تعداد نشریات | 38 |
تعداد شمارهها | 1,244 |
تعداد مقالات | 9,010 |
تعداد مشاهده مقاله | 7,871,824 |
تعداد دریافت فایل اصل مقاله | 4,721,840 |
الگوریتم رمزنگاری تصویر مبتنی بر گروه جایگشت Sn و توابع آشوب | ||
پدافند الکترونیکی و سایبری | ||
مقاله 11، دوره 8، شماره 3 - شماره پیاپی 31، آبان 1399، صفحه 139-150 اصل مقاله (2.02 M) | ||
نوع مقاله: مقاله پژوهشی | ||
نویسنده | ||
ابراهیم زارعی زفره* | ||
گروه علوم کامپیوتر، دانشگاه خوانسار، خوانسار ، ایران | ||
تاریخ دریافت: 24 آبان 1398، تاریخ بازنگری: 04 دی 1398، تاریخ پذیرش: 12 بهمن 1398 | ||
چکیده | ||
در این مقاله، یک الگوریتم رمزنگاری تصویر جدید با استفاده از گروه جایگشت Sn و توابع آشوب ارائه شده است. الگوریتم پیشنهادی شامل سه مرحله میباشد: (1) با اعمال توابع درهمساز بر روی اطلاعات تصویر اصلی و کلید رمز خارجی 256 بیتی، یک کلید رمز محرمانه 256 بیتی استخراج میگردد که با کمک آن شرایط اولیه و پارامترهای مربوط به توابع آشوب تولید میشود؛ (2) در مرحله انتشار، با انجام یک جایگشت سطری و یک جایگشت ستونی مبتنی بر توابع آشوب، موقعیت پیسکلها در تصویر اصلی جابهجا میشود بهطوری که همبستگی بین پیکسلهای مجاور به شدت کاهش مییابد؛ (3) در مرحله اغتشاش، مقدار سطح روشنایی هر پیکسل با انجام جایگشت در سطح بیت با کمک گروه جایگشت S8 و توابع فوق آشوب تغییر مییابد؛ سپس با انجام تبدیل در سطح بیت به وسیله جعبههای جایگزینی S8Sbox و عملگر XOR، امنیت الگوریتم پیشنهادی افزایش مییابد. نتایج تجربی و تحلیلهای امنیتی نشان میدهد که 60/99% ، 40/%33 ، آنتروپی بزرگتر 99/7 و ضرایب همبستگی برای تصویر رمز نزدیک به صفر میباشد. همچنین الگوریتم رمزنگاری تصویر پیشنهادی مقاومت بالایی در برابر حملات متداول همانند حملات جستجوی کامل، برش و نویز از خود نشان میدهد. | ||
کلیدواژهها | ||
رمزنگاری تصویر؛ گروه جایگشت؛ توابع آشوب؛ جعبه جایگزینی؛ انتشار؛ اغتشاش | ||
عنوان مقاله [English] | ||
An Image Encryption Algorithm Based on the Sn Permutation Group and Chaotic Functions | ||
نویسندگان [English] | ||
E. Zarei Zefreh | ||
Department of Computer Science, University of Khansar, Khansar, Iran | ||
چکیده [English] | ||
In this paper, an image encryption algorithm is proposed based on the Sn permutation group and chaotic functions. The proposed algorithm consists of three steps. In the first step, by applying the hash functions to the plain image information and using the 256-bit external key, a 256-bit secret key is extracted and used to calculate the initial values and parameters of the chaotic functions. In the second step known as the confusion step, the pixel positions of the plain image are rearranged using a row and column level permutation based on the chaotic functions, such that the correlation between adjacent pixels of the plain image is significantly reduced. In the third step or the diffusion step, the gray value of each pixel is changed based on a bit level permutation using the S8 permutation group and the chaotic functions. Finally, by applying the bit level transform using the S8Sbox and XOR operation, the security of the proposed image encryption algorithm is increased. The experimental results and security analysis show that the NPCR is , the UACI is , entropy is and the correlation coefficients of the encrypted images are close to 0. Also, the proposed image encryption algorithm has high resistance against common attacks such as the exhaustive search, cropping and noise attacks. | ||
کلیدواژهها [English] | ||
Image Encryption, Permutation Group, Chaotic Functions, S-box, Confusion, Diffusion | ||
مراجع | ||
[1] X. Wang, X. Zhu, X. Wu, and Y. Zhang, “Image Encryption Algorithm Based on Multiple Mixed Hash Functions and Cyclic Shift,” OPT. LASER ENG., vol. 107, pp. 370-379, 2018.##
[2] Q. Zhang, L. Guo, and X. Wei, “A Novel Image Fusion Encryption Algorithm Based on DNA Sequence Operation and Hyper-Chaotic System,” OPTIK, vol. 124, no. 18, pp. 3596-3600, 2013.##
