Advertisement

Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling

  • Aniq Ur RahmanEmail author
  • Mayukh BhattacharyyaEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 969)

Abstract

Security of personal information is affirmation of the right to privacy. With increasing data requirements of consumers and the bulk of archival information thereby created needs storage space and here cloud storage comes to the rescue, which however is prone to cyber attacks and needs better data security protocols as time changes. In this paper, we propose a novel symmetric-key image encryption scheme by shuffling the pixels which renders the information unintelligible. We show how our technique provides an additional layer of security on top of the regular encryption techniques. We analyze our algorithm by performing statistical and difference attack tests. We also discuss the brute force attack and its viability. The results validate effectiveness of our encryption scheme.

Keywords

Visual cryptography Multimedia security Information hiding 

References

  1. 1.
    Tarran, B.: What can we learn from the Facebook Cambridge analytica scandal? Significance 15(3), 4–5 (2018)CrossRefGoogle Scholar
  2. 2.
    Marwick, A.E.: Scandal or sex crime? Ethical implications of the celebrity nude photo leaks. AoIR Selected Papers of Internet Research 6 (2017)Google Scholar
  3. 3.
    Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175–193. Springer, Heidelberg (2004).  https://doi.org/10.1007/978-3-540-24654-1_13CrossRefGoogle Scholar
  4. 4.
    Ding, W.: Digital image scrambling technology based on Arnold transformation. J. Comput. Aided Des. Comput. Graph. 13(4), 338–341 (2001)Google Scholar
  5. 5.
    Ravankar, A.A., Sedukhin, S.G.: Image scrambling based on a new linear transform. In: International Conference on Multimedia Technology (ICMT), 26 July 2011, pp. 3105–3108. IEEE (2011)Google Scholar
  6. 6.
    Sarma, K.S., Lavanya, B.: Digital image scrambling based on sequence generation. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), 20 April 2017, pp. 1–5. IEEE (2017)Google Scholar
  7. 7.
    Saraswathi, P.V., Venkatesulu, M.: A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: International Conference on Trends in Electronics and Informatics (ICEI), 11 May 2017, pp. 425–429. IEEE (2017)Google Scholar
  8. 8.
    Wu, W.C., Yang, S.C.: Enhancing image security and privacy in cloud system using steganography. In: IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 12 June 2017, pp. 321–322. IEEE (2017)Google Scholar
  9. 9.
    Preishuber, M., Htter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. (2018)Google Scholar
  10. 10.
    Xing, Y., Li, M., Wang, L.: Chaotic-map image encryption scheme based on AES key producing schedule. In: IEEE Third International Conference on Data Science in Cyberspace (DSC), 18 June 2018. IEEE (2018)Google Scholar
  11. 11.
    Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process. Mag. IEEE 26(1), 98–117 (2009)CrossRefGoogle Scholar
  12. 12.
    Zhou, W., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image qualifty assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)CrossRefGoogle Scholar
  13. 13.
    Zhang, Y., Li, X.: A fast image encryption scheme based on integer wavelet and hyper-chaotic system. In: International Conference on Artificial Intelligence and Big Data (ICAIBD), 26 May 2018. IEEE (2018)Google Scholar
  14. 14.
    Lang, J.: Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt. Commun. 1(338), 181–192 (2015)CrossRefGoogle Scholar
  15. 15.
    Kang, X., Han, Z., Yu, A., Duan, P.: Double random scrambling encoding in the RPMPFrHT domain. In: IEEE International Conference on Image Processing (ICIP), 17 September 2017, pp. 4362–4366. IEEE (2017)Google Scholar
  16. 16.
    Kang, X., Ming, A., Tao, R.: Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans. Circuits Syst. Video Technol. (2018)Google Scholar
  17. 17.
    Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 366(4–5), 391–396 (2007)CrossRefGoogle Scholar
  18. 18.
    Bluman, A.G.: Elementary Statistics. McGraw Hill, Chennai (2013)Google Scholar
  19. 19.
    Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563–571 (2013)Google Scholar
  20. 20.
    Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)MathSciNetCrossRefGoogle Scholar
  21. 21.
    Rahman, A.U.: Pyxel, Github (2018). https://github.com/Aniq55/pyxel

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.National Institute of Technology DurgapurDurgapurIndia

Personalised recommendations