Abstract
This paper proposes an enhanced substitution-diffusion based image cipher using improved chaotic map. The first step consists of permutation which uses the odd key values. Byte substitution is applied in the second step to improve the security against the known/chosen-plaintext attack. Finally, confusion and diffusion are obtained using the sub diagonal diffusion of adjacent pixels and XORing with the chaotic key. The numbers of rounds in the steps are controlled by combination of pseudo random sequence and original image. The security and performance of the proposed image encryption technique have been analyzed thoroughly using statistical analysis, key sensitivity analysis, differential analysis, key space analysis and entropy analysis. Results of the various types of analyzes are showing that the proposed image encryption technique is more secure and fast.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Matthew, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 8, 29–42 (1989)
Schneier, B.: Applied cryptography: protocols algorithms and source code in C. Wiley, New York (1996)
Baptista, M.S.: Cryptography with chaos. Phys. Lett. A 240, 50–54 (1998)
Chen, G.R., Mao, Y.B., Charles, K.C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21, 749–761 (2004)
Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simulat. 14, 3056–3075 (2009)
Alvarez, G., Shujun, L.: Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun. Nonlinear Sci. Numer. Simulat. 14, 3743–3749 (2009)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simulat. 15, 1887–1892 (2010)
Jianquan, X., Chunhua, Y., Qing, X., Lijun, T.: An Encryption Algorithm Based on Transformed Logistic Map. In: IEEE International Conference on Network Security, Wireless Communications and Truested Computing, pp. 111–114 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S. (2010). Enhanced Substitution-Diffusion Based Image Cipher Using Improved Chaotic Map. In: Das, V.V., Vijaykumar, R. (eds) Information and Communication Technologies. ICT 2010. Communications in Computer and Information Science, vol 101. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15766-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-642-15766-0_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15765-3
Online ISBN: 978-3-642-15766-0
eBook Packages: Computer ScienceComputer Science (R0)