Javascript must be enabled to continue!
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
View through CrossRef
Abstract
To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper. This algorithm consists of three stages: adaptive key generation, double scrambling and random diffusion. Firstly, in order to make the key highly correlated with the plaintext image, we use the SHA-256 value of the plaintext image to generate the key. Then, the double permutation is mainly composed of pixel-level permutation and bit-level permutation. The pixel-level permutation uses chaotic sequences generated by the chaotic system to generate the permutation sequences and uses these two sequences to rearrange the row and column coordinates of the image. Secondly, we implement bit-level permutation using the Fisher-Yates Shuffle algorithm as a group of every four neighboring pixels. The double permutation breaks the high correlation between image pixels. Thirdly, in the diffusion stage, we propose a random diffusion algorithm to address the problem that the diffusion order and direction of current diffusion methods are fixed and not random. The permuted image is divided into four blocks, and the order and direction of the diffusion operation for each pixel in each block is determined according to the chaotic sequence from the chaotic system. Finally, experimental results and security analysis show that the algorithm has good performance and sufficient security. It can resist a variety of attacks, such as statistical attacks, brute force attacks, and plaintext/selective plaintext attacks.
Title: A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
Description:
Abstract
To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper.
This algorithm consists of three stages: adaptive key generation, double scrambling and random diffusion.
Firstly, in order to make the key highly correlated with the plaintext image, we use the SHA-256 value of the plaintext image to generate the key.
Then, the double permutation is mainly composed of pixel-level permutation and bit-level permutation.
The pixel-level permutation uses chaotic sequences generated by the chaotic system to generate the permutation sequences and uses these two sequences to rearrange the row and column coordinates of the image.
Secondly, we implement bit-level permutation using the Fisher-Yates Shuffle algorithm as a group of every four neighboring pixels.
The double permutation breaks the high correlation between image pixels.
Thirdly, in the diffusion stage, we propose a random diffusion algorithm to address the problem that the diffusion order and direction of current diffusion methods are fixed and not random.
The permuted image is divided into four blocks, and the order and direction of the diffusion operation for each pixel in each block is determined according to the chaotic sequence from the chaotic system.
Finally, experimental results and security analysis show that the algorithm has good performance and sufficient security.
It can resist a variety of attacks, such as statistical attacks, brute force attacks, and plaintext/selective plaintext attacks.
Related Results
Image encryption based on permutation polynomials over finite fields
Image encryption based on permutation polynomials over finite fields
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Comment on: Macroscopic water vapor diffusion is not enhanced in snow
Comment on: Macroscopic water vapor diffusion is not enhanced in snow
Abstract. The central thesis of the authors’ paper is that macroscopic water vapor diffusion is not enhanced in snow compared to diffusion through humid air alone. Further, mass di...
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Optical Color Image Encryption Algorithm Based on Two‐Dimensional Quantum Walking (OCT)
Optical Color Image Encryption Algorithm Based on Two‐Dimensional Quantum Walking (OCT)
The Double Random Phase Encoding (DRPE) image encryption method has garnered significant attention in color image processing and optical encryption, thanks to its parallel encrypti...

