A Novel Hyper-Chaos-Based Image Encryption Algorithm Using Bit-Level Permutation and Pixel-Level Diffusion

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-62 Number-1
Year of Publication : 2018
Authors : Yajuan Li, Ruisong Ye, Yucheng Chen
  10.14445/22312803/IJCTT-V62P106

MLA

MLA Style: Yajuan Li, Ruisong Ye, Yucheng Chen "A Novel Hyper-Chaos-Based Image Encryption Algorithm Using Bit-Level Permutation and Pixel-Level Diffusion" International Journal of Engineering Trends and Technology 62.1 (2018): 40-49.

APA Style: Yajuan Li, Ruisong Ye, Yucheng Chen (2018). A Novel Hyper-Chaos-Based Image Encryption Algorithm Using Bit-Level Permutation and Pixel-Level Diffusion. International Journal of Engineering Trends and Technology, 62(1), 40-49.

Abstract
In this paper, a 4D Lorenz map is proposed using in cryptography. Performance evaluations show that it has hyper-chaotic behavior, wide chaotic range and large complexity. Based on this map, a novel image encryption algorithm is designed by employing bit-level permutation and pixel-level diffusion. The bit-level permutation is performed by chaotic sequence, and the bit-level diffusion is carried out by Arithmetic plus. Besides, to achieve the better ability of resisting chosen-plaintext or known-plaintext attack, the substitution key stream generated using SHA-256 in our method is dependent on the plain image. Consequently, different plain images produce the distinct key stream for substitution. The simulation results and performance analysis show that the proposed image encryption algorithm is both secure and reliable for image encryption.

Reference
[1] Li, S., Chen, G., Cheung, A., Bhargava, B., & Lo, K. T. (2007). On the design of perceptual MPEG-video encryption algorithms. IEEE Transactions on Circuits and Systems for Video Technology, 17(2), 214-223.
[2] Li, Y., Wang, C., & Chen, H. (2017). A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics & Lasers in Engineering, 90, 238-246.
[3] Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm[J]. Cryptologia, 8(8), 29-42.
[4] Fridrich, J. (1997). Image encryption based on chaotic maps. IEEE International Conference on Systems, Man, and Cybernetics, 1997. Computational Cybernetics and Simulation (Vol.2, pp.1105-1110 vol.2). IEEE.
[5] Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos, 8(06), 1259-1284.
[6] Ping, P., Xu, F., Mao, Y., & Wang, Z. (2018). Designing permutation–substitution image encryption networks with Henon map. Neurocomputing, 283, 53-63.
[7] Liao, X., Hahsmi, M. A., & Haider, R. (2018). An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik-International Journal for Light and Electron Optics, 153, 117-134.
[8] Chen, J., Zhu, Z. L., Zhang, L. B., Zhang, Y., & Yang, B. Q. (2018). Exploiting self-adaptive permutation–diffusion and dna random encoding for secure and efficient image encryption. Signal Processing, 142, 340-353.
[9] Zhang, X., & Wang, X. (2017). Multiple-image encryption algorithm based on mixed image element and chaos ☆. Computers & Electrical Engineering, 92, 6-16.
[10] Yang, Y. G., Tian, J., Lei, H., Zhou, Y. H., & Shi, W. M. (2016). Novel quantum image encryption using one-dimensional quantum cellular automata. Information Sciences, 345, 257-270.
[11] Hua, Z., & Zhou, Y. (2017). Design of image cipher using block-based scrambling and image filtering. Information Sciences, 396, 97-113.
[12] Pak, C., & Huang, L. (2017). A new color image encryption using combination of the 1D chaotic map. Signal Processing, 138, 129-137.
[13] Wang, H., Xiao, D., Chen, X., & Huang, H. (2018). Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Processing, 144, 444-452.
[14] Cao, C., Sun, K., & Liu, W. (2018). A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Processing, 143, 122-133.
[15] Li, C., Liu, Y., Zhang, L. Y., & Chen, M. Z. (2013). Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. International Journal of Bifurcation and Chaos, 23(04), 1350075.
[16] Zhang, Y., Xiao, D., Shu, Y., & Li, J. (2013). A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Processing: Image Communication, 28(3), 292-300.
[17] Wang, X. Y., Zhang, Y. Q., & Bao, X. M. (2015). A novel chaotic image encryption scheme using DNA sequence operations. Optics and Lasers in Engineering, 73, 53-61.
[18] Li, X., Wang, L., Yan, Y., & Liu, P. (2016). An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems. Optik-International Journal for Light and Electron Optics, 127(5), 2558-2565.
[19] Kulsoom, A., Xiao, D., & Abbas, S. A. (2016). An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimedia Tools and Applications, 75(1), 1-23.
[20] Liao, X., Kulsoom, A., & Ullah, S. (2016). A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimedia Tools and Applications, 75(18), 11241-11266.
[21] Liu, H., & Wang, X. (2012). Image encryption using DNA complementary rule and chaotic maps. Applied Soft Computing, 12(5), 1457-1466.
[22] Zhou, Y., Cao, W., & Chen, C. P. (2014). Image encryption using binary bitplane. Signal Processing, 100, 197-207.
[23] Wu, Y., Zhou, Y., Noonan, J. P., &Agaian, S. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317-339.
[24] Patidar, V., Pareek, N. K., Purohit, G., & Sud, K. K. (2011). A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Optics Communications, 284(19), 4331-4339.
[25] Wu, Y., Noonan, J. P., &Agaian, S. (2011). NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT), 1(2), 31-38.
[26] Wang, X., Luan, D., & Bao, X. (2014). Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing, 25, 244-247.

Keywords
4-D hyper-chaotic maps, Bit-level, Image encryption, SHA-256