- Volume 11 Issue 4
This paper proposes an efficient image encryption scheme based on quintuple encryption using two chaotic maps. The encryption process is realized with quintuple encryption by calling the encrypt(E) and decrypt(D) functions five times with five different keys in the form EDEEE. The decryption process is accomplished in the reverse direction by invoking the encrypt and decrypt functions in the form DDDED. The keys for the quintuple encryption/decryption processes are generated by using a Tent map. The chaotic values for the encrypt/decrypt operations are generated by using a Gumowski-Mira map. The encrypt function E is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage scrambles all the rows and columns to chaotically generated positions. This stage reduces the correlation radically among the neighboring pixels. The pixel value rotation stage circularly rotates all the pixels either left or right, and the amount of rotation is based on chaotic values. The last stage performs the diffusion four times by scanning the image in four different directions: Horizontally, Vertically, Principal diagonally and Secondary diagonally. Each of the four diffusion steps performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. This stage ensures the resistance against the differential attacks. The security and performance of the proposed method is investigated thoroughly by using key space, statistical, differential, entropy and performance analysis. The experimental results confirm that the proposed scheme is computationally fast with security intact.
Quintuple Encryption;Gumowski-Mira map;Tent Map;Statistical Attacks;Differential Attacks
- N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic Logistic map,” Image Vision and Computing, vol. 24, no. 9, 2006, pp. 926-934. https://doi.org/10.1016/j.imavis.2006.02.021
- Bruce schneier, “Applied cryptography,” John Wiley & sons, 2001.
- Xiaoling Huang, “Image encryption algorithm using chaotic Chebyshev generator,” Nonlinear Dynamics, vol. 67, no. 4, 2012, pp. 2411-2417. https://doi.org/10.1007/s11071-011-0155-7
- Xiaofeng Liao, Shiyue Lai, and Qing Zhou, “A novel image encryption algorithm based on self-adaptive wave transmission,” Signal processing, vol. 90, no. 9, 2010, pp. 2714-2722. https://doi.org/10.1016/j.sigpro.2010.03.022
- Guanrong Chen, Yaobin Mao, and Charles K. Chui’ “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos solitons and fractals, vol. 21 no. 3, 2004, pp. 749-761. https://doi.org/10.1016/j.chaos.2003.12.022
- Lequan Min and Guanrong Chen, “A novel stream encryption scheme with avalanche effect,” The European Physical Journal B, vol. 86, 2013, p. 459. https://doi.org/10.1140/epjb/e2013-40199-7
- D. Chattopadhyay, M. K. Mandal, and D. Nandi, “Symmetric key chaotic image encryption using circle map,” Indian Journal of Science and Technology, vol. 4, 2010, pp. 593-599.
- A Akhshani, S Behnia, A Akhavan, H Abu Hassan, and Z Hassan, “A novel scheme for image encryption based on 2D piecewise chaotic maps,” Optics Communications, vol. 283, no. 17, 2010, pp. 3259-3266. https://doi.org/10.1016/j.optcom.2010.04.056
- Guodong Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, vol. 31, no. 5, 2010, pp. 347-354. https://doi.org/10.1016/j.patrec.2009.11.008
- Gonzalo Alvarez and Shujun Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, 2006, pp. 2129-2151. https://doi.org/10.1142/S0218127406015970
- V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution diffusion based image cipher using chaotic standard and Logistic maps,” Communications in Nonlinear Science and Numerical Simulations, vol. 14, no. 7, 2009, pp. 3056-3075. https://doi.org/10.1016/j.cnsns.2008.11.005
- Guodong Ye and Kwok Wo Wong, “An efficient chaotic image encryption algorithm based on a generalized Arnold map,” Nonlinear Dynamics, vol. 69, no. 4, 2012, pp. 2079-2087. https://doi.org/10.1007/s11071-012-0409-z
- Ahmed A. Abd El-Latif, Li Li, Tiejun Zhang, Ning Wang, Xianhua Song, and Xiamu Niu, “Digital image encryption scheme based on multiple chaotic systems,” Sensing and Imaging, vol. 13, no. 2, 2012, pp. 67-88. https://doi.org/10.1007/s11220-012-0071-z
- Shatheesh Sam, P. Devaraj, and R. S. Bhuvaneswaran, "A novel image cipher based on mixed transformed logistic maps," Multimedia Tools and Applications, vol. 56, no. 2, 2012, pp. 315-330. https://doi.org/10.1007/s11042-010-0652-6
- M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Processing: Image Communications, vol. 27, no. 3, 2012, pp. 249-259. https://doi.org/10.1016/j.image.2011.11.003
- Nidhi Taneja, Balasubramanian Raman, Indra Gupta, “Combinational domain encryption for still visual data,” Multimedia Tools and Applications, vol. 159, no. 3, 2012, pp. 775-793. https://doi.org/10.1007/s11042-011-0775-4
- Shantheesh Sam, P. Devaraj, and R. S. Bhuvaneswaran, “An intertwining chaotic maps based image encryption scheme,” Nonlinear Dynamics, vol. 69, no. 4, 2012, pp. 1995-2007. https://doi.org/10.1007/s11071-012-0402-6