An Image Encryption Scheme Based on Permutation-subsitution Architecture at Half Pixel Level

被引:0
作者
Ye, Ruisong [1 ]
Zhao, Junqin [1 ]
机构
[1] Shantou Univ, Dept Math, Shantou 515063, Guangdong, Peoples R China
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING | 2015年 / 121卷
关键词
Arnold map; Chaos; Permutation; Substitution; Image Encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An image encryption scheme using permutation-substitution mechanism at half pixel level is proposed. One round of permutation and one round of substitution achieve desirable results. In the permutation process, the image sized HxW is expanded to one sized Hx2W. The generalized Arnold map is applied to generate the pseudo-random sequences for the permutation and substitution processes implemented row-by-row/column-by-column instead of pixel-by-pixel to increase the encryption rate. The security and performance of the proposed scheme have been analyzed as well.
引用
收藏
页码:45 / 48
页数:4
相关论文
共 9 条
  • [1] Symmetric ciphers based on two-dimensional chaotic maps
    Fridrich, J
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
  • [2] Kocarev L., 2001, IEEE Circuits and Systems Magazine, V1, P6, DOI 10.1109/7384.963463
  • [3] A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
    Li, Shujun
    Li, Chengqing
    Chen, Guanrong
    Bourbakis, Nikolaos G.
    Lo, Kwok-Tung
    [J]. SIGNAL PROCESSING-IMAGE COMMUNICATION, 2008, 23 (03) : 212 - 223
  • [4] Color image encryption using spatial bit-level permutation and high-dimension chaotic system
    Liu, Hongjun
    Wang, Xingyuan
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (16-17) : 3895 - 3903
  • [5] A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption
    Patidar, Vinod
    Pareek, N. K.
    Purohit, G.
    Sud, K. K.
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (19) : 4331 - 4339
  • [6] SCHIENER B, 1996, APPL CRYPTOGRAPHY PR
  • [7] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
  • [8] A chaos-based image encryption algorithm with variable control parameters
    Wang, Yong
    Wong, Kwok-Wo
    Liao, Xiaofeng
    Xiang, Tao
    Chen, Guanrong
    [J]. CHAOS SOLITONS & FRACTALS, 2009, 41 (04) : 1773 - 1783
  • [9] A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism
    Ye, Ruisong
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (22) : 5290 - 5298