الگوریتم رمزنگاری تصویر مبتنی بر گروه جایگشت Sn و توابع آشوب

نوع مقاله : مقاله پژوهشی

نویسنده

گروه علوم کامپیوتر، دانشگاه خوانسار، خوانسار ، ایران

چکیده

در این مقاله، یک الگوریتم رمزنگاری تصویر جدید با استفاده از گروه­­ جایگشت Sn و توابع آشوب ارائه شده است. الگوریتم پیشنهادی شامل سه مرحله­ می­باشد: (1) با اعمال توابع درهم­ساز بر روی اطلاعات تصویر اصلی و کلید رمز خارجی 256 بیتی، یک کلید رمز محرمانه 256 بیتی استخراج می­گردد که با کمک آن شرایط اولیه و پارامترهای مربوط به توابع آشوب تولید می­شود؛ (2) در مرحله انتشار، با انجام یک جایگشت سطری و یک جایگشت ستونی مبتنی بر توابع آشوب، موقعیت پیسکل­ها در تصویر اصلی جابه­جا می­شود به­طوری که همبستگی بین پیکسل­های مجاور به شدت کاهش می­یابد؛ (3) در مرحله اغتشاش، مقدار سطح روشنایی هر پیکسل با انجام جایگشت در سطح بیت با کمک گروه جایگشت S8 و توابع فوق آشوب تغییر می­یابد؛ سپس با انجام تبدیل در سطح بیت به وسیله جعبه­های جایگزینی S8Sbox و عملگر XOR، امنیت الگوریتم پیشنهادی افزایش می­یابد. نتایج تجربی و تحلیل­های امنیتی نشان می­دهد که 60/99% ، 40/%33 ، آنتروپی بزرگ‌تر 99/7  و ضرایب همبستگی برای تصویر رمز نزدیک به صفر می­باشد. همچنین الگوریتم رمزنگاری تصویر پیشنهادی مقاومت بالایی در برابر حملات متداول همانند حملات جستجوی کامل، برش و نویز از خود نشان می­دهد.

کلیدواژه‌ها


عنوان مقاله [English]

An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions

نویسنده [English]

  • E. Zarei Zefreh
Department of Computer Science, University of Khansar, Khansar, Iran
چکیده [English]

In this paper, an image encryption algorithm is proposed based on the Sn permutation group and chaotic functions. The proposed algorithm consists of three steps. In the first step, by applying the hash functions to the plain image information and using the 256-bit external key, a 256-bit secret key is extracted and used to calculate the initial values and parameters of the chaotic functions. In the second step known as the        confusion step, the pixel positions of the plain image are rearranged using a row and column level          permutation based on the chaotic functions, such that the correlation between adjacent pixels of the plain image is significantly reduced.  In the third step or the diffusion step, the gray value of each pixel is changed based on a bit level permutation using the S8 permutation group and the chaotic functions.       Finally, by applying the bit level transform using the S8Sbox and XOR operation, the security of the       proposed image encryption algorithm is increased. The experimental results and security analysis show that the NPCR is , the UACI is , entropy is  and the correlation coefficients of the encrypted images are close to 0. Also, the proposed image encryption algorithm has high resistance against common attacks such as the exhaustive search, cropping and noise attacks.
 

کلیدواژه‌ها [English]

