Design of image cipher using block-based scrambling and image filtering

被引:170
作者
Hua, Zhongyun [1 ]
Zhou, Yicong [2 ]
机构
[1] Shenzhen Grad Sch, Sch Comp Sci & Technol, Harbin Inst Technol, Shenzhen 518055, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
关键词
Block-based scrambling; Cryptosystem; Image encryption; Image filtering; CHAOTIC SYSTEM; CRYPTANALYSIS; MAP;
D O I
10.1016/j.ins.2017.02.036
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The operation of image filtering is widely used to deblur digital images. However, using inappropriate masks, it can also blur images. Motivated by this concept, this paper introduces an image cipher using block-based scrambling and image filtering (IC-BSIF). To the best of our knowledge, this is the first time that image filtering has been used for image encryption. IC-BSIF uses the well-known substitution-permutation network and strictly follows the concepts of Confusion and diffusion. The block-based scrambling is able to separate neighboring pixels to different rows and columns, and thus can efficiently weaken the strong correlations between adjacent pixels. Using randomly generated masks by the secret key, the image filtering can spread little change of plain-images to the entire pixels of cipher-images. Simulation results show that IC-BSIF can encrypt differeht kinds of images into noise-like ones, and security evaluations demonstrate that it can achieve better performance than several state-of-the-art encryption schemes. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:97 / 113
页数:17
相关论文
共 37 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]  
[Anonymous], 2010, 80022 SP NAT I STAND
[3]   Image encryption: Generating visually meaningful encrypted images [J].
Bao, Long ;
Zhou, Yicong .
INFORMATION SCIENCES, 2015, 324 :197-207
[4]   A visually secure image encryption scheme based on compressive sensing [J].
Chai, Xiuli ;
Gan, Zhihua ;
Chen, Yiran ;
Zhang, Yushu .
SIGNAL PROCESSING, 2017, 134 :35-51
[5]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[6]   Reusing the permutation matrix dynamically for efficient image cryptographic algorithm [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Yushu .
SIGNAL PROCESSING, 2015, 111 :294-307
[7]   An efficient image encryption scheme using gray code based permutation approach [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Li-bo .
OPTICS AND LASERS IN ENGINEERING, 2015, 67 :191-204
[8]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[9]   A novel chaos-based bit-level permutation scheme for digital image encryption [J].
Fu, Chong ;
Lin, Bin-bin ;
Miao, Yu-sheng ;
Liu, Xiao ;
Chen, Jun-jie .
OPTICS COMMUNICATIONS, 2011, 284 (23) :5415-5423
[10]  
Habutsu T., 1991, ADV CRYPTOLOGY EUROC, V91, P127