Image encryption based on permutation polynomials over finite fields

被引:2
作者
Wu, Jianhua [1 ]
Liu, Hai [1 ]
Zhu, Xishun [2 ]
机构
[1] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[2] Nanchang Univ, Gongqing Coll, Jiujiang 332020, Peoples R China
基金
中国国家自然科学基金;
关键词
finite field; permutation polynomial; scrambling; diffusion; image encryption; FRACTIONAL FOURIER-TRANSFORM; COSINE TRANSFORMS; ALGORITHM; COMPRESSION; SCHEME; DCT;
D O I
10.37190/oa200303
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists of four stages: i) a mapping from pixel gray-levels into finite field, ii) a pre-scrambling of pixels' positions based on the parameterized permutation polynomial, iii) a symmetric matrix transform over finite fields which completes the operation of diffusion and, iv) a post-scrambling based on the permutation polynomial with different parameters. The parameters used for the polynomial parameterization and for constructing the symmetric matrix are used as cipher keys. Theoretical analysis and simulation demonstrate that the proposed image encryption scheme is feasible with a high efficiency and a strong ability of resisting various common attacks. In addition, there are not any round-off errors in computation over finite fields, thus guaranteeing a strictly lossless image encryption. Due to the intrinsic nonlinearity of permutation polynomials in finite fields, the proposed image encryption system is nonlinear and can resist known-plaintext and chosen-plaintext attacks.
引用
收藏
页码:357 / 376
页数:20
相关论文
共 36 条
[1]   On constructing permutations of finite fields [J].
Akbary, Amir ;
Ghioca, Dragos ;
Wang, Qiang .
FINITE FIELDS AND THEIR APPLICATIONS, 2011, 17 (01) :51-67
[2]  
[曹喜望 CAO Xiwang], 2006, [数学研究与评论, Journal of Mathematical Research and Exposition], V26, P219
[3]   Image compression-encryption algorithm combining compressive sensing with log operation [J].
Chen, Rong-Ling ;
Zhou, Ying ;
Luo, Ming ;
Gong, Li-Hua .
OPTICA APPLICATA, 2018, 48 (04) :563-573
[4]   New Kloosterman sums identities over F2m for all m [J].
Helleseth, T ;
Zinoviev, V .
FINITE FIELDS AND THEIR APPLICATIONS, 2003, 9 (02) :187-193
[5]   Image encryption based on the reality-preserving multiple-parameter fractional Fourier transform and chaos permutation [J].
Lang, Jun .
OPTICS AND LASERS IN ENGINEERING, 2012, 50 (07) :929-937
[6]  
Li LS, 2018, FINITE FIELDS TH APP, V51, P31, DOI 10.1016/j.ffa.2018.01.003
[7]   Further results on a class of permutation polynomials over finite fields [J].
Li, Nian ;
Helleseth, Tor ;
Tang, Xiaohu .
FINITE FIELDS AND THEIR APPLICATIONS, 2013, 22 :16-23
[8]   Image encryption combining multiple generating sequences controlled fractional DCT with dependent scrambling and diffusion [J].
Liang, Yaru ;
Liu, Guoping ;
Zhou, Nanrun ;
Wu, Jianhua .
JOURNAL OF MODERN OPTICS, 2015, 62 (04) :251-264
[9]  
Lidl R., 1997, Finite Fields
[10]   Cosine transforms over fields of characteristic 2: Fast computation and application to image encryption [J].
Lima, J. B. ;
da Silva, E. S. ;
Campello de Souza, R. M. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2017, 54 :130-139