A Secure and Robust Image Encryption Scheme Based on Mixture of Multiple Generalized Bernoulli Shift Maps and Arnold Maps

In this paper, a chaotic image encryption scheme with an efficient permutation-diffusion mechanism is constructed, where six generalized Bernoulli shift maps and one six-dimensional Arnold map are utilized to generate one hybrid chaotic orbit applied to disorder the pixel positions in the permutation process while four generalized Bernoulli shift maps and one Arnold map are employed to yield two random gray value sequences to change the gray values by a two-way diffusion process. Several merits of the proposed image encryption scheme are achieved, including a huge key space, good statistical properties resisting statistical attack and differential attack, desirable robustness against malicious attacks on cipher-images, such as cropping, noising, JPEG compression, etc. Experimental results have been carried out with detailed analysis to show that the proposed scheme can be a potential candidate for practical image encryption.

[1]  Douglas R Stinson Cryptography : Theory and Practice -3/E. , 2014 .

[2]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .

[3]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[4]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[5]  V. I. Arnolʹd,et al.  Ergodic problems of classical mechanics , 1968 .

[6]  Yuri Maistrenko,et al.  An introduction to the synchronization of chaotic systems: coupled skew tent maps , 1997 .

[7]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[8]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[9]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[10]  Di Xiao,et al.  Analysis and improvement of a chaos-based image encryption algorithm , 2009 .

[11]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[12]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[14]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[15]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[18]  S. Li,et al.  Breaking an encryption scheme based on chaotic baker map , 2004, Physics Letters.

[19]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[20]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[21]  Zhi-Hong Guan,et al.  A modified method of a class of recently presented cryptosystems , 2005 .

[22]  J. Koenderink Q… , 2014, Les noms officiels des communes de Wallonie, de Bruxelles-Capitale et de la communaute germanophone.

[23]  Ruisong Ye,et al.  Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking , 2010 .

[24]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[25]  M. Baptista Cryptography with chaos , 1998 .

[26]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .