Design of image cipher using latin squares

被引:147
作者
Wu, Yue [1 ]
Zhou, Yicong [2 ]
Noonan, Joseph P. [1 ]
Agaian, Sos [3 ]
机构
[1] Tufts Univ, Dept Elect & Comp Engn, Medford, MA 02155 USA
[2] Univ Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
关键词
Image encryption; Latin square; Substitution-permutation network; Confusion-diffusion; Error tolerance; ENCRYPTION SCHEME; SECURITY; PERMUTATION; TRANSFORM;
D O I
10.1016/j.ins.2013.11.027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC) for grayscale and color image encryption. Our main contributions include (1) we propose new Latin square image encryption primitives including Latin Square Whitening, Latin Square S-box and Latin Square P-box; (2) we develop probabilistic image encryption by embedding random noise into the least significant bit-plane of images; and (3) we design a new loom-like 2D substitution-permutation network maintaining good confusion and diffusion properties with extra error tolerance. Theoretical analysis and simulation results show that the proposed method has many desired properties of a secure cipher, shows robustness against different attack models, and outperforms state of the art suggested by many peer algorithms. Open-source implementation can be found on the webpage https://sites.google.com/site/tuftsyuewu/source-code. (C) 2013 Elsevier Inc. All rights reserved.
引用
收藏
页码:317 / 339
页数:23
相关论文
共 55 条
[1]   Sudoku science [J].
Aaronson, L .
IEEE SPECTRUM, 2006, 43 (02) :16-17
[2]  
Advanced Encryption Standard, 2001, FEDERAL INFORM PROCE, V197
[3]   Cryptanalysis of a discrete chaotic cryptosystem using external key [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
PHYSICS LETTERS A, 2003, 319 (3-4) :334-339
[4]   Analysis of security problems in a medical image encryption system [J].
Alvarez, Gonzalo ;
Li, Shujun ;
Hernandez, Luis .
COMPUTERS IN BIOLOGY AND MEDICINE, 2007, 37 (03) :424-427
[5]  
[Anonymous], 1994, Fast Software Encryption, DOI DOI 10.1007/3-540-58108-1_24
[6]  
Bellare M., 38 ANN S FDN COMP SC, P394
[7]   Discrete fractional wavelet transform and its application to multiple encryption [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
INFORMATION SCIENCES, 2013, 223 :297-316
[8]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[9]   Image security system using recursive cellular automata substitution [J].
Chen, Rong-Jian ;
Lai, Jui-Lin .
PATTERN RECOGNITION, 2007, 40 (05) :1621-1631
[10]   Compression-unimpaired batch-image encryption combining vector quantization and index compression [J].
Chen, Tzung-Her ;
Wu, Chang-Sian .
INFORMATION SCIENCES, 2010, 180 (09) :1690-1701