Advertisement

Security Analysis of a New Bit-Level Permutation Image Encryption Algorithm

  • Adrian-Viorel Diaconu
  • Valeriu Ionescu
  • Jose Manuel Lopez-Guede
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 527)

Abstract

A new chaotic, permutation-substitution architecture based, image encryption algorithm has been introduced with a novel inter-intra bit-level permutation based confusion strategy. The proposed image cryptosystem uses Sudoku grids to ensure a high performance diffusion process and key space. This paper presents a fully comprehensive set of security analyses on the newly proposed image cryptosystem, including statistical and differential analysis, local and global information entropy calculation and robustness profile to different types of attacks. Based on the good statistical results, rounded by the theoretical arguments, the conducted study demonstrates that the proposed images’ encryption algorithm has a desirable level of security.

Keywords

Inter-intra bit-level permutation Image encryption Chaos-based cryptography Security analysis 

References

  1. 1.
    Diaconu, A.V., Ionescu, V.M., Iana, G., Lope-Guede, J.M.: A new bit-level permutation image encryption algorithm. In: International Conference on Communications, COMM 2016, Bucharest, Romania, 9–11 June 2016Google Scholar
  2. 2.
    Boriga, R., Dăscălescu, A.C., Priescu, I.: A new hyperchaotic map and its application in an image encryption scheme. Signal Process. Image 29(8), 887–901 (2014)CrossRefGoogle Scholar
  3. 3.
    Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using Latin squares. Inf. Sci. 264, 317–339 (2014)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Wu, Y., Zhou, Y., Noonan, J.P., Panetta, K., Agaian, S.: Image encryption using the Sudoku matrix. In: Proceedings of SPIE 7708, pp. 77080P-1–77080P-12 (2010)Google Scholar
  5. 5.
    Diaconu, A.-V., Loukhaoukha, K.: An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic map. Math. Prob. Eng. (2013). doi: 10.1155/2013/848392CrossRefGoogle Scholar
  6. 6.
    Zhu, Z.-L., Zhang, W., Wong, K.-W., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)CrossRefGoogle Scholar
  7. 7.
    Zhou, Y., Bao, L., Chen, C.L.P.: A new 1D chaotic system for image encryption. Signal Process. 97, 172–182 (2014)CrossRefGoogle Scholar
  8. 8.
    Enayatifar, R., Abdullah, A.H., Isnin, I.F.: Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt. Lasers Eng. 56, 83–93 (2014)CrossRefGoogle Scholar
  9. 9.
    Sui, L., Duan, K., Liang, J., Zhang, Z., Meng, H.: Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt. Lasers Eng. 62, 139–152 (2014)CrossRefGoogle Scholar
  10. 10.
    Li, H., Wang, Y., Yan, H., Li, L., Li, Q., Zhao, X.: Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Opt. Lasers Eng. 51, 1327–1331 (2013)CrossRefGoogle Scholar
  11. 11.
    Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10–18 (2015)CrossRefGoogle Scholar
  12. 12.
    Wang, X.Y., Wang, X.M.: A novel block cryptosystem based on the coupled chaotic map lattice. Nonlinear Dyn. 72, 707–715 (2013)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Zhan, Y.-Q., Wang, X.-Y.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10–20 (2015)CrossRefGoogle Scholar
  14. 14.
    Zhan, Y.-Q., Wang, X.-Y.: A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf. Sci. 273, 329–351 (2014)CrossRefGoogle Scholar
  15. 15.
    Dăscălescu, A.C., Boriga, R.: A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling. Nonlinear Dyn. 73, 307–318 (2013)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Li, C., Li, S., Lo, K.-T.: Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 837–843 (2011)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Diaconu, A.-V.: KenKen puzzle-based image encryption algorithm. Proc. Rom. Acad., Ser. A 16, 313–320 (2015)MathSciNetGoogle Scholar
  18. 18.
    Diaconu A.-V.: Circular inter-intra pixels bit-level permutation and chaos based image encryption. Inf. Sci. (in press). doi: 10.1016/j.ins.2015.10.027CrossRefGoogle Scholar
  19. 19.
    Boriga, R., Dascalescu, A.-C., Diaconu A.-V.: Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator, Math. Prob. Eng. 2015, Article. ID 769108 (2013)Google Scholar
  20. 20.
    Wang, X., Luan, D.: A novel image encryption algorithm using a chaos and reversible cellular automata. Commun. Nonlinear Sci. Numer. Simulat. 18, 3075–3085 (2013)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Song, C.-Y., Qiao, Y.-L., Zhang, X.-Z.: An image encryption scheme based on new spatiotemporal chaos. Optik 124, 3329–3334 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Adrian-Viorel Diaconu
    • 1
  • Valeriu Ionescu
    • 2
  • Jose Manuel Lopez-Guede
    • 3
  1. 1.IT&C DepartmentLumina – The University of South-East EuropeBucharestRomania
  2. 2.Department of Electronics, Computers and Electrical EngineeringUniversity of PitestiPitestiRomania
  3. 3.Systems and Automatic Control DepartmentUniversity College of Engineering of Victoria, Basque Country University (UPV/EHU)VitoriaSpain

Personalised recommendations