A New method for Image Encryption Using Chaotic Permutation

Full Text (PDF, 1069KB), PP.42-49

Views: 0 Downloads: 0

Author(s)

Somayyeh Jafarali Jassbi 1,* Ashkan Emami Ale Agha 1

1. Department of Computer Engineering, Science and Research Branch, Islamic Azad University, Tehran, Iran

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2020.02.05

Received: 20 Dec. 2019 / Revised: 15 Jan. 2020 / Accepted: 3 Feb. 2020 / Published: 8 Apr. 2020

Index Terms

Image encryption, chaotic map, permutation, pseudo random bit, Logistic Map, Ikeda Map, pixel scrambling

Abstract

With the extensive recent development of communication methods and resulting increase in data surveillance and espionage, the need for reliable data encryption methods is greater than ever. Conventional encryption calculations, for example, DES and RSA, are not beneficial in the field of picture encryption because of some inherent characteristics of pictures such as bulk data size and high redundancy, which are problematic for conventional encryption. Many researchers have proposed different image encryption schemes to overcome image encryption problems. In the last two decades, more and more studies have looked to incorporate conventional encryption methods and the complex behavior of chaotic signals. In this paper, a novel image encryption algorithm is proposed based on pixel chaotic permutation. A chaotic logistic map and Ikeda map are used to design a new pseudo-random bit generator, and a novel permutation scheme is used to modify pixel values. Then, a new permutation algorithm based on a traditional Japanese game called Amidakuji is used for pixel scrambling. Different statistical manners, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, are used to provide analysis of the effectiveness of the proposed encryption methods. Our example reveals that the proposed encryption method can obtain highly secure encrypted images using a novel chaotic permutation method based on Amidakuji.

Cite This Paper

Somayyeh Jafarali Jassbi, Ashkan Emami Ale Agha, " A New method for Image Encryption Using Chaotic Permutation", International Journal of Image, Graphics and Signal Processing(IJIGSP), Vol.12, No.2, pp. 42-49, 2020. DOI: 10.5815/ijigsp.2020.02.05

Reference

[1]Schneier B.: Cryptography: Theory and Practice, CRC Press, Boca Raton, 1995.

[2]R. Ye and W. Zhou, An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice, International Journal of Information and Communication Technology Research, 1(8), 2011, pp. 344-348.   

[3]J. Daemen, B. Sand, V. Rijmen, The Design of Rijndael: AES–The Advanced Encryption Standard, Springer-Verlag, Berlin, 2002.

[4]Fridrich, J.: Symmetric ciphers based on two dimensional chaotic maps. International Journal of Bifurcation and Chaos 8, 1259--1284 (1998).

[5]Shannon, C. E. “Communication Theory of Secrecy Systems .”; Bell Syst. Tech. J. 1949, 28, 656-715.

[6]Kwok H. and Tang W., “A Fast Image Encryption System Based on Chaotic Maps With Finite Precision Representation,” Chaos, Solitons and Fractals, vol. 32, no. 4, pp. 1518-1529, 2007.

[7]Pareek N. K., Patidar Vinod and Sud K. K. Discrete chaotic cryptography using external secret key. Physics Letters A, vol. 309, pp. 75-82, 2003. 

[8]C. Pellicer-Lostao and R. Lopez-Ruiz, “Pseudo-Random Bit Generation Based on 2D Chaotic Maps of Logistic Type and Its Applications in Chaotic Cryptography,” Journal of Computational Science and Its Applications, Vol. 5073, 2008, pp. 784-796. 

[9]K.Ikeda, Multiple-valued Stationary State and its Instability of the Transmitted Light by a Ring Cavity System, Opt. Commun. 30 257-261 (1979); K. Ikeda, H. Daido and O. Akimoto, Optical Turbulence: Chaotic Behavior of Transmitted Light from a Ring Cavity, Phys. Rev. Lett. 45, 709–712 (1980).

[10]Vinod Patidar, K.K. Sud (2009), A Pseudo Random Bit Generator Based on Chaotic Logisitic Map and its statistical Testing, Informatica volume 33, pp. 441-452.

[11]El Assad, S., Farajallah, M.: A new chaos-based image encryption system. Signal Process.: Image Communication. (2015).

[12]Wang, L.; Song, H.; Liu, P. A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Lasers Eng. 2016, 77, 118–125.

[13]Zhongyun Hua, Yicong Zhou, "Image encryption using 2D Logistic-adjusted-Sine map," Information Sciences, vol. 339, pp. 237–253, 2016.

[14]LI, C. H., LUO, G. C., Ke, Q. I. N., & LI, C. B. (2017). A Novel Image Encryption Algorithm Based on Bernoulli Maps. DEStech Transactions on Computer Science and Engineering, (ameit).

[15]Wang, X., Wang, S., Zhang, Y., & Guo, K. (2017). A novel image encryption algorithm based on chaotic shuffling method. Information Security Journal: A Global Perspective, 26(1), 7-16.

[16]Jin, C., & Liu, H. (2017). A Color Image Encryption Scheme Based on Arnold Scrambling and Quantum Chaotic. IJ Network Security, 19(3), 347-357.

[17]Enayatifar, R., Abdullah, A. H., Isnin, I. F., Altameem, A., & Lee, M. (2017). Image encryption using a synchronous permutation-diffusion technique. Optics and Lasers in Engineering, 90, 146-154.

[18]Niu, Y., Zhang, X., & Han, F. (2017). Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database. Computational intelligence and neuroscience, 2017.

[19]Fan, H., & Li, M. (2017). Cryptanalysis and Improvement of Chaos-Based Image Encryption Scheme with Circular Inter-Intra-Pixels Bit-Level Permutation. Mathematical Problems in Engine

[20]Ge, Meng, and Ruisong Ye. "A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties." Egyptian Informatics Journal (2018).

[21]Liu, Zeyu, and Tiecheng Xia. "Novel two dimensional fractional-order discrete chaotic map and its application to image encryption." Applied Computing and Informatics 14, no. 2 (2018): 177-185.

[22]Huang, Linqing, Shuting Cai, Mingqing Xiao, and Xiaoming Xiong. "A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion." Entropy 20, no. 7 (2018): 535.

[23]Ismail, Samar M., Lobna A. Said, Ahmed G. Radwan, Ahmed H. Madian, and Mohamed F. Abu-Elyazeed. "Generalized double-humped logistic map-based medical image encryption." Journal of advanced research 10 (2018): 85-98.