Secure chaos-based substitution with diffusion for highly auto-correlated data in image encryption

researchers. By using chaotic maps based random S-box selection, multiple substitution boxes can be used to reduce the correlation among the adjacent pixels of an image but this key dependent nature of substitution methodology makes it vulnerable to chosen plain text attack (CPA). To address these issues, a substitution methodology based on propagating cipher block chaining (PCBC) with a new diffusion technique has been proposed. PCBC is known to be CPA resistant. The effect of first round diffusion is being transferred to next round of diffusion, when first pixel is replaced by last pixel XORed with first the pixel of image. Extensive analyses indicate that proposed solution is secure and achieves best results.

[1]  Zhongmeng Zhao,et al.  An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.

[2]  Iqtadar Hussain Optical image encryption based on S-box transformation and fractional Hartley transform , 2016 .

[3]  Di Xiao,et al.  Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack , 2013, Nonlinear Dynamics.

[4]  Seong Oun Hwang,et al.  Chaos-based diffusion for highly autocorrelated data in encryption algorithms , 2015, Nonlinear Dynamics.

[5]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[6]  Wei Zhang,et al.  Image encryption based on three-dimensional bit matrix permutation , 2016, Signal Process..

[7]  Zhongmeng Zhao,et al.  Chaotic image encryption based on circular substitution box and key stream buffer , 2014, Signal Process. Image Commun..

[8]  Tariq Shah,et al.  A novel technique for the construction of strong S-boxes based on chaotic Lorenz systems , 2012, Nonlinear Dynamics.

[9]  Majid Khan,et al.  An efficient method for the construction of block cipher with multi-chaotic systems , 2013 .

[10]  Sos S. Agaian,et al.  2D Sudoku associated bijections for image scrambling , 2016, Inf. Sci..

[11]  Zhongmeng Zhao,et al.  A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution , 2014, Multimedia Tools and Applications.

[12]  Congxu Zhu,et al.  Breaking and improving an image encryption scheme based on total shuffling scheme , 2013 .

[13]  Amir Akhavan,et al.  Cryptanalysis of “an improvement over an image encryption method based on total shuffling” , 2015 .