Abstract
Recently, the development of confidentiality and authenticity ensured by image encryption has been one of the key advancements in the field of secured wireless communication. The proposed work focuses on providing confusion, diffusion and permutation inherently in the system. The input grayscale image is shuffled by employing the Henon algorithm and subsequently separated into 8 bit planes. With the aid of a secret key of 256 bits, chaotic sequences are generated for each bit plane. Later, the logistic map is adapted on the chaotic sequences to obtain the scrambled image. Furthermore, this image is shuffled with Zaslavskii and Hilbert Space Filling Curve algorithms, which establishes the confusion stage. To incorporate the diffusion stage, a self-invertible matrix is generated by a latin square image cipher and a secret key. This matrix and the scrambled image underwent the Hill cipher to build the encrypted image followed by a row-column transformation to ensure multifold security. The proposed compound activities of encryption are successfully implemented on the laboratory virtual instrumentation engineering workbench 2013 platform. Noticeably, the established processes of image encryption are tested in the universal software radio peripheral environment and transceived via an additive white Gaussian noise (AWGN) channel. More specifically, the influence of natural and unnatural (cropping attack) noise on the characteristics of the encrypted image while sharing through AWGN channel has been investigated. Security analysis is performed by computing the unified average changing intensity, number of pixels change rate, correlation value, large key space to defy brute force attack, strong key sensitivity and uniform gray value distribution on encryption.
Similar content being viewed by others
References
Zhang, Y., & Xiao, D. (2014). An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simulat, 19(1), 74–82. doi:10.1016/j.cnsns.2013.06.031.
Zhou, Y., Panetta, K., Agaian, S., & Philip Chen, C. L. (2012). Image encryption using P-Fibonacci transform and decomposition. Optics Communications, 285(5), 594–608. doi:10.1016/j.optcom.2011.11.044.
Lima, J. B., Lima, E. A. O., & Adeiro, F. M. (2013). Image encryption based on the finite field cosine transform. Signal Processing: Image Communication, 28(10), 1537–1547. doi:10.1016/j.image.2013.05.008.
Hussian, I., Shah, T., & Asif Gondal, M. (2012). An efficient image encryption algorithm based on S8 S-box transformation and NCAmap. Optics Communications, 285(24), 4887–4890. doi:10.1016/j.optcom.2012.06.011.
Zhang, L. Y., Li, C., Wongd, K.-W., Shua, S., & Chend, G. (2012). Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. The Journal of Systems and Software, 85(9), 2077–2085. doi:10.1016/j.jss.2012.04.002.
Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903. doi:10.1016/j.optcom.2011.04.001.
Fu-Yan, S., Shu-Tang, L., & Zong-Wang, L. (2007). Image encryption using high-dimension chaotic system. Chinese Physics, 16(12), 3616–3623. doi:10.1088/1009-1963/16/12/011.
Ghebleh, M., Kanso, A., & Noura, H. (2014). An image encryption scheme based on irregularly decimated chaotic maps. Signal Processing: Image Communication, 29(5), 618–627. doi:10.1016/j.image.2013.09.009.
Li, S., Zhao, Y., Bayi, Q., & Wang, J. (2013). Image scrambling based on chaotic sequences and Veginère cipher. Multimedia Tools and Applications, 66(3), 573–588. doi:10.1007/s11042-012-1281-z.
Wang, X., & Dahai, X. (2014). A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dynamics, 75(1–2), 345–353. doi:10.1007/s11071-013-1070-x.
Mishra, M., & Mankar, M. H. (2012). Chaotic cipher using Arnolds and duffings map. Advances in Intelligent and Soft Computing, 167(2), 529–539. doi:10.1007/978-3-642-30111-7_50.
Zhu, Z-l, Zhang, W., Wong, K., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), 1171–1186. doi:10.1016/j.ins.2010.11.009.
Chen, W., & Zhang, X. (2009). Image encryption algorithm based on Henon chaotic system. In Proceedings of international conference on image analysis and signal processing, pp. 94-97. doi:10.1109/IASP.2009.5054653
Gilani, S. A. N., & Bangash, M. A. (2008). Enhanced block based colour image encryption technique with confusion. In Proceedings of 12th IEEE international multitopic conference, pp. 200–206. doi:10.1109/INMIC.2008.4777736
Ismail, I. A., Mohammed, A., & Hossam, D. (2006). How to repair the Hill cipher. Journal of Zhejiang University SCIENCE A, 7(12), 2022–2030. doi:10.1631/jzus.2006.A2022.
Sastry, V. U., Shankar, N. R., & Bhavani, S. D. (2010). A modified hill cipher involving interweaving and iteration. International Journal of Network Security, 11(1), 11–16. http://ijns.femto.com.tw/download_paper.jsp?PaperID=IJNS-2008-11-24-3&PaperName=ijns-v11-n1/ijns-2010-v11-n1-p11-16.pdf
Yue, W., Zhou, Y., Joseph, P. N., & Agaian, S. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317–339. doi:10.1016/j.ins.2013.11.027.
Panduranga, H. T., & Kumar, S. K. N. (2014). Image encryption based on permutation substitution using chaotic map and latin square image cipher. The European Physical Journal Special Topics, 223(8), 1663–1677. doi:10.1140/epjst/e2014-02119-9.
Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., & Mosavi, M. R. (2013). A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimedia Tools and Applications, 1–31, doi:10.1007/s11042-013-1699-y.
Khanzadi, H., Eshghi, M., & Etemadi Borujeni, S. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineerin, 39(2), 1039–1047. doi:10.1007/s13369-013-0713-z.
Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals, 40(5), 2557–2568.
Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276.
Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach(2015). AEU - International Journal of Electronics and Communications, 69(2), 562–572.
Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan,J. B. B. (2015). Triple chaotic image scrambling on RGB—A random imageencryption approach. Security and Communication Networks (in press).
Acknowledgments
The Authors would like to express their sincere thanks to SASTRA University, for the Grant received under R&M fund (R&M / 0027 / SEEE – 010 / 2012 – 13) to conduct this research.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Praveenkumar, P., Amirtharajan, R., Thenmozhi, K. et al. Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65, 65–78 (2017). https://doi.org/10.1007/s11235-016-0212-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-016-0212-0