Abstract
In recent years, substantial work has been done for developing image encryption algorithms. Image encryption requires handling of large data, which needs computationally efficient algorithm. Chaos-based image encryption has been proposed against conventional encryption techniques. Cryptosystem using chaotic systems for image encryption has proven to be computationally effective. In this paper, a new approach to bit permutation in image encryption has been proposed using a three-dimensional puzzle along with chaos for further diffusion and confusion. The proposed encryption algorithm is tested for security and validity using various analyses. The result for tests proves that the proposed algorithm provides security against statistical and differential attacks.
Similar content being viewed by others
References
Aloka, S., Kehar, S.: A technique for image encryption using digital signature. Optics Commun. 218(4–6), 229–234 (2003)
Alvarez, E., Fernandez, A., Garcıa, P., Jiménez, J., Marcano, A.: New approach to chaotic encryption. Phys. Lett. A 263(4–6), 373–375 (1999)
Arroyo, D., Li, C., Li, S., Alvarez, G., Halang, W.A.: Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos Solitons Fractals 41(5), 2613–2616 (2009)
Baptista, M.: Cryptography with chaos. Phys. lett. A 240(1–2), 50–54 (1998)
Boriga, R., Dăscălescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image Commun. 29(8), 887–901 (2014)
Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58(2), 83–91 (2001)
Chen, H.C., Guo, J.I., Huang, L.C., Yen, J.C.: Design and realization of a new signal security system for multimedia data transmission. EURASIP J. Appl. Signal Process. 2003, 1291–1305 (2003)
Chen, L., Wang, S.: Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput. Biol. Med. 65, 69–75 (2015)
Dang, P.P., Chau, P.M.: Image encryption for secure internet multimedia applications. IEEE Trans. Consum. Electron. 46(3), 395–403 (2000)
Erdem, Y., Cem, K.M., Ezgi, Y.: A chaos-based image encryption algorithm with simple logical functions. Comput. Electr. Eng. 54, 471–483 (2016)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8(06), 1259–1284 (1998)
Fu, C., Lin, Bb, Miao, Ys, Liu, X., Chen, Jj: A novel chaos-based bit-level permutation scheme for digital image encryption. Optics Commun. 284(23), 5415–5423 (2011)
Fu, C., Meng, Wh, Zhan, Yf, Zhu, Z.L., Lau, F.C., Chi, K.T., Ma, H.F.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43(8), 1000–1010 (2013)
Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)
Guan, Z.H., Huang, F., Guan, W.: Chaos-based image encryption algorithm. Phys. Lett. A 346(1–3), 153–157 (2005)
Huang, X., Ye, G.: An efficient self-adaptive model for chaotic image encryption algorithm. Commun. Nonlinear Sci. Numer. Simul. 19(12), 4094–4104 (2014)
Kwok, H., Tang, W.K.: A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4), 1518–1529 (2007)
Li, C., Li, S., Lo, K.T.: Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16(2), 837–843 (2011)
Li, C., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91(4), 949–954 (2011)
Li, S., Li, C., Chen, G., Zhang, D., Bourbakis, N.G.: A general cryptanalysis of permutation-only multimedia encryption algorithms. IACRs Cryptol. ePrint Arch. Rep. 374, 2004 (2004)
Özkaynak, F., Özer, A.B.: Cryptanalysis of a new image encryption algorithm based on chaos. Optik Int. J. Light Electron Optics 127(13), 5190–5192 (2016)
Pareek, N., Patidar, V., Sud, K.: Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 10(7), 715–723 (2005)
Rhouma, R., Belghith, S.: Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(38), 5973–5978 (2008)
Solak, E., Çokal, C., Yildiz, O.T., Biyikoǧlu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 20(05), 1405–1413 (2010)
Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)
Yang, H., Wong, K.W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)
Ye, R.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Commun. 284(22), 5290–5298 (2011)
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., Tourki, R.: A modified aes based algorithm for image encryption. World Acad. Sci. Eng. Technol. 27, 206–211 (2007)
Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Optics Commun. 284(12), 2775–2780 (2011)
Zhang, L.B., Zhu, Z.L., Yang, B.Q., Liu, W.Y., Zhu, H.F., Zou, M.Y.: Cryptanalysis and improvement of an efficient and secure medical image protection scheme. Math. Probl. Eng. 2015, 1–11 (2015)
Zhang, Y., Xiao, D.: An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul. 19(1), 74–82 (2014)
Zhu, Zl, Zhang, W., Wong, Kw, Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Rights and permissions
About this article
Cite this article
Raza, S.F., Satpute, V. A novel bit permutation-based image encryption algorithm. Nonlinear Dyn 95, 859–873 (2019). https://doi.org/10.1007/s11071-018-4600-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-018-4600-8