Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms

被引:159
作者
Belazi, Akram [1 ]
El-Latif, Ahmed A. Abd [2 ]
Diaconu, Adrian-Viorel [3 ]
Rhouma, Rhouma [1 ]
Belghith, Safya [1 ]
机构
[1] Natl Engn Sch Tunis, Tunis, Tunisia
[2] Menoufia Univ, Fac Sci, Comp Sci Lab, Dept Math, Shibin Al Kawm 32511, Egypt
[3] Lumina Univ South East Europe, IT&C Dept, Bucharest 021187, Romania
关键词
Cryptography; S-box; Chaos; Linear fractional transform; Partial encryption; Lifting-Wavelet Transform; S-BOXES; SELECTIVE ENCRYPTION; SUBSTITUTION BOX; CONSTRUCTION; EFFICIENT; DESIGN; CRYPTOGRAPHY; TESTS;
D O I
10.1016/j.optlaseng.2016.07.010
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform own frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:37 / 50
页数:14
相关论文
共 48 条
[1]  
Abid S. H., 2014, Int. J. Basic Appl. Sci, V3, P62
[2]  
[Anonymous], 1998, SKIPJACK KEA ALGORIT, P1
[3]   Selective image encryption based on pixels of interest and singular value decomposition [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan .
DIGITAL SIGNAL PROCESSING, 2012, 22 (04) :648-663
[4]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[5]   An extended method for obtaining S-boxes based on three-dimensional chaotic Baker maps [J].
Chen, Guo ;
Chen, Yong ;
Liao, Xiaofeng .
CHAOS SOLITONS & FRACTALS, 2007, 31 (03) :571-579
[6]  
Cui LG, 2007, INT J INNOV COMPUT I, V3, P751
[7]  
Daemen J, 1999, AES PROPOSAL RIJNDAE
[8]   Factoring wavelet transforms into lifting steps [J].
Daubechies, I ;
Sweldens, W .
JOURNAL OF FOURIER ANALYSIS AND APPLICATIONS, 1998, 4 (03) :247-269
[9]   Scrambling for privacy protection in video surveillance systems [J].
Dufaux, Frederic ;
Ebrahimi, Touradj .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2008, 18 (08) :1168-1174
[10]   Pseudo-random number generator based on mixing of three chaotic maps [J].
Francois, M. ;
Grosges, T. ;
Barchiesi, D. ;
Erra, R. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (04) :887-895