  • Image Encryption
  • Permutation Group
  • Chaotic Functions
  • S-box
  • Confusion
  • Diffusion
[1]     X. Wang, X. Zhu, X. Wu, and Y. Zhang, “Image Encryption Algorithm Based on Multiple Mixed Hash Functions and Cyclic Shift,” OPT. LASER ENG., vol. 107, pp. 370-379, 2018.##
[2]     Q. Zhang, L. Guo, and X. Wei, “A Novel Image Fusion Encryption Algorithm Based on DNA Sequence Operation and Hyper-Chaotic System,” OPTIK, vol. 124, no. 18, pp. 3596-3600, 2013.##
[3]     M. Ahmadipari and M. Moradi, “A New Approach for Grayscale Image Encryption Using Beness Interconnection Networks and Logistic Map Chaos Function,” Electronic and Cyber Defense, vol. 6, no. 1, pp. 37-46, 2017 (In Persian).##
[4]     M. Khan and T. Shah, “A Novel Image Encryption Technique Based on Hénon Chaotic Map and S8 Symmetric Group,” Neural Comput. Appl., vol. 25, no. 7-8, pp. 1717-1722, 2014.##
[5]     P. K. Sharma, M. Ahmad, and P. M. Khan, “Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation,” In Int. Symposium on Security in Computing and Communication, Springer, pp.      173-181, 2014.##
[6]     S. Xu, Y. Wang, Y. Guo, and C. Wang, “A Novel Image Encryption Scheme Based on a Nonlinear Chaotic Map,” IJIGSP, vol. 2, no. 1, p. 61, 2010.##
[7]     M. J. Rostami, A. Shahba, S. Saryazdi, and H. Nezamabadipour, “A Novel Parallel Image Encryption with Chaotic Windows Based on Logistic Map,” Comput. Electr. Eng., vol. 62, pp. 384-400, 2017.##
[8]     Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based Chaotic System for Image Encryption,” Inform. Sciences, vol. 480, pp. 403-419, 2019.##
[9]     A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” J. of Passive Defence Science and Technology, 2011      (In Persian).##
[10]  Y. Wu, J. P. Noonan, G. Yang, and H. Jin, “Image Encryption Using the Two-dimensional Logistic Chaotic Map,” J. Electron. Imaging, vol. 21, no. 1, p. 013014, 2012.##
[11]  B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, “A Novel Image Encryption Based on Row-Column, Masking and Main Diffusion Processes with Hyper Chaos,” Multimed. Tools Appl., vol. 74, no. 3, pp. 781-811, 2015.##
[12]  S. El Assad and M. Farajallah, “A New Chaos-based Image Encryption System,” Signal Process-Image, vol. 41, pp. 144-157, 2016.##
[13]  B. Murugan and A. G. N. Gounder, “Image Encryption Scheme Based on Block-based Confusion and Multiple Levels of Diffusion,” IET. COMPUT. VIS., vol. 10, no. 6, pp. 593-602, 2016.##
[14]  A. Belazi, M. Khan, A. El-Latif, and S. Belghith, “Efficient Cryptosystem Approaches: S-boxes and Permutation–substitution-based Encryption,” Nonlinear Dynam., vol. 87, no. 1, pp. 337-361, 2017.##
[15]  B. Mondal, P. Kumar, and S. Singh, “A Chaotic Permutation and Diffusion Based Image Encryption Algorithm for Secure Communications,” Multimed. Tools Appl., vol. 77, no. 23, pp. 31177-31198, 2018.##
[16]  A. Farajollahzadeh and F. Motiei, “Image Encryption Based Using Three-dimensional Logistic Chaotic Map,” 5th Int. Conf. on Electrical and Computer Engineering, 2018 (In Persian).##
[17]  I. Hussain, T. Shah, H. Mahmood, and M. A. Gondal, “Construction of S8 Liu J S-boxes and their Applications,” Comput. Math Appl., vol. 64, no. 8, pp. 2450-2458, 2012.##
[18]  F. Özkaynak, V. Çelik, and A. B. Özer, “A New S-box Construction Method Based on the Fractional-order Chaotic Chen System,” Signal Image Video P, vol. 11, no. 4, pp. 659-664, 2017.##
[19]  X. Wang and C. Liu, “A Novel and Effective Image Encryption Algorithm Based on Chaos and DNA Encoding,” Multimed. Tools Appl., vol. 76, no. 5, pp. 6229-6245, 2017.##
[20]  J. Ma, Z. Chen, Z. Wang, and Q. Zhang, “A Four-wing hyper-Chaotic Attractor Generated from a 4-D Memristive System with a Line Equilibrium,” Nonlinear Dynam., vol. 81, no. 3, pp. 1275-1288, 2015.##
[21]  F. ul Islam and G. Liu, “Designing S-box Based on 4D-4wing Hyperchaotic System,” 3D Res, vol. 8, no. 1, p. 9, 2017.##
[22]  T. W. Hungerford, “Abstract Algebra: An Introduction,” Cengage Learning, 2012.##
[23]  A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” Booz-Allen and Hamilton Inc. Mclean Va, 2001.##
[24]  P. Ping, F. Xu, Y. Mao, and Z. Wang, “Designing Permutation–substitution Image Encryption Networks with Henon Map,” Neurocomputing, vol. 283, pp.  53-63, 2018.##