Skip to main content
Log in

Fusion of confusion and diffusion: a novel image encryption approach

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

Recently, the development of confidentiality and authenticity ensured by image encryption has been one of the key advancements in the field of secured wireless communication. The proposed work focuses on providing confusion, diffusion and permutation inherently in the system. The input grayscale image is shuffled by employing the Henon algorithm and subsequently separated into 8 bit planes. With the aid of a secret key of 256 bits, chaotic sequences are generated for each bit plane. Later, the logistic map is adapted on the chaotic sequences to obtain the scrambled image. Furthermore, this image is shuffled with Zaslavskii and Hilbert Space Filling Curve algorithms, which establishes the confusion stage. To incorporate the diffusion stage, a self-invertible matrix is generated by a latin square image cipher and a secret key. This matrix and the scrambled image underwent the Hill cipher to build the encrypted image followed by a row-column transformation to ensure multifold security. The proposed compound activities of encryption are successfully implemented on the laboratory virtual instrumentation engineering workbench 2013 platform. Noticeably, the established processes of image encryption are tested in the universal software radio peripheral environment and transceived via an additive white Gaussian noise (AWGN) channel. More specifically, the influence of natural and unnatural (cropping attack) noise on the characteristics of the encrypted image while sharing through AWGN channel has been investigated. Security analysis is performed by computing the unified average changing intensity, number of pixels change rate, correlation value, large key space to defy brute force attack, strong key sensitivity and uniform gray value distribution on encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Zhang, Y., & Xiao, D. (2014). An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simulat, 19(1), 74–82. doi:10.1016/j.cnsns.2013.06.031.

    Article  Google Scholar 

  2. Zhou, Y., Panetta, K., Agaian, S., & Philip Chen, C. L. (2012). Image encryption using P-Fibonacci transform and decomposition. Optics Communications, 285(5), 594–608. doi:10.1016/j.optcom.2011.11.044.

    Article  Google Scholar 

  3. Lima, J. B., Lima, E. A. O., & Adeiro, F. M. (2013). Image encryption based on the finite field cosine transform. Signal Processing: Image Communication, 28(10), 1537–1547. doi:10.1016/j.image.2013.05.008.

    Google Scholar 

  4. Hussian, I., Shah, T., & Asif Gondal, M. (2012). An efficient image encryption algorithm based on S8 S-box transformation and NCAmap. Optics Communications, 285(24), 4887–4890. doi:10.1016/j.optcom.2012.06.011.

    Article  Google Scholar 

  5. Zhang, L. Y., Li, C., Wongd, K.-W., Shua, S., & Chend, G. (2012). Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. The Journal of Systems and Software, 85(9), 2077–2085. doi:10.1016/j.jss.2012.04.002.

    Article  Google Scholar 

  6. Liu, H., & Wang, X. (2011). Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Communications, 284(16–17), 3895–3903. doi:10.1016/j.optcom.2011.04.001.

    Article  Google Scholar 

  7. Fu-Yan, S., Shu-Tang, L., & Zong-Wang, L. (2007). Image encryption using high-dimension chaotic system. Chinese Physics, 16(12), 3616–3623. doi:10.1088/1009-1963/16/12/011.

    Article  Google Scholar 

  8. Ghebleh, M., Kanso, A., & Noura, H. (2014). An image encryption scheme based on irregularly decimated chaotic maps. Signal Processing: Image Communication, 29(5), 618–627. doi:10.1016/j.image.2013.09.009.

    Google Scholar 

  9. Li, S., Zhao, Y., Bayi, Q., & Wang, J. (2013). Image scrambling based on chaotic sequences and Veginère cipher. Multimedia Tools and Applications, 66(3), 573–588. doi:10.1007/s11042-012-1281-z.

    Article  Google Scholar 

  10. Wang, X., & Dahai, X. (2014). A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dynamics, 75(1–2), 345–353. doi:10.1007/s11071-013-1070-x.

    Article  Google Scholar 

  11. Mishra, M., & Mankar, M. H. (2012). Chaotic cipher using Arnolds and duffings map. Advances in Intelligent and Soft Computing, 167(2), 529–539. doi:10.1007/978-3-642-30111-7_50.

    Google Scholar 

  12. Zhu, Z-l, Zhang, W., Wong, K., & Hai, Y. (2011). A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences, 181(6), 1171–1186. doi:10.1016/j.ins.2010.11.009.

    Article  Google Scholar 

  13. Chen, W., & Zhang, X. (2009). Image encryption algorithm based on Henon chaotic system. In Proceedings of international conference on image analysis and signal processing, pp. 94-97. doi:10.1109/IASP.2009.5054653

  14. Gilani, S. A. N., & Bangash, M. A. (2008). Enhanced block based colour image encryption technique with confusion. In Proceedings of 12th IEEE international multitopic conference, pp. 200–206. doi:10.1109/INMIC.2008.4777736

  15. Ismail, I. A., Mohammed, A., & Hossam, D. (2006). How to repair the Hill cipher. Journal of Zhejiang University SCIENCE A, 7(12), 2022–2030. doi:10.1631/jzus.2006.A2022.

    Article  Google Scholar 

  16. Sastry, V. U., Shankar, N. R., & Bhavani, S. D. (2010). A modified hill cipher involving interweaving and iteration. International Journal of Network Security, 11(1), 11–16. http://ijns.femto.com.tw/download_paper.jsp?PaperID=IJNS-2008-11-24-3&PaperName=ijns-v11-n1/ijns-2010-v11-n1-p11-16.pdf

  17. Yue, W., Zhou, Y., Joseph, P. N., & Agaian, S. (2014). Design of image cipher using latin squares. Information Sciences, 264, 317–339. doi:10.1016/j.ins.2013.11.027.

    Article  Google Scholar 

  18. Panduranga, H. T., & Kumar, S. K. N. (2014). Image encryption based on permutation substitution using chaotic map and latin square image cipher. The European Physical Journal Special Topics, 223(8), 1663–1677. doi:10.1140/epjst/e2014-02119-9.

    Article  Google Scholar 

  19. Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., & Mosavi, M. R. (2013). A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimedia Tools and Applications, 1–31, doi:10.1007/s11042-013-1699-y.

  20. Khanzadi, H., Eshghi, M., & Etemadi Borujeni, S. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineerin, 39(2), 1039–1047. doi:10.1007/s13369-013-0713-z.

    Article  Google Scholar 

  21. Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals, 40(5), 2557–2568.

    Article  Google Scholar 

  22. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276.

  23. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach(2015). AEU - International Journal of Electronics and Communications, 69(2), 562–572.

    Article  Google Scholar 

  24. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan,J. B. B. (2015). Triple chaotic image scrambling on RGB—A random imageencryption approach. Security and Communication Networks (in press).

Download references

Acknowledgments

The Authors would like to express their sincere thanks to SASTRA University, for the Grant received under R&M fund (R&M / 0027 / SEEE – 010 / 2012 – 13) to conduct this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Praveenkumar, P., Amirtharajan, R., Thenmozhi, K. et al. Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65, 65–78 (2017). https://doi.org/10.1007/s11235-016-0212-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-016-0212-0

Keywords

Navigation