Abstract

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks. This paper presents a novel chaos-based image encryption method based on permutation and substitution using a single Substitution Box (S-Box) to address issues in contemporary image encryption algorithms. The proposed encryption technique’s efficiency is validated through extensive experiments as compared to the state-of-the-art encryption algorithms using different measures and benchmarks. Precisely, the collected results demonstrate that the proposed technique is more resilient against well-known statistical attacks and performs well under plaintext attacks. Indeed, the proposed scheme exhibits very high sensitivity concerning the plaintext attack. A minor change in the encryption key or the plain text would result in a completely different encrypted image.

Highlights

  • In recent years, the privacy of users has become one of the major security concern that needs to be addressed carefully, especially when dealing with information shared over the Internet or other openly accessible communication outlets [1]

  • This research tries to fill in the gap by introducing a novel chaotic permutation–substitution image encryption scheme based on logistic map and Advanced Encryption Standard (AES) substitution box (S-Box)

  • On the other hand permutation is a technique used to replace the position of pixels of image in such a way that it can be recovered to the original state when needed

Read more

Summary

INTRODUCTION

The privacy of users has become one of the major security concern that needs to be addressed carefully, especially when dealing with information shared over the Internet or other openly accessible communication outlets [1]. Jawad et al method has a lower impact on the encrypted image if the corresponding plain text image is taken with a changed pixel value and has comparatively high correlation coefficient between the pixels of encrypted image He et al proposed a cryptosystem by substituting sine map in sine iterative chaotic map with infinite collapse modulation map system utilizing a delayed sine map [11]. This research tries to fill in the gap by introducing a novel chaotic permutation–substitution image encryption scheme based on logistic map and AES S-Box. The results illustrate that the proposed encryption algorithm can produce a profoundly secured encrypted image with highly scrambled pixels than the other cryptosystem methods is comparatively more efficient and resistant against attacks.

BACKGROUND
RESULTS AND SECURITY
CORRELATION COEFFICIENTS BETWEEN CONSECUTIVE PIXELS
ENTROPY
PEAK SIGNAL TO NOISE RATIO
RESISTANCE TO DIFFERENTIAL ATTACKS
Proposed Method
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.