A Novel Design of Blowfish Algorithm for Image Security

In order to improve the security and efficiency of image encryption systems comprehensively an image encryption based on enhanced design of Blowfish scheme is proposed. The proposed system is employed block based image encryption technique combined with chaotic map properties. Firstly the digital image is scrambled and decomposed into several key based blocks randomly to decorrelated the relationship between original and processed image then each block is passed through an enhanced blowfish algorithm. The enhancement in design is to gain advantage of the strong facility, which is maintained by blowfish algorithm by overcoming its flaws, which leads to a significant improvement in security/performance. As a result the proposed system offers good performance for image encryption. The proposed algorithm is 320-bit Blowfish-like block cipher, where cascaded looking composition of F-functions is used instead of rounds. The key is accepted a variable length up to 400 bytes. The pragmatic aim of the proposed system is to decrease memory requirements and execution time while keeping the cipher simple and highly adaptable to future demands. To ensure improved encryption algorithm, the implementation of both techniques has been carried out for experimental purposes which is showed that the original image has a flat histogram after encrypted, a decreasing correlation between adjacent pixels in all color components and increasing entropy for the cases studied. The proposed algorithm has a sufficiently large key space and a very high sensitivity to the key. A comparative study with previous Blowfish algorithm shows the superiority of the modified algorithm.

[1]  Di Xiao,et al.  An image encryption scheme based on rotation matrix bit-level permutation and block diffusion , 2014, Commun. Nonlinear Sci. Numer. Simul..

[2]  Robertas Damasevicius,et al.  An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map , 2019, Entropy.

[3]  Xin Jin,et al.  An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map , 2015 .

[4]  Karthikeyan Bhargavan,et al.  On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN , 2016, CCS.

[5]  Tariq Shah,et al.  Image encryption algorithm based on PGL(2,GF(28)) S-boxes and TD-ERCS chaotic sequence , 2012 .

[6]  Yingqian Zhang,et al.  Image encryption algorithm based on multiple mixed hash functions and cyclic shift , 2017, Optics and Lasers in Engineering.

[7]  Chittaranjan Pradhan,et al.  Novel color image encryption technique using Blowfish and Cross Chaos map , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[8]  B. Ross Performance Enhancement of Blowfish Encryption Using RK-Blowfish Technique , 2017 .

[9]  Seong Oun Hwang,et al.  A secure image encryption scheme based on chaotic maps and affine transformation , 2015, Multimedia Tools and Applications.

[10]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[11]  Zijie Zhao,et al.  Image encryption algorithm based on modified SC-Hopfield , 2019 .

[12]  Jordi Grau-Moya,et al.  Non-Equilibrium Relations for Bounded Rational Decision-Making in Changing Environments , 2017, Entropy.

[13]  Mingqing Xiao,et al.  A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion , 2018, Entropy.

[14]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[15]  Abdennaceur Kachouri,et al.  A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 , 2015, Nonlinear Dynamics.

[16]  Ross Anderson,et al.  Serpent: A Proposal for the Advanced Encryption Standard , 1998 .

[17]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[18]  Ghazali Sulong,et al.  Chaotic map-embedded Blowfish algorithm for security enhancement of colour image encryption , 2015, Nonlinear Dynamics.

[19]  Xuesong Wang,et al.  Remote-Sensing Image Encryption Algorithm Using the Advanced Encryption Standard , 2018, Applied Sciences.

[20]  Geeta Bagade,et al.  Exploring AspectJ Refactorings , 2016 .

[21]  N. Sriraam,et al.  Image Encryption Based on Diffusion and Multiple Chaotic Maps , 2011, ArXiv.

[22]  Guangchun Luo,et al.  An Image Encryption Scheme Based on The Three-dimensional Chaotic Logistic Map , 2019, Int. J. Netw. Secur..

[23]  Wenhong Wang,et al.  A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256 , 2018, Entropy.

[24]  M. Mekala,et al.  Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key , 2016 .

[25]  Romani Patel Research of Secure Image Encryption Technique Using Blowfish And Chaos , 2016 .

[26]  Eric R. Dittman,et al.  Identification of cubic nonlinearity in disbonded aluminum honeycomb panels using single degree-of-freedom models , 2015 .

[27]  Xingyuan Wang,et al.  A novel chaotic image encryption scheme using DNA sequence operations , 2015 .

[28]  Shreyank N. Gowda Using Blowfish encryption to enhance security feature of an image , 2016, 2016 6th International Conference on Information Communication and Management (ICICM).

[29]  Han-Ping Hu,et al.  Dynamics Analysis of a New Fractional-Order Hopfield Neural Network with Delay and Its Generalized Projective Synchronization , 2018, Entropy.

[30]  W. Schwarz,et al.  Chaos and cryptography , 2001 .

[31]  Constantin Volosencu,et al.  Chaotic Trajectory Design for Monitoring an Arbitrary Number of Specified Locations Using Points of Interest , 2012 .

[32]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[33]  Alireza Jolfaei,et al.  Image Encryption Using Chaos and Block Cipher , 2010, Comput. Inf. Sci..

[34]  Narendra K. Pareek,et al.  Design and Analysis of a Novel Digital Image Encryption Scheme , 2012, ArXiv.

[35]  Sohail Nadeem,et al.  Peristaltic Flow of Carreau Fluid in a Rectangular Duct through a Porous Medium , 2012 .

[36]  Daniel Curiac,et al.  Chaos-Based Cryptography: End of the Road? , 2007, The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007).