A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation

被引:45
作者
Ahmad, Jawad [1 ]
Khan, Muazzam Ali [2 ]
Ahmed, Fawad [1 ]
Khan, Jan Sher [3 ]
机构
[1] HITEC Univ Taxila, Dept Elect Engn, Taxila, Pakistan
[2] Natl Univ Sci, Dept Comp Engn, Technol, Islamabad, Pakistan
[3] Gaziantep Univ, Dept Elect Engn, Gaziantep, Turkey
关键词
Image encryption; Security efficiency; Entropy; DCT; NPCR; UACI; CHAOS;
D O I
10.1007/s00521-017-2970-3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Content protection is considered as an important issue in today's world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.'s scheme to fulfill essential needs of a secure image encryption algorithm. The proposed cryptosystem is resistant against many attacks like brute force, differential and statistical. To quantify the quality of the proposed scheme, instead of visual inspection, the proposed scheme is analyzed through various tests, such as correlation coefficient, information entropy, Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI). Simulation results of the presented scheme shows good diffusion characteristics when compared to other traditional schemes.
引用
收藏
页码:3847 / 3857
页数:11
相关论文
共 51 条
[1]   A secure image encryption scheme based on chaotic maps and affine transformation [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13951-13976
[2]   Chaos-based diffusion for highly autocorrelated data in encryption algorithms [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
NONLINEAR DYNAMICS, 2015, 82 (04) :1839-1850
[3]   An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes [J].
Ahmad, Jawad ;
Hwang, Seong Oun ;
Ali, Arshad .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) :901-918
[4]  
Ahmad Jawad., 2010, computing, V23, P25
[5]  
Ahmed Fawad, 2010, 2010 Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), P232, DOI 10.1109/PSIVT.2010.46
[6]   A Noisy Channel Tolerant Image Encryption Scheme [J].
Ahmed, Fawad ;
Anees, Amir ;
Abbas, Vali Uddin ;
Siyal, M. Y. .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (04) :2771-2791
[7]  
Ahmed H, 2017, INT J INF TECHNOL, V3, P245
[8]  
Ahmed J, IMTIC 15 INT MULT C, P104
[9]   Chaotic substitution for highly autocorrelated data in encryption algorithm [J].
Anees, Amir ;
Siddiqui, Adil Masood ;
Ahmed, Fawad .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (09) :3106-3118
[10]  
[Anonymous], 2016, NEURAL COMPUTING APP