An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem

Article Preview

Abstract:

A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by dividing the plain-image into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits. The permutation operations are done row-by-row and column-by-column to increase the speed. The chaotic generalized Arnold map is utilized to generate chaotic sequence, which is quantized to shuffle the expanded image. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plain-image sensitivity. To achieve more avalanche effect and larger key space, Chinese Remainder Theorem is applied to diffuse the shuffled image. The key sensitivity and key space of the proposed image encryption have been analyzed as well. The experimental results suggest that the proposed image encryption scheme can be used for secure image and video communication applications.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 1049-1050)

Pages:

1371-1374

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] B. Schiener. Applied Cryptography: Protocols, Algorithms and Source Code in C. John Wiley and sons, New York, (1996).

Google Scholar

[2] J. Fridrich. Symmetric ciphers based on two-dimensional chaotic maps, International Journal of Bifurcation and Chaos, 8(1998), 1259–1284.

DOI: 10.1142/s021812749800098x

Google Scholar

[3] L. Kocarev. Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine, 1(2001), 6–21.

DOI: 10.1109/7384.963463

Google Scholar

[4] R. Ye. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism, Optics Communications, 284(2011), 5290–5298.

DOI: 10.1016/j.optcom.2011.07.070

Google Scholar

[5] N. Masuda and K. Aihara. Cryptosystems with discretized chaotic maps, IEEE Trans. Circuits Syst. I, 49(2002), 28–40.

DOI: 10.1109/81.974872

Google Scholar

[6] V. Patidar, N. K. Pareek and K. K. Sud. A new substitution–diffusion based image cipher using chaotic standard and logistic maps, Commun. Nonlinear Sci. Numer. Simulat., 14 (2009), 3056–3075.

DOI: 10.1016/j.cnsns.2008.11.005

Google Scholar

[7] C. Asmuth and J. Bloom. A modular approach to key safeguarding, IEEE Transactions on information theory, Vol. IT-29(1983), 208-210.

DOI: 10.1109/tit.1983.1056651

Google Scholar

[8] M. Mignotte. How to share a secret, in: T. Beth, editor, Lecture Notes in Computer Science, Vol. 149, pp.371-375.

DOI: 10.1007/3-540-39466-4_27

Google Scholar