Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain

Noha Ramadan , HossamEldin H. Ahmed , Said E. El-khamy , Fathi E. Abd El-Samie

Journal of Central South University ›› 2017, Vol. 24 ›› Issue (9) : 2049 -2057.

PDF
Journal of Central South University ›› 2017, Vol. 24 ›› Issue (9) : 2049 -2057. DOI: 10.1007/s11771-017-3614-6
Article

Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain

Author information +
History +
PDF

Abstract

A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented. Fractional Fourier Transform (FRFT) is used before the encryption scheme to get a large degree of randomization. The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map. Modification of the Logistic map is developed to increase the space of the encryption key, and hence increase the security. The key of the encryption algorithm dependents on the plain image, and thus, the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks. The key space is large and hence the algorithm can effectively resist brute-force attacks. The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure, and it can effectively resist different attacks.

Keywords

Backer map / chaotic encryption / fractional Fourier transform (FRFT) / modified Logistic map

Cite this article

Download citation ▾
Noha Ramadan, HossamEldin H. Ahmed, Said E. El-khamy, Fathi E. Abd El-Samie. Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain. Journal of Central South University, 2017, 24(9): 2049-2057 DOI:10.1007/s11771-017-3614-6

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

BurrW E. Data encryption standard [M]// NIST’s anthology. A Century of Excellence in Measurements Standards and Technology: A Chronicle of Selected NBS/NIST Publications, 2000

[2]

FIPS PUB 197. Advanced Encryption Standard (AES) [S]. National Institute of Standards and Technology, U.S. Department of Commerce, 2001.

[3]

RivestR L, RobshawM J B, SidneyR, YinY LThe RC6TM Block Cipher [M], 1998, Cambridge, USA, MIT Laboratory for Computer Science

[4]

PatidarV, PareekN K, SudK K. A new substitution–diffusion based image cipher using chaotic standard and logistic maps[J]. Nonlinear Sci Numer Simulat, 2009, 14: 3056-3075

[5]

ZhangL H, LiaoX F, WangX B. An image encryption approach based on chaotic maps [J]. Chaos, Solitons & Fractals, 2005, 24: 759-765

[6]

ShannonC E. A mathematical theory of communication [J]. Bell System Technical Journal, 1948, 27: 379-423

[7]

YangM, BourbakisN, LiS. Data-image-video encryption [M]. IEEE, 2004

[8]

MaoY, ChenG, LianS. A novel fast image encryption scheme based on 3D chaotic Baker maps [J]. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613-3624

[9]

ShenJ, JinX, ZhouC. A color image encryption algorithm based on magic cube transformation and modular arithmetic operation [J]. Advances in Multimedia Information Processing, Lecture Notes in Computer Science, 2005, 3768: 270-280

[10]

HeX, ZhuQ, GuP. A new chaos-based encryption method for color image [J]. Rough Sets and Knowledge Technology, Lecture Notes in Computer Science, 2006, 4062: 671-678

[11]

LiC, ChenG. On the security of a class of image encryption schemes [C]// Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS’ 08). Seattle, Wash, USA, 200832903293

[12]

CaoG-h, HuK, ZhangY-z, ZhouJ, ZhangXing. Chaotic image encryption based on running-key related to plaintext [J]. Hindawi Publishing Corporation the Scientific World Journal, 2014, 6: 490179

[13]

OzaktasH M, ZalevskyZ, KutayM AThe fractional Fourier transform [M], 2001, Chichester, Wiley

[14]

OzaktasH M. Fractional Fourier domains [J]. Signal Process, 1995, 46119-124

[15]

FridrichJ. Symmetric ciphers based on two-dimensional chaotic maps [J]. Int J Bifurcation and Chaos, 1998, 8(6): 1259-1284

[16]

BakerG L, GollubJ PChaotic dynamics an Introduction [M], 1990, First Ed. New York, Press Syndicate of the University of Cambridge

[17]

El-HosenyH, AhmedH H, KazemianH, AbdE-S F E, AbbasA M. Digital image encryption in transform domains [D]. Faculty of Electronic Engineering, Menofia University, Menof, 2014

[18]

FridrichJ. Symmetric ciphers based on two-dimensional chaotic maps [J]. Int J Bifurcation and Chaos, 1998, 8(6): 1259-1284

[19]

ZhuC-x, XuS-y, HuY-ping. Breaking a novel image encryption scheme based on Brownian motion and PWLCM chaotic system [J]. Nonlinear Dynamics, 2015, 79(2): 1511-1518

[20]

ZhuC-x, LiaoC-l, DengX-heng. Breaking and improving an image encryption scheme based on total shuffling scheme [J]. Nonlinear Dynamics, 2013, 71(12): 25-34

[21]

MerkleR C, HellmanM. On the security of multiple encryption [J]. Communications of the ACM, 1981, 24(7): 465-467

[22]

http://in.mathworks.com/help/images/ref/corr2.html

[23]

CurranK, BaileyK. An evaluation of image based steganography methods [J]. International Journal of Digital Evidence, 2003, 2(2): 55-88

[24]

FuC, ChenJ-j, ZouH, MengW-h, ZhanY-feng. A chaos based digital image encryption scheme with an improved diffusion strategy [J]. Optics Express, 2012, 20(3): 2363-2378

AI Summary AI Mindmap
PDF

132

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/