Skip to main content

Security Analysis of a New Bit-Level Permutation Image Encryption Algorithm

  • Conference paper
  • First Online:
International Joint Conference SOCO’16-CISIS’16-ICEUTE’16 (SOCO 2016, CISIS 2016, ICEUTE 2016)

Abstract

A new chaotic, permutation-substitution architecture based, image encryption algorithm has been introduced with a novel inter-intra bit-level permutation based confusion strategy. The proposed image cryptosystem uses Sudoku grids to ensure a high performance diffusion process and key space. This paper presents a fully comprehensive set of security analyses on the newly proposed image cryptosystem, including statistical and differential analysis, local and global information entropy calculation and robustness profile to different types of attacks. Based on the good statistical results, rounded by the theoretical arguments, the conducted study demonstrates that the proposed images’ encryption algorithm has a desirable level of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Diaconu, A.V., Ionescu, V.M., Iana, G., Lope-Guede, J.M.: A new bit-level permutation image encryption algorithm. In: International Conference on Communications, COMM 2016, Bucharest, Romania, 9–11 June 2016

    Google Scholar 

  2. Boriga, R., Dăscălescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image 29(8), 887–901 (2014)

    Article  Google Scholar 

  3. Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using Latin squares. Inf. Sci. 264, 317–339 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  4. Wu, Y., Zhou, Y., Noonan, J.P., Panetta, K., Agaian, S.: Image encryption using the Sudoku matrix. In: Proceedings of SPIE 7708, pp. 77080P-1–77080P-12 (2010)

    Google Scholar 

  5. Diaconu, A.-V., Loukhaoukha, K.: An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic map. Math. Prob. Eng. (2013). doi:10.1155/2013/848392

    Article  Google Scholar 

  6. Zhu, Z.-L., Zhang, W., Wong, K.-W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)

    Article  Google Scholar 

  7. Zhou, Y., Bao, L., Chen, C.L.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Article  Google Scholar 

  8. Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83–93 (2014)

    Article  Google Scholar 

  9. Sui, L., Duan, K., Liang, J., Zhang, Z., Meng, H.: Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt. Lasers Eng. 62, 139–152 (2014)

    Article  Google Scholar 

  10. Li, H., Wang, Y., Yan, H., Li, L., Li, Q., Zhao, X.: Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt. Lasers Eng. 51, 1327–1331 (2013)

    Article  Google Scholar 

  11. Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10–18 (2015)

    Article  Google Scholar 

  12. Wang, X.Y., Wang, X.M.: A novel block cryptosystem based on the coupled chaotic map lattice. Nonlinear Dyn. 72, 707–715 (2013)

    Article  MathSciNet  Google Scholar 

  13. Zhan, Y.-Q., Wang, X.-Y.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10–20 (2015)

    Article  Google Scholar 

  14. Zhan, Y.-Q., Wang, X.-Y.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)

    Article  Google Scholar 

  15. Dăscălescu, A.C., Boriga, R.: A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn. 73, 307–318 (2013)

    Article  MathSciNet  Google Scholar 

  16. Li, C., Li, S., Lo, K.-T.: Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 837–843 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  17. Diaconu, A.-V.: KenKen puzzle-based image encryption algorithm. Proc. Rom. Acad., Ser. A 16, 313–320 (2015)

    MathSciNet  Google Scholar 

  18. Diaconu A.-V.: Circular inter-intra pixels bit-level permutation and chaos based image encryption. Inf. Sci. (in press). doi:10.1016/j.ins.2015.10.027

  19. Boriga, R., Dascalescu, A.-C., Diaconu A.-V.: Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator, Math. Prob. Eng. 2015, Article. ID 769108 (2013)

    Google Scholar 

  20. Wang, X., Luan, D.: A novel image encryption algorithm using a chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simulat. 18, 3075–3085 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  21. Song, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik 124, 3329–3334 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Diaconu, AV., Ionescu, V., Lopez-Guede, J.M. (2017). Security Analysis of a New Bit-Level Permutation Image Encryption Algorithm. In: Graña, M., López-Guede, J.M., Etxaniz, O., Herrero, Á., Quintián, H., Corchado, E. (eds) International Joint Conference SOCO’16-CISIS’16-ICEUTE’16. SOCO CISIS ICEUTE 2016 2016 2016. Advances in Intelligent Systems and Computing, vol 527. Springer, Cham. https://doi.org/10.1007/978-3-319-47364-2_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47364-2_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47363-5

  • Online ISBN: 978-3-319-47364-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics