Design of image cipher using block-based scrambling and image filtering
Introduction
The two-dimensional (2D) digital images play more and more important roles in the modern digital technology. A 2D digital image is a type of 2D data, which carries data with a visualized and meaningful way. Then, if secret images are stolen, used or viewed by unauthorized users, disastrous security issues may happen. For example, if the spy steals the images of one new martial weapon, the hostile country may obtain the detail settings and parameters of the weapon by analyzing these images. Therefore, it is quite important to protect digital images and image cipher is an efficient solution of image security issue by encrypting a digital image into a random-like cipher-image [3], [31], [35]. Only with the correct secret key, one can recover the original image from the cipher-image.
Up to now, researchers have developed many image ciphers using different kinds of techniques [8], [15], [16], [17], [18], [23], [29]. Among these techniques, chaos theory is the most widely used one [1], [21], [34], [36], [37]. This is due to that chaotic maps have the properties of initial state sensitivity, unpredictability and ergodicity, and these properties can be found similar counterparts in image cipher [7], [9]. Some examples of chaos-based image ciphers are as follows. In [33], a new image encryption scheme was designed using a new one-dimensional (1D) chaotic map, which is developed by combining two existing chaotic maps. In [11], an image cipher was developed using a new 2D chaotic map, named 2D-SLMM. In [10], another image cipher was proposed using a new 2D chaotic map, called 2D-LASM. For these chaos-based image ciphers, their security levels are highly dependent on the performance of their used chaotic maps. However, the chaotic behaviors of chaotic maps may degrade to periodic behaviors when they are implemented in the finite precision platforms. This greatly reduces the security levels of the corresponding encryption schemes [22]. Many researchers have proved that some chaos-based ciphers owning low security levels can be successfully attacked [13], [14], [20], [28].
Besides chaos theory, many other techniques were also applied to designing image ciphers [2], [6], [30]. Some examples are as follows. In [27], the authors developed an image encryption scheme, which uses the Latin sequences to do pixel permutation and substitution. In [5], the authors proposed a novel image encryption scheme using Gray code. The Gray code is used to do pixel permutation and a plain pixel-related image diffusion structure is used to achieve the diffusion property.
It is well-known that image filtering is widely used in many digital image processing technologies, such as image deblurring, image smoothing and edge detection. This paper first presents the concept of using image filtering to encrypt a digital image, and then designs a new image cipher using block-based scrambling and image filtering (IC-BSIF). IC-BSIF adopts the well-known substitution-permutation network and strictly follows the confusion and diffusion concepts. The block-based scrambling first divides image into blocks, and then randomly shuffles pixels of each block into different rows and columns. It can simultaneously shuffle the row and column positions of a pixel and thus can achieve a high efficiency to reduce the strong correlations between adjacent pixels. Using randomly generated masks, the image filtering operation can spread little change in plain-image to the entire cipher-image. Simulation results and security analysis show that IC-BSIF can encrypt different kinds of digital images into random-like ones with high security levels.
The rest of this paper is organized as follows. Section 2 presents the concepts of image filtering. Section 3 introduces IC-BSIF and Section 4 displays its simulation results. Section 5 evaluates the security performance of IC-BSIF and the last section concludes this paper.
Section snippets
Concept of image encryption using image filtering
This section introduces the detail operation of image filtering, and presents the concepts of using image filtering to do image encryption.
Image cipher
This section presents IC-BSIF and Fig. 4 shows its structure. The secret key is to generate pseudo-random numbers for the block-based scrambling and image filtering in each encryption round. The block-based scrambling fast shuffles neighboring pixels. The image rotation rotates image by 90 degrees clockwise. The image filtering is to randomly change pixel values. The proposed IC-BSIF is a private key encryption scheme. Using the identical secret key, the receiver can losslessly recover the
Simulation results
This section provides the simulation results of IC-BSIF in the MATLAB 2012b environment. Most of the used images in the experiments are from the CVG-UGR image database.
The proposed IC-BSIF can be directly applied to digital images with all kinds of data formats. In our experiments, we use IC-BSIF to encrypt a large number of images with different data formats and some representative simulation results are displayed in Figs. 10 and 11. Fig. 10 shows the simulation results of five grayscale
Security analysis
This section analyzes the security of IC-BSIF from the following four aspects: secret key, randomness, differential attack and adjacent pixel correlation. The test images are selected from BOWS-2 image database and several typical encryption schemes are used as the reference schemes: HZPC [11], LLZ [16], WNA [25], WYJN [26], ZBC1 [32], ZBC2 [33], CMC [4], FLMLC [8] and WZNS [27].
Conclusion
This paper first presented the concept of encrypting an image using image filtering, and then proposed an image cipher using block-based scrambling and image filtering, named IC-BSIF. The block-based scrambling can separate pixels in an image block into different rows and columns, and thus can achieve high efficiency to weaken the strong correlations between adjacent pixels. Using randomly generated masks, the image filtering can blur the image and achieve the diffusion property. Experimental
Acknowledgement
This work was supported in part by the Macau Science and Technology Development Fund under Grant FDCT/016/2015/A1 and by the Research Committee at University of Macau under Grants MYRG2014-00003-FST and MYRG2016-00123-FST.
References (37)
- et al.
Image encryption: generating visually meaningful encrypted images
Inf. Sci.
(2015) - et al.
A visually secure image encryption scheme based on compressive sensing
Signal Process.
(2017) - et al.
A symmetric image encryption scheme based on 3D chaotic cat maps
Chaos, Solitons Fractals
(2004) - et al.
An efficient image encryption scheme using gray code based permutation approach
Opt. Lasers Eng.
(2015) - et al.
Reusing the permutation matrix dynamically for efficient image cryptographic algorithm
Signal Process.
(2015) - et al.
A novel chaos-based bit-level permutation scheme for digital image encryption
Opt. Commun.
(2011) - et al.
Image encryption using 2D logistic-adjusted-Sine map
Inf. Sci.
(2016) - et al.
2D Sine logistic modulation map for image encryption
Inf. Sci.
(2015) Cracking a hierarchical chaotic image encryption algorithm based on permutation
Signal Process.
(2016)- et al.
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
Signal Process.
(2011)
A novel image encryption algorithm based on self-adaptive wave transmission
Signal Process.
A wheel-switch chaotic system for image encryption
Proceedings of 2011 International Conference on System Science and Engineering (ICSSE)
On the security of symmetric ciphers based on DNA coding
Inf. Sci.
Exploiting random convolution and random subsampling for image encryption and compression
Electron. Lett.
Image encryption using a new parametric switching chaotic system
Signal Process.
A new 1D chaotic system for image encryption
Signal Process.
A novel image encryption–compression scheme using hyper-chaos and chinese remainder theorem
Signal Process. Image Commun.
An image encryption scheme using generalized arnold map and affine cipher
Optik-Int. J. Light Electron Opt.
Cited by (175)
Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption
2024, Expert Systems with ApplicationsA novel image encryption scheme with adaptive Fourier decomposition
2024, Journal of the Franklin InstituteA novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems
2024, Journal of Information Security and ApplicationsColor image encryption using a Zigzag Transformation and sine–cosine maps
2023, Scientific AfricanNovel multiple-image encryption algorithm based on a two-dimensional hyperchaotic modular model
2023, Chaos, Solitons and Fractals