LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

An efficient symmetric image encryption algorithm based on an intertwining logistic map

Photo from wikipedia

A new structure of pre-modular, permutation, and diffusion (PPD) cipher for image encryption is proposed.Solve the low sensitivity of the plain-image when meeting invariance of pixel summation.Self-adaptive encryption scheme is… Click to show full abstract

A new structure of pre-modular, permutation, and diffusion (PPD) cipher for image encryption is proposed.Solve the low sensitivity of the plain-image when meeting invariance of pixel summation.Self-adaptive encryption scheme is implemented, and no extra transmission is needed.The keystreams used for encryption are designed dependent on the plain-image. Differing from the traditional permutationdiffusion architecture, an efficient symmetric image encryption algorithm is designed in this paper. To resolve the issue of low sensitivity of a plain-image, which is measured by a unified averaged changing intensity and the number of changing pixel rate, pre-modular operation is proposed to be used for pre-processing a classical encryption algorithm. Because of the invariance of pixel summation in the plain-image before and after pixel positions exchange, the keystream used for the permutation operation is designed to be dependent on the plain-image. Since for most encryption algorithms it is hard to implement the diffusion operation in relation with the plain-image dependence, a self-adaptive encryption scheme is proposed as a remedy. Consequently, the keystream for diffusion becomes dependent on the plain-image, which still satisfies the requirement as a symmetric cipher. To that end, by taking full advantage of the chaotic intertwining logistic map and its unpredictability, a new cipher with pre-modular, permutation and diffusion is designed for image encryption, which is then simulated and tested. Numerical experiments and security analysis demonstrate that the new cipher is secure enough for image communication over the open network.

Keywords: plain image; image encryption; image; encryption algorithm; encryption

Journal Title: Neurocomputing
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.