Abstract

In this paper, a secure and fast chaotic image encryption scheme with simultaneous permutation-diffusion operation is proposed. We combine permutation and diffusion processes into a whole, namely, simultaneous permutation and diffusion operation (SPDO). This can solve the problem of traditional encryption scheme in which the permutation and diffusion are two independent processes, that leads attackers to crack the two processes separately. In SPDO, the initial value of the current Sine-Sine chaotic map is related to the secret keys and the previous encrypted pixels’ values. In this case, the proposed scheme can generate dynamic key streams and indexes that are related to plaintext, which improves the sensitivity to plaintext for the encryption scheme. In addition, the pixel values are processed by row and column (row-level and column-level) during the encryption procedure. Thus, the proposed scheme presents lower time complexity and faster running speed compared with bit-level or pixel-level image encryption schemes, which makes the proposed scheme be conducive to the batch transmission and real-time transmission of digital images. The simulation results and security analysis show that our scheme can resist common attacks, such as statistical attack, differential attack, chosen plaintext attack and other comprehensive attacks.

Highlights

  • With the wide application of information technology, secure and efficient transmissions of digital images capture the attention of researchers

  • In this paper, we propose a fast image encryption scheme based on simultaneous permutation and diffusion operation (SPDO)

  • What’s more, in SPDO, the initial value of the Sine-Sine map is related to the image information and the secret key, which generates distinct keystreams and index sequences for different plain images

Read more

Summary

INTRODUCTION

With the wide application of information technology, secure and efficient transmissions of digital images capture the attention of researchers. Tu et al [9] and Wang et al [10] cracked the diffusion process and the permutation process of the encryption schemes presented in [4], [5] respectively by developing chosen plaintext attack. Liu et al [14] cracked the scheme [12] by developing twice chosen plaintext attacks They cracked the diffusion process by constructing a special image, and the nine-pixel values of the permuted image of the special image in fixed positions are identical with those in the cipher image. Fan et al [15] cracked the encryption scheme [13] by applying seven times chosen plaintext attacks They calculated the secret location by selecting two images with the same pixel sum.

PRELIMINARY WORK
REWRITE PIXELS’ VALUES OF THE PLAIN IMAGE P BY
THE SPDO BY ROW
THE SPDO BY COLUMN
SIMULATION RESULTS AND SECURITY ANALYSIS
SPEED AND TIME COMPLEXITY ANALYSIS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.