International Journal of Computer Network and Information Security(IJCNIS)
ISSN: 20749090 (Print), ISSN: 20749104 (Online)
Publisher: MECS IJCNIS Vol.4, No.7, July 2012
An Efficient Chaosbased Image Encryption Scheme Using Affine Modular Maps 

Full Text (PDF, 1012KB), PP.4150  
Author(s)  
Ruisong Ye,Haiying Zhao  
Index Terms  
Affine modular maps, Chaotic system, Image encryption, Permutation, Diffusion  
Abstract  
Linear congruential generator has been widely applied to generate pseudorandom numbers successfully. This paper proposes a novel chaosbased image encryption scheme using affine modular maps, which are extensions of linear congruential generators, acting on the unit interval. A permutation process utilizes two affine modular maps to get two index order sequences for the shuffling of image pixel positions, while a diffusion process employs another two affine modular maps to yield two pseudorandom gray value sequences for a twoway diffusion of gray values. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to frustrate bruteforce attack efficiently and can resist statistical attack, differential attack, knownplaintext attack as well as chosenplaintext attack thanks to the yielded gray value sequences in the diffusion process not only being sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depending on the plainimage processed. 

Reference  
[1]Schneier, B., Cryptography: Theory and Practice, CRC Press, Boca Raton, 1995. [2]Fridrich, J., Symmetric ciphers based on twodimensional chaotic maps, International Journal of Bifurcation and Chaos, 1998, 8: 1259–1284. [3]Chen, G. R., Mao, Y. B., Chui, C. K., A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21: 749761. [4]Mao, Y. B., Chen, G., Lian, S. G., A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos, 2004, 14: 36133624. [5]Guan, Z.H., Huang, F., Guan, W., Chaosbased image encryption algorithm, Physics Letters A, 2005, 346: 153157. [6]Lian, S., Sun, J., Wang, Z., A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons and Fractals, 2005, 26: 117129. [7]Wong, K. W., Kwok, B., Law, W. S., A fast image encryption scheme based on chaotic standard map, Physics Letters A , 2008, 372: 2645–2652. [8]Patidar, V., Pareek, N. K., Sud, K. K., A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 2009, 14: 30563075. [9]Matthews, R., On the derivation of a chaotic encryption algorithm, Cryptologia, 1989, 8: 2941. [10]Kocarev, L., Chaosbased cryptography: a brief overview, IEEE Circuits and Systems Magazine, 2001, 1: 621. [11]Pareek, N. K., Patidar, V., Sud, K. K., Image encryption using chaotic logistic map, Image and Vision Computing, 2006, 24: 926934 [12]Tong, X., Cui, M., Image encryption with compound chaotic sequence cipher shifting dynamically, Image and Vision Computing, 2008, 26: 843850. [13]Li, S., Zheng, X., Cryptanalysis of a chaotic image encryption method, in: Proc. IEEE Int. Symposium on Circuits and Systems, vol. II, 2002, pp. 708711. [14]Alvarez, G., Montoya, F., Romera, M., Pastor, G., Cryptanalysis of a discrete chaotic cryptosystem using external key, Physics Letters A, 2003, 319: 334339. [15]Alvarez, G., Li, S., Breaking an encryption scheme based on chaotic baker map, Physics Letters A, 2006, 352: 7882. [16]Li, C., Li, S., Chen, G., Halang, W. A., Cryptanalysis of an image encryption scheme based on a compound chaotic sequence, Image and Vision Computing, 2009, 27: 10351039. [17]Xiao, D., Liao, X., Wei, P., Analysis and improvement of a chaosbased image encryption algorithm, Chaos, Solitons and Fractals, 2009, 40: 21912199. [18]Liu, J. M., Qu, Q., Cryptanalysis of a substitutiondiffusion based on cipher using chaotic standard and logistic map. In: Third International Symposium on Information Processing, pp. 6769 (2010). [19]Rhouma, R., Solak, E., Belghith, S., Cryptanalysis of a new substitutiondiffusion based image cipher,Commun. Nonlinear Sci. Numer. Simulat., 2010, 15: 18871892. [20]Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi H., Akhavan A., A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps, Physics Letters A, 2007, 366: 391396. [21]Zhang, G. J., Liu, Q., A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284: 27752780. [22]Zhu, Z. L., Zhang, W., Wong, K. W., Yu H., A chaosbased symmetric image encryption scheme using a bitlevel permutation, Information Sci., 2010, 181: 11711186. [23]Liu, H., Wang, X., Color image encryption using spatial bitlevel permutation and highdimension chaotic system, Opt. Commun. 2011, 284: 38953903. [24]Gao, T., Chen, Z., A new image encryption algorithm based on hyperchaos, Physics Letters A, 2008, 372: 394400. [25]Ye, R., A novel chaosbased image encryption scheme with an efficient permutationdiffusion mechanism, Opt. Commun. 2011, 284: 52905298. [26]Ye, R., Zhou W., A Chaosbased Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice, I. J. Computer Network and Information Security, 2012, 1: 3844. [27]Knuth D. E., The Art of Computer Programming, Vol. 2: SemiNumerical Algorithms, third ed., AddisonWesley, 1981. [28]Shannon C. E., Communication theory of secrecy system. Bell Syst. Tech. J, 1949, 28: 656–715. 

Citation  
Ruisong Ye,Haiying Zhao,"An Efficient Chaosbased Image Encryption Scheme Using Affine Modular Maps", IJCNIS, vol.4, no.7, pp.4150, 2012. 
Copyright © 20072014 MECS. All Rights Reserved.
Microsoft Internet Explorer is recommended if the page is not displayed properly!