Image encryption based on permutation polynomials over finite fields

被引:2
作者
Wu, Jianhua [1 ]
Liu, Hai [1 ]
Zhu, Xishun [2 ]
机构
[1] Nanchang Univ, Sch Informat Engn, Nanchang 330031, Jiangxi, Peoples R China
[2] Nanchang Univ, Gongqing Coll, Jiujiang 332020, Peoples R China
基金
中国国家自然科学基金;
关键词
finite field; permutation polynomial; scrambling; diffusion; image encryption; FRACTIONAL FOURIER-TRANSFORM; COSINE TRANSFORMS; ALGORITHM; COMPRESSION; SCHEME; DCT;
D O I
10.37190/oa200303
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists of four stages: i) a mapping from pixel gray-levels into finite field, ii) a pre-scrambling of pixels' positions based on the parameterized permutation polynomial, iii) a symmetric matrix transform over finite fields which completes the operation of diffusion and, iv) a post-scrambling based on the permutation polynomial with different parameters. The parameters used for the polynomial parameterization and for constructing the symmetric matrix are used as cipher keys. Theoretical analysis and simulation demonstrate that the proposed image encryption scheme is feasible with a high efficiency and a strong ability of resisting various common attacks. In addition, there are not any round-off errors in computation over finite fields, thus guaranteeing a strictly lossless image encryption. Due to the intrinsic nonlinearity of permutation polynomials in finite fields, the proposed image encryption system is nonlinear and can resist known-plaintext and chosen-plaintext attacks.
引用
收藏
页码:357 / 376
页数:20
相关论文
共 36 条
[31]   Four classes of permutation polynomials of F2m [J].
Yuan, Jin ;
Ding, Cunsheng .
FINITE FIELDS AND THEIR APPLICATIONS, 2007, 13 (04) :869-876
[32]   A chaos-based joint image compression and encryption scheme using DCT and SHA-1 [J].
Yuen, Ching-Hung ;
Wong, Kwok-Wo .
APPLIED SOFT COMPUTING, 2011, 11 (08) :5092-5098
[33]   Permutation polynomials over F2n of the form (x2i + x + δ)s1 + (x2i + x + δ)s2 + x [J].
Zeng, Xiangyong ;
Zhu, Xishun ;
Li, Nian ;
Liu, Xianping .
FINITE FIELDS AND THEIR APPLICATIONS, 2017, 47 :256-268
[34]  
Zeng XY, 2010, APPL ALGEBR ENG COMM, V21, P145, DOI 10.1007/s00200-010-0120-6
[35]   Novel color image encryption algorithm based on the reality preserving fractional Mellin transform [J].
Zhou, Nanrun ;
Wang, Yixian ;
Gong, Lihua ;
Chen, Xiubo ;
Yang, Yixian .
OPTICS AND LASER TECHNOLOGY, 2012, 44 (07) :2270-2281
[36]   Novel image encryption algorithm based on multiple-parameter discrete fractional random transform [J].
Zhou, Nanrun ;
Dong, Taiji ;
Wu, Jianhua .
OPTICS COMMUNICATIONS, 2010, 283 (15) :3037-3042