New cryptosystem using Vigenere and multiple bit-level permutations

Abdellatif JarJar

Abstract


The largest part of the image encryption algorithms operates on the pixel as a central element by implementing diffusion confusion and eventually a permutation. On the other side, a permutation applied at the bit level changes not only the pixel value, but also its location within the image. In this work, we will propose a new technology for medical and color image encryption, which starts with an application of an improved Vigenere method acting at the pixel level to overcome any differential attack, followed by an implementation of several chaotic permutations acting at the bit level. Simulations performed on a large number of images of different sizes and formats ensure that our method is not subject to any known attacks.


Keywords


Vigenere grid; Chaotic map; Broadcast function; Chaotic permutation;

Full Text:

PDF

References


Al-Khalid, A. S., & Al-Khfagi, A. O. (2015, September). Cryptanalysis of a Hill cipher using genetic algorithm. In 2015 World Symposium on Computer Networks and Information Security (WSCNIS) (pp. 1-4). IEEE.

Anwar, S., & Meghana, S. (2019). A pixel permutation based image encryption technique using chaotic map. Multimedia tools and applications, 78(19), 27569-27590.

Bansal, R., Gupta, S., & Sharma, G. (2017). An innovative image encryption scheme based on chaotic map and Vigenère scheme. Multimedia Tools and Applications, 76(15), 16529-16562.

Enayatifar, R., Abdullah, A. H., Isnin, I. F., Altameem, A., & Lee, M. (2017). Image encryption using a synchronous permutation-diffusion technique. Optics and Lasers in Engineering, 90, 146-154.

Essaid, M., Akharraz, I., & Saaidi, A. (2019). Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic maps. Journal of Information Security and Applications, 47, 173-187.

IEEE Computer Society. (1985) IEEE Standard for Binary Floating-Point Arithmetic, ANSI/IEEE Std, New York.

Jarjar, A. (2017). Improvement of hill’s classical method in image cryptography. International Journal of Statistics and Applied Mathematics, 2(3 Part A).

Khan, J. S., & Ahmad, J. (2019). Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 30(2), 943-961.

Li, H., Wang, Y., & Zuo, Z. (2019). Chaos-based image encryption algorithm with orbit perturbation and dynamic state variable selection mechanisms. Optics and Lasers in Engineering, 115, 197-207

Li, P., Li, Z., Halang, W. A., & Chen, G. (2006). A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Physics Letters A, 349(6), 467-473.

Lin, C. H., Lee, C. Y., & Lee, C. Y. (2004). Comments on Saeednia's improved scheme for the Hill cipher. Journal of the Chinese institute of engineers, 27(5), 743-746.

Liu, H., & Wang, X. (2010). Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications, 59(10), 3320-3327.

Overbey, J., Traves, W., & Wojdylo, J. (2005). On the keyspace of the Hill cipher. Cryptologia, 29(1), 59-72.

Pareek, N. K., Patidar, V., & Sud, K. K. (2006). Image encryption using chaotic logistic map. Image and vision computing, 24(9), 926-934.

Rachmawanto, E. H., De Rosal, I. M. S., Sari, C. A., Santoso, H. A., Rafrastara, F. A., & Sugiarto, E. (2019, July). Block-based arnold chaotic map for image encryption. In 2019 International Conference on Information and Communications Technology (ICOIACT) (pp. 174-178). IEEE.

Reddy, V. V. K., & Bhukya, S. (2018). Encrypt and decrypt image using vigenere cipher. International Journal of Pure and Applied Mathematics, 118(24).

Saeednia, S. (2000). How to make the Hill cipher secure. Cryptologia, 24(4), 353-360.

Saputra, I., Hasibuan, N. A., & Rahim, R. (2017). Vigenere cipher algorithm with grayscale image key generator for secure text file. International Journal of Engineering Research & Technology (IJERT), 6(1), 266-269

Wang, Y., Wong, K. W., Liao, X., Xiang, T., & Chen, G. (2009). A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons & Fractals, 41(4), 1773-1783.

Ye, R. (2011). A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Communications, 284(22), 5290-5298.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 The Journal of Applied Sciences Research

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.