Skip to main content

Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map

  • Conference paper

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 101))

Abstract

This paper proposes an enhanced substitution-diffusion based image cipher using improved chaotic map. The first step consists of permutation which uses the odd key values. Byte substitution is applied in the second step to improve the security against the known/chosen-plaintext attack. Finally, confusion and diffusion are obtained using the sub diagonal diffusion of adjacent pixels and XORing with the chaotic key. The numbers of rounds in the steps are controlled by combination of pseudo random sequence and original image. The security and performance of the proposed image encryption technique have been analyzed thoroughly using statistical analysis, key sensitivity analysis, differential analysis, key space analysis and entropy analysis. Results of the various types of analyzes are showing that the proposed image encryption technique is more secure and fast.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Matthew, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 8, 29–42 (1989)

    Article  Google Scholar 

  2. Schneier, B.: Applied cryptography: protocols algorithms and source code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  3. Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  4. Chen, G.R., Mao, Y.B., Charles, K.C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21, 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  5. Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 14, 3056–3075 (2009)

    Article  Google Scholar 

  6. Alvarez, G., Shujun, L.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simulat. 14, 3743–3749 (2009)

    Article  Google Scholar 

  7. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulat. 15, 1887–1892 (2010)

    Article  MathSciNet  Google Scholar 

  8. Jianquan, X., Chunhua, Y., Qing, X., Lijun, T.: An Encryption Algorithm Based on Transformed Logistic Map. In: IEEE International Conference on Network Security, Wireless Communications and Truested Computing, pp. 111–114 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S. (2010). Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15766-0_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15765-3

  • Online ISBN: 978-3-642-15766-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics