An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion

Full Text (PDF, 872KB), PP.82-92

Views: 0 Downloads: 0

Author(s)

Ruisong Ye 1,* Shaojun Zeng 1 Peiqian Lun 1 Junming Ma 1 Chuting Lai 1

1. Department of Mathematics, Shantou University, Shantou, Guangdong, 515063, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2014.01.10

Received: 2 Apr. 2013 / Revised: 20 Jul. 2013 / Accepted: 13 Sep. 2013 / Published: 8 Dec. 2013

Index Terms

Chaotic System, Bit Circular Shift, Diffusion, Image Encryption

Abstract

A novel image encryption scheme based on chaotic system is proposed. The proposed encryption scheme utilizes one tent map to generate a pseudo-random sequence and then shift the bits of the expanding 0-1 image circularly so as to shuffle the image gray values. To make the encryption scheme resist differential attack efficiently, generalized Arnold maps and Bernoulli shift maps are applied to produce two pseudo-random gray value sequences and then diffuse the gray values bi-directionally. The bit circular shift process and diffusion processes greatly confuse the statistical nature between plain-images and cipher-images. Security analyses including key sensitivity analysis, key space analysis, statistical analysis, differential attack analysis and information entropy analysis are performed. All the experimental results demonstrate that the proposed image encryption scheme possesses large key space to frustrate brute-force attack efficiently and can resist statistical attack, differential attack, etc.

Cite This Paper

Ruisong Ye, Shaojun Zeng, Peiqian Lun, Junming Ma, Chuting Lai, "An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion", International Journal of Information Technology and Computer Science(IJITCS), vol.6, no.1, pp.82-92, 2014. DOI:10.5815/ijitcs.2014.01.10

Reference

[1]B. Schneier. Cryptography: Theory and Practice. Boca Raton: CRC Press, 1995.

[2]J. Fridrich. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(1998), 1259--1284.

[3]G. R. Chen, Y. B. Mao, C. K. Chui. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21(2004), 749--761.

[4]Y.B. Mao, G. Chen, S. G. Lian. A novel fast image encryption scheme based on the 3D chaotic Baker map. International Journal of Bifurcation and Chaos, 14(2004), 613--3624.

[5]Z.-H. Guan, F. Huang, W. Guan, Chaos-based image encryption algorithm, Physics Letters A, 346 (2005), 153--157. 

[6]S. Lian, J. Sun, Z. Wang, A block cipher based on a suitable use of the chaotic standard map, Chaos, Solitons and Fractals, 26 (2005), 117--129. 

[7]V. Patidar, N. K. Pareek, K. K. Sud, A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 14 (2009) 3056--3075. 

[8]R. Ye, H. Huang, Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking, I. J. Image, Graphics and Signal Processing, 1(2010), 19--29.

[9]X. Wang, X. Wang, J. Zhao, Z. Zhang, Chaotic encryption algorithm based on alternant of stream cipher and block cipher, Nonlinear Dynamics, 63(2011), 587--597. 

[10]R. Ye. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt. Commun., 284(2011), 5290--5298.

[11] G. Chen, W. A. Halang. Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image and Vision Computing, 27(2009), 1035--1039.

[12]D. Xiao, X. Liao, P. Wei. Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons and Fractals, 2009, 40: 2191--2199.

[13]X. Wang, G. He. Cryptanalysis on a novel image encryption method based on total shuffling scheme. Opt. Commun.,284( 2011), 5804--5807

[14]G. J. Zhang, Q. Liu. A novel image encryption method based on total shuffling scheme. Opt. Commun., 284(2011), 2775--2780.

[15]Z.-L. Zhu, W. Zhang, K.-W. Wong, H. Yu, A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences, 181(2011), 1171--1186.

[16]L. Teng, X. Wang, A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive, Opt. Commun., 285(2012), 4048--4054.

[17]M. Hasler and Y. L. Maistrenko, An introduction to the synchronization of chaotic systems: Coupled skew tent map, IEEE Transactions on Circuits and Systems, 44(1997), 856--866.

[18]C. E. Shannon. Communication theory of secrecy system. Bell Syst. Tech. J, 28(1949), 656--715.