056–3075.
[15]Y. Wang, K.W. Wong, X. F. Liao, T. Xiang, G. R. Chen, A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons and Fractals, 41(2009), 1773–1783.
[16]S. J. Li, C. Q. Li, G. R. Chen, N. G. Bourbakis, K. T. Lo, A general quantitative cryptanalysis of permutation-only multimedia ciphers against plain-image attacks. Signal Process. Image Commun., 23(2009), 212–223.
[17]C. Q. Li, S. J. Li, G. R. Chen, G. Chen, L. Hu, Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J. Appl. Signal Process., 8(2005), 1277–1288.
[18]Patidar Vinod, N.K. Pareek, K.K. Sud, A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulations, 14 (2009), 3056-3075.
[19]Patidar Vinod, N.K. Pareek, G. Purohit, K.K. Sud, Modified substitution–diffusion image cipher using chaotic standard and logistic maps, Communications in Nonlinear Science and Numerical Simulations, 15 (2010), 2755-2765.
[20]Patidar Vinod, N.K. Pareek, G. Purohit, K.K. Sud, A new chaos based permutation-substitution approach for image incryption, in: L.M. Patnaik, K.R. Venugopal (Eds.), Proceedings of the 4th International Conference on Information Processing, I. K. International Publishing House, New Delhi, 2010.
[21]Vinod Patidar, N.K. Pareek, G. Purohit, K.K. Sud. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption, Optics Communications, 284(2011), 4331-4339.
[22]Ruisong Ye, Wei Zhou. An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice, International Journal of Information and Communication Technology Research, 1:8(2011), 344-348.
[23]C. Robinson, An Introduction to Dynamical Systems, Continuous and Discrete. Prentice Hall, 2004
[24]C.E. Shannon, Communication theory of secrecy system. Bell Syst. Tech. J, 28(1949), 656–715.