Plaintext related image hybrid encryption scheme using algebraic interpolation and generalized chaotic map
- 10 Downloads
In this paper, a plaintext related image hybrid encryption scheme is proposed based on Lagrange interpolation, generalized Henon map and nonlinear operations of matrices. The proposed scheme consists of three parts. In the first part, a generalized chaotic map is constructed on the basis of Henon map. Using the novel map, a chaotic sequence is built. And then, both the chaotic sequence and the plaintext pixels are used to implement the first nonlinear operation for generating the first cipher matrix associated with the plaintext. By performing an exclusive XOR operation between the original pixels matrix and the first cipher matrix, the diffusion encryption is carried out. In the second part, Lagrange interpolation is used to create the second cipher matrix related to the diffused image; the second nonlinear transformation is developed between the diffused image and the second cipher matrix; and sequence rearrangement is adopted to scramble the diffused image. In the third part, the third nonlinear transformation of matrices based on point operation and rounding operation is implemented on the scrambled image to complete the image encryption. Accordingly, the decryption process is executed by the inverse operations in the opposite order. The proposed algorithm has some distinctive features: a variety of nonlinear tools such as nonlinear polynomial interpolation, nonlinear chaotic map, and nonlinear operations were involved in the scheme. The cryptosystem is designed with the plaintext to enhance the algorithm security. Due to the combination of multiple nonlinear methods and random factors, the scheme is one time pad, which can withstand multiple types of attacks. The algorithm has a clear structure and a simple calculation, so it is easy to program. In addition, encryption simulation and performance analysis are carried out. The feasibility and effectiveness of the algorithm are verified by the simulated results. The security of the algorithm are proved by the objective indicators such as the running time, key space, statistical properties, key sensitivity, and differential analysis, etc.
KeywordsNon-linear methods Lagrange interpolation Chaotic map Plaintext related Image encryption
Without institutional funding, the authors carry out the research on image encryption solely due to personal interest. The authors express their sincere gratitude to those who have provided information and suggestions for this work.
Compliance with ethical standards
We solemnly declare that all authors are well aware of the academic ethics of the journal of Nonlinear Dynamics and are committed to unconditionally complying with these norms.
We certify that this manuscript is original and has not been published and will not be submitted elsewhere for publication while being considered by the journal of Multimedia Tools and Applications. And the study is not split up into several parts to increase the quantity of submissions and submitted to various journals or to one journal over time. No data have been fabricated or manipulated (including images) to support our conclusions. No data, text, or theories by others are presented as if they were our own.
The submission has been received explicitly from all co-authors. And authors whose names appear on the submission have contributed sufficiently to the scientific work and therefore share collective responsibility and accountability for the results.
The authors declare that they have no conflict of interest. This article does not contain any studies with human participants or animals performed by any of the authors. Informed consent was obtained from all individual participants included in the study.
- 1.101_ObjectCategories, The Caltech 101 dataset[DB/OL] (2019) http://www.vision.caltech.edu/Image_Datasets/Caltech101/Caltech101.html#Download
- 2.Akif OZ (2012) Image encryption technique using Lagrange interpolation. Ibn Al-Haitham Journal for Pure and Applied Science 25(1):478–493Google Scholar
- 3.Amalarethinam DIG, Geetha JS (2015) Image encryption and decryption in public key cryptography based on MR. IEEE international conference on computing and communications technologies, Cairo, Egypt. SpringerGoogle Scholar
- 7.CIFAR-10 Matlab version, The CIFAR-10 dataset[DB/OL] (2019) http://www.cs.toronto.edu/~kriz/cifar.html
- 8.Contour Detection and Image Segmentation Resources[DB/OL] (2018) https://www2.eecs.berkeley.edu/Research/Projects/CS/vision/grouping/resources.html
- 11.Guo FM, Tu L (2015) Application of chaos theory in cryptography[M]. Beijing Institute of Technology Press, BeijingGoogle Scholar
- 15.Liu CL (2017) Image processing with Matlab[M]. Tsinghua university press, BeijingGoogle Scholar
- 18.Miller JE, Moursund DG, Duris CS (2011) Elementary theory and application of numerical analysis [M]. Dover Publications, New YorkGoogle Scholar
- 20.Prasad M, Sudha KL (2011) Chaos image encryption using pixel shuffling[M]. In: Wyld C et al (eds) CCSEA, CS &IT 02, pp 169–179Google Scholar
- 21.Ritwik MG, Krishna D, Sahoo A (2017) Cryptanalysis of image encryption using traditional encryption techniques. Image Vis Comput 23(5):89–97Google Scholar
- 23.Sun XH (2013) Image encryption algorithms and practices with implentations in C#[M]. Science Press, BeijingGoogle Scholar
- 27.Zhang Y (2014) Plaintext related image encryption scheme using chaotic map. TELKOMNIKA 12(1):635–643Google Scholar
- 28.Zhang Y (2014) A chaotic system based image encryption algorithm using plaintext-related confusion. TELKOMNIKA 12(11):7952–7962Google Scholar
- 29.Zhang Y (2016) Chaotic digital image cryptosystem[M]. Tsinghua university press, BeijingGoogle Scholar