Abstract

In this paper, a novel high security plaintext-related dynamical image encryption algorithm is proposed. Compared with the classical permutation-diffusion encryption architecture, we add the combination operation before the diffusion, which uses the 3D intertwining Logistic map (3D-ILM) to generate dynamic interference matrix with the same size of the grayscale plaintext image, and then combine the permutated image with interference matrix. It can be seen as an improvement to enhance the connection between permutation and diffusion operation, which makes adversaries are difficult to crack the permutation and diffusion algorithm separately. Besides, the permutated pixels are hidden in the dynamic interference matrix during the combination process, which reduces the correlation among local adjacent pixels. Thus, it can increase the resistance of chosen-plaintext attack. After the permutation, combination, and diffusion operation, a dynamic color cipher image is generated. Note that the generated color cipher image is dynamic changing even the same plaintext image is encrypted with identical secret keys. Ultimately, simulation results and security analysis show that the proposed algorithm has high-security performance and can resist most known common attacks.

Highlights

  • With the rapid development of mobile Internet technology, the transmission of multimedia information has been increasing rapidly

  • Through the analysis of the above encryption algorithms, we find some common problems: (1) Image encryption algorithms are not related to plaintext image and no correlation between permutation and diffusion, such as the methods in [1], [27], [36], which are vulnerable to chosen-ciphertext attack [16] and chosen-plaintext attack [17], [37]

  • The same secret keys are used to encrypt the identical plaintext image, and the generated color cipher image is dynamically changed, which will effectively prevent the differential attacks. (u)-(y) are corresponding decrypted grayscale images obtained by decrypting with the correct key

Read more

Summary

Introduction

With the rapid development of mobile Internet technology, the transmission of multimedia information has been increasing rapidly. (3) Image encryption algorithms are related to plaintext image, and the permutation and diffusion process are correlated, such as the method in [43], but the secret key value is static, which is vulnerable to chosen-plaintext attack [44].

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call