A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption

被引:138
作者
Patidar, Vinod [1 ]
Pareek, N. K. [2 ]
Purohit, G. [1 ]
Sud, K. K. [1 ]
机构
[1] Sir Padampat Singhania Univ, Sch Engn, Dept Phys, Udaipur 313601, Rajasthan, India
[2] MLS Univ, Univ Comp Ctr, Udaipur 313002, Rajasthan, India
关键词
Chaos; Cryptography; Image encryption; Ergodicity; Confusion-diffusion; Pseudorandom;
D O I
10.1016/j.optcom.2011.05.028
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A novel and robust chaos-based pseudorandom permutation-substitution scheme for image encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for the color images but may also be used for the gray scale images. A secret key of 161-bit, comprising of the initial conditions and system parameter of the chaotic map (the standard map), number of iterations and number of rounds, is used in the algorithm. The whole encryption process is the sequential execution of a preliminary permutation and a fix number of rounds (as specified in the secret key) of substitution and main permutation of the 2D matrix obtained from the 3D image matrix. To increase the speed of encryption all three processes: preliminary permutation, substitution and main permutation are done row-by-row and column-by-column instead of pixel-by-pixel. All the permutation processes are made dependent on the input image matrix and controlled through the pseudo random number sequences (PRNS) generated from the discretization of chaotic standard map which result in both key sensitivity and plaintext sensitivity. However each substitution process is initiated with the initial vectors (different for rows and columns) generated using the secret key and chaotic standard map and then the properties of rows and column pixels of input matrix are mixed with the PRNS generated from the standard map. The security and performance analysis of the proposed image encryption has been performed using the histograms, correlation coefficients, information entropy, key sensitivity analysis, differential analysis, key space analysis, encryption/decryption rate analysis etc. Results suggest that the proposed image encryption technique is robust and secure and can be used for the secure image and video communication applications. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:4331 / 4339
页数:9
相关论文
共 22 条
[1]  
[Anonymous], 2000, Studies in nonlinearity
[2]  
ARROYO D, 2008, INADEQUACY LOGISTIC
[3]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[4]   ESTIMATION OF THE KOLMOGOROV-ENTROPY FROM A CHAOTIC SIGNAL [J].
GRASSBERGER, P ;
PROCACCIA, I .
PHYSICAL REVIEW A, 1983, 28 (04) :2591-2593
[5]   Multi chaotic systems based pixel shuffle for image encryption [J].
Huang, C. K. ;
Nien, H. H. .
OPTICS COMMUNICATIONS, 2009, 282 (11) :2123-2127
[6]   Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps [J].
Li, Chengqing ;
Li, Shujun ;
Lo, Kwok-Tung .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (02) :837-843
[7]   A block cipher based on chaotic neural networks [J].
Lian, Shiguo .
NEUROCOMPUTING, 2009, 72 (4-6) :1296-1301
[8]   Color image encryption based on one-time keys and robust chaotic maps [J].
Liu Hongjun ;
Wang Xingyuan .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 59 (10) :3320-3327
[9]   Discrete chaotic cryptography using external key [J].
Pareek, NK ;
Patidar, V ;
Sud, KK .
PHYSICS LETTERS A, 2003, 309 (1-2) :75-82
[10]   A new substitution-diffusion based image cipher using chaotic standard and logistic maps [J].
Patidar, Vinod ;
Pareek, N. K. ;
Sud, K. K. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (07) :3056-3075