Fusion of confusion and diffusion: a novel image encryption approach

Recently, the development of confidentiality and authenticity ensured by image encryption has been one of the key advancements in the field of secured wireless communication. The proposed work focuses on providing confusion, diffusion and permutation inherently in the system. The input grayscale image is shuffled by employing the Henon algorithm and subsequently separated into 8 bit planes. With the aid of a secret key of 256 bits, chaotic sequences are generated for each bit plane. Later, the logistic map is adapted on the chaotic sequences to obtain the scrambled image. Furthermore, this image is shuffled with Zaslavskii and Hilbert Space Filling Curve algorithms, which establishes the confusion stage. To incorporate the diffusion stage, a self-invertible matrix is generated by a latin square image cipher and a secret key. This matrix and the scrambled image underwent the Hill cipher to build the encrypted image followed by a row-column transformation to ensure multifold security. The proposed compound activities of encryption are successfully implemented on the laboratory virtual instrumentation engineering workbench 2013 platform. Noticeably, the established processes of image encryption are tested in the universal software radio peripheral environment and transceived via an additive white Gaussian noise (AWGN) channel. More specifically, the influence of natural and unnatural (cropping attack) noise on the characteristics of the encrypted image while sharing through AWGN channel has been investigated. Security analysis is performed by computing the unified average changing intensity, number of pixels change rate, correlation value, large key space to defy brute force attack, strong key sensitivity and uniform gray value distribution on encryption.

[1]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .

[2]  Vijay H. Mankar,et al.  Chaotic Cipher Using Arnolds and Duffings Map , 2012 .

[3]  Hassan N. Noura,et al.  An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..

[4]  K. Thenmozhi,et al.  Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach , 2015 .

[5]  Tariq Shah,et al.  An efficient image encryption algorithm based on S8 S-box transformation and NCA map , 2012 .

[6]  Rengarajan Amirtharajan,et al.  Triple chaotic image scrambling on RGB - a random image encryption approach , 2015, Secur. Commun. Networks.

[7]  Sos S. Agaian,et al.  Design of image cipher using latin squares , 2014, Inf. Sci..

[8]  S. Gilani,et al.  Enhanced Block Based color Image Encryption technique with confusion , 2008, 2008 IEEE International Multitopic Conference.

[9]  H. T. Panduranga,et al.  Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher , 2014 .

[10]  Zhang Xin,et al.  Image encryption algorithm based on Henon chaotic system , 2009, 2009 International Conference on Image Analysis and Signal Processing.

[11]  Kwok-Wo Wong,et al.  Cryptanalyzing a chaos-based image encryption algorithm using alternate structure , 2011, J. Syst. Softw..

[12]  刘树堂,et al.  Image encryption using high-dimension chaotic system , 2007 .

[13]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[14]  Mohammad Reza Mosavi,et al.  A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos , 2013, Multimedia Tools and Applications.

[15]  Xing-yuan Wang,et al.  A novel image encryption scheme based on Brownian motion and PWLCM chaotic system , 2013, Nonlinear Dynamics.

[16]  S. Durga Bhavani,et al.  A Modified Hill Cipher Involving Interweaving and Iteration , 2010, Int. J. Netw. Secur..

[17]  Shanshan Li,et al.  Image scrambling based on chaotic sequences and Veginère cipher , 2013, Multimedia Tools and Applications.

[18]  Mohammed Amin,et al.  How to repair the Hill cipher , 2006 .

[19]  Juliano B. Lima,et al.  Image encryption based on the finite field cosine transform , 2013, Signal Process. Image Commun..

[20]  Di Xiao,et al.  An image encryption scheme based on rotation matrix bit-level permutation and block diffusion , 2014, Commun. Nonlinear Sci. Numer. Simul..

[21]  Rengarajan Amirtharajan,et al.  Medical data sheet in safe havens - A tri-layer cryptic solution , 2015, Comput. Biol. Medicine.

[22]  A. Kanso,et al.  Logistic chaotic maps for binary numbers generations , 2009 .

[23]  Shahram Etemadi Borujeni,et al.  Image Encryption Using Random Bit Sequence Based on Chaotic Maps , 2013, Arabian Journal for Science and Engineering.

[24]  Sos S. Agaian,et al.  Image encryption using P-Fibonacci transform and decomposition , 2012 .