×

An image encryption scheme with a pseudorandom permutation based on chaotic maps. (English) Zbl 1222.94041

Summary: Many research efforts for image encryption schemes have elaborated for designing nonlinear functions since security of these schemes closely depends on inherent characteristics of nonlinear functions. It is commonly believed that a chaotic map can be used as a good candidate of a nonlinear component for image encryption schemes. We propose a new image encryption algorithm using a large pseudorandom permutation which is combinatorially generated from small permutation matrices based on chaotic maps. The random-like nature of chaos is effectively spread into encrypted images by using the permutation matrix. The experimental results show that the proposed encryption scheme provides comparable security with that of the conventional image encryption schemes based on Baker map or Logistic map.

MSC:

94A60 Cryptography
37D45 Strange attractors, chaotic dynamics of systems with hyperbolic behavior
37N35 Dynamical systems in control
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
Full Text: DOI

References:

[1] National Institute of Standards and Technology (NIST). FIPS-197: Advanced encryption standard; November 2001. Available from: http://csrc.nist.gov/publications/PubsFIPS.html; National Institute of Standards and Technology (NIST). FIPS-197: Advanced encryption standard; November 2001. Available from: http://csrc.nist.gov/publications/PubsFIPS.html
[2] Socek, D.; Magliveras, S.; C’ulibrk, D.; Marques, O.; Kalva, H.; Furht, B., Digital video encryption algorithms based on correlation-preserving permutations, EURASIP J Inform Security (2007)
[3] Chang, C.; Hwang, M.; Chen, T., A new encryption algorithm for image cryptosystems, J Syst Software, 58, 83-91 (2001)
[4] Preneel B. Design principles for dedicated hash functions. In: Fast software encryption, Cambridge security workshop, Lecture notes in computer science, vol. 809, Springer, Berlin; 1993. p. 71-82.; Preneel B. Design principles for dedicated hash functions. In: Fast software encryption, Cambridge security workshop, Lecture notes in computer science, vol. 809, Springer, Berlin; 1993. p. 71-82. · Zbl 0943.94524
[5] Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int J Bifurcat Chaos, 8, 1259-1284 (1998) · Zbl 0935.94019
[6] Zhang, L.; Liao, X.; Wang, X., An image encryption approach based on chaotic maps, Chaos Soliton Fract, 24, 759-765 (2005) · Zbl 1083.94011
[7] Tong, X.; Cui, M., Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator, Signal Process, 89, 480-491 (2009) · Zbl 1157.94311
[8] Gao, T.; Chen, Z., Image encryption based on a new total shuffling algorithm, Chaos Soliton Fract, 38, 213-220 (2008) · Zbl 1142.94310
[9] Chen, G.; Mao, Y.; Chui, C. K., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Soliton Fract, 21, 3, 749-761 (2004) · Zbl 1049.94009
[10] Kocarev, L.; Jakimoski, G., Logistic map as a block encryption algorithm, Phys Lett A, 289, 4-5, 199-206 (2001) · Zbl 0974.94005
[11] Pisarchik, A. N.; Flores-Carmona, N. J.; Carpio-Valadez, M., Encryption and decryption of images with chaotic map lattices, Chaos: Interdiscipl J Nonlinear Sci, 16, 3, 033118 (2006) · Zbl 1151.94560
[12] Li, P.; Li, Z.; Halang, W. A.; Chen, G., A stream cipher based on a spatiotemporal chaotic system, Chaos Soliton Fract, 32, 5, 1867-1876 (2007) · Zbl 1131.94014
[13] Sun, F.; Liu, S.; Li, Z.; Lu, Z., A novel image encryption scheme based on spatial chaos map, Chaos Soliton Fract, 38, 3, 631-640 (2008) · Zbl 1146.94303
[14] Scharinger, J., Fast encryption of image data using chaotic Kolmogrov flow, J Electron Eng, 7, 2, 318-325 (1998)
[15] Dyson, F. J.; Falk, H., Period of a discrete cat mapping, Am Math Month, 99, 7, 603-614 (1992) · Zbl 0772.58023
[16] May, R. M., Simple mathematical models with very complicated dynamics, Nature, 261 (1976) · Zbl 1369.37088
[17] Knuth, D. E., The art of computer programming, vol. 2 (1997), Addison-Wesley: Addison-Wesley Reading, MA · Zbl 0883.68015
[18] Ding, C.; Fu, F.; Klove, T.; Wei, V. K.W., Constructions of permutation arrays, IEEE Trans Inform Theory, 48, 977-980 (2002) · Zbl 1061.05016
[19] National Institute of Standards and Technology (NIST). FIPS pub 140-2: Security requirements for cryptographic modules; May 2001. Available from: http://csrc.nist.gov/publications/PubsFIPS.html; National Institute of Standards and Technology (NIST). FIPS pub 140-2: Security requirements for cryptographic modules; May 2001. Available from: http://csrc.nist.gov/publications/PubsFIPS.html
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.