Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Image encryption based on Fisher-Yates shuffling and three dimensional chaotic economic map

Recently, few researchers investigated algorithms of image encryption using different chaotic economic maps (CEMs). However, the authors investigated the effect of these maps on the encryption of the plain image. In the current study, an image encryption algorithm via Fisher–Yates shuffling (FYS) combined with a three-dimensional (3D) CEM is given. FYS is used to generate the random permutation of a finite sequence. First, it is used to shuffle the rows and the columns of the plain image. Second, the 3DCEM is used in the substitution stage to confuse the pixels of the shuffling image. The proposed algorithm is applied to several types of images. Many measurements are performed to check the security and performance of the proposed algorithm. In addition, numerical simulations and experimental results have been implemented to verify that the proposed algorithm can resist different attack types.

References

    1. 1)
      • 44. Rukin, A., Soto, J., Nechvatal, J., et al: ‘Statistical test suite for random and pseudorandom number generators for cryptographic applications’, NIST Special Publication 800–22, 2001, Available at http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf.
    2. 2)
      • 1. Tuchman, W.: ‘A brief history of the data encryption standard’, in (Eds.): ‘Internet besieged: countering cyberspace scofflaws’ (ACM Press/Addison-Wesley Publishing Co., New York, NY, USA, 1997), pp. 275280.
    3. 3)
      • 33. Wang, X., Lie, Y.: ‘A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models’, Opt. Commun., 2012, 282, pp. 40334042.
    4. 4)
      • 9. Nien, H., Huang, W., et al: ‘Hybrid image encryption using multi-chaos-system’. Int. Conf. Information, Communications and Signal Processing (ICICS), Macau, China, 2009, pp. 15.
    5. 5)
      • 32. Tao, X., Liao, X.F., Tang, G.P.: ‘A novel block cryptosystem based on iterating a chaotic map’, Phys. Lett. A, 2006, 349, (1–4), pp. 109115.
    6. 6)
      • 40. George, S.N., Pattathil, D.P.: ‘A secure LFSR based random measurement matrix for compressive sensing’, Sens. Imaging, 2014, 15, (1), pp. 129.
    7. 7)
      • 30. Kwok, H.S., Tang, W.K.: ‘A fast image encryption system based on chaotic maps with finite precision representation’, Chaos Solitons Fractals, 2007, 32, pp. 15181529.
    8. 8)
      • 31. Sobhy, M.I., Shehata, A.R.: ‘Methods of attacking chaotic encryption and countermeasures’. IEEE Acoustics Speech Signal Processing, Salt Lake City, UT, USA, 2001, pp. 10011004.
    9. 9)
      • 39. Parvin, Z., Seyedarabi, H., Shamsi, M.: ‘A new secure and sensitive image encryption scheme based on new substitution with chaotic function’, Multimedia Tools Appl., 2016, 75, pp. 1063110648.
    10. 10)
      • 20. Wang, X., Liu, C.: ‘A novel and effective image encryption algorithm based on chaos and DNA encoding’, Multimedia Tools Appl., 2017, 76, pp. 62296245.
    11. 11)
      • 21. Ye, G., Huang, X.: ‘A secure image encryption algorithm based on chaotic maps and SHA-3’, Secur. Commun. Netw., 2016, 9, (13), pp. 20152023.
    12. 12)
      • 16. Vaferi, E., Sabbaghi-Nadooshan, R.: ‘A new encryption algorithm for color images based on total chaotic shuffling scheme’, Opt. – Int. J. Light Electron. Opt., 2015, 126, (20), pp. 24742480.
    13. 13)
      • 38. Zhu, C.: ‘A novel image encryption scheme based on improved hyperchaotic sequences’, Opt. Commun., 2012, 285, (1), pp. 2937.
    14. 14)
      • 25. Liu, H., Wang, X.: ‘Color image encryption based on one-time keys and robust chaotic maps’, Comput. Math. Appl., 2010, 59, (10), pp. 33203327.
    15. 15)
      • 12. Zhu, W., Shen, Y.: ‘Encryption algorithms using chaos and CAT methodology’. Int. Conf. Anti-Counterfeiting Security and Identification in Communication (ASID), Chengdu, China, 2010, pp. 2023.
    16. 16)
      • 35. Pareek, N.K., Patidar, V., Sud, K.K.: ‘Image encryption using chaotic logistic map, image and vision computing’, Image and Vision Comput., 2006, 24, (9), pp. 926934.
    17. 17)
      • 24. Wang, X., Luan, D.: ‘A novel image encryption algorithm using chaos and reversible cellular automata’, Commun. Nonlinear Sci. Numer. Simul., 2013, 18, (11), pp. 30753085.
    18. 18)
      • 19. Liu, L., Miao, S., Hu, H., et al: ‘N-phase logistic chaotic sequence and its application for image encryption’, IET Signal Process., 2016, 10, (9), pp. 10961104.
    19. 19)
      • 27. Liu, H., Wang, X., Kadir, A.: ‘Image encryption using DNA complementary rule and chaotic maps’, Appl. Soft Comput., 2012, 12, (5), pp. 14571466.
    20. 20)
