Advertisement

Image Encryption Using Permutation–Diffusion Approach

  • Rachna Tewani
  • Yash Garg
  • Jasmeet Singh BaggaEmail author
  • Akash Singh
  • Rahul Bhalsodia
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 612)

Abstract

Image encryption is a critical area of cyber security that has emerged as a topic of interest for recent researches. This paper proposes a novel method for image encryption using chaos theory. Logistic maps are used to generate a set of 24 keys that are used to encrypt the image. The complete design is simple and efficient based on permutation, diffusion and optimization. The results obtained showed increased randomness in the encrypted images which is a primary parameter for quality of cipher. We have performed analysis on the proposed approach using histogram analysis, entropy and correlation coefficient.

Keywords

Chaos theory Logistic map Permutation diffusion 

References

  1. 1.
    Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154CrossRefGoogle Scholar
  2. 2.
    Zhang Y (2015) Cryptanalysis of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 126(2):223–229CrossRefGoogle Scholar
  3. 3.
    Kumar M, Aggarwal A, Garg A (2014) A review on various digital image encryption techniques and security criteria. Int J Comput Appl (0975-8887)Google Scholar
  4. 4.
    Afarin R, Mozaffari S (2013) Image encryption using genetic algorithm. In: 8th Iranian conference on machine learning and image processing. IEEEGoogle Scholar
  5. 5.
    Tian Y, Lu Z (2017) Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation. AIP Adv 7:085008Google Scholar
  6. 6.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284MathSciNetCrossRefGoogle Scholar
  7. 7.
    Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761MathSciNetCrossRefGoogle Scholar
  8. 8.
    Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816CrossRefGoogle Scholar
  9. 9.
    Suri S, Vijay R (2019) A bi-objective genetic algorithm optimization of chaos-DNA based hybrid approach. J Intell SystGoogle Scholar
  10. 10.
    Konak A, Coit DW, Smith AE (2006) Multi-objective optimization using genetic algorithms: a tutorial. Reliab Eng Syst Saf 91(9):992–1007CrossRefGoogle Scholar
  11. 11.
    Head T, Rozenberg G, Bladergroen RS, Breek CKD, Lommerse PHM, Spaink HP (2000) Computing with DNA by operating on plasmids. Biosystems 57(2):87–93CrossRefGoogle Scholar
  12. 12.
    Al-Husainy MAF (2012) Genetic algorithm: tool to encrypt image. Int J Adv Res Comput Sci 3:36–42Google Scholar
  13. 13.
    Chen J-x, Zhu Z-l, Zhang L-b, Fu C, Yu H (2014) An efficient diffusion scheme for chaos based digital image encryption. Hindawi Publishing CorporationGoogle Scholar
  14. 14.
    Ye R (2011) An image encryption scheme with efficient permutation and diffusion processes. Advances in computer science and education application. Springer, pp 32–39Google Scholar
  15. 15.
    Gopalkrishnan T, Ramakrishnan S, Balakumar M (2014) An image encryption using chaotic permutation and diffusion. IEEEGoogle Scholar
  16. 16.
    Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on the perceptron model. Nonlinear Dyn 69(3):1091–1096MathSciNetCrossRefGoogle Scholar
  17. 17.
    Xiao H-P, Zhang G-J (2006) An image encryption scheme based on chaotic systems. In: Fifth international conference on machine learning and cybernetics, Dalian. IEEEGoogle Scholar
  18. 18.
    Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn 83(3):1123–1136MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Rachna Tewani
    • 1
  • Yash Garg
    • 1
  • Jasmeet Singh Bagga
    • 1
    Email author
  • Akash Singh
    • 1
  • Rahul Bhalsodia
    • 1
  1. 1.Department of Information TechnologyBharati Vidhyapeeth’s College of EngineeringNew DelhiIndia

Personalised recommendations