Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps

Abstract.In recent years, a number of chaos-based image encryption schemes have been proposed. In digital images, pixel is considered as the smallest element. So, most of the image encryption schemes implement diffusion and permutation operation at the pixel level. The substitution process creates diffusion. It can be done by using the substitution box (S-box). Although the S-box plays a vital role in any cryptosystem, the S-box substitution takes too much time to substitute the pixels of an image of size $ 256 \times 256$256×256 or more than $ 256 \times 256$256×256 . So, in this paper, for the low time complexity, bit level permutation is performed by extracting the binary bit planes from the plaintext image. Bit level permutation has an ability to create confusion and diffusion at the same time. A new random image is introduced to create more diffusion. The chaotic cubic-logistic and logistic map are also used in the proposed cryptosystem. Experimental results are carried out to show the efficiency of the proposed cryptosystem.

[1]  Xiao Liu,et al.  A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .

[2]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[3]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[4]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[5]  M. Bettayeb,et al.  A novel secure image transmission scheme based on synchronization of fractional-order discrete-time hyperchaotic systems , 2017 .

[6]  Xing-yuan Wang,et al.  A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems , 2015, Nonlinear Dynamics.

[7]  Xing-yuan Wang,et al.  A fast image algorithm based on rows and columns switch , 2014, Nonlinear Dynamics.

[8]  Sos S. Agaian,et al.  Image encryption using P-Fibonacci transform and decomposition , 2012 .

[9]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[10]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[11]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[12]  Jiun-In Guo,et al.  Design of a new signal security system , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[13]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[14]  Xing-yuan Wang,et al.  A novel image encryption algorithm based on dynamic S-boxes constructed by chaos , 2013, Nonlinear Dynamics.

[15]  Sos S. Agaian,et al.  Decompositional methods for stack filtering using Fibonacci p-codes , 1995, Signal Process..

[16]  Sos S. Agaian,et al.  Parallel algorithms and VLSI architectures for stack filtering using Fibonacci p-codes , 1995, IEEE Trans. Signal Process..

[17]  Sos S. Agaian,et al.  (n, k, p)-Gray code for image systems , 2013, IEEE Transactions on Cybernetics.

[18]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[19]  Adil Masood Siddiqui,et al.  Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..

[20]  Jiun-In Guo,et al.  EURASIP Journal on Applied Signal Processing 2003:13, 1291–1305 c ○ 2003 Hindawi Publishing Corporation Design and Realization of a New Signal Security System for Multimedia Data Transmission , 2003 .

[21]  Sos S. Agaian,et al.  Selective object encryption for privacy protection , 2009, Defense + Commercial Sensing.

[22]  Jan Sher Khan,et al.  A new chaos-based secure image encryption scheme using multiple substitution boxes , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).

[23]  Michael W. Marcellin,et al.  Scanning Order Strategies for Bitplane Image Coding , 2012, IEEE Transactions on Image Processing.

[24]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[25]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[26]  Sung Bum Pan,et al.  An Efficient Selective Encryption of Fingerprint Images for Embedded Processors , 2006 .

[27]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[28]  Long-Wen Chang,et al.  A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[29]  Amir Anees,et al.  An Image Encryption Scheme Based on Lorenz System for Low Profile Applications , 2015 .

[30]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[31]  Iqtadar Hussain,et al.  A technique for digital steganography using chaotic maps , 2014 .

[32]  Mohammed Yakoob Siyal,et al.  A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.

[33]  Shujun Li,et al.  On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.

[34]  Gang Chen,et al.  Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..

[35]  J. A. Muñoz-Rodríguez,et al.  Computational cryptography based on trigonometric algorithms and intensity superposition , 2010 .

[36]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[37]  Darko Kirovski,et al.  Multimedia Security Handbook , 2004 .

[38]  M. Y. Siyal,et al.  A Perceptually Scalable and JPEG Compression Tolerant Image Encryption Scheme , 2010, 2010 Fourth Pacific-Rim Symposium on Image and Video Technology.

[39]  Paul M. Chau,et al.  Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).

[40]  Subariah bt. Ibrahim,et al.  Enhanced chaotic image encryption algorithm based on Baker's map , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[41]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[42]  Andreas Uhl,et al.  SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .

[43]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[44]  Jianhua Wu,et al.  Novel image encryption algorithm based on multiple-parameter discrete fractional random transform , 2010 .

[45]  M. Yaghoobi,et al.  A new image encryption method: parallel sub-image encryption with hyper chaos , 2011, Nonlinear Dynamics.

[46]  X. Liao,et al.  Selective image encryption using a spatiotemporal chaotic system. , 2007, Chaos.

[47]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[48]  Eun-Soo Kim,et al.  Optical image encryption based on XOR operations , 1999 .

[49]  Fuyan Sun,et al.  A novel image encryption scheme based on spatial chaos map , 2008 .

[50]  William Stallings,et al.  Cryptography and Network Security (4th Edition) , 2005 .

[51]  Seong Oun Hwang,et al.  Chaos-based diffusion for highly autocorrelated data in encryption algorithms , 2015, Nonlinear Dynamics.

[52]  M. I. Moussa,et al.  Image encryption based on new one-dimensional chaotic map , 2014, 2014 International Conference on Engineering and Technology (ICET).

[53]  Tariq Shah,et al.  Stego optical encryption based on chaotic S-box transformation , 2014 .

[54]  Raphael C.-W. Phan,et al.  SPRING: a novel parallel chaos-based image encryption scheme , 2018 .

[55]  Iqtadar Hussain,et al.  A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps , 2018, The European Physical Journal Plus.