An Image Encryption Algorithm Based on Scrambling with Reversible Matrix Transformation and Chaotic Diffusion

  IJCTT-book-cover
 
         
 
© 2020 by IJCTT Journal
Volume-68 Issue-5
Year of Publication : 2020
Authors : Zikang Wu, Jietao Liang, Rui Deng, Ruisong Ye
DOI :  10.14445/22312803/IJCTT-V68I5P109

How to Cite?

Zikang Wu, Jietao Liang, Rui Deng, Ruisong Ye, "An Image Encryption Algorithm Based on Scrambling with Reversible Matrix Transformation and Chaotic Diffusion," International Journal of Computer Trends and Technology, vol. 68, no. 5, pp. 37-44, 2020. Crossref, https://doi.org/10.14445/22312803/IJCTT-V68I5P109

Abstract
In view of the poor resistance against statistical analysis and weak security of simple two-dimensional scrambling based image encryption algorithms, this paper proposes an image encryption algorithm combining image pixel scrambling and diffusion controlled by Chebyshev chaotic sequences. Firstly, two-dimensional and three-dimensional reversible scrambling matrices are generated and used to scramble the pixels positions and RGB color component vector, so as to weaken the correlation of adjacent pixels, the correlation of color components and greatly change the statistical characteristics of plain-image’s histogram. Then, the classical Chebyshev sequences are uniformized and used to diffuse the pixels components values. The security of the proposed encryption algorithm is simulated and analyzed from histogram, correlation coefficient, information entropy, key sensitivity and differential attack. Experimental results show that the proposed image encryption algorithm is strongly sensitive to key and plaintext, and can effectively resist exhaustive analysis, differential analysis and statistical analysis, etc. It is an encryption algorithm with high security and good encryption performance.

Keywords
Reversible scrambling matrix, chaotic sequence, diffusion, image encryption.

Reference
[1] B. Schiener, "Applied Cryptography: Protocols, Algorithms and Source Code in C", John Wiley and sons, New York, 1996.
[2] J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps", International Journal of Bifurcation and Chaos, 8(1998), 1259–1284.
[3] G. Chen, Y. Mao, C. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons and Fractals", 21(2004), 749–761.
[4] R. Ye, "A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, Optics Communications", 284(2011) 5290-5298.
[5] Patidar Vinod, N. K. Pareek, K. K. Sud, "A new substitution–diffusion based image cipher using chaotic standard and logistic maps”, Communications in Nonlinear Science and Numerical Simulations, 14 (2009), 3056-3075.
[6] R. Ye, M. Ge, P. Huang, H. Li, "A Novel Self-adaptive Color Image Encryption Scheme", International Journal of Computer Trends and Technology, 2016, 40(1), 39-44.
[7] L. Shao, Z. Qin, X. Heng, H. Gao, "Solution for the inverse problem of matrix transform based image scrambling". Acta Electronica Sinica, 7(2008), 1355-1363.
[8] S. Li, C. Li, G. Chen, N. G. Bourbakis, K. Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks". Signal Processing: Image Communication, 23(2009), 212-223.
[9] X. Zhao, G. Chen, D. Zhang, et al., "Decryption of pure-position permutation algorithms". Journal of Zhejiang University (Science Version), 2004, 5(7): 803-809.
[10] X. Zhang, J. Chen, J. Peng, M. Xi, "Image encryption algorithm based on complex chaotic sequences", Application Research of Computers, 36(2019), 3396-3400.
[11] L. Lei, G. Ma, X. Cai, H. Shi, "Study of chaotic sequence based on Chebyshev mapping”, Computer Engineering, 35(2009), 4-6.
[12] H. Kwok, W. Tang, "A fast image encryption system based on chaotic maps with finite precision representation, Chaos, Solitons and Fractals", 32(2007), 1518-1529.