An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher
详细信息    查看全文
  • 作者:Gururaj Hanchinamani ; Linganagouda Kulkarni
  • 关键词:Image encryption/decryption ; Peter De Jong map ; RC4 stream generator ; Statistical attacks ; Differential attacks
  • 刊名:3D Research
  • 出版年:2015
  • 出版时间:September 2015
  • 年:2015
  • 卷:6
  • 期:3
  • 全文大小:2,814 KB
  • 参考文献:1.El-Latif, A. A. A., Li, L., Zhang, T., Wang, N., Song, X., & Niu, X. (2012). Digital image encryption scheme based on multiple chaotic systems. Sensing and Imaging, 13(2), 67-8. doi:10.-007/?s11071-012-0409-z .View Article
    2.Francois, M., Grosges, T., Barchiesi, D., & Erra, R. (2012). A new image encryption scheme based on a chaotic function. Signal Processing, 27(3), 249-59. doi:10.-016/?j.?image.-011.-1.-03 .MATH
    3.Sam, S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). A novel image cipher based on a mixed transformed logistic maps. Multimedia Tools and Applications, 56(2), 315-30. doi:10.-007/?s11042-010-0652-6 .View Article
    4.Taneja, N., Raman, B., & Gupta, I. (2012). Combinational domain encryption for still visual data. Multimedia Tools and Applications, 159(3), 775-93. doi:10.-007/?s11042-011-0775-4 .View Article
    5.Sam, S., Devaraj, P., & Bhuvaneswaran, R. S. (2012). An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics, 69(4), 1995-007. doi:10.-007/?s11071-012-0402-6 .MathSciNet View Article
    6.Zhang, X., Mao, Y., & Zhao, Z. (2014). An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dynamics, 78(1), 359-69. doi:10.-007/?s11071-014-1445-7 .View Article
    7.Zhou, Y., Bao, L., & Chen, C. L. P. (2013). Image encryption using a new parametric switching chaotic system. Signal Processing, 93(11), 3039-052. doi:10.-016/?j.?sigpro.-013.-4.-21 .View Article
    8.Ye, G., & Wong, K. W. (2012). An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dynamics, 69, 2079-087. doi:10.-007/?s11071-012-0409-z .MathSciNet View Article
    9.El-Latif, A. A. A., Li, L., & Niu, X. (2014). A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimedia Tools and Applications, 70, 1559-584. doi:10.-007/?s11042-012-1173-2 .View Article
    10.Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563-71. doi:10.-007/?s11235-011-9461-0 .
    11.Ye, Guodong. (2010). Image scrambling encryption algorithm of pixel bit based on chao map. Pattern Recognition Letters, 31(5), 347-54. doi:10.-016/?j.?patrec.-009.-1.-08 .View Article
    12.Yoon, J. W., & Kim, H. (2010). An image encryption scheme with a pseudorandom permutation based on chaotic maps. Communications in Nonlinear Science and Numerical Simulations, 15(12), 3998-006. doi:10.-016/?j.?cnsns.-010.-1.-41 .MathSciNet View Article MATH
    13.Zhang, L., Liao, X., & Wang, X. (2004). An image encryption approach based on chaotic maps. Chaos, Solitons & Fractals, 24(3), 759-65. doi:10.-016/?j.?chaos.-004.-9.-35 .MathSciNet View Article
    14.Liu, Y., Tian, S., Hu, W., & Xing, C. (2012). Design and statistical analysis of a new chaotic block cipher for wireless sensor networks. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3267-278. doi:10.-016/?j.?cnsns.-011.-1.-40 .MathSciNet View Article
    15.Wong, K. K., Carter, G., Dawson, E. (2010). An analysis of the RC4 family of stream ciphers against algebraic attacks. Proceedings 8th Australasian information security conference, 103, pp. 67-4.
  • 作者单位:Gururaj Hanchinamani (1)
    Linganagouda Kulkarni (1)

    1. BVB College of Engineering & Technology, Hubli, 580031, India
  • 刊物类别:Engineering
  • 刊物主题:Computer Imaging, Vision, Pattern Recognition and Graphics
    Signal,Image and Speech Processing
  • 出版者:3D Display Research Center, co-published with Springer
  • ISSN:2092-6731
文摘
Security is a vital issue in communication and storage of the images and encryption is one of the ways to ensure the security. This paper proposes an efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. A Peter De Jong map is employed to determine the initial keys for the RC4 stream generator and also during permutation stage. The RC4 stream generator is utilized to generate the pseudo random numbers for the pixel value rotation and diffusion operations. Each encryption round is comprised of three stages: permutation, pixel value rotation and diffusion. The permutation is based on scrambling the rows and columns, in addition, circular rotations of the rows and columns in alternate orientations. The second stage circularly rotates each and every pixel value by utilizing M?×?N pseudo random numbers. The last stage carries out the diffusion twice by scanning the image in two different ways. Each of the two diffusions accomplishes the diffusion in two orientations (forward and backward) with two previously diffused pixels and two pseudo random numbers. The security and performance of the proposed method is assessed thoroughly by using key space, statistical, differential, entropy and performance analysis. Moreover, two rounds of the call to the encrypt function provide the sufficient security. The experimental results show that the proposed encryption scheme is computationally fast with high security.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700