Skip to main content

Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling

  • Conference paper
  • First Online:
Security in Computing and Communications (SSCC 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 969))

Included in the following conference series:

  • 1404 Accesses

Abstract

Security of personal information is affirmation of the right to privacy. With increasing data requirements of consumers and the bulk of archival information thereby created needs storage space and here cloud storage comes to the rescue, which however is prone to cyber attacks and needs better data security protocols as time changes. In this paper, we propose a novel symmetric-key image encryption scheme by shuffling the pixels which renders the information unintelligible. We show how our technique provides an additional layer of security on top of the regular encryption techniques. We analyze our algorithm by performing statistical and difference attack tests. We also discuss the brute force attack and its viability. The results validate effectiveness of our encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Tarran, B.: What can we learn from the Facebook Cambridge analytica scandal? Significance 15(3), 4–5 (2018)

    Article  Google Scholar 

  2. Marwick, A.E.: Scandal or sex crime? Ethical implications of the celebrity nude photo leaks. AoIR Selected Papers of Internet Research 6 (2017)

    Google Scholar 

  3. Gilbert, H., Handschuh, H.: Security analysis of SHA-256 and sisters. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 175–193. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24654-1_13

    Chapter  Google Scholar 

  4. Ding, W.: Digital image scrambling technology based on Arnold transformation. J. Comput. Aided Des. Comput. Graph. 13(4), 338–341 (2001)

    Google Scholar 

  5. Ravankar, A.A., Sedukhin, S.G.: Image scrambling based on a new linear transform. In: International Conference on Multimedia Technology (ICMT), 26 July 2011, pp. 3105–3108. IEEE (2011)

    Google Scholar 

  6. Sarma, K.S., Lavanya, B.: Digital image scrambling based on sequence generation. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), 20 April 2017, pp. 1–5. IEEE (2017)

    Google Scholar 

  7. Saraswathi, P.V., Venkatesulu, M.: A novel stream cipher using pesudo random binary sequence generator for medical image encryption. In: International Conference on Trends in Electronics and Informatics (ICEI), 11 May 2017, pp. 425–429. IEEE (2017)

    Google Scholar 

  8. Wu, W.C., Yang, S.C.: Enhancing image security and privacy in cloud system using steganography. In: IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 12 June 2017, pp. 321–322. IEEE (2017)

    Google Scholar 

  9. Preishuber, M., Htter, T., Katzenbeisser, S., Uhl, A.: Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans. Inf. Forensics Secur. (2018)

    Google Scholar 

  10. Xing, Y., Li, M., Wang, L.: Chaotic-map image encryption scheme based on AES key producing schedule. In: IEEE Third International Conference on Data Science in Cyberspace (DSC), 18 June 2018. IEEE (2018)

    Google Scholar 

  11. Wang, Z., Bovik, A.C.: Mean squared error: love it or leave it? A new look at signal fidelity measures. Signal Process. Mag. IEEE 26(1), 98–117 (2009)

    Article  Google Scholar 

  12. Zhou, W., Bovik, A.C., Sheikh, H.R., Simoncelli, E.P.: Image qualifty assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13(4), 600–612 (2004)

    Article  Google Scholar 

  13. Zhang, Y., Li, X.: A fast image encryption scheme based on integer wavelet and hyper-chaotic system. In: International Conference on Artificial Intelligence and Big Data (ICAIBD), 26 May 2018. IEEE (2018)

    Google Scholar 

  14. Lang, J.: Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt. Commun. 1(338), 181–192 (2015)

    Article  Google Scholar 

  15. Kang, X., Han, Z., Yu, A., Duan, P.: Double random scrambling encoding in the RPMPFrHT domain. In: IEEE International Conference on Image Processing (ICIP), 17 September 2017, pp. 4362–4366. IEEE (2017)

    Google Scholar 

  16. Kang, X., Ming, A., Tao, R.: Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans. Circuits Syst. Video Technol. (2018)

    Google Scholar 

  17. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A.: A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A 366(4–5), 391–396 (2007)

    Article  Google Scholar 

  18. Bluman, A.G.: Elementary Statistics. McGraw Hill, Chennai (2013)

    Google Scholar 

  19. Huang, C.K., Liao, C.W., Hsu, S.L., Jeng, Y.C.: Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun. Syst. 52(2), 563–571 (2013)

    Google Scholar 

  20. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  Google Scholar 

  21. Rahman, A.U.: Pyxel, Github (2018). https://github.com/Aniq55/pyxel

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Aniq Ur Rahman or Mayukh Bhattacharyya .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rahman, A.U., Bhattacharyya, M. (2019). Hiding in Plain Sight - Symmetric Key Chaotic Image Encryption by Sequential Pixel Shuffling. In: Thampi, S., Madria, S., Wang, G., Rawat, D., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2018. Communications in Computer and Information Science, vol 969. Springer, Singapore. https://doi.org/10.1007/978-981-13-5826-5_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-5826-5_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-5825-8

  • Online ISBN: 978-981-13-5826-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics