OSA's Digital Library

Optics Express

Optics Express

  • Editor: Andrew M. Weiner
  • Vol. 21, Iss. 23 — Nov. 18, 2013
  • pp: 27873–27890

An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism

Jun-xin Chen, Zhi-liang Zhu, Chong Fu, and Hai Yu  »View Author Affiliations


Optics Express, Vol. 21, Issue 23, pp. 27873-27890 (2013)
http://dx.doi.org/10.1364/OE.21.027873


View Full Text Article

Enhanced HTML    Acrobat PDF (11222 KB)





Browse Journals / Lookup Meetings

Browse by Journal and Year


   


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

Share
Citations

Abstract

During the past decades, chaos-based permutation-diffusion type image cipher has been widely investigated to meet the increasing demand for real-time secure image transmission over public networks. However, the existing researches almost exclusively focus on the improvements of the permutation and diffusion methods independently, without consideration of cooperation between the two processes. In this paper, an improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism is proposed. In the permutation stage, pixels in the plain image are shuffled with a pixel-swapping mechanism, and the pseudorandom locations are generated by chaotic logistic map iteration. Furthermore, a plain pixel related chaotic orbit perturbing mechanism is introduced. As a result, a tiny change in plain image will be spread out during the confusion process, and hence an effective diffusion effect is introduced. By using a reverse direction diffusion method, the introduced diffusion effect will be further diffused to the whole cipher image within one overall encryption round. Simulation results and extensive cryptanalysis justify that the proposed scheme has a satisfactory security with a low computational complexity, which renders it a good candidate for real-time secure image storage and distribution applications.

© 2013 Optical Society of America

OCIS Codes
(100.2000) Image processing : Digital image processing
(100.2960) Image processing : Image analysis
(110.1758) Imaging systems : Computational imaging

ToC Category:
Image Processing

History
Original Manuscript: September 16, 2013
Revised Manuscript: October 25, 2013
Manuscript Accepted: October 30, 2013
Published: November 6, 2013

Citation
Jun-xin Chen, Zhi-liang Zhu, Chong Fu, and Hai Yu, "An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism," Opt. Express 21, 27873-27890 (2013)
http://www.opticsinfobase.org/oe/abstract.cfm?URI=oe-21-23-27873


Sort:  Author  |  Year  |  Journal  |  Reset  

References

  1. S. Li, G. Chen, and X. Zheng, “Chaos-based encryption for digital images and videos,” in Multimedia Security Handbook (CRC Press, 2005), Chap. 4.
  2. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” Int. J. Bifurcat. Chaos8(6), 1259–1284 (1998). [CrossRef]
  3. S. G. Lian, J. S. Sun, and Z. Q. Wang, “A block cipher based on a suitable use of chaotic standard map,” Chaos Solitons Fractals26(1), 117–129 (2005). [CrossRef]
  4. K. W. Wong, B. S. H. Kwok, and W. S. Law, “A fast image encryption scheme based on chaotic standard map,” Phys. Lett. A372(15), 2645–2652 (2008). [CrossRef]
  5. T. Xiang, K. W. Wong, and X. F. Liao, “Selective image encryption using a spatiotemporal chaotic system,” Chaos17(2), 023115 (2007). [CrossRef] [PubMed]
  6. Y. Wang, K. W. Wong, X. F. Liao, T. Xiang, and G. R. Chen, “A chaos-based image encryption algorithm with variable control parameters,” Chaos Solitons Fractals41(4), 1773–1783 (2009). [CrossRef]
  7. K. W. Wong, B. S. H. Kwok, and C. H. Yuen, “An efficient diffusion approach for chaos-based image encryption,” Chaos Solitons Fractals41(5), 2652–2663 (2009). [CrossRef]
  8. C. Fu, J. J. Chen, H. Zou, W. H. Meng, Y. F. Zhan, and Y. W. Yu, “A chaos-based digital image encryption scheme with an improved diffusion strategy,” Opt. Express20(3), 2363–2378 (2012). [CrossRef] [PubMed]
  9. Y. B. Mao, G. R. Chen, and S. G. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” Int. J. Bifurcat. Chaos14(10), 3613–3624 (2004). [CrossRef]
  10. G. R. Chen, Y. B. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solitons Fractals21(3), 749–761 (2004). [CrossRef]
  11. F. Y. Sun, S. T. Liu, and Z. W. Lu, “Image encryption using high-dimension chaotic system,” Chin. Phys.16(12), 3616–3623 (2007). [CrossRef]
  12. C. X. Zhu, “A novel image encryption scheme based on improved hyper chaotic sequences,” Opt. Commun.285(1), 29–37 (2012). [CrossRef]
  13. T. G. Gao and Z. Q. Chen, “A new image encryption algorithm based on hyper-chaos,” Phys. Lett. A372(4), 394–400 (2008). [CrossRef]
  14. S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos Solitons Fractals35(2), 408–419 (2008). [CrossRef]
  15. A. N. Pisarchik and M. Zanin, “Image encryption with chaotically coupled chaotic maps,” Physica D237(20), 2638–2648 (2008). [CrossRef]
  16. C. K. Huang and H. H. Nien, “Multi chaotic systems based pixel shuffle for image encryption,” Opt. Commun.282(11), 2123–2127 (2009). [CrossRef]
  17. S. Mazloom and A. M. Eftekhari-Moghadam, “Color image encryption based on Coupled Nonlinear Chaotic Map,” Chaos Solitons Fractals42(3), 1745–1754 (2009). [CrossRef]
  18. R. Rhouma, S. Meherzi, and S. Belghith, “OCML-based colour image encryption,” Chaos Solitons Fractals40(1), 309–318 (2009). [CrossRef]
  19. F. Y. Sun, S. T. Liu, Z. Q. Li, and Z. W. Lu, “A novel image encryption scheme based on spatial chaos map,” Chaos Solitons Fractals38(3), 631–640 (2008). [CrossRef]
  20. S. T. Liu and F. Y. Sun, “Spatial chaos-based image encryption design,” Sci. China, Ser. G52(2), 177–183 (2009). [CrossRef]
  21. X. J. Tong, “The novel bilateral - diffusion image encryption algorithm with dynamical compound chaos,” J. Syst. Software85(4), 850–858 (2012). [CrossRef]
  22. C. Fu, B. B. Lin, Y. S. Miao, X. Liu, and J. J. Chen, “A novel chaos-based bit-level permutation scheme for digital image encryption,” Opt. Commun.284(23), 5415–5423 (2011). [CrossRef]
  23. Z. L. Zhu, W. Zhang, K. W. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Inf. Sci.181(6), 1171–1186 (2011). [CrossRef]
  24. W. Zhang, K. W. Wong, H. Yu, and Z. L. Zhu, “An image encryption scheme using lightweight bit-level confusion and cascade cross circular diffusion,” Opt. Commun.285(9), 2343–2354 (2012). [CrossRef]
  25. Y. Wang, K. W. Wong, X. F. Liao, T. Xiang, and G. R. Chen, “A chaos-based image encryption algorithm with variable control parameters,” Chaos Solitons Fractals41(4), 1773–1783 (2009). [CrossRef]
  26. Y. Wang, X. F. Liao, T. Xiang, K.-W. Wong, and D. Yang, “Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map,” Phys. Lett. A363(4), 277–281 (2007). [CrossRef]
  27. J. Wei, X. F. Liao, K. W. Wong, and T. Zhou, “Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps,” Commun. Nonlinear Sci. Numer. Simul.12(5), 814–822 (2007). [CrossRef]
  28. IEEE Computer Society, “IEEE standard for binary floating-point arithmetic,” ANSI/IEEE std. 754–1985 (1985).
  29. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” Int. J. Bifurcat. Chaos16(8), 2129–2151 (2006). [CrossRef]
  30. A statistical test suite for random and pseudorandom number generators for cryptographic applications, Special Publication 800–22 Rev 1a, 2010, http://www.nist.gov .
  31. C. E. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J.28(4), 656–715 (1949). [CrossRef]

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited