Computer Science ›› 2014, Vol. 41 ›› Issue (9): 158-164.doi: 10.11896/j.issn.1002-137X.2014.09.030

Previous Articles     Next Articles

Substitution-Permutation Network Structured Image Encryption Algorithm Based on Chaotic Map

CAI Jun,CHEN Xin and XIANG Xu-dong   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Various image encryption algorithms based on the permutation-diffusion structure have been proposed in the past few years.However,permutation and diffusion are considered as two separate stages,making image encryption vulnerable to attacks.Moreover,the algorithms,in general,have low diffusion efficiency and high computational complexity in key scheming.To solve these problems,this paper proposed a SP(Substitution-Permutation) network image encryption algorithm based on chaotic map.The proposed algorithm adopts the following three strategies:(1) To further enhance the security of the cryptosystem,XOR and S-box operations are introduced in the beginning of each encryption round;(2) An bidirectional permutation-diffusion strategy is proposed to accelerate the spreading process;(3) Simple circular bit shift and XOR operations are used to improve the efficiency of key scheming.We conducted a rich set of cryptanalyses on the proposed algorithm,e.g.,key space analysis,key sensitivity analysis,various statistical analyses and differential analysis.Analytical results demonstrate that the proposed algorithm reaches the same security level of previously proposed counterparts in merely three iterations with high efficiency,and is thus applicable for secure image encryption.

Key words: SP network,Image encryption,Chaos,3D arnold map,Logistic map

[1] Alvarez G,Li S.Some basic cryptographic requirements for chaosbased cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(08):2129-2151
[2] 黄伟琦,陈志刚,梁涤青,等.基于多混沌系统的医学图像加密算法[J].计算机科学,2012,39(12):261-263,299
[3] Li Shu-jun,Mou Xuan-qin,Cai Yuan-long.Pseudo-random bitgenerator based on couple chaotic systems and its applications in stream-cipher cryptography[M]∥Progress in Cryptology-INDOCRYPT 2001.Springer Berlin Heidelberg,2001:316-329
[4] Liu Nian-sheng.Pseudo-randomness and complexity of binarysequences generated by the chaotic system[J].Communications in Nonlinear Science and Numerical Simulation,2011,16(2):761-768
[5] Chee C Y,Xu D.Chaotic encryption using discrete-time synchro-nous chaos[J].Physics Letters A,2006,348(3):284-292
[6] Kocarev L,Jakimoski G.Logistic map as a block encryption algorithm [J].Physics Letters A,2001,289(4):199-206
[7] Fridrich J.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284
[8] Chen Guan-rong,Mao Yao-bin,Chui C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons & Fractals,2004,21(3):749-761
[9] Zhu Zhi-liang,Zhang Wei,Wong K,et al.A chaos-based symmetric image encryption scheme using a bit-level permutation[J].Information Sciences,2011,181(6):1171-1186
[10] Tong Xiao-jun,Cui Ming-gen.Image encryption scheme basedon 3D baker with dynamical compound chaotic sequence cipher generator[J].Signal Processing,2009,89(4):480-491
[11] Tong Xiao-jun.Design of an image encryption scheme based on a multiple chaotic map[J].Communications in Nonlinear Science and Numerical Simulation,2012,18(7):1725-1733
[12] Rhouma R,Meherzi S,Belghith S.OCML-based colour imageencryption[J].Chaos,Solitons & Fractals,2009,40(1):309-318
[13] Xu Shu-jiang,Chen Xiu-bo,Zhang Ru,et al.An improved chaoticcryptosystem based on circular bit shift and XOR operations[J].Physics Letters A,2012,376(10):1003-1010
[14] Mazloom S,Eftekhari-Moghadam A M.Color image encrypttion based on coupled nonlinear chaotic map[J].Chaos,Solitons & Fractals,2009,42(3):1745-1754
[15] Wang Yong,Wong K,Liao Xiao-feng,et al.A chaos-based image encryption algorithm with variable control parameters[J].Chaos,Solitons & Fractals,2009,41(4):1773-1783
[16] Zhang Wei,Wong K,Yu Hai,et al.An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(8):2066-2080
[17] Fu Chong,Chen Jun-jie,Zou Hao,et al.A chaos-based digitalimage encryption scheme with an improved diffusion strategy[J].Optics Express,2012,20(3):2363-2378
[18] Shannon C E.Communication theory of secrecy systems [J].Bell system technical journal,1949,28(4):656-715
[19] Wang Yong,Wong K,Liao Xiao-feng,et al.A new chaos-based fast image encryption algorithm[J].Applied soft computing,2011,11(1):514-522
[20] Schneier B.Applied cryptography:protocols,algorithms,andsource code in C[M].John Wiley & Sons,2007
[21] 郭建胜,张锋.一种图像加密算法的等效密钥攻击方案[J].电子学报,2010,38(4):781-785
[22] Solak E,C,okal C,Yildiz O T,et al.Cryptanalysis of Fridrich’s chaotic image encryption[J].International Journal of Bifurcation and Chaos,2010,20(05):1405-1413
[23] Lian S,Sun J,Wang Z.A block cipher based on a suitable use of the chaotic standard map[J].Chaos,Solitons & Fractals,2005,26(1):117-129

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!