A Secure and Efficient Image Encryption Scheme Based on Tent Map and Permutation-substitution Architecture

A secure image encryption scheme based on 2D skew tent map is proposed for the encryption of color images. The proposed encryption scheme is composed of one permutation process and one substitution process. The 3D color plain-image matrix is converted to 2D image matrix first, then 2D skew tent map is utilized to generate chaotic sequences, which are used for both permutation process and substitution process. The chaotic sequence for permutation process is dependent on plain- image and cipher keys, resulting in good key sensitivity and plaintext sensitivity. The substitution process is first initiated with the initial vectors generated by the cipher keys and 2D skew tent map, then the gray values of row and column pixels of 2D image matrix are mixed with the pseudorandom number sequences via bitxoring operation. Both permutation process and substitution process are executed row-by-row and column-by-column instead of pixel-by-pixel to improve the speed of encryption. The security and performance of the proposed image encryption have been analyzed, including histograms, correlation coefficients, information entropy, key sensitivity analysis, key space analysis, differential analysis, encryption/decryption rate analysis etc. All the experimental results suggest that the proposed image encryption scheme is robust and secure and can be used for secure image and video communication applications. Index Terms—Chaotic system, skew tent map, image encryption, permutation-substitution architecture

[1]  Ruisong Ye,et al.  A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism , 2011 .

[2]  Jinsheng Sun,et al.  A block cipher based on a suitable use of the chaotic standard map , 2005 .

[3]  Gang Chen,et al.  Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..

[4]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[5]  Zhi-Hong Guan,et al.  A modified method of a class of recently presented cryptosystems , 2005 .

[6]  Wei Zhou,et al.  An Image Encryption Scheme Based on 2D Tent Map and Coupled Map Lattice , 2011 .

[7]  R. Robinson,et al.  An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .

[8]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[9]  N. K. Pareek,et al.  Modified substitution-diffusion image cipher using chaotic standard and logistic maps , 2010 .

[10]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[11]  Ruisong Ye,et al.  Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking , 2010 .

[12]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[13]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[14]  Xingyuan Wang,et al.  Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .

[15]  Guanrong Chen,et al.  A chaos-based image encryption algorithm with variable control parameters , 2009 .

[16]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[17]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[18]  Xingyuan Wang,et al.  Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .

[19]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[20]  K. Aihara,et al.  Cryptosystems with discretized chaotic maps , 2002 .

[21]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[22]  Nikolaos G. Bourbakis,et al.  A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..

[23]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..