Advertisement

A Novel Image Encryption Scheme Based on Hidden Random Disturbance and Feistel RPMPFrHT Network

  • Guozhen Hu
  • Xuejing Kang
  • Zihui Guo
  • Xuanshu Luo
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 875)

Abstract

In this paper, we propose a novel image encryption scheme based on hidden random disturbance and Feistel RPMPFrHT network, which can improve some common defects of the transform-based methods. At first, we hide some distractive information into the plain image without enlarging the size of the image, which can greatly improve the ability to resist chosen plaintext attack. Then we put the image into Feistel RPMPFrHT network to transform it into two different fractional domain and we will obtain the merits of robustness to noise and data loss. At last we homogenize the numerical distribution and rearrange the pixels by plain-image-dependent chaotic sequences to hide the special statistical characteristics of the image, which can increase the plaintext sensitivity. Simulation results have proved that our proposed encryption scheme shows good performance on most general tests and it makes a great improvement compared with existing image encryption schemes in transform domain.

Keywords

Image encryption Random disturbance Feistel network Fractional Hartley transform 

Notes

Acknowledgement

This work was supported in part by National Natural Science Foundation of China (61701036), Fundamental Research Funds for the Central Universities (2017RC52).

References

  1. 1.
    Lang, J.: Image encryption based on the reality-preserving multiple-parameter fractional fourier transform and chaos permutation. Opt. Lasers Eng. 50(7), 929–937 (2012)CrossRefGoogle Scholar
  2. 2.
    Chang, H.T., Hwang, H.E., Lee, C.L., Lee, M.T.: Wavelength multiplexing multiple-image encryption using cascaded phase-only masks in the fresnel transform domain. Opt. Commun. 50(5), 710 (2011)CrossRefGoogle Scholar
  3. 3.
    Singh, N., Sinha, A.: Gyrator transform-based optical image encryption, using chaos. Opt. Lasers Eng. 47(5), 539–546 (2009)CrossRefGoogle Scholar
  4. 4.
    Zhou, N., Wang, Y., Gong, L., Chen, X., Yang, Y.: Novel color image encryption algorithm based on the reality preserving fractional mellin transform. Opt. Laser Technol. 44(7), 2270–2281 (2012)CrossRefGoogle Scholar
  5. 5.
    Jimenez, C., Torres, C., Mattos, L.: Fractional Hartley transform applied to optical image encryption, p. 012041 (2011)Google Scholar
  6. 6.
    Schneier, B., Kelsey, J.: Unbalanced Feistel networks and block cipher design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121–144. Springer, Heidelberg (1996).  https://doi.org/10.1007/3-540-60865-6_49CrossRefGoogle Scholar
  7. 7.
    Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66(66), 10–18 (2015)CrossRefGoogle Scholar
  8. 8.
    Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)CrossRefGoogle Scholar
  9. 9.
    Abid, S., Hasan, H.: About asymmetric noisy chaotic maps. Int. J. Basic Appl. Sci. 3(2), 62 (2014)Google Scholar
  10. 10.
    Wu, Y.: NPCR and UACI randomness tests for image encryption. Cyber J.: Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1(2), 31–38 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Guozhen Hu
    • 1
  • Xuejing Kang
    • 2
  • Zihui Guo
    • 1
    • 2
  • Xuanshu Luo
    • 1
    • 2
  1. 1.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Institute of Sensing Technology and BusinessBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations