A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding

In this paper, we propose a secure and robust image encryption based on the chaotic permutation multiple circular shrinking and expanding. An image with the n×m size is encrypted in n set columns and m set rows using the permutation multiple circular and linked bitxor. The proposed method characterized by a very large key space, such that for an image size of 256×256, the key space reaches 2 which is probably the largest key space ever recorded in a chaotic image encryption. It is sensitive to changes in key, so that the change 1 bit in initial key among 2 possibilities is likely to produce a significant different ciphered images (for image peppers NPCR 99.65%, UACI 33.35, r < 0.008). It also resistant to differential attack due to a change 1 bit in the plain image lead to completely different ciphered image (for image lena NPCR 99.60% and UACI 33.47%). The proposed method is also resistant to JPEG compression, noise scheme (Gaussian, Poisson, Salt&Pepper, and speckle), data loss, and brightness-contrast adjustment, so the ciphered image can be stored in smaller file size and transmitted in a noisy communication system.

[1]  Amir Akhavan,et al.  A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps , 2006, 2006 International Conference on Image Processing.

[2]  Guanrong Chen,et al.  Cryptanalysis of an image encryption scheme , 2006, J. Electronic Imaging.

[3]  Qiang Zhang,et al.  Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps , 2014 .

[4]  Elankovan Sundararajan,et al.  A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map , 2014, TheScientificWorldJournal.

[5]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[6]  Qindong Sun,et al.  Double-image encryption using discrete fractional random transform and logistic maps , 2014 .

[7]  Kwok-Wo Wong,et al.  An efficient chaotic image encryption algorithm based on a generalized Arnold map , 2012, Nonlinear Dynamics.

[8]  Shujun Li,et al.  On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.

[9]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.

[10]  Abdelhakim Saadane,et al.  New Chaotic Permutation Methods for Image Encryption , 2010 .

[11]  Xingyuan Wang,et al.  Image encryption using Game of Life permutation and PWLCM chaotic system , 2012 .

[12]  Qu Wang,et al.  Double image encryption based on phase-amplitude mixed encoding and multistage phase encoding in gyrator transform domains , 2013 .

[13]  Yousef Farid,et al.  A novel image encryption/decryption scheme based on chaotic neural networks , 2012, Eng. Appl. Artif. Intell..

[15]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[16]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[17]  Junwei Zhou,et al.  A block chaotic image encryption scheme based on self-adaptive modelling , 2014, Appl. Soft Comput..

[18]  Z. Guan,et al.  Chaos-based image encryption algorithm ✩ , 2005 .

[19]  Wolfgang A. Halang,et al.  Cryptanalysis of an image encryption scheme based on a compound chaotic sequence , 2007, Image Vis. Comput..

[20]  Abdul Hanan Abdullah,et al.  A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata , 2015 .

[21]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[22]  Hadi Seyedarabi,et al.  A new secure and sensitive image encryption scheme based on new substitution with chaotic function , 2014, Multimedia Tools and Applications.

[23]  Shiguo Lian,et al.  Security Analysis of A Chaos-based Image Encryption Algorithm , 2005, ArXiv.

[24]  Zhongmeng Zhao,et al.  Chaotic image encryption based on circular substitution box and key stream buffer , 2014, Signal Process. Image Commun..

[25]  Chong Fu,et al.  A chaotic symmetric image cipher using a pixel-swapping based permutation , 2013, 2013 IEEE International Conference of IEEE Region 10 (TENCON 2013).

[26]  Yinglong Wang,et al.  Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations , 2008, 2008 International Conference on Computational Intelligence and Security.

[27]  Feng Xu,et al.  Image encryption based on non-affine and balanced cellular automata , 2014, Signal Process..

[28]  Samrat L. Sabat,et al.  A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..

[29]  Kalamullah Ramli,et al.  Chaos properties of the Chaotic Permutation generated by Multi Circular Shrinking and Expanding Movement , 2015, 2015 International Conference on Quality in Research (QiR).

[30]  Jan Nordin,et al.  A Survey on Principal Aspects of Secure Image Transmission , 2012 .

[31]  Abdul Hanan Abdullah,et al.  Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .

[32]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[33]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..