A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture

International Journal of Computer Trends and Technology (IJCTT)
© 2014 by IJCTT Journal
Volume-15 Number-4
Year of Publication : 2014
Authors : Junqin Zhao , Weichuang Guo , Ruisong Ye
DOI :  10.14445/22312803/IJCTT-V15P137


Junqin Zhao , Weichuang Guo , Ruisong Ye. "A Chaos-based Image Encryption Scheme Using Permutation-Substitution Architecture". International Journal of Computer Trends and Technology (IJCTT) V15(4):174-185, Sep 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Recently, a great number of chaos-based image encryption algorithms have been proposed. But most of them are either deficient in security or complicated. In this paper, we propose a permutation-substitution image encryption scheme based on generalized Arnold map. Only one round of permutation and one round of substitution are performed to get the desirable results. The generalized chaotic Arnold maps are applied to generate the pseudo-random sequences for the permutation and substitution. The permutation and substitution are both performed row-by-row/column-by-column instead of pixel-by-pixel to increase the speed of encryption. The security and performance of the proposed scheme have been analyzed, including statistical analysis, key sensitivity analysis, key space analysis, differential analysis, encryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is efficient and highly secure.

[1] C. E. Shannon, Communication theory of secrecy system. Bell Syst. Tech. J, 28(1949), 656–715.
[2] J. Fridrich, Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, 8(1998), 1259–1284.
[3] L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, 1(2001), 6–21.
[4] F. Huang, Z.-H. Guan, A modified method of a class of recently presented cryptosystems, Chaos, Solitons and Fractals, 23(2005), 1893–1899.
[5] N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image and Vision Computing, 24(2006), 926-934.
[6] R. Ye, A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, Optics Communications, 284(2011), 5290–5298.
[7] N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image and Vision Computing, 24(2006), 926-934.
[8] N. Masuda, K. Aihara, Cryptosystems with discretized chaotic maps, IEEE Trans. Circuits Syst. I, 49(2002), 28–40.
[9] H. Liu, X. Wang, Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Optics Communications, 284(2011), 3895–3903.
[10] S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, A. Akhavan, A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps, Phys. Lett. A, 366(2007), 391–396.
[11] R. Ye, H. Huang, Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking, I. J. Image, Graphics and Signal Processing, 1(2010), 19–29.
[12] V. Patidar, N. K. Pareek, K. K. Sud, A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 14 (2009), 3056–3075.
[13] Y. Wang, K.W. Wong, X. F. Liao, T. Xiang, G. R. Chen, A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons and Fractals, 41(2009), 1773–1783.
[14] S. J. Li, C. Q. Li, G. R. Chen, N. G. Bourbakis, K. T. Lo, A general quantitative cryptanalysis of permutation-only multimedia ciphers against plain-image attacks. Signal Process. Image Commun., 23(2009), 212–223.
[15] C. Q. Li, S. J. Li, G. R. Chen, G. Chen, L. Hu, Cryptanalysis of a new signal security system for multimedia data transmission. EURASIP J. Appl. Signal Process., 8(2005), 1277–1288.
[16] Vinod Patidar, N.K. Pareek, G. Purohit, K.K. Sud. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption, Optics Communications, 284(2011), 4331-4339.
[17] V. Arnold, A. Avez, Ergodic problem in classical mechanics, Benjamin, New York, 1986
[18] B. Schiener, Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and sons, New York, 1996.

Arnold map, chaotic dynamical system, permutation-substitution architecture, image encryption.