Image encryption based on permutation polynomials over finite fields

被引:2
作者
Wu, Jianhua [1 ]
Liu, Hai [1 ]
Zhu, Xishun [2 ]
机构
[1] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[2] Nanchang Univ, Gongqing Coll, Jiujiang 332020, Peoples R China
基金
中国国家自然科学基金;
关键词
finite field; permutation polynomial; scrambling; diffusion; image encryption; FRACTIONAL FOURIER-TRANSFORM; COSINE TRANSFORMS; ALGORITHM; COMPRESSION; SCHEME; DCT;
D O I
10.37190/oa200303
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists of four stages: i) a mapping from pixel gray-levels into finite field, ii) a pre-scrambling of pixels' positions based on the parameterized permutation polynomial, iii) a symmetric matrix transform over finite fields which completes the operation of diffusion and, iv) a post-scrambling based on the permutation polynomial with different parameters. The parameters used for the polynomial parameterization and for constructing the symmetric matrix are used as cipher keys. Theoretical analysis and simulation demonstrate that the proposed image encryption scheme is feasible with a high efficiency and a strong ability of resisting various common attacks. In addition, there are not any round-off errors in computation over finite fields, thus guaranteeing a strictly lossless image encryption. Due to the intrinsic nonlinearity of permutation polynomials in finite fields, the proposed image encryption system is nonlinear and can resist known-plaintext and chosen-plaintext attacks.
引用
收藏
页码:357 / 376
页数:20
相关论文
共 36 条
[21]   Nonlinear optical double image encryption using random-optical vortex in fractional Hartley transform domain [J].
Singh, Hukum .
OPTICA APPLICATA, 2017, 47 (04) :557-578
[22]   Color image encryption using singular value decomposition in discrete cosine Stockwell transform domain [J].
Vaish, Ankita ;
Kumar, Manoj .
OPTICA APPLICATA, 2018, 48 (01) :25-38
[23]  
Venturini I, 2004, 2004 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL V, PROCEEDINGS, P205
[24]   PERMUTATION POLYNOMIALS OF THE FORM X(R)F(X((Q-1)/D)) AND THEIR GROUP-STRUCTURE [J].
WAN, DQ ;
LIDL, R .
MONATSHEFTE FUR MATHEMATIK, 1991, 112 (02) :149-163
[25]   On permutation polynomials [J].
Wang, LY .
FINITE FIELDS AND THEIR APPLICATIONS, 2002, 8 (03) :311-322
[26]   Fully-phase optical image encryption in diffractive-imaging scheme with QR-code-based random illumination [J].
Wang, Zhipeng ;
Zhang, Yingying ;
Gong, Qiong ;
Li, Shuyi ;
Qin, Yi .
OPTICA APPLICATA, 2017, 47 (02) :233-243
[27]   Image encryption based on a reality-preserving fractional discrete cosine transform and a chaos-based generating sequence [J].
Wu, Jianhua ;
Guo, Fangfang ;
Zeng, Pingping ;
Zhou, Nanrun .
JOURNAL OF MODERN OPTICS, 2013, 60 (20) :1760-1771
[28]   Image scrambling encryption algorithm of pixel bit based on chaos map [J].
Ye, Guodong .
PATTERN RECOGNITION LETTERS, 2010, 31 (05) :347-354
[29]   A known-plaintext attack on iterative random phase encoding in fractional Fourier domains [J].
Yin, Fucheng ;
He, Qi ;
Liu, Zhengjun .
OPTICA APPLICATA, 2017, 47 (01) :131-139
[30]   Permutation polynomials of the form (xP-x+δ)S+L(x) [J].
Yuan, Jin ;
Ding, Cunsheng ;
Wang, Huaxiong ;
Pieprzyk, Josef .
FINITE FIELDS AND THEIR APPLICATIONS, 2008, 14 (02) :482-493