Design and Analysis of a Permutation Strategy using 3D Chaotic Map

Authors

  • Panwar K USICT, GGSIP University, New Delhi, India
  • Purwar RK USICT, GGSIP University, New Delhi, India

DOI:

https://doi.org/10.26438/ijcse/v7i6.295299

Keywords:

Image Scrambling, 3D Lorenz system, Random number generator, Encryption, Complexity

Abstract

In Image encryption scheme, the permutation operation plays an important role in confusing the pixels of image and is used in combination with diffusion operation. This paper proposes an efficient 3D permutation strategy for color image that is free from sorting operation and is based on Lorenz map. It has good confusion properties than permutation algorithms that do not involve sorting operation and in comparison to permutation algorithms with similar security that involves use of sorting operation, the proposed method has lower complexity. Performance and Security of proposed permutation algorithm are analysed and results further justify that the permutation scheme is secure is computationally efficient for application in image encryption scheme.

References

[1] Y. Patil and P. Deshmukh, “A review: Mobile cloud computing: Its challenges and security,” International Journal of Scientific Research in Network Security and communication, vol. 6, no. 1, pp. 11–13, 2018.

[2] P. Devi, “Attacks on cloud data: A big security issue,” International Journal of Scientific Research in Network Security and communication, vol. 6, no. 2, pp. 15–18, 2018.

[3] L. Chen, S. Tang, Q. Li, and S. Zhong, “A new 4D hyperchaotic system with high complexity,” Mathematics and Computers in Simulation, vol. 146, pp. 44–56, 2018.

[4] N. Yujun, W. Xingyuan, W. Mingjun, and Z. Huaguang, “A new hyperchaotic system and its circuit implementation,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 11, pp.3518–3524, 2010.

[5] A. Jain and N. Rajpal, “A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5455–5472, May 2016.

[6] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.

[7] K. Wang, L. Zou, A. Song, Z. He et al., “On the security of 3D cat map based symmetric image encryption scheme,” Physics Letters A, vol. 343, no. 6, pp. 432–439, 2005.

[8] F.-G. Jeng, W.-L. Huang, and T.-H. Chen, “Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes,” Signal Processing: Image Communication, vol. 34, pp. 45–51, 2015.

[9] K. Panwar, R. Purwar, and A. Jain, “Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps,” International Journal of Bifurcation and Chaos, 2019 (in press).

[10] K. Panwar, R. K. Purwar, and A. Jain, “Cryptanalysis of an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion,” in the proceedings of 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, Feb 2018, pp. 236–239.

[11] A. Gerosa, R. Bernardini, and S. Pietri, “A fully integrated chaotic system for the generation of truly random numbers,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 49, no. 7, pp. 993–1000, 2002.

[12] L. Kocarev and G. Jakimoski, “Pseudorandom bits generated by chaotic maps,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 50, no. 1, pp. 123–126, 2003.

[13] C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, and G. Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371–1381, 2009.

[14] C. Li, D. Lin, and J. L¨u, “Cryptanalyzing an image-scrambling encryption algorithm of pixel bits,” IEEE MultiMedia, vol. 24, no. 3, pp. 64–71, 2017.

[15] Q. Yin and C. Wang, “A new chaotic image encryption scheme using breadth-first search and dynamic diffusion,” International Journal of Bifurcation and Chaos, vol. 28, no. 04, p. 1850047, 2018.

[16] H. Zhu, X. Zhang, H. Yu, C. Zhao, and Z. Zhu, “An image encryption algorithm based on compound homogeneous hyper-chaotic system,” Nonlinear Dynamics, vol. 89, no. 1, pp. 61–79, 2017.

[17] F. O¨ zkaynak and A. B. O¨ zer, “A method for designing strong s-boxes based on chaotic Lorenz system,” Physics Letters A, vol. 374, no. 36, pp. 3733–3738, 2010.

[18] M. Moghtadaei and M. H. Golpayegani, “Complex dynamic behaviours of the complex lorenz system,” Scientia Iranica, vol. 19, no. 3, pp. 733– 738, 2012.

[19] C. Li, M. Z. Chen, and K.-T. Lo, “Breaking an image encryption algorithm based on chaos,” International Journal of Bifurcation and Chaos, vol. 21, no. 07, pp. 2067–2076, 2011.

[20] C. Li, D. Lin, B. Feng, J. L¨u, and F. Hao, “Cryptanalysis of a chaotic image encryption algorithm based on information entropy,” IEEE Access, vol. 6, pp. 75 834–75 842, 2018.

[21] C. Li, B. Feng, S. Li, J. Kurths, and G. Chen, “Dynamic analysis of digital chaotic maps via state-mapping networks,” IEEE Transactions on Circuits and Systems I: Regular Papers, 2019.

[22] Z. Li, C. Peng, L. Li, and X. Zhu, “A novel plaintext-related image encryption scheme using hyper-chaotic system,” Nonlinear Dynamics, vol. 94, no. 2, pp. 1319–1333, 2018.

[23] Z. Galias and W. Tucker, “Short periodic orbits for the lorenz system,” in the proceedings of 2008 International Conference on Signals and Electronic Systems. IEEE, pp. 285–288, 2008.

[24] K. Panwar, R. Purwar, and A. Jain, “Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps,” Journal of Electronic Imaging, vol. 27, no. 5, pp. 1 –18, 2018.

Downloads

Published

2019-06-30
CITATION
DOI: 10.26438/ijcse/v7i6.295299
Published: 2019-06-30

How to Cite

[1]
K. Panwar and R. Purwar, “Design and Analysis of a Permutation Strategy using 3D Chaotic Map”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 295–299, Jun. 2019.

Issue

Section

Research Article