A new chaos based color image encryption algorithm using permutation substitution and Boolean operation

被引:68
作者
Ali, Tahir Sajjad [1 ]
Ali, Rashid [1 ]
机构
[1] Capital Univ Sci & Technol, Islamabad, Pakistan
关键词
Image encryption; Logistic map; Piece-wise linear chaotic map; S-box;
D O I
10.1007/s11042-020-08850-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A new color image encryption algorithm is proposed by using chaotic maps. Cipher image is constructed in three phases. In the first phase permutation of digital image is performed with the help of a chaotic map. The second phase uses chaotic substitution box for pixel substitution and finally in the third phase a Boolean operator XOR is used for mixing chaotic logistic based random sequence. Chaotic maps have main role in this encryption. Chaos theory, due to its randomness and unpredictable behaviors, is known as favorite for the purpose of image encryption. The RGB components of image scrambled by permutation-substitution and Boolean operation, show good results for security and performance analysis. Different tests of security analysis like key space, key sensitivity, correlation analysis, entropy, histogram analysis, number of pixel change rate (NPCR) and unified average changing intensity (UACI) tests are employed on the proposed scheme. On the basis of these tests, we believe that proposed scheme is well suited for practical applications.
引用
收藏
页码:19853 / 19873
页数:21
相关论文
共 34 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]  
[Anonymous], 2019, IEEE T CIRCUITS SYST
[3]   Efficient and simple method for designing chaotic S-boxes [J].
Asim, Muhammad ;
Jeoti, Varun .
ETRI JOURNAL, 2008, 30 (01) :170-172
[4]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[5]  
Dhall S, 2018, J KING SAUD U COMPUT
[6]   A new image encryption scheme based on a chaotic function [J].
Francois, M. ;
Grosges, T. ;
Barchiesi, D. ;
Erra, R. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2012, 27 (03) :249-259
[7]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157
[8]   A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 [J].
Guesmi, R. ;
Farah, M. A. B. ;
Kachouri, A. ;
Samet, M. .
NONLINEAR DYNAMICS, 2016, 83 (03) :1123-1136
[9]  
Hrestak D, 2014, 2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1400, DOI 10.1109/MIPRO.2014.6859786
[10]  
Knudsen R. A. E. B. L., 1998, 1 ADV ENCR STAND AES