810 research outputs found
A Novel Latin Square Image Cipher
In this paper, we introduce a symmetric-key Latin square image cipher (LSIC)
for grayscale and color images. Our contributions to the image encryption
community include 1) we develop new Latin square image encryption primitives
including Latin Square Whitening, Latin Square S-box and Latin Square P-box ;
2) we provide a new way of integrating probabilistic encryption in image
encryption by embedding random noise in the least significant image bit-plane;
and 3) we construct LSIC with these Latin square image encryption primitives
all on one keyed Latin square in a new loom-like substitution-permutation
network. Consequently, the proposed LSIC achieve many desired properties of a
secure cipher including a large key space, high key sensitivities, uniformly
distributed ciphertext, excellent confusion and diffusion properties,
semantically secure, and robustness against channel noise. Theoretical analysis
show that the LSIC has good resistance to many attack models including
brute-force attacks, ciphertext-only attacks, known-plaintext attacks and
chosen-plaintext attacks. Experimental analysis under extensive simulation
results using the complete USC-SIPI Miscellaneous image dataset demonstrate
that LSIC outperforms or reach state of the art suggested by many peer
algorithms. All these analysis and results demonstrate that the LSIC is very
suitable for digital image encryption. Finally, we open source the LSIC MATLAB
code under webpage https://sites.google.com/site/tuftsyuewu/source-code.Comment: 26 pages, 17 figures, and 7 table
Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption
Optical chaos is a topic of current research characterized by
high-dimensional nonlinearity which is attributed to the delay-induced
dynamics, high bandwidth and easy modular implementation of optical feedback.
In light of these facts, which adds enough confusion and diffusion properties
for secure communications, we explore the synchronization phenomena in
spatiotemporal semiconductor laser systems. The novel system is used in a
two-phase colored image encryption process. The high-dimensional chaotic
attractor generated by the system produces a completely randomized chaotic time
series, which is ideal in the secure encoding of messages. The scheme thus
illustrated is a two-phase encryption method, which provides sufficiently high
confusion and diffusion properties of chaotic cryptosystem employed with unique
data sets of processed chaotic sequences. In this novel method of cryptography,
the chaotic phase masks are represented as images using the chaotic sequences
as the elements of the image. The scheme drastically permutes the positions of
the picture elements. The next additional layer of security further alters the
statistical information of the original image to a great extent along the
three-color planes. The intermediate results during encryption demonstrate the
infeasibility for an unauthorized user to decipher the cipher image. Exhaustive
statistical tests conducted validate that the scheme is robust against noise
and resistant to common attacks due to the double shield of encryption and the
infinite dimensionality of the relevant system of partial differential
equations.Comment: 20 pages, 11 figures; Article in press, Optics Communications (2011
Image Encryption Based on Diffusion and Multiple Chaotic Maps
In the recent world, security is a prime important issue, and encryption is
one of the best alternative way to ensure security. More over, there are many
image encryption schemes have been proposed, each one of them has its own
strength and weakness. This paper presents a new algorithm for the image
encryption/decryption scheme. This paper is devoted to provide a secured image
encryption technique using multiple chaotic based circular mapping. In this
paper, first, a pair of sub keys is given by using chaotic logistic maps.
Second, the image is encrypted using logistic map sub key and in its
transformation leads to diffusion process. Third, sub keys are generated by
four different chaotic maps. Based on the initial conditions, each map may
produce various random numbers from various orbits of the maps. Among those
random numbers, a particular number and from a particular orbit are selected as
a key for the encryption algorithm. Based on the key, a binary sequence is
generated to control the encryption algorithm. The input image of 2-D is
transformed into a 1- D array by using two different scanning pattern (raster
and Zigzag) and then divided into various sub blocks. Then the position
permutation and value permutation is applied to each binary matrix based on
multiple chaos maps. Finally the receiver uses the same sub keys to decrypt the
encrypted images. The salient features of the proposed image encryption method
are loss-less, good peak signal-to-noise ratio (PSNR), Symmetric key
encryption, less cross correlation, very large number of secret keys, and
key-dependent pixel value replacement.Comment: 14 pages,9 figures and 5 tables;
http://airccse.org/journal/jnsa11_current.html, 201
- …