Browse > Article
http://dx.doi.org/10.3837/tiis.2018.09.020

The fast image encryption algorithm based on substitution and diffusion  

Zhang, Yong (School of Software and Communication Engineering, Jiangxi University of Finance and Economics)
Jia, Xiaoyang (Changchun China Optical Science & Technology Museum)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.12, no.9, 2018 , pp. 4487-4511 More about this Journal
Abstract
A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.
Keywords
Information security; image encryption; chaos; substitution; diffusion;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Z. Hua, Y. Zhou, C. Pun and C. L. P. Chen, "2D Sine Logistic modulation map for image encryption," Information Sciences, vol. 297, no. C, pp. 80-94, March 2015.   DOI
2 Unal Cavusoglu, S. Kacar, I. Pehlivan I and A. Zengin, "Secure image encryption algorithm design using a novel chaos based S-Box," Chaos Solitons & Fractals, vol. 95, no. 2, pp. 92-101, February 2017.   DOI
3 G. Ye, H. Zhao and H. Chai, "Chaotic image encryption algorithm using wave-line permutation and block diffusion," Nonlinear Dynamics, vol. 83, no. 4, pp. 2067-2077, April 2016.   DOI
4 Y. Zhou, L. Bao and C. L. P. Chen, "A new 1D chaotic system for image encryption," Signal Processing, vol. 97, no. 7, pp. 172-182, April 2014.   DOI
5 X. Li, G. Zhang and X. Zhang, "Image encryption algorithm with compound chaotic maps," Journal of Ambient Intelligence and Humanized Computing, vol. 6, no. 5, pp. 563-570, May 2015.   DOI
6 A. Akif, M. Irene, P. Ihsan and S. Vaidyanathan, "A new four-scroll chaotic attractor and its engineering applications," Optik, vol. 127, no. 13, pp. 5491-5499, July 2016.   DOI
7 E. Chen, L. Min and G. Chen, "Discrete chaotic systems with one-line equilibria and their application to image encryption," International Journal of Bifurcation and Chaos, vol. 27, no. 3, pp. 1750046 (17 pages), March 2017.   DOI
8 J. S. A. E. Fouda, J. Y. Effa, S. L. SamratL and M. Ali, "A fast chaotic block cipher for image encryption," Communications in Nonlinear Science & Numerical Simulation, vol. 19, no. 3, pp. 578-588, March 2014.   DOI
9 N. B. Slimane, K. Bouallegue and M. Machhout, "Designing a multi-scroll chaotic system by operating Logistic map with fractal process," Nonlinear Dynamics, vol. 88, no. 3, pp. 1655-1675, March 2017.   DOI
10 T. Sivakumar and R. Venkatesan, "A novel image encryption using calligraphy based scan method and random number," KSII Transactions on Internet & Information Systems, vol. 9, no. 6, pp. 2317-2337, June 2015.   DOI
11 J. A. Jolfaei, X. Wu and V. Muthukkumarasamy, "On the security of permutation-only image encryption schemes," IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 235-246, February 2016.   DOI
12 Y. Zhang, "A chaotic system based image encryption scheme with identical encryption and decryption algorithm," Chinese Journal of Electronics, vol. 26, no. 5, pp. 1022-1031, October 2017.   DOI
13 P. Li and Y. Zhao, "A simple encryption algorithm for quantum color image," International Journal of Theoretical Physics, vol. 56, no. 6, pp. 1961-1982, June 2017.   DOI
14 C. Li, "Cracking a hierarchical chaotic image encryption algorithm based on permutation," Signal Processing, vol. 118, no. C, pp. 203-210, January 2016.   DOI
15 D. S. Laiphrakpam and M. S. Khumanthem, "Cryptanalysis of symmetric key image encryption using chaotic Rossler system," Optik, vol. 135, no. 4, pp. 200-209, April 2017.   DOI
16 B. Norouzi and S. Mirzkuchaki, "Breaking a novel image encryption scheme based on an improper fractional order chaotic system," Multimedia Tools & Applications, vol. 76, no. 2, pp. 1817-1826, February 2017.   DOI
17 W. Wen, Y. Zhang, M. Su, R. Zhang, J. Chen and M. Li, "Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture," Nonlinear Dynamics, vol. 87, no. 1, pp. 383-390, January 2017.   DOI
18 X. Wang and D. Xu, "A novel image encryption scheme using chaos and Langton's Ant cellular automaton," Nonlinear Dynamics, vol. 79, no. 4, pp. 2449-2456, March 2015.   DOI
19 X. Chai, Z. Gan, K. Yang, Y. Chen and X. Liu, "An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations," Signal Processing: Image Communication, vol. 52, no. C, pp. 6-19, March 2017.   DOI
20 Y. Zhang and Y. Tang, "A plaintext-related image encryption algorithm based on chaos," Multimedia Tools and Applications, vol. 77, no. 6, pp. 6647-6669, March 2018.   DOI
21 A. V. Diaconu, "Circular inter-intra pixels bit-level permutation and chaos-based image encryption," Information Sciences, vol. 355-356, pp. 314-327, August 2016.   DOI
22 H. Fan and M. Li, "Cryptanalysis and improvement of chaos-based image encryption scheme with circular inter-intra-pixels bit-level permutation," Mathematical Problems in Engineering, vol. 2017, pp. 1-11, July 2017.
23 W. Zhang, H. Yu, Y. Zhao and Z. Zhu, "Image encryption based on three-dimensional bit matrix permutation," Signal Processing, vol. 118, no. 1, pp. 36-50, January 2016.   DOI
24 J. Wu, X. Liao and B. Yang, "Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation," Signal Processing, vol. 142, no. 1, pp. 292-300, January 2018.   DOI
25 X. Wang and H. Zhang, "A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems," Nonlinear Dynamics, vol. 83, no. 1-2, pp. 333-346, February 2016.   DOI
26 T. Ueta and G. Chen, "Bifurcation analysis of Chen's equation," International Journal of Bifurcation & Chaos, vol. 10, no. 8, pp. 1917-1931, August 2000.   DOI
27 National Institute of Standards and Technology, "Federal Information Processing Standard FIPS PUB 140-2, Security requirements for cryptographic modules," 2002.
28 G. Chen, Y. Mao and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos Solitons & Fractals, vol. 21, no. 3, pp. 749-761, July 2004.   DOI
29 J. Daemen and V. Rijmen, "The design of Rijndael: AES - the Advanced Encryption Standard," Springer-Verlag, Berlin, 2002.