A New Image Scrambling Scheme through Chaotic Permutation and Geometric Grid based Noise Induction

Digital images cover the major portion of data that is being exchanged over communication network. When digital images are personal or confidential a high level security has to be provided. Traditional Encryption which is normally used to disguise data making it unintelligible to unauthorized observers do not consider the inherent features of images and thus is not considered to be highly effective with regard to computational complexity and also the security level enforced on images. This paper presents a new concept for image scrambling by applying pixel permutation and pixel substitution on an image split into irregular trapezoidal grids. Pixel permutation is performed using Arnold’s 2-D cat map which will disarray the pixels. Then substitution is performed employing a distinctive feature that the key for substitution process for pixels are derived from the properties of the trapezoidal grid to which the pixel belongs. Thus pixels mapped to various grids will have different noise induction thus providing high level security. The entire process of pixel permutation and substitution is repeated for several iterations to provide higher level security. The experimental results show that the proposed algorithm can successfully scramble the images, and the security analysis of the algorithm also demonstrates that the proposed scheme can withstand various cryptanalytic and statistical attacks. General Terms Security, Image Processing, Chaos Theory.

[1]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[2]  Franz Pichler,et al.  Finite Dimensional Generalized Baker Dynamical Systems for Cryptographic Applications , 1995, EUROCAST.

[3]  J. Todd Book Review: Digital image processing (second edition). By R. C. Gonzalez and P. Wintz, Addison-Wesley, 1987. 503 pp. Price: £29.95. (ISBN 0-201-11026-1) , 1988 .

[4]  X. Liao,et al.  A novel block cryptosystem based on iterating a chaotic map , 2006 .

[5]  Li Chuanmu,et al.  A New Image Encryption Scheme based on Hyperchaotic Sequences , 2007, 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID).

[6]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[7]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[8]  Chin-Chen Chang,et al.  A new steganographic method for color and grayscale image hiding , 2007, Comput. Vis. Image Underst..

[9]  Josef Scharinger Secure and fast encryption using chaotic Kolmogorov flows , 1998, 1998 Information Theory Workshop (Cat. No.98EX131).

[10]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[11]  P. Nagabhushan,et al.  A Novel Image Scrambling Technique Based On Information Entropy And Quad Tree Decomposition , 2013 .

[12]  Robert A. Scholtz,et al.  Performance Analysis of , 1998 .

[13]  Shiguo Lian,et al.  Multimedia Content Encryption: Techniques and Applications , 2008 .

[14]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[15]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[16]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[17]  Yang Wang,et al.  The performance analysis of image encryption algorithm based on chaotic system , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[18]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[19]  Alireza Jolfaei,et al.  Survey: image encryption using Salsa20 , 2010 .

[20]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[21]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[22]  Josef Scharinger,et al.  Fast encryption of image data using chaotic Kolmogorov flows , 1997, Electronic Imaging.

[23]  Sos S. Agaian,et al.  Image encryption based on edge information , 2009, Electronic Imaging.

[24]  Nanrun Zhou,et al.  Image Encryption Based on Cat Map and Fractional Fourier Transform , 2012 .