Browse > Article
http://dx.doi.org/10.6109/jkiice.2020.24.11.1507

PingPong 256 shuffling method with Image Encryption and Resistance to Various Noise  

Kim, Ki Hwan (Department of Ubequertus IT, Dongseo University)
Lee, Hoon Jae (Department of Computer Engineering, Dongseo University)
Abstract
High-quality images have a lot of information, so sensitive data is stored by encryption for private company, military etc. Encrypted images can only be decrypted with a secret key, but the original data cannot be retained when attacked by the Shear attack and Noise pollution attack techniques that overwrite some pixel data with arbitrary values. Important data is the more necessary a countermeasure for the recovery method against attack. In this paper, we propose a random number generator PingPong256 and a shuffling method that rearranges pixels to resist Shear attack and Noise pollution attack techniques so that image and video encryption can be performed more quickly. Next, the proposed PingPong256 was examined with SP800-22, tested for immunity to various noises, and verified whether the image to which the shuffling method was applied satisfies the Anti-shear attack and the Anti-noise pollution attack.
Keywords
PingPong256; Histogram; Messy; Shuffling; Gaussian distribution;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Y. Wu, J. Noonan, and S. Agaian, "NPCR and UACI randomness tests for image encryption," Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications, vol. 1, no. 2, pp. 31-38, Apr. 2011.
2 X. Wang and J. Yang, "A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system," Optik, vol. 217, no. 164884, May. 2020.
3 Y. Su, W. X. Su, and Z. Jie, "Optical image encryption based on chaotic fingerprint phase mask and pattern-illuminated Fourier ptychography," Optics and Lasers in Engineering, vol. 128, no. 106042, Jan. 2020.
4 Security news, CCTV data deletion to hide negligence is useless! [Internet]. Available: https://www.boannews.com/media/view.asp?idx=63311
5 D. E. ElKamchouchi, H. G. Mohamed, and K. H. Moussa, "A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion," Entropy, vol. 22, no. 2, 180, Feb. 2020.   DOI
6 F. Yang, J. Mou, C. Ma, and Y. Cao, "Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application," Optics and Lasers in Engineering, vol. 129, 106031, Jan. 2020.
7 C. Pak and L. Huang, "A new color image encryption using combination of the 1D chaotic map," Signal Processing, vol. 138, pp. 129-137, Mar. 2017.   DOI
8 H. Liu and X. Wang, "Image encryption using DNA complementary rule and chaotic maps," Applied Soft Computing, vol. 12, no. 5, pp. 1457-1466, Dec. 2014.
9 Y. Wan, S. Gu, and B. Du, "A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding," Entropy, vol. 22, no. 2, 171, Jan. 2020.   DOI
10 I. Jarin, S. A. Fattah, and C. Shahnaz, "Natural and Medical Image Encryption using Self-Adaptive Permutation and DNA Encoding," in Proceeding of the 2018 IEEE International WIE Conference on Electrical and Computer Engineering, Chonburi: Thailand, pp. 99-102, 2018.
11 M. Makoto. "Linear feedback shift register," US Patent No. 5,090,035, to NEC Corp, Patent and Trademark Office, Tokyo, 1992.
12 JoongAng Ilbo, CCTV footage that disappeared one day and the scheme of daycare center directors. [Internet]. Available: https://news.joins.com/article/23493244
13 K. H. Kim, H. J. Lee, and Y. S. Lee, "Proposed image encryption method using PingPong256," Journal of the Korea Society of Computer and Information, vol. 25, no. 1, pp. 71-77, Jan. 2020.   DOI
14 A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangle, D. Banks, A. Heckert, J. Dray, and S. Vo. "A statistical test suite for random and pseudorandom number generators for cryptographic applications," National Institute of Standards and Technology, Sp 800-22 rev. 1a, 2001.
15 S. Liu, C. Guo, and J. T. Sheridan, "A review of optical image encryption techniques," Optics & Laser Technology, vol. 57, pp. 327-342, Apr. 2014.   DOI
16 Y. Liu, J. Wang, J. Fan, and L. Gong, "Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences," Multimedia Tools and Applications, vol. 75, no. 8, pp. 4363-4382, Feb. 2015.
17 S. B. Rhee, J. H. Kang, and K. H. Kim, "Local Differential Pixel Assessment Method for Image Stitching," Journal of Broadcast Engineering, vol. 24, no. 5, pp. 775-784, Sep. 2019.   DOI
18 X. Y. Wang and Z. M. Li, "A color image encryption algorithm based on Hopfield chaotic neural network," Optics and Lasers in Engineering, vol. 115, pp. 107-118, Apr. 2019.   DOI
19 J. S. Jeong and Y. J. Kim, "Structural Similarity Index for Image Assessment Using Pixel Difference and Saturation Awareness," Journal of KIISE, vol. 41, no. 10, pp. 847-858, Oct. 2014.   DOI