Abstract
Security is a vital issue in communication and storage of the images and encryption is one of the ways to ensure the security. This paper proposes an efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. A Peter De Jong map is employed to determine the initial keys for the RC4 stream generator and also during permutation stage. The RC4 stream generator is utilized to generate the pseudo random numbers for the pixel value rotation and diffusion operations. Each encryption round is comprised of three stages: permutation, pixel value rotation and diffusion. The permutation is based on scrambling the rows and columns, in addition, circular rotations of the rows and columns in alternate orientations. The second stage circularly rotates each and every pixel value by utilizing M × N pseudo random numbers. The last stage carries out the diffusion twice by scanning the image in two different ways. Each of the two diffusions accomplishes the diffusion in two orientations (forward and backward) with two previously diffused pixels and two pseudo random numbers. The security and performance of the proposed method is assessed thoroughly by using key space, statistical, differential, entropy and performance analysis. Moreover, two rounds of the call to the encrypt function provide the sufficient security. The experimental results show that the proposed encryption scheme is computationally fast with high security.
Similar content being viewed by others
References
El-Latif, A. A. A., Li, L., Zhang, T., Wang, N., Song, X., & Niu, X. (2012). Digital image encryption scheme based on multiple chaotic systems. Sensing and Imaging, 13(2), 67–88. doi:10.1007/s11071-012-0409-z.
Francois, M., Grosges, T., Barchiesi, D., & Erra, R. (2012). A new image encryption scheme based on a chaotic function. Signal Processing, 27(3), 249–259. doi:10.1016/j.image.2011.11.003.
Sam, S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). A novel image cipher based on a mixed transformed logistic maps. Multimedia Tools and Applications, 56(2), 315–330. doi:10.1007/s11042-010-0652-6.
Taneja, N., Raman, B., & Gupta, I. (2012). Combinational domain encryption for still visual data. Multimedia Tools and Applications, 159(3), 775–793. doi:10.1007/s11042-011-0775-4.
Sam, S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics, 69(4), 1995–2007. doi:10.1007/s11071-012-0402-6.
Zhang, X., Mao, Y., & Zhao, Z. (2014). An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dynamics, 78(1), 359–369. doi:10.1007/s11071-014-1445-7.
Zhou, Y., Bao, L., & Chen, C. L. P. (2013). Image encryption using a new parametric switching chaotic system. Signal Processing, 93(11), 3039–3052. doi:10.1016/j.sigpro.2013.04.021.
Ye, G., & Wong, K. W. (2012). An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dynamics, 69, 2079–2087. doi:10.1007/s11071-012-0409-z.
El-Latif, A. A. A., Li, L., & Niu, X. (2014). A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimedia Tools and Applications, 70, 1559–1584. doi:10.1007/s11042-012-1173-2.
Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563–571. doi:10.1007/s11235-011-9461-0.
Ye, Guodong. (2010). Image scrambling encryption algorithm of pixel bit based on chao map. Pattern Recognition Letters, 31(5), 347–354. doi:10.1016/j.patrec.2009.11.008.
Yoon, J. W., & Kim, H. (2010). An image encryption scheme with a pseudorandom permutation based on chaotic maps. Communications in Nonlinear Science and Numerical Simulations, 15(12), 3998–4006. doi:10.1016/j.cnsns.2010.01.041.
Zhang, L., Liao, X., & Wang, X. (2004). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759–765. doi:10.1016/j.chaos.2004.09.035.
Liu, Y., Tian, S., Hu, W., & Xing, C. (2012). Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3267–3278. doi:10.1016/j.cnsns.2011.11.040.
Wong, K. K., Carter, G., Dawson, E. (2010). An analysis of the RC4 family of stream ciphers against algebraic attacks. Proceedings 8th Australasian information security conference, 103, pp. 67–74.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hanchinamani, G., Kulkarni, L. An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher. 3D Res 6, 30 (2015). https://doi.org/10.1007/s13319-015-0062-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s13319-015-0062-7