Javascript must be enabled to continue!
A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
View through CrossRef
Abstract
To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper. This algorithm consists of three stages: adaptive key generation, double scrambling and random diffusion. Firstly, in order to make the key highly correlated with the plaintext image, we use the SHA-256 value of the plaintext image to generate the key. Then, the double permutation is mainly composed of pixel-level permutation and bit-level permutation. The pixel-level permutation uses chaotic sequences generated by the chaotic system to generate the permutation sequences and uses these two sequences to rearrange the row and column coordinates of the image. Secondly, we implement bit-level permutation using the Fisher-Yates Shuffle algorithm as a group of every four neighboring pixels. The double permutation breaks the high correlation between image pixels. Thirdly, in the diffusion stage, we propose a random diffusion algorithm to address the problem that the diffusion order and direction of current diffusion methods are fixed and not random. The permuted image is divided into four blocks, and the order and direction of the diffusion operation for each pixel in each block is determined according to the chaotic sequence from the chaotic system. Finally, experimental results and security analysis show that the algorithm has good performance and sufficient security. It can resist a variety of attacks, such as statistical attacks, brute force attacks, and plaintext/selective plaintext attacks.
Title: A Novel Image Encryption Algorithm Based on Double Permutation and Random Diffusion
Description:
Abstract
To improve the image transmission security, an image encryption algorithm based on double permutation with random diffusion is proposed in this paper.
This algorithm consists of three stages: adaptive key generation, double scrambling and random diffusion.
Firstly, in order to make the key highly correlated with the plaintext image, we use the SHA-256 value of the plaintext image to generate the key.
Then, the double permutation is mainly composed of pixel-level permutation and bit-level permutation.
The pixel-level permutation uses chaotic sequences generated by the chaotic system to generate the permutation sequences and uses these two sequences to rearrange the row and column coordinates of the image.
Secondly, we implement bit-level permutation using the Fisher-Yates Shuffle algorithm as a group of every four neighboring pixels.
The double permutation breaks the high correlation between image pixels.
Thirdly, in the diffusion stage, we propose a random diffusion algorithm to address the problem that the diffusion order and direction of current diffusion methods are fixed and not random.
The permuted image is divided into four blocks, and the order and direction of the diffusion operation for each pixel in each block is determined according to the chaotic sequence from the chaotic system.
Finally, experimental results and security analysis show that the algorithm has good performance and sufficient security.
It can resist a variety of attacks, such as statistical attacks, brute force attacks, and plaintext/selective plaintext attacks.
Related Results
Image encryption based on permutation polynomials over finite fields
Image encryption based on permutation polynomials over finite fields
In this paper, we propose an image encryption algorithm based on a permutation polynomial over finite fields proposed by the authors. The proposed image encryption process consists...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...
A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption
A Multilayer Nonlinear Permutation Framework and Its Demonstration in Lightweight Image Encryption
As information systems become more widespread, data security becomes increasingly important. While traditional encryption methods provide effective protection against unauthorized ...
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
An Image Encryption Scheme Based on Generalized Arnold Map and Chinese Remainder Theorem
A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract
This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...

