Skip to main content
Log in

Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher

  • Regular Article
  • Chaos Based Image Encryption, Stream Cipher and Authentication
  • Published:
The European Physical Journal Special Topics Aims and scope Submit manuscript

Abstract

In this paper we presented a image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The proposed method consists of permutation and substitution process. In permutation process, plain image is permuted according to chaotic sequence generated using chaotic map. In substitution process, based on secrete key of 256 bit generate a Latin Square Image Cipher (LSIC) and this LSIC is used as key image and perform XOR operation between permuted image and key image. The proposed method can applied to any plain image with unequal width and height as well and also resist statistical attack, differential attack. Experiments carried out for different images of different sizes. The proposed method possesses large key space to resist brute force attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Salleh, Mazleena, Ibrahim, J. Teknol. 39, 1 (2012)

    Google Scholar 

  2. Usama, Muhammad, Khan, Biom. Sec. Technol., 1 (2008)

  3. Wang, Xingyuan, Yang, Lei, Opt. Comm. 285, 4033 (2013)

    Google Scholar 

  4. Ye, Ruisong, J. Teknol. 284, 5290 (2011)

    Google Scholar 

  5. Abd El-Latif, Ahmed A., Niu, AEU-International J. Electron. Comm. (2012)

  6. Wang, Xingyuan, Teng, Lin, Qin, Xue, Signal Proc. 92, 1101 (2012)

    Article  Google Scholar 

  7. Patidar, Vinod, Pareek, Opt. Comm. 284, 4331 (2011)

    Article  ADS  Google Scholar 

  8. Fu, Chong, Lin, Bin-bin, Miao, Opt. Comm. 284, 5415 (2011)

    Article  ADS  Google Scholar 

  9. Wu, Yue, Zhou, Yicong, Noonan, Joseph P., Panetta, SPIE Defense, Sec. Sensing, 77080 (2010)

  10. Wu, Yue, Zhou, arXiv preprint [arXiv:1204.2310] (2012)

  11. Wu, Yue, Agaian, arXiv preprint [arXiv:1207.5856] (2012)

  12. Azzaz, M.S., Tanougast, Signals Syst. Conf. 1 (2009)

  13. Chang, Chin-Chen, Lin, J. Comm. 5, 5 (2010)

    Article  Google Scholar 

  14. Azzaz, M.S., Tanougast, NEWCAS Conf. 92, 61 (2010)

    Google Scholar 

  15. Wang, Xingyuan, Teng, Lin, Qin, Xue, Adv. Recent Technol. Comm. Comput., 623 (2009)

  16. Tong, Xiaojun, Cui, Image Vision Comput. 26, 843 (2008)

    Article  Google Scholar 

  17. F. Sun, Z.L.S. Liu, Opt. Comm. 283, 2066 (2010)

    Article  ADS  Google Scholar 

  18. Abdullah, Abdul Hanan, AEU-Int. J. Electron. Comm. 66, 806 (2012)

    Article  Google Scholar 

  19. Wang, Xingyuan, Jin, J. Comm. 5, 5 (2010)

    Google Scholar 

  20. Pareek, Narendra K., Patidar, Digital Signal Proc. (2012)

  21. Wu, Yue, Noonan, Joseph P., Agaian, arXiv preprint [arXiv:1103.5520] (2011)

  22. Wu, Yue, Noonan, Joseph P., Agaian, Cyber J.: Multidiscipl. J. Sci. Technol., 31 (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to H.T. Panduranga, S.K. Naveen Kumar or Kiran.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Panduranga, H., Naveen Kumar, S. & Kiran Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher. Eur. Phys. J. Spec. Top. 223, 1663–1677 (2014). https://doi.org/10.1140/epjst/e2014-02119-9

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1140/epjst/e2014-02119-9

Keywords

Navigation