Abstract

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.

Highlights

  • The dynamic progression in multimedia and communication industry attracted an increased concern in regards to digital image security which are being sent via open or stored channels [1,2]

  • Data may be guarded using some cryptographic standards like as indexing S-Box (AES) (Advanced Encryption Standard) or IDEA (International Data Encryption Standard) [4]

  • None-the-less there is no possibility for encrypting images using those approaches, and that is attributed to massive dimensions of data as well as the increased association amongst the pixels in the image files [5,6]. This is why chaos- based approaches have proven their superiority for image encryption

Read more

Summary

INTRODUCTION

The dynamic progression in multimedia and communication industry attracted an increased concern in regards to digital image security which are being sent via open or stored channels [1,2]. An original image encryption approach is based on diffusion and confusion has been utilized [10, 11]. Their scheme represents permutation and substitution operations to obtain the necessary effect of diffusion and confusion [12, 13]. This approach includes a wide range of benefits, like a wide key space range, increased sensitivity of the key, decreased time of encryption, amongst other factors [14, 15]. The authors were not able to find the whole random code sequence which is used in an operation of diffusion, which is why it is not easy deciphering other cipher text images that have been encrypted using their algorithm. [16]

LOGISTIC MAP
THE PROPOSED CRYPTOSYSTEM
ANALYSIS OF THE PROPOSED ALGORITHM
NPCR and UACI
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call