      • 23. Wang, X., Liu, L., Zhang, Y.: ‘A novel chaotic block image encryption algorithm based on dynamic random growth technique’, Opt. Lasers Eng., 2015, 66, pp. 1018.
    21. 21)
      • 4. Askar, S.S., Karawia, A.A., Alshamrani, A.: ‘Image encryption algorithm based on chaotic economic model’, Math. Probl. Eng., 2015, 2015, Article ID 341729, pp. 110.
    22. 22)
      • 28. Wang, X., Yang, L., Liu, R., et al: ‘A chaotic image encryption algorithm based on perceptron model’, Nonlinear Dyn., 2010, 62, (3), pp. 615621.
    23. 23)
      • 2. Chen, G., Mao, Y., Chui, C.K.: ‘A symmetric image encryption scheme based on 3D chaotic cat maps’, Chaos Solitons Fractals, 2004, 21, (3), pp. 749761.
    24. 24)
      • 14. Sivakumar, T., Venkatesan, R.: ‘Image encryption based on pixel shuffling and random key stream’, Int. J. Comput. Inf. Technol., 2014, 3, (6), pp. 14681476.
    25. 25)
      • 42. Ahmad, M., Shamsi, U., Khan, I.: ‘An enhanced image encryption algorithm using fractional chaotic systems’, Procedia Comput. Sci., 2015, 57, pp. 852859.
    26. 26)
      • 5. Askar, S.S., Karawia, A.A., Alammar, F.S.: ‘Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map’, IET Image Process., 2018, 12, (1), pp. 158167.
    27. 27)
      • 13. Fridrich, J.: ‘Symmetric ciphers based on two-dimensional chaotic maps’, Int. J. Bifurcation Chaos, 1998, 8, (6), pp. 12591284.
    28. 28)
      • 43. Qian, Z., Yuan, W.: ‘A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice’, Inf. Sci., 2014, 273, pp. 329351.
    29. 29)
      • 22. Wang, X., Zhang, Y., Bao, X.: ‘A novel chaotic image encryption scheme using DNA sequence operations’, Opt. Lasers Eng., 2015, 73, pp. 5361.
    30. 30)
      • 36. Borujeni, S., Eshghi, M.: ‘Chaotic image encryption design using Tompkins–Paige algorithm’, Math. Probl. Eng., 2009, 2009, Article ID 762652, pp. 122.
    31. 31)
      • 34. Zhang, Y., Wang, X.: ‘A new image encryption algorithm based on non-adjacent coupled map lattices’, Appl. Soft Comput., 2015, 26, pp. 1020.
    32. 32)
      • 6. Matthews, R.: ‘On the derivation of a chaotic encryption algorithm’, Cryptologia, 1989, 13, pp. 2942.
    33. 33)
      • 41. Wang, X., Qin, L.: ‘A novel colour image encryption algorithm based on chaos’, Signal Process., 2012, 92, pp. 11011108.
    34. 34)
      • 11. Jeyamala, J., Gopi Ganesh, S., Raman, S.: ‘An image encryption scheme based on one time pads – a chaotic approach’. Int. Conf. Computing, Communication and Networking Technologies, Karur, India, 2010, pp. 16.
    35. 35)
      • 10. Cao, Y., Fu, C.: ‘An image encryption scheme based on high dimension chaos system’. Int. Conf. Intelligent Computation Technology and Automation, Hunan, China, 2008, pp. 104108.
    36. 36)
      • 29. Ding, Z., Hang, Q., Tian, L.: ‘Analysis of the dynamics of Cournot team-game with heterogeneous players’, Appl. Math. Comput., 2009, 215, pp. 10981105.
    37. 37)
      • 45. Askar, S., Karawia, A., AL-Khedhairi, A., et al: ‘An algorithm of image encryption using logistic and two-dimensional chaotic economic maps’, Entropy, 2019, 21, (1), p. 44.
    38. 38)
      • 17. Xiao, D., Liao, X., Wei, P.: ‘Analysis and improvement of a chaos-based image encryption algorithm’, Chaos Solitons Fractals, 2009, 40, (5), pp. 21912199.
    39. 39)
      • 15. Zhang, J., Fang, D., Ren, H.: ‘Image encryption algorithm based on DNA encoding and chaotic maps’, Math. Probl. Eng., 2014, 2014, p. 22, Article ID 917147, pp. 110.
    40. 40)
      • 7. Xu, E., Shao, L., Cao, G., et al: ‘A new method of information encryption’. Int. Colloquium Computing, Communication, Control, and Management, Sanya, China, 2009, pp. 583586.
    41. 41)
      • 8. Dinghui, Z., Qiujie, G., Yonghua, P., et al: ‘Discrete chaotic encryption and decryption of digital images’. Int. Conf. Computer Science and Software Engineering, Hubei, China, 2009, pp. 849852.
    42. 42)
      • 18. Liu, L., Miao, S.: ‘An image encryption algorithm based on Baker map with varying parameter’, Multimedia Tools Appl., 2017, 76, pp. 1651116527.
    43. 43)
      • 3. Chiaraluce, F., Ciccarelli, L., Gambi, E., et al: ‘A new chaotic algorithm for video encryption’, IEEE Trans. Consum. Electron., 2002, 48, pp. 838843.
    44. 44)
      • 37. Song, C-Y., Qiao, Y-L., Zhang, X-Z.: ‘An image encryption scheme based on new spatiotemporal chaos’, Opt. – Int. J. Light Electron. Opt., 2013, 124, (18), pp. 33293334.
    45. 45)
      • 26. Liu, H., Wang, X.: ‘Color image encryption using spatial bit-level permutation and high-dimension chaotic system’, Opt. Commun., 2011, 284, (16–17), pp. 38953903.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ipr.2018.5142
Loading

Related content

content/journals/10.1049/iet-ipr.2018.5142
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address