Abstract
Security of personal information is affirmation of the right to privacy. With increasing data requirements of consumers and the bulk of archival information thereby created needs storage space and here cloud storage comes to the rescue, which however is prone to cyber attacks and needs better data security protocols as time changes. In this paper, we propose a novel symmetric-key image encryption scheme by shuffling the pixels which renders the information unintelligible. We show how our technique provides an additional layer of security on top of the regular encryption techniques. We analyze our algorithm by performing statistical and difference attack tests. We also discuss the brute force attack and its viability. The results validate effectiveness of our encryption scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Tarran, B.: What can we learn from the Facebook Cambridge analytica scandal? Significance 15(3), 4–5 (2018)
Marwick, A.E.: Scandal or sex crime? Ethical implications of the celebrity nude photo leaks. AoIR Selected Papers of Internet Research 6 (2017)
Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24654-1_13
Ding, W.: Digital image scrambling technology based on Arnold transformation. J. Comput. Aided Des. Comput. Graph. 13(4), 338–341 (2001)
Ravankar, A.A., Sedukhin, S.G.: Image scrambling based on a new linear transform. In: International Conference on Multimedia Technology (ICMT), 26 July 2011, pp. 3105–3108. IEEE (2011)
Sarma, K.S., Lavanya, B.: Digital image scrambling based on sequence generation. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), 20 April 2017, pp. 1–5. IEEE (2017)
Saraswathi, P.V., Venkatesulu, M.: A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: International Conference on Trends in Electronics and Informatics (ICEI), 11 May 2017, pp. 425–429. IEEE (2017)
Wu, W.C., Yang, S.C.: Enhancing image security and privacy in cloud system using steganography. In: IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 12 June 2017, pp. 321–322. IEEE (2017)
Preishuber, M., Htter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. (2018)
Xing, Y., Li, M., Wang, L.: Chaotic-map image encryption scheme based on AES key producing schedule. In: IEEE Third International Conference on Data Science in Cyberspace (DSC), 18 June 2018. IEEE (2018)
Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process. Mag. IEEE 26(1), 98–117 (2009)
Zhou, W., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image qualifty assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)
Zhang, Y., Li, X.: A fast image encryption scheme based on integer wavelet and hyper-chaotic system. In: International Conference on Artificial Intelligence and Big Data (ICAIBD), 26 May 2018. IEEE (2018)
Lang, J.: Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt. Commun. 1(338), 181–192 (2015)
Kang, X., Han, Z., Yu, A., Duan, P.: Double random scrambling encoding in the RPMPFrHT domain. In: IEEE International Conference on Image Processing (ICIP), 17 September 2017, pp. 4362–4366. IEEE (2017)
Kang, X., Ming, A., Tao, R.: Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans. Circuits Syst. Video Technol. (2018)
Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 366(4–5), 391–396 (2007)
Bluman, A.G.: Elementary Statistics. McGraw Hill, Chennai (2013)
Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563–571 (2013)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
Rahman, A.U.: Pyxel, Github (2018). https://github.com/Aniq55/pyxel
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rahman, A.U., Bhattacharyya, M. (2019). Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_38
Download citation
DOI: https://doi.org/10.1007/978-981-13-5826-5_38
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-5825-8
Online ISBN: 978-981-13-5826-5
eBook Packages: Computer ScienceComputer Science (R0)