Symmetric synchronous stream encryption using images

In this paper, a symmetric synchronous stream encryption technique is suggested. The proposed technique utilizes a selected block from the parity bit plane of a public image as a nonlinear function to confuse the relation between the ciphered bits and the key stream. Using the proposed technique, any sort of message like text or image can be encrypted as well as decrypted bit by bit. Simulation results showed that ciphered gray scale images have flat histogram with entropy almost equal to eight and a correlation between pixels in all directions which is almost equal to zero. The technique is highly sensitive to any change in the starting pixel of the selected block or the initial condition of the pseudo-random generator.

[1]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[2]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[3]  Vinod Patidar,et al.  A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .

[4]  Ahmed A. Abd El-Latif,et al.  A chaotic block cipher algorithm for image cryptosystems , 2010 .

[5]  Wentian Li,et al.  On the Relationship between Complexity and Entropy for Markov Chains and Regular Languages , 1991, Complex Syst..

[6]  Xingyuan Wang,et al.  A new image encryption algorithm based on chaos , 2012 .

[7]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[8]  Ahmed A. Abd El-Latif,et al.  Efficient modified RC5 based on chaos adapted to image encryption , 2010, J. Electronic Imaging.

[9]  Ahmed A. Abd El-Latif,et al.  Chaotic Image Encryption Using Bézier Curve in DCT Domain Scrambling , 2011, DEIS.

[10]  Allan G. Bluman Elementary Statistics: A Step By Step Approach , 1980 .

[11]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[12]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[13]  Alfredo De Santis,et al.  Unconditionally secure key assignment schemes , 2006, Discret. Appl. Math..

[14]  S. Lian,et al.  Efficient image or video encryption based on spatiotemporal chaos system , 2009 .

[15]  Zhiliang Zhu,et al.  An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion , 2012 .

[16]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[17]  Amir Akhavan,et al.  A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .

[18]  Xin Zhang,et al.  A new chaotic algorithm for image encryption , 2006 .

[19]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[20]  A. Akhavan,et al.  A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .

[21]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[22]  Congxu Zhu,et al.  A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .

[23]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[24]  Hyoungshick Kim,et al.  An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .

[25]  Qing Zhou,et al.  Collision-based flexible image encryption algorithm , 2012, J. Syst. Softw..