A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods

ABSTRACT⎯ This paper presents a novel chaos-based cryptosystem for secure transmitted images. In the proposed block encryption/decryption algorithm, two chaotic permutation methods (key-dependant shift approach and Socek method) are used to shuffle the image pixel bits. These methods are controlled using a perturbed chaotic PWLCM map. The perturbing orbit technique improves the dynamical statistical properties of generated chaotic sequences. Our algorithm is based on tree encryption cryptosystems (Socek, Yang and Xiang algorithms). In this paper, we prove that the proposed cryptosystem overcomes the drawbacks of these algorithms. Finally, many standard tools are performed to quantify the security level of the proposed cryptosystem, and experimental results show that the suggested cryptosystem has a high security level.

[1]  Morris J. Dworkin,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .

[2]  Y. Hilewitz,et al.  Comparing fast implementations of bit permutation instructions , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[3]  Ruby B. Lee,et al.  Efficient permutation instructions for fast software cryptography , 2001 .

[4]  Borko Furht,et al.  Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[5]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[6]  Sang Tao,et al.  Perturbance-based algorithm to expand cycle length of chaotic key stream , 1998 .

[7]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[8]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[9]  Safwan El Assad,et al.  DIGITAL CHAOTIC CODEC FOR DS-CDMA COMMUNICATION SYSTEMS , 2006 .

[10]  M. Ali,et al.  Chaotic Communications, their applications and advantages over traditional methods of communication , 2008, 2008 6th International Symposium on Communication Systems, Networks and Digital Signal Processing.

[11]  A. Jantan,et al.  An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , 2008 .

[12]  Di Xiao,et al.  Analysis and improvement of a chaos-based image encryption algorithm , 2009 .

[13]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[14]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[15]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[16]  Ruby B. Lee,et al.  Bit permutation instructions for accelerating software cryptography , 2000, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors.

[17]  Ljupco Kocarev,et al.  Discrete Chaos-I: Theory , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[18]  Safwan El Assad,et al.  Comparative Study of 1-D Chaotic Generators for Digital Data Encryption , 2008 .

[19]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[20]  Jamal Daafouz,et al.  A connection between chaotic and conventional cryptography , 2008, IEEE Transactions on Circuits and Systems I: Regular Papers.