Paper
23 January 2017 A self-adaptive image encryption scheme with half-pixel interchange permutation operation
Ruisong Ye, Li Liu, Minyu Liao, Yafang Li, Zikang Liao
Author Affiliations +
Proceedings Volume 10322, Seventh International Conference on Electronics and Information Engineering; 1032214 (2017) https://doi.org/10.1117/12.2265157
Event: Seventh International Conference on Electronics and Information Engineering, 2016, Nanjing, China
Abstract
A plain-image dependent image encryption scheme with half-pixel-level swapping permutation strategy is proposed. In the new permutation operation, a pixel-swapping operation between four higher bit-planes and four lower bit-planes is employed to replace the traditional confusion operation, which not only improves the conventional permutation efficiency within the plain-image, but also changes all the pixel gray values. The control parameters of generalized Arnold map applied for the permutation operation are related to the plain-image content and consequently can resist chosen-plaintext and known-plaintext attacks effectively. To enhance the security of the proposed image encryption, one multimodal skew tent map is applied to generate pseudo-random gray value sequence for diffusion operation. Simulations have been carried out thoroughly to demonstrate that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-diffusion operations.
© (2017) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Ruisong Ye, Li Liu, Minyu Liao, Yafang Li, and Zikang Liao "A self-adaptive image encryption scheme with half-pixel interchange permutation operation", Proc. SPIE 10322, Seventh International Conference on Electronics and Information Engineering, 1032214 (23 January 2017); https://doi.org/10.1117/12.2265157
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Diffusion

Statistical analysis

Computer security

Image processing

Complex systems

Image enhancement

RELATED CONTENT


Back to Top