Abstract
To efficiently protect digital images, this paper proposes a novel image encryption scheme using the concepts of Josephus permutation and image filtering. It adopts the well-known architecture of confusion and diffusion. The Josephus permutation is designed to achieve the confusion property by fast separating adjacent pixels into different rows and columns, while the image filtering is to obtain the diffusion property by spreading tiny change in plain-image to the whole cipher-image. Simulation results demonstrate that the proposed image encryption scheme can encrypt different kinds of images into noise-like cipher-images. Security analysis shows that it has high security level and can outperform several other image encryption schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jain, Y., Bansal, R., Sharma, G., Kumar, B., Gupta, S.: Image encryption schemes: a complete survey. Int. J. Sig. Process. Image Process. Patt. Recogn. 9(7), 157–192 (2016)
Zhang, L.Y., Liu, Y., Pareschi, F., Zhang, Y., Wong, K.W., Rovatti, R., Setti, G.: On the security of a class of diffusion mechanisms for image encryption. IEEE Trans. Cybern. PP, 1–13 (2017)
Hua, Z., Wang, Y., Zhou, Y.: Image cipher using a new interactive two-dimensional chaotic map. In: 2015 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1804–1808. IEEE (2015)
Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017)
Hua, Z., Zhou, Y.: Design of image cipher using block-based scrambling and image filtering. Inf. Sci. 396, 97–113 (2017)
Chen, J., Zhu, Z.L., Zhang, L.B., Zhang, Y., Yang, B.Q.: Exploiting self-adaptive permutation-diffusion and dna random encoding for secure and efficient image encryption. Sig. Process. 142, 340–353 (2018)
FIPS PUB 197: Advanced encryption standard (AES) (2001)
Ye, G., Huang, X.: An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing 251, 45–53 (2017)
Zhou, Y., Bao, L., Chen, C.P.: A new 1D chaotic system for image encryption. Sig. Process. 97, 172–182 (2014)
Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)
Arroyo, D., Rhouma, R., Alvarez, G., Li, S., Fernandez, V.: On the security of a new image encryption scheme based on chaotic map lattices. Chaos Interdisc. J. Nonlinear Sci. 18(3), 033112 (2008)
Ping, P., Xu, F., Wang, Z.J.: Image encryption based on non-affine and balanced cellular automata. Sig. Process. 105, 419–429 (2014)
Halbeisen, L., Hungerbühler, N.: The josephus problem. J. de théorie des nombres de Bordeaux 9(2), 303–318 (1997)
Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)
Wang, X., Wang, Q., Zhang, Y.: A fast image algorithm based on rows and columns switch. Nonlinear Dyn. 79(2), 1141–1149 (2015)
Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multi. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT), 31–38 (2011)
Acknowledgement
This work was financially supported by National Natural Science Foundation of China with Grant No. 61701137, No. 11371004 and No. 61672195, National Key Research and Development Program of China with Grant No. 2016YFB0800804 and No. 2017YFB0803002, and Shenzhen Science and Technology Plan with Grant No. JCYJ20170307150704051, No. JCYJ20160318094336513, No. JCYJ20160318094101317 and No. KQCX20150326141251370.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Xu, B., Hua, Z., Huang, H. (2017). A Novel Image Encryption Scheme Using Josephus Permutation and Image Filtering. In: Wen, S., Wu, W., Castiglione, A. (eds) Cyberspace Safety and Security. CSS 2017. Lecture Notes in Computer Science(), vol 10581. Springer, Cham. https://doi.org/10.1007/978-3-319-69471-9_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-69471-9_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69470-2
Online ISBN: 978-3-319-69471-9
eBook Packages: Computer ScienceComputer Science (R0)