Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD

被引:7
作者
Butt, Khushbu Khalid [1 ]
Li, Guohui [2 ]
Khan, Sajid [1 ]
Manzoor, Sohaib [3 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Fac Comp Sci Dept, Wuhan 430074, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Elect Informat & Commun, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
image encryption; modular addition; scrambling plus diffusion (SPD); SHA-512; security; entropy; HYPER-CHAOTIC SYSTEM; LEVEL PERMUTATION; BIT-PERMUTATION; SCHEME; CIPHERS; MAP; CRYPTANALYSIS; DIFFUSION; SECURE; ROBUST;
D O I
10.3390/e22010112
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Bit-level and pixel-level methods are two classifications for image encryption, which describe the smallest processing elements manipulated in diffusion and permutation respectively. Most pixel-level permutation methods merely alter the positions of pixels, resulting in similar histograms for the original and permuted images. Bit-level permutation methods, however, have the ability to change the histogram of the image, but are usually not preferred due to their time-consuming nature, which is owed to bit-level computation, unlike that of other permutation techniques. In this paper, we introduce a new image encryption algorithm which uses binary bit-plane scrambling and an SPD diffusion technique for the bit-planes of a plain image, based on a card game trick. Integer values of the hexadecimal key SHA-512 are also used, along with the adaptive block-based modular addition of pixels to encrypt the images. To prove the first-rate encryption performance of our proposed algorithm, security analyses are provided in this paper. Simulations and other results confirmed the robustness of the proposed image encryption algorithm against many well-known attacks; in particular, brute-force attacks, known/chosen plain text attacks, occlusion attacks, differential attacks, and gray value difference attacks, among others.
引用
收藏
页数:28
相关论文
共 77 条
  • [1] Multi-scale local structure patterns histogram for describing visual contents in social image retrieval systems
    Ahmad, Jamil
    Sajjad, Muhammad
    Rho, Seungmin
    Baik, Sung Wook
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (20) : 12669 - 12692
  • [2] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [3] [Anonymous], 2011, Computer Networks
  • [4] [Anonymous], DIGITAL IMAGE PROCES
  • [5] Cryptanalysis of a Classical Chaos-Based Cryptosystem with Some Quantum Cryptography Features
    Arroyo, David
    Hernandez, Fernando
    Orue, Amalia B.
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2017, 27 (01):
  • [6] Image encryption: Generating visually meaningful encrypted images
    Bao, Long
    Zhou, Yicong
    [J]. INFORMATION SCIENCES, 2015, 324 : 197 - 207
  • [7] A novel image encryption scheme based on substitution-permutation network and chaos
    Belazi, Akram
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    [J]. SIGNAL PROCESSING, 2016, 128 : 155 - 170
  • [8] A novel multi-dimensional encryption technique to secure the grayscale images and color images in public cloud storage
    Boopathy, D.
    Sundaresan, M.
    [J]. INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2019, 15 (01) : 43 - 64
  • [9] The strict avalanche criterion randomness test
    Castro, JCH
    Sierra, JM
    Seznec, A
    Izquierdo, A
    Ribagorda, A
    [J]. MATHEMATICS AND COMPUTERS IN SIMULATION, 2005, 68 (01) : 1 - 7
  • [10] An image encryption algorithm based on chaotic system and compressive sensing
    Chai, Xiuli
    Zheng, Xiaoyu
    Gan, Zhihua
    Han, Daojun
    Chen, Yiran
    [J]. SIGNAL PROCESSING, 2018, 148 : 124 - 144