Chaotic image encryption algorithm using wave-line permutation and block diffusion
- 487 Downloads
An efficient and secure image encryption algorithm is proposed in this manuscript using SHA-3 hash function together with double two-dimensional Arnold chaotic maps. Classical encryption architecture, i.e., permutation plus diffusion, is employed in our scheme. To avoid time consumption of sorting operation for pixel position index in permutation stage, a novel wave-line-based confusion is suggested with four random directions of shuffling. The keystream generated by Arnold map is used for vertical and horizontal circular confusions, respectively, in which the initial conditions are updated by the SHA-3 hash values of chaotic matrix and a new vector produced from the plain-image. As a result, the proposed scheme can resist the known-plaintext attack compared with some existing encryption methods. Furthermore, in diffusion stage, a blocking method is designed with the outputs of hash values in the former block permuted image which are used to update again the initial conditions for Arnold map. The current block will influence the next block during the iterations, of which can resist well the chosen-plaintext attack. Numerical results show that the proposed encryption algorithm can have higher security and faster implementation for digital image communication.
KeywordsImage encryption SHA-3 Arnold map Wave-line Block
The authors would like to thank the three anonymous reviewers for valuable comments which are very useful in improving the quality of this manuscript. The work described in this paper was fully supported by the National Natural Science Foundation of China (No. 11301091), the Natural Science Foundation of Guangdong Province of China (No. 2015A030313614), the Project of Enhancing School With Innovation of Guangdong Ocean University of China (No. Q14217), and the Science & Technology Planning Project of Zhanjiang City of China (Nos. 2015B01051, 2015B01098).
- 18.Farajallah, M., Fawaz, Z., El Assad, S., Déforges, O.: Efficient image encryption and authentication scheme based on chaotic sequences. In: The 7th International Conference on Emerging Security Information, Systems and Technologies, pp.150–155 (2013)Google Scholar
- 21.Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: The Keccak sponge function family. http://keccak.noekeon.org