A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure

Authenticated image encryption is crucial in handling top-secret images. To ensure confidentiality, authenticated encryption supplies legal validity for the image data. We propose a novel modified logistic map with an expanded key space, an integer-based key generation algorithm and an authenticated image encryption algorithm for block ciphers using a modified logistic map and a butterfly-like structure. The key that is used to encrypt images also aids in detecting content tampering of the images. The performance evaluations demonstrate that the proposed encryption method is fast and invulnerable to attacks and has a large key space. Additionally, the designed algorithm can assess the credibility of the data. Moreover, eight keys are used in decryption compared to four in encryption, which strengthens the security. Therefore, this algorithm can be used in real-time scenarios.

[1]  Ran Tao,et al.  Image Encryption With Multiorders of Fractional Fourier Transforms , 2010, IEEE Transactions on Information Forensics and Security.

[2]  Amitesh Singh Rajput,et al.  A Novel Image Encryption and Authentication Scheme Using Chaotic Maps , 2014, ISI.

[3]  Maaruf Ali,et al.  Highly secured chaotic block cipher for fast image encryption , 2014, Appl. Soft Comput..

[4]  G. Álvarez,et al.  Cryptanalysis of a chaotic encryption system , 2000 .

[5]  Bin Zhu,et al.  A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps , 2017, IEEE Access.

[6]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[7]  Miao Zhang,et al.  A new chaotic map based image encryption schemes for several image formats , 2014, J. Syst. Softw..

[8]  G. Hacibeki̇rog˜lu,et al.  The higher order Schwarzian derivative: Its applications for chaotic behavior and new invariant sufficient condition of chaos , 2009 .

[9]  Gonzalo Álvarez,et al.  Cryptanalysis of a computer cryptography scheme based on a filter bank , 2007, Chaos, Solitons & Fractals.

[10]  Xiaonan Luo,et al.  Integrated chaotic systems for image encryption , 2018, Signal Process..

[11]  Yu-Chen Hu,et al.  An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..

[12]  Bin Wang,et al.  Cryptanalysis of an image cryptosystem based on logistic map , 2013 .

[13]  Mario Aldape-Pérez,et al.  Substitution box generation using Chaos: An image encryption application , 2018, Appl. Math. Comput..

[14]  Kwok-Wo Wong,et al.  A fast image encryption and authentication scheme based on chaotic maps , 2010 .

[15]  Sos S. Agaian,et al.  Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..

[16]  Chi-Shiang Chan An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..

[17]  S. Pincus Approximate entropy (ApEn) as a complexity measure. , 1995, Chaos.

[18]  Safya Belghith,et al.  Selective image encryption scheme based on DWT, AES S-box and chaotic permutation , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[19]  Kwok-Wo Wong,et al.  An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion , 2013, Commun. Nonlinear Sci. Numer. Simul..

[20]  Kehui Sun,et al.  A fast image encryption algorithm based on chaotic map , 2016 .

[21]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[22]  W. Trzciński,et al.  Optical spectroscopy to study confined and semi-closed explosions of homogeneous and composite charges , 2017 .

[23]  Yannick Abanda,et al.  Image encryption by chaos mixing , 2016, IET Image Process..

[24]  Guangchun Luo,et al.  An image encryption scheme based on chaotic tent map , 2016, Nonlinear Dynamics.

[25]  Yu-Chen Hu,et al.  A novel reversible image authentication scheme for digital images , 2014, Signal Process..

[26]  Wen-Chuan Wu,et al.  SVD-based self-embedding image authentication scheme using quick response code features , 2016, J. Vis. Commun. Image Represent..

[27]  Qiang Liu,et al.  A novel image encryption algorithm based on chaos and Line map , 2015, Neurocomputing.

[28]  Lin Yuan,et al.  Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain , 2017 .

[29]  Ahmed A. Abd El-Latif,et al.  A simple yet efficient S-box method based on chaotic sine map , 2017 .

[30]  Kehui Sun,et al.  A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map , 2018, Signal Process..

[31]  Lu Xu,et al.  A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion , 2017 .

[32]  Safya Belghith,et al.  A novel approach to construct S-box based on Rossler system , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).

[33]  Yicong Zhou,et al.  Medical image encryption using edge maps , 2017, Signal Process..

[34]  Osama S. Faragallah Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map , 2015, Signal Image Video Process..

[35]  Diana Maimut,et al.  Authenticated Encryption: Toward Next-Generation Algorithms , 2014, IEEE Security & Privacy.