Abstract
This paper presents a new image encryption scheme that employs an initial permutation for total shuffling of the positions of image pixels using randomly chosen prime numbers and then uses modified logistic map for the other operations. The logistic map and standard maps are modified for randomness and coupled together to increase the key length and used in the encryption process. A new substitution box is introduced and this substitution box changes dynamically during the iterations using the chaotic maps. The states combination of the chaotic systems are used to confuse the relationship between the plain-image and the cipher-image in a nonlinear fashion so as to resist against known plain-text and chosen plain-text attacks. The security and performance of the proposed image encryption technique have been analyzed using statistical analysis, key sensitivity analysis, key space analysis, differential analysis and entropy analysis. The simulation shows that a single pixel difference of the plain-image will change almost all the pixels in the cipher-image (NPCR>99%), and the unified average changing intensity is high (UACI>33%). The experimental results demonstrate that the new algorithm has a low time complexity and the suggested encryption algorithm has the advantages of large key space and high security, and moreover, the distribution of grey values of the encrypted image has a random-like behavior.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alvarez, G., Shujun, L.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simulation 14, 3743–3749 (2009)
Cokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373, 1350–1357 (2009)
Li, C., Li, S., Kwok-Tung, L.: Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. (article in press), doi:10.1016/j.cnsns.2009.07.007
Li, C., Li, S., Alvarez, G., Chen, G., Lo, K.T.: Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations. Phys. Lett. A 369, 23–30 (2007)
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G.: On the security defects of an image encryption scheme. Image Vis. Comput. 27(1), 371–381 (2009)
Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulation 14(7), 3056–3075 (2009)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulation 15(7), 1887–1892 (2010)
Sam, I.S., Devaraj, P., Bhuvaneswaran, R.S.: A novel image cipher based on mixed transformed logistic maps. Multimedia Tools and Applications. Springer, Heidelberg, doi:10.1007/s11042-010-0652-6
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Devaraj, P. (2012). Dynamic Substitution and Diffusion Based Image Encryption Using Modified Logistic Map. In: Thilagam, P.S., Pais, A.R., Chandrasekaran, K., Balakrishnan, N. (eds) Advanced Computing, Networking and Security. ADCONS 2011. Lecture Notes in Computer Science, vol 7135. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-29280-4_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-29280-4_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-29279-8
Online ISBN: 978-3-642-29280-4
eBook Packages: Computer ScienceComputer Science (R0)