Skip to main content

A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10581))

Included in the following conference series:

Abstract

To efficiently protect digital images, this paper proposes a novel image encryption scheme using the concepts of Josephus permutation and image filtering. It adopts the well-known architecture of confusion and diffusion. The Josephus permutation is designed to achieve the confusion property by fast separating adjacent pixels into different rows and columns, while the image filtering is to obtain the diffusion property by spreading tiny change in plain-image to the whole cipher-image. Simulation results demonstrate that the proposed image encryption scheme can encrypt different kinds of images into noise-like cipher-images. Security analysis shows that it has high security level and can outperform several other image encryption schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://sipi.usc.edu/database/.

  2. 2.

    http://homepages.inf.ed.ac.uk/rbf/CVonline/Imagedbase.htm.

References

  1. Jain, Y., Bansal, R., Sharma, G., Kumar, B., Gupta, S.: Image encryption schemes: a complete survey. Int. J. Sig. Process. Image Process. Patt. Recogn. 9(7), 157–192 (2016)

    Google Scholar 

  2. Zhang, L.Y., Liu, Y., Pareschi, F., Zhang, Y., Wong, K.W., Rovatti, R., Setti, G.: On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. PP, 1–13 (2017)

    Google Scholar 

  3. Hua, Z., Wang, Y., Zhou, Y.: Image cipher using a new interactive two-dimensional chaotic map. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1804–1808. IEEE (2015)

    Google Scholar 

  4. Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017)

    Article  Google Scholar 

  5. Hua, Z., Zhou, Y.: Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 396, 97–113 (2017)

    Article  Google Scholar 

  6. Chen, J., Zhu, Z.L., Zhang, L.B., Zhang, Y., Yang, B.Q.: Exploiting self-adaptive permutation-diffusion and dna random encoding for secure and efficient image encryption. Sig. Process. 142, 340–353 (2018)

    Article  Google Scholar 

  7. FIPS PUB 197: Advanced encryption standard (AES) (2001)

    Google Scholar 

  8. Ye, G., Huang, X.: An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251, 45–53 (2017)

    Article  Google Scholar 

  9. Zhou, Y., Bao, L., Chen, C.P.: A new 1D chaotic system for image encryption. Sig. Process. 97, 172–182 (2014)

    Article  Google Scholar 

  10. Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  11. Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdisc. J. Nonlinear Sci. 18(3), 033112 (2008)

    Article  Google Scholar 

  12. Ping, P., Xu, F., Wang, Z.J.: Image encryption based on non-affine and balanced cellular automata. Sig. Process. 105, 419–429 (2014)

    Article  Google Scholar 

  13. Halbeisen, L., Hungerbühler, N.: The josephus problem. J. de théorie des nombres de Bordeaux 9(2), 303–318 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  14. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Article  Google Scholar 

  15. Wang, X., Wang, Q., Zhang, Y.: A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 79(2), 1141–1149 (2015)

    Article  MathSciNet  Google Scholar 

  16. Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)

    Article  MATH  MathSciNet  Google Scholar 

  17. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multi. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT), 31–38 (2011)

    Google Scholar 

Download references

Acknowledgement

This work was financially supported by National Natural Science Foundation of China with Grant No. 61701137, No. 11371004 and No. 61672195, National Key Research and Development Program of China with Grant No. 2016YFB0800804 and No. 2017YFB0803002, and Shenzhen Science and Technology Plan with Grant No. JCYJ20170307150704051, No. JCYJ20160318094336513, No. JCYJ20160318094101317 and No. KQCX20150326141251370.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hejiao Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Xu, B., Hua, Z., Huang, H. (2017). A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69471-9_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69470-2

  • Online ISBN: 978-3-319-69471-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics