Abstract
In this paper, a secure and fast chaotic image encryption scheme with simultaneous permutation-diffusion operation is proposed. We combine permutation and diffusion processes into a whole, namely, simultaneous permutation and diffusion operation (SPDO). This can solve the problem of traditional encryption scheme in which the permutation and diffusion are two independent processes, that leads attackers to crack the two processes separately. In SPDO, the initial value of the current Sine-Sine chaotic map is related to the secret keys and the previous encrypted pixels’ values. In this case, the proposed scheme can generate dynamic key streams and indexes that are related to plaintext, which improves the sensitivity to plaintext for the encryption scheme. In addition, the pixel values are processed by row and column (row-level and column-level) during the encryption procedure. Thus, the proposed scheme presents lower time complexity and faster running speed compared with bit-level or pixel-level image encryption schemes, which makes the proposed scheme be conducive to the batch transmission and real-time transmission of digital images. The simulation results and security analysis show that our scheme can resist common attacks, such as statistical attack, differential attack, chosen plaintext attack and other comprehensive attacks.
Highlights
With the wide application of information technology, secure and efficient transmissions of digital images capture the attention of researchers
In this paper, we propose a fast image encryption scheme based on simultaneous permutation and diffusion operation (SPDO)
What’s more, in SPDO, the initial value of the Sine-Sine map is related to the image information and the secret key, which generates distinct keystreams and index sequences for different plain images
Summary
With the wide application of information technology, secure and efficient transmissions of digital images capture the attention of researchers. Tu et al [9] and Wang et al [10] cracked the diffusion process and the permutation process of the encryption schemes presented in [4], [5] respectively by developing chosen plaintext attack. Liu et al [14] cracked the scheme [12] by developing twice chosen plaintext attacks They cracked the diffusion process by constructing a special image, and the nine-pixel values of the permuted image of the special image in fixed positions are identical with those in the cipher image. Fan et al [15] cracked the encryption scheme [13] by applying seven times chosen plaintext attacks They calculated the secret location by selecting two images with the same pixel sum.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.