A Novel Image Stream Cipher Based On Dynamic Substitution
Recently, many chaos-based stream cipher algorithms have been developed. Traditional chaos stream cipher is based on XORing a generated secure random number sequence based on chaotic maps (e.g. logistic map, Bernoulli Map, Tent Map etc.) with the original image to get the encrypted image, This type of stream cipher seems to be vulnerable to chosen plaintext attacks. This paper introduces a new stream cipher algorithm based on dynamic substitution box. The new algorithm uses one substitution box (S-box) and a chaotic shuffling process. Each byte in the plain image vector is substituted using a different S-box to get the cipher image vector. This algorithm is designed to be invulnerable to chosen plaintext attacks. In addition, this algorithm is more secured compared to conventional stream cipher.
Keywords:chaos, encryption, plain image, stream cipher, substitution box
C. Paar, Ing. J. Pelzl, Understanding Cryptography, Springer, 2010 DOI: https://doi.org/10.1007/978-3-642-04101-3
B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, Inc., 1996
J. Boyar, “Inferring sequences produced by pseudo-random number generators”, J. ACM, Vol. 36, No. 1, pp. 129–141, 1989 DOI: https://doi.org/10.1145/58562.59305
J. Won, H. Kim, “Commun Nonlinear Sci Numer Simulat An image encryption scheme with a pseudorandom permutation based on chaotic maps”, Commun. NONLINEAR Sci. Numer. Simul., Vol. 15, No. 12, pp. 3998-4006, 2010 DOI: https://doi.org/10.1016/j.cnsns.2010.01.041
J. Yen, J.Guo, “A New Chaotic Key-Based Design for Image Encryption and Decryption”, IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, 2000
A. Kaushik, S. Khanna, M. Barnela, A. Kumar, “Stream Encryption Standard for Digital Images”, International Journal of Computer and Electrical Engineering, Vol. 3, No. 2, pp. 240-243, 2011 DOI: https://doi.org/10.7763/IJCEE.2011.V3.320
W. De, Z. Yuan-Biao, “Image encryption algorithm based on S-boxes substitution and chaos random sequence”, 2009 Int. Conf. Comput. Model. Simulation, ICCMS 2009, pp. 110–113, 2009
X. Wang, Q. Wang, “A novel image encryption algorithm based on dynamic S-boxes constructed by chaos”, Nonlinear Dyn., Vol. 75, No. 3, pp. 567–576, 2013 DOI: https://doi.org/10.1007/s11071-013-1086-2
X. Zhang, Z. Zhao, J. Wang, “Chaotic image encryption based on circular substitution box and key stream buffer”, Signal Process. Image Commun., Vol. 29, No. 8, pp. 902–913, 2014 DOI: https://doi.org/10.1016/j.image.2014.06.012
Y. Zhang, D. Xiao, “Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack”, Nonlinear Dyn., Vol. 72, No. 4, pp. 751–756, 2013 DOI: https://doi.org/10.1007/s11071-013-0750-x
Eduardo Bayro Corrochano, Handbook of Geometric Computing, Springer, 2005
R. Siwatch, V. Kumar, “Image Encryption Based on Inter-Pixel Displacement”, International Journal of Scientific Research Engineering & Technology, Vol. 3, No. 3, pp. 673–676, 2014
R. Mathews, M. Iaeng, A. Goel, M. Iaeng, P. Saxena, V. P. Mishra, “Image Encryption Based on Explosive Inter-pixel Displacement of the RGB Attributes of a PIXEL”, Proceedings of the World Congress on Engineering and Computer Science, Vol. I, pp. 19–22, 2011
B. Aïssa, D. Nadib, R. Mohamedc, “Image Encryption Using Stream Cipher Based on Nonlinear Combination Generator with Enhanced Security”, New Trends Math. Sci., Vol. 1, No. 1, pp. 10–19, 2013
How to Cite
MetricsAbstract Views: 638
PDF Downloads: 221
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.