Security Analysis of a New Bit-Level Permutation Image Encryption Algorithm
A new chaotic, permutation-substitution architecture based, image encryption algorithm has been introduced with a novel inter-intra bit-level permutation based confusion strategy. The proposed image cryptosystem uses Sudoku grids to ensure a high performance diffusion process and key space. This paper presents a fully comprehensive set of security analyses on the newly proposed image cryptosystem, including statistical and differential analysis, local and global information entropy calculation and robustness profile to different types of attacks. Based on the good statistical results, rounded by the theoretical arguments, the conducted study demonstrates that the proposed images’ encryption algorithm has a desirable level of security.
KeywordsInter-intra bit-level permutation Image encryption Chaos-based cryptography Security analysis
- 1.Diaconu, A.V., Ionescu, V.M., Iana, G., Lope-Guede, J.M.: A new bit-level permutation image encryption algorithm. In: International Conference on Communications, COMM 2016, Bucharest, Romania, 9–11 June 2016Google Scholar
- 4.Wu, Y., Zhou, Y., Noonan, J.P., Panetta, K., Agaian, S.: Image encryption using the Sudoku matrix. In: Proceedings of SPIE 7708, pp. 77080P-1–77080P-12 (2010)Google Scholar
- 19.Boriga, R., Dascalescu, A.-C., Diaconu A.-V.: Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator, Math. Prob. Eng. 2015, Article. ID 769108 (2013)Google Scholar
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (http://creativecommons.org/licenses/by-nc/2.5/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.