A Novel Chaotic Image Encryption Scheme Based on Hash Function and Cyclic Shift

ABSTRACT A novel chaotic image encryption scheme based on hash function and cyclic shift is designed. The key streams are dependent on the hash value of the plain text and changed in every encryption process. The one-time keys are generated by the hash values of the plain images to get six initial values of the piecewise linear chaotic map (PWLCM). Then, the PWLCM system will produce three pseudo-random sequences to diffusion and confusion image. The mask operation and new fast ranks transformation method are used to encrypt image based on pixel level. Cycle shift is applied to the encryption system to change the position and the value of the pixels based on bit level. Many experiments are done and security analyses are discussed, which show that the novel algorithm has good effect and it can resist common attacks.

[1]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[2]  Xing-yuan Wang,et al.  Image encryption scheme using chaos and simulated annealing algorithm , 2016 .

[3]  Di Xiao,et al.  Analysis and improvement of a hash-based image encryption algorithm , 2011 .

[4]  Musheer Ahmad,et al.  Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling , 2016 .

[5]  Wei Zhang,et al.  A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..

[6]  X. Liao,et al.  Selective image encryption using a spatiotemporal chaotic system. , 2007, Chaos.

[7]  Lu Xu,et al.  A novel bit-level image encryption algorithm based on chaotic maps , 2016 .

[8]  Abdennaceur Kachouri,et al.  Hash key-based image encryption using crossover operator and chaos , 2015, Multimedia Tools and Applications.

[9]  Xingyuan Wang,et al.  Novel image encryption algorithm based on cycle shift and chaotic system , 2015 .

[10]  Mrinal Kanti Mandal,et al.  An Image Encryption Process based on Chaotic Logistic Map , 2012 .

[11]  Tariq Shah,et al.  Application of S-box and chaotic map for image encryption , 2013, Math. Comput. Model..

[12]  Xingyuan Wang,et al.  Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..

[13]  Yong Wang,et al.  A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..

[14]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[15]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[16]  Xingyuan Wang,et al.  A novel image encryption algorithm based on chaotic system and improved Gravity Model , 2015 .

[17]  Dariusz Czarkowski,et al.  Asymmetrical Duty-Cycle and Phase-Shift Control of a Novel Multiport CLL Resonant Converter , 2015, IEEE Journal of Emerging and Selected Topics in Power Electronics.

[18]  Hongjun Liu,et al.  Triple-image encryption scheme based on one-time key stream generated by chaos and plain images , 2013, J. Syst. Softw..

[19]  Debashis Nandi,et al.  Reduction of Dynamical Degradation in Chaotic Image Encryption System by Coupling Multiple Chaotic Maps and Perturbation , 2012 .

[20]  Mohammad Reza Mosavi,et al.  A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.

[21]  A. Pisarchik,et al.  Image encryption with chaotically coupled chaotic maps , 2008 .

[22]  Zhenjun Tang,et al.  Multiple-image encryption with bit-plane decomposition and chaotic maps , 2016 .

[23]  Kevin Curran,et al.  A hash-based image encryption algorithm , 2010 .

[24]  Guodong Ye,et al.  Chaotic image encryption algorithm using wave-line permutation and block diffusion , 2015, Nonlinear Dynamics.

[25]  Di Xiao,et al.  Analysis and improvement of a chaos-based image encryption algorithm , 2009 .

[26]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .