Skip to main content
Erschienen in: Telecommunication Systems 1/2017

25.08.2016

Fusion of confusion and diffusion: a novel image encryption approach

verfasst von: Padmapriya Praveenkumar, Rengarajan Amirtharajan, Karuppuswamy Thenmozhi, John Bosco Balaguru Rayappan

Erschienen in: Telecommunication Systems | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, the development of confidentiality and authenticity ensured by image encryption has been one of the key advancements in the field of secured wireless communication. The proposed work focuses on providing confusion, diffusion and permutation inherently in the system. The input grayscale image is shuffled by employing the Henon algorithm and subsequently separated into 8 bit planes. With the aid of a secret key of 256 bits, chaotic sequences are generated for each bit plane. Later, the logistic map is adapted on the chaotic sequences to obtain the scrambled image. Furthermore, this image is shuffled with Zaslavskii and Hilbert Space Filling Curve algorithms, which establishes the confusion stage. To incorporate the diffusion stage, a self-invertible matrix is generated by a latin square image cipher and a secret key. This matrix and the scrambled image underwent the Hill cipher to build the encrypted image followed by a row-column transformation to ensure multifold security. The proposed compound activities of encryption are successfully implemented on the laboratory virtual instrumentation engineering workbench 2013 platform. Noticeably, the established processes of image encryption are tested in the universal software radio peripheral environment and transceived via an additive white Gaussian noise (AWGN) channel. More specifically, the influence of natural and unnatural (cropping attack) noise on the characteristics of the encrypted image while sharing through AWGN channel has been investigated. Security analysis is performed by computing the unified average changing intensity, number of pixels change rate, correlation value, large key space to defy brute force attack, strong key sensitivity and uniform gray value distribution on encryption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
5.
Zurück zum Zitat Zhang, L. Y., Li, C., Wongd, K.-W., Shua, S., & Chend, G. (2012). Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. The Journal of Systems and Software, 85(9), 2077–2085. doi:10.1016/j.jss.2012.04.002.CrossRef Zhang, L. Y., Li, C., Wongd, K.-W., Shua, S., & Chend, G. (2012). Cryptanalyzing a chaos-based image encryption algorithm using alternate structure. The Journal of Systems and Software, 85(9), 2077–2085. doi:10.​1016/​j.​jss.​2012.​04.​002.CrossRef
8.
13.
Zurück zum Zitat Chen, W., & Zhang, X. (2009). Image encryption algorithm based on Henon chaotic system. In Proceedings of international conference on image analysis and signal processing, pp. 94-97. doi:10.1109/IASP.2009.5054653 Chen, W., & Zhang, X. (2009). Image encryption algorithm based on Henon chaotic system. In Proceedings of international conference on image analysis and signal processing, pp. 94-97. doi:10.​1109/​IASP.​2009.​5054653
14.
Zurück zum Zitat Gilani, S. A. N., & Bangash, M. A. (2008). Enhanced block based colour image encryption technique with confusion. In Proceedings of 12th IEEE international multitopic conference, pp. 200–206. doi:10.1109/INMIC.2008.4777736 Gilani, S. A. N., & Bangash, M. A. (2008). Enhanced block based colour image encryption technique with confusion. In Proceedings of 12th IEEE international multitopic conference, pp. 200–206. doi:10.​1109/​INMIC.​2008.​4777736
18.
Zurück zum Zitat Panduranga, H. T., & Kumar, S. K. N. (2014). Image encryption based on permutation substitution using chaotic map and latin square image cipher. The European Physical Journal Special Topics, 223(8), 1663–1677. doi:10.1140/epjst/e2014-02119-9.CrossRef Panduranga, H. T., & Kumar, S. K. N. (2014). Image encryption based on permutation substitution using chaotic map and latin square image cipher. The European Physical Journal Special Topics, 223(8), 1663–1677. doi:10.​1140/​epjst/​e2014-02119-9.CrossRef
19.
Zurück zum Zitat Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., & Mosavi, M. R. (2013). A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimedia Tools and Applications, 1–31, doi:10.1007/s11042-013-1699-y. Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., & Mosavi, M. R. (2013). A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimedia Tools and Applications, 1–31, doi:10.​1007/​s11042-013-1699-y.
20.
Zurück zum Zitat Khanzadi, H., Eshghi, M., & Etemadi Borujeni, S. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineerin, 39(2), 1039–1047. doi:10.1007/s13369-013-0713-z.CrossRef Khanzadi, H., Eshghi, M., & Etemadi Borujeni, S. (2014). Image encryption using random bit sequence based on chaotic maps. Arabian Journal for Science and Engineerin, 39(2), 1039–1047. doi:10.​1007/​s13369-013-0713-z.CrossRef
21.
Zurück zum Zitat Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals, 40(5), 2557–2568.CrossRef Kanso, A., & Smaoui, N. (2009). Logistic chaotic maps for binary numbers generations. Chaos, Solitons & Fractals, 40(5), 2557–2568.CrossRef
22.
Zurück zum Zitat Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276. Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Medical data sheet in safe havens—A tri-layer cryptic solution. Computers in Biology and Medicine, 62, 264–276.
23.
Zurück zum Zitat Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach(2015). AEU - International Journal of Electronics and Communications, 69(2), 562–572.CrossRef Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan, J. B. B. (2015). Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach(2015). AEU - International Journal of Electronics and Communications, 69(2), 562–572.CrossRef
24.
Zurück zum Zitat Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan,J. B. B. (2015). Triple chaotic image scrambling on RGB—A random imageencryption approach. Security and Communication Networks (in press). Praveenkumar, P., Amirtharajan, R., Thenmozhi, K., & Rayappan,J. B. B. (2015). Triple chaotic image scrambling on RGB—A random imageencryption approach. Security and Communication Networks (in press).
Metadaten
Titel
Fusion of confusion and diffusion: a novel image encryption approach
verfasst von
Padmapriya Praveenkumar
Rengarajan Amirtharajan
Karuppuswamy Thenmozhi
John Bosco Balaguru Rayappan
Publikationsdatum
25.08.2016
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2017
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-016-0212-0

Weitere Artikel der Ausgabe 1/2017

Telecommunication Systems 1/2017 Zur Ausgabe

Neuer Inhalt