[3] M. Ahmadipari and M. Moradi, “A New Approach for Grayscale Image Encryption Using Beness Interconnection Networks and Logistic Map Chaos Function,” Electronic and Cyber Defense, vol. 6, no. 1, pp. 37-46, 2017 (In Persian).##
[4] M. Khan and T. Shah, “A Novel Image Encryption Technique Based on Hénon Chaotic Map and S8 Symmetric Group,” Neural Comput. Appl., vol. 25, no. 7-8, pp. 1717-1722, 2014.##
[5] P. K. Sharma, M. Ahmad, and P. M. Khan, “Cryptanalysis of Image Encryption Algorithm Based on Pixel Shuffling and Chaotic S-box Transformation,” In Int. Symposium on Security in Computing and Communication, Springer, pp. 173-181, 2014.##
[6] S. Xu, Y. Wang, Y. Guo, and C. Wang, “A Novel Image Encryption Scheme Based on a Nonlinear Chaotic Map,” IJIGSP, vol. 2, no. 1, p. 61, 2010.##
[7] M. J. Rostami, A. Shahba, S. Saryazdi, and H. Nezamabadipour, “A Novel Parallel Image Encryption with Chaotic Windows Based on Logistic Map,” Comput. Electr. Eng., vol. 62, pp. 384-400, 2017.##
[8] Z. Hua, Y. Zhou, and H. Huang, “Cosine-transform-based Chaotic System for Image Encryption,” Inform. Sciences, vol. 480, pp. 403-419, 2019.##
[9] A. Mirghadri and A. Jolfaei, “A Novel Image Encryption Scheme Using Chaotic Maps,” J. of Passive Defence Science and Technology, 2011 (In Persian).##
[10] Y. Wu, J. P. Noonan, G. Yang, and H. Jin, “Image Encryption Using the Two-dimensional Logistic Chaotic Map,” J. Electron. Imaging, vol. 21, no. 1, p. 013014, 2012.##
[11] B. Norouzi, S. M. Seyedzadeh, S. Mirzakuchaki, and M. R. Mosavi, “A Novel Image Encryption Based on Row-Column, Masking and Main Diffusion Processes with Hyper Chaos,” Multimed. Tools Appl., vol. 74, no. 3, pp. 781-811, 2015.##
[12] S. El Assad and M. Farajallah, “A New Chaos-based Image Encryption System,” Signal Process-Image, vol. 41, pp. 144-157, 2016.##
[13] B. Murugan and A. G. N. Gounder, “Image Encryption Scheme Based on Block-based Confusion and Multiple Levels of Diffusion,” IET. COMPUT. VIS., vol. 10, no. 6, pp. 593-602, 2016.##
[14] A. Belazi, M. Khan, A. El-Latif, and S. Belghith, “Efficient Cryptosystem Approaches: S-boxes and Permutation–substitution-based Encryption,” Nonlinear Dynam., vol. 87, no. 1, pp. 337-361, 2017.##
[15] B. Mondal, P. Kumar, and S. Singh, “A Chaotic Permutation and Diffusion Based Image Encryption Algorithm for Secure Communications,” Multimed. Tools Appl., vol. 77, no. 23, pp. 31177-31198, 2018.##
[16] A. Farajollahzadeh and F. Motiei, “Image Encryption Based Using Three-dimensional Logistic Chaotic Map,” 5th Int. Conf. on Electrical and Computer Engineering, 2018 (In Persian).##
[17] I. Hussain, T. Shah, H. Mahmood, and M. A. Gondal, “Construction of S8 Liu J S-boxes and their Applications,” Comput. Math Appl., vol. 64, no. 8, pp. 2450-2458, 2012.##
[18] F. Özkaynak, V. Çelik, and A. B. Özer, “A New S-box Construction Method Based on the Fractional-order Chaotic Chen System,” Signal Image Video P, vol. 11, no. 4, pp. 659-664, 2017.##
[19] X. Wang and C. Liu, “A Novel and Effective Image Encryption Algorithm Based on Chaos and DNA Encoding,” Multimed. Tools Appl., vol. 76, no. 5, pp. 6229-6245, 2017.##
[20] J. Ma, Z. Chen, Z. Wang, and Q. Zhang, “A Four-wing hyper-Chaotic Attractor Generated from a 4-D Memristive System with a Line Equilibrium,” Nonlinear Dynam., vol. 81, no. 3, pp. 1275-1288, 2015.##
[21] F. ul Islam and G. Liu, “Designing S-box Based on 4D-4wing Hyperchaotic System,” 3D Res, vol. 8, no. 1, p. 9, 2017.##
[22] T. W. Hungerford, “Abstract Algebra: An Introduction,” Cengage Learning, 2012.##
[23] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, and E. Barker, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” Booz-Allen and Hamilton Inc. Mclean Va, 2001.##
[24] P. Ping, F. Xu, Y. Mao, and Z. Wang, “Designing Permutation–substitution Image Encryption Networks with Henon Map,” Neurocomputing, vol. 283, pp. 53-63, 2018.##
| ||
آمار تعداد مشاهده مقاله: 632 تعداد دریافت فایل اصل مقاله: 516 |