TY - JOUR
T1 - A self-cited pixel summation based image encryption algorithm
AU - Ye, Guo-Dong
AU - Huang, Xiao-Ling
AU - Zhang, Leo Yu
AU - Wang, Zheng-Xia
PY - 2017/1/1
Y1 - 2017/1/1
N2 - In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack (KPA) and the chosen plaintext attack (CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.
AB - In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack (KPA) and the chosen plaintext attack (CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.
KW - gravity
KW - image encryption algorithm
KW - intertwining logistic map
KW - pixel summation
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85013481739&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-85013481739&origin=recordpage
U2 - 10.1088/1674-1056/26/1/010501
DO - 10.1088/1674-1056/26/1/010501
M3 - RGC 21 - Publication in refereed journal
SN - 1674-1056
VL - 26
JO - Chinese Physics B
JF - Chinese Physics B
IS - 1
M1 - 010501
ER -