IJCNIS Vol. 4, No. 7, 8 Jul. 2012

Cover page and Table of Contents: PDF (size: 1012KB)

Full Text (PDF, 1012KB), PP.41-50

Views: 0 Downloads: 0

Affine modular maps, Chaotic system, Image encryption, Permutation, Diffusion

Linear congruential generator has been widely applied to generate pseudo-random numbers successfully. This paper proposes a novel chaos-based image encryption scheme using affine modular maps, which are extensions of linear congruential generators, acting on the unit interval. A permutation process utilizes two affine modular maps to get two index order sequences for the shuffling of image pixel positions, while a diffusion process employs another two affine modular maps to yield two pseudo-random gray value sequences for a two-way diffusion of gray values. Experimental results are carried out with detailed analysis to demonstrate that the proposed image encryption scheme possesses large key space to frustrate brute-force attack efficiently and can resist statistical attack, differential attack, known-plaintext attack as well as chosen-plaintext attack thanks to the yielded gray value sequences in the diffusion process not only being sensitive to the control parameters and initial conditions of the considered chaotic maps, but also strongly depending on the plain-image processed.

Ruisong Ye, Haiying Zhao, "An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.7, pp.41-50, 2012. DOI:10.5815/ijcnis.2012.07.05

[1]Schneier, B., Cryptography: Theory and Practice, CRC Press, Boca Raton, 1995.

[2]Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, 1998, 8: 1259–1284.

[3]Chen, G. R., Mao, Y. B., Chui, C. K., A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21: 749-761.

[4]Mao, Y. B., Chen, G., Lian, S. G., A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos, 2004, 14: 3613-3624.

[5]Guan, Z.-H., Huang, F., Guan, W., Chaos-based image encryption algorithm, Physics Letters A, 2005, 346: 153-157.

[6]Lian, S., Sun, J., Wang, Z., A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons and Fractals, 2005, 26: 117-129.

[7]Wong, K. W., Kwok, B., Law, W. S., A fast image encryption scheme based on chaotic standard map, Physics Letters A , 2008, 372: 2645–2652.

[8]Patidar, V., Pareek, N. K., Sud, K. K., A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 2009, 14: 3056-3075.

[9]Matthews, R., On the derivation of a chaotic encryption algorithm, Cryptologia, 1989, 8: 29-41.

[10]Kocarev, L., Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, 2001, 1: 6-21.

[11]Pareek, N. K., Patidar, V., Sud, K. K., Image encryption using chaotic logistic map, Image and Vision Computing, 2006, 24: 926-934

[12]Tong, X., Cui, M., Image encryption with compound chaotic sequence cipher shifting dynamically, Image and Vision Computing, 2008, 26: 843-850.

[13]Li, S., Zheng, X., Cryptanalysis of a chaotic image encryption method, in: Proc. IEEE Int. Symposium on Circuits and Systems, vol. II, 2002, pp. 708-711.

[14]Alvarez, G., Montoya, F., Romera, M., Pastor, G., Cryptanalysis of a discrete chaotic cryptosystem using external key, Physics Letters A, 2003, 319: 334-339.

[15]Alvarez, G., Li, S., Breaking an encryption scheme based on chaotic baker map, Physics Letters A, 2006, 352: 78-82.

[16]Li, C., Li, S., Chen, G., Halang, W. A., Cryptanalysis of an image encryption scheme based on a compound chaotic sequence, Image and Vision Computing, 2009, 27: 1035-1039.

[17]Xiao, D., Liao, X., Wei, P., Analysis and improvement of a chaos-based image encryption algorithm, Chaos, Solitons and Fractals, 2009, 40: 2191-2199.

[18]Liu, J. M., Qu, Q., Cryptanalysis of a substitution-diffusion based on cipher using chaotic standard and logistic map. In: Third International Symposium on Information Processing, pp. 67-69 (2010).

[19]Rhouma, R., Solak, E., Belghith, S., Cryptanalysis of a new substitution-diffusion based image cipher,Commun. Nonlinear Sci. Numer. Simulat., 2010, 15: 1887-1892.

[20]Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi H., Akhavan A., A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps, Physics Letters A, 2007, 366: 391-396.

[21]Zhang, G. J., Liu, Q., A novel image encryption method based on total shuffling scheme. Opt. Commun. 2011, 284: 2775-2780.

[22]Zhu, Z. L., Zhang, W., Wong, K. W., Yu H., A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sci., 2010, 181: 1171-1186.

[23]Liu, H., Wang, X., Color image encryption using spatial bit-level permutation and high-dimension chaotic system, Opt. Commun. 2011, 284: 3895-3903.

[24]Gao, T., Chen, Z., A new image encryption algorithm based on hyper-chaos, Physics Letters A, 2008, 372: 394-400.

[25]Ye, R., A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, Opt. Commun. 2011, 284: 5290-5298.

[26]Ye, R., Zhou W., A Chaos-based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice, I. J. Computer Network and Information Security, 2012, 1: 38-44.

[27]Knuth D. E., The Art of Computer Programming, Vol. 2: Semi-Numerical Algorithms, third ed., Addison-Wesley, 1981.

[28]Shannon C. E., Communication theory of secrecy system. Bell Syst. Tech. J, 1949, 28: 656–715.