Open Access   Article Go Back

Design and Analysis of a Permutation Strategy using 3D Chaotic Map

K. Panwar1 , R.K. Purwar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-6 , Page no. 295-299, Jun-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i6.295299

Online published on Jun 30, 2019

Copyright © K. Panwar, R.K. Purwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K. Panwar, R.K. Purwar, “Design and Analysis of a Permutation Strategy using 3D Chaotic Map,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.295-299, 2019.

MLA Style Citation: K. Panwar, R.K. Purwar "Design and Analysis of a Permutation Strategy using 3D Chaotic Map." International Journal of Computer Sciences and Engineering 7.6 (2019): 295-299.

APA Style Citation: K. Panwar, R.K. Purwar, (2019). Design and Analysis of a Permutation Strategy using 3D Chaotic Map. International Journal of Computer Sciences and Engineering, 7(6), 295-299.

BibTex Style Citation:
@article{Panwar_2019,
author = {K. Panwar, R.K. Purwar},
title = {Design and Analysis of a Permutation Strategy using 3D Chaotic Map},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {295-299},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4546},
doi = {https://doi.org/10.26438/ijcse/v7i6.295299}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.295299}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4546
TI - Design and Analysis of a Permutation Strategy using 3D Chaotic Map
T2 - International Journal of Computer Sciences and Engineering
AU - K. Panwar, R.K. Purwar
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 295-299
IS - 6
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
356 316 downloads 186 downloads
  
  
           

Abstract

In Image encryption scheme, the permutation operation plays an important role in confusing the pixels of image and is used in combination with diffusion operation. This paper proposes an efficient 3D permutation strategy for color image that is free from sorting operation and is based on Lorenz map. It has good confusion properties than permutation algorithms that do not involve sorting operation and in comparison to permutation algorithms with similar security that involves use of sorting operation, the proposed method has lower complexity. Performance and Security of proposed permutation algorithm are analysed and results further justify that the permutation scheme is secure is computationally efficient for application in image encryption scheme.

Key-Words / Index Term

Image Scrambling, 3D Lorenz system, Random number generator, Encryption, Complexity

References

[1] Y. Patil and P. Deshmukh, “A review: Mobile cloud computing: Its challenges and security,” International Journal of Scientific Research in Network Security and communication, vol. 6, no. 1, pp. 11–13, 2018.
[2] P. Devi, “Attacks on cloud data: A big security issue,” International Journal of Scientific Research in Network Security and communication, vol. 6, no. 2, pp. 15–18, 2018.
[3] L. Chen, S. Tang, Q. Li, and S. Zhong, “A new 4D hyperchaotic system with high complexity,” Mathematics and Computers in Simulation, vol. 146, pp. 44–56, 2018.
[4] N. Yujun, W. Xingyuan, W. Mingjun, and Z. Huaguang, “A new hyperchaotic system and its circuit implementation,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 11, pp.3518–3524, 2010.
[5] A. Jain and N. Rajpal, “A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps,” Multimedia Tools and Applications, vol. 75, no. 10, pp. 5455–5472, May 2016.
[6] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004.
[7] K. Wang, L. Zou, A. Song, Z. He et al., “On the security of 3D cat map based symmetric image encryption scheme,” Physics Letters A, vol. 343, no. 6, pp. 432–439, 2005.
[8] F.-G. Jeng, W.-L. Huang, and T.-H. Chen, “Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes,” Signal Processing: Image Communication, vol. 34, pp. 45–51, 2015.
[9] K. Panwar, R. Purwar, and A. Jain, “Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps,” International Journal of Bifurcation and Chaos, 2019 (in press).
[10] K. Panwar, R. K. Purwar, and A. Jain, “Cryptanalysis of an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion,” in the proceedings of 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN), IEEE, Feb 2018, pp. 236–239.
[11] A. Gerosa, R. Bernardini, and S. Pietri, “A fully integrated chaotic system for the generation of truly random numbers,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 49, no. 7, pp. 993–1000, 2002.
[12] L. Kocarev and G. Jakimoski, “Pseudorandom bits generated by chaotic maps,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 50, no. 1, pp. 123–126, 2003.
[13] C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, and G. Chen, “On the security defects of an image encryption scheme,” Image and Vision Computing, vol. 27, no. 9, pp. 1371–1381, 2009.
[14] C. Li, D. Lin, and J. L¨u, “Cryptanalyzing an image-scrambling encryption algorithm of pixel bits,” IEEE MultiMedia, vol. 24, no. 3, pp. 64–71, 2017.
[15] Q. Yin and C. Wang, “A new chaotic image encryption scheme using breadth-first search and dynamic diffusion,” International Journal of Bifurcation and Chaos, vol. 28, no. 04, p. 1850047, 2018.
[16] H. Zhu, X. Zhang, H. Yu, C. Zhao, and Z. Zhu, “An image encryption algorithm based on compound homogeneous hyper-chaotic system,” Nonlinear Dynamics, vol. 89, no. 1, pp. 61–79, 2017.
[17] F. O¨ zkaynak and A. B. O¨ zer, “A method for designing strong s-boxes based on chaotic Lorenz system,” Physics Letters A, vol. 374, no. 36, pp. 3733–3738, 2010.
[18] M. Moghtadaei and M. H. Golpayegani, “Complex dynamic behaviours of the complex lorenz system,” Scientia Iranica, vol. 19, no. 3, pp. 733– 738, 2012.
[19] C. Li, M. Z. Chen, and K.-T. Lo, “Breaking an image encryption algorithm based on chaos,” International Journal of Bifurcation and Chaos, vol. 21, no. 07, pp. 2067–2076, 2011.
[20] C. Li, D. Lin, B. Feng, J. L¨u, and F. Hao, “Cryptanalysis of a chaotic image encryption algorithm based on information entropy,” IEEE Access, vol. 6, pp. 75 834–75 842, 2018.
[21] C. Li, B. Feng, S. Li, J. Kurths, and G. Chen, “Dynamic analysis of digital chaotic maps via state-mapping networks,” IEEE Transactions on Circuits and Systems I: Regular Papers, 2019.
[22] Z. Li, C. Peng, L. Li, and X. Zhu, “A novel plaintext-related image encryption scheme using hyper-chaotic system,” Nonlinear Dynamics, vol. 94, no. 2, pp. 1319–1333, 2018.
[23] Z. Galias and W. Tucker, “Short periodic orbits for the lorenz system,” in the proceedings of 2008 International Conference on Signals and Electronic Systems. IEEE, pp. 285–288, 2008.
[24] K. Panwar, R. Purwar, and A. Jain, “Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps,” Journal of Electronic Imaging, vol. 27, no. 5, pp. 1 –18, 2018.