TD-ERCS map-based confusion and diffusion of autocorrelated data

被引:29
作者
Khan, Jan Sher [1 ]
Ahmad, Jawad [1 ]
Khan, Muazzam A. [2 ]
机构
[1] HITEC Univ Taxila, Taxila, Pakistan
[2] Natl Univ Sci & Technol, NUST Coll EME, Islamabad, Pakistan
关键词
TD-ERCS; S-box; Chaos; Confusion; Diffusion; Image encryption; Security parameters; NPCR; UACI; IMAGE ENCRYPTION SCHEME; S-BOXES; CHAOS; PERMUTATION; TRANSFORMATION; SUBSTITUTION; IMPROVEMENT; STANDARD;
D O I
10.1007/s11071-016-3028-2
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this article, we proposed a new scheme to encrypt highly autocorrelated image pixel data. In existing literature, single substitution was used to break autocorrelation in images. To get better results, instead of single substitution box, some researchers are minimizing the autocorrelation via utilizing multiple substitution boxes. However, we found that multiple substitution boxes cannot solve the problem of autocorrelation independently. Therefore, we added chaotic confusion and diffusion to the existing substitution scheme in order to remove the correlation completely. Initially, we break the autocorrelation of data by permuting the pixels via TD-ERCS chaotic map. Bitwise XOR is carried out for diffusion using logistic map followed by the existing substitution scheme. Experimental analysis shows that the proposed scheme has greater resistance to brute force attack and statistical attack. Further analyses such as statistical analysis, peak signal-to-noise ratio, contrast analysis, key space analysis, entropy analysis, correlation analysis, key sensitivity analysis, and encryption quality analysis proved the high robustness of the proposed scheme.
引用
收藏
页码:93 / 107
页数:15
相关论文
共 72 条
[1]   A secure image encryption scheme based on chaotic maps and affine transformation [J].
Ahmad, Jawad ;
Hwang, Seong Oun .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (21) :13951-13976
[2]   An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes [J].
Ahmad, Jawad ;
Hwang, Seong Oun ;
Ali, Arshad .
WIRELESS PERSONAL COMMUNICATIONS, 2015, 84 (02) :901-918
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]   Logistic map as a random number generator [J].
Andrecut, M .
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 1998, 12 (09) :921-930
[5]   Chaotic substitution for highly autocorrelated data in encryption algorithm [J].
Anees, Amir ;
Siddiqui, Adil Masood ;
Ahmed, Fawad .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (09) :3106-3118
[6]  
[Anonymous], 2012, International Journal of Video and Image Processing and Network Security
[7]  
[Anonymous], 2013, The design of Rijndael: AES-the advanced encryption standard
[8]  
[Anonymous], INT J ELECT COMPUT E
[9]  
[Anonymous], NEURAL COMPUT APPL
[10]  
[Anonymous], NONLINEAR DYNAMICS