A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption

Abstract A novel and robust chaos-based pseudorandom permutation–substitution scheme for image encryption is proposed. It is a loss-less symmetric block cipher and specifically designed for the color images but may also be used for the gray scale images. A secret key of 161-bit, comprising of the initial conditions and system parameter of the chaotic map (the standard map), number of iterations and number of rounds, is used in the algorithm. The whole encryption process is the sequential execution of a preliminary permutation and a fix number of rounds (as specified in the secret key) of substitution and main permutation of the 2D matrix obtained from the 3D image matrix. To increase the speed of encryption all three processes: preliminary permutation, substitution and main permutation are done row-by-row and column-by-column instead of pixel-by-pixel. All the permutation processes are made dependent on the input image matrix and controlled through the pseudo random number sequences (PRNS) generated from the discretization of chaotic standard map which result in both key sensitivity and plaintext sensitivity. However each substitution process is initiated with the initial vectors (different for rows and columns) generated using the secret key and chaotic standard map and then the properties of rows and column pixels of input matrix are mixed with the PRNS generated from the standard map. The security and performance analysis of the proposed image encryption has been performed using the histograms, correlation coefficients, information entropy, key sensitivity analysis, differential analysis, key space analysis, encryption/decryption rate analysis etc. Results suggest that the proposed image encryption technique is robust and secure and can be used for the secure image and video communication applications.

[1]  P. Grassberger,et al.  Estimation of the Kolmogorov entropy from a chaotic signal , 1983 .

[2]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[3]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[4]  Shujun Li,et al.  Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps , 2009, ArXiv.

[5]  S. Strogatz Nonlinear Dynamics and Chaos: With Applications to Physics, Biology, Chemistry and Engineering , 1995 .

[6]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[7]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[8]  Kwok-Wo Wong,et al.  A fast image encryption and authentication scheme based on chaotic maps , 2010 .

[9]  Gonzalo Alvarez,et al.  On the inadequacy of the logistic map for cryptographic applications , 2008 .

[10]  Guanrong Chen,et al.  A chaos-based image encryption algorithm with variable control parameters , 2009 .

[11]  N. K. Pareek,et al.  Modified substitution-diffusion image cipher using chaotic standard and logistic maps , 2010 .

[12]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .

[13]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[14]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[15]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[16]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[17]  Shiguo Lian,et al.  A block cipher based on chaotic neural networks , 2009, Neurocomputing.