Title of article :
Color image encryption using linear feedback shift registers by three-dimensional permutation and substitution operations
Author/Authors :
momeni asl, ali Departament of computer engineering - Qom Branch - Islamic Azad University - Qom, Iran , broumandnia, ali Departament of computer engineering - South Tehran Branch - Islamic Azad University - Tehran, Iran , mirabedini, javad Department of Computer engineering - Center Tehran Branch - Islamic Azad University, Tehran, Iran
Pages :
19
From page :
903
To page :
921
Abstract :
This study proposes a scale-invariant digital color image encryption method that includes three main steps the pre-substitution, the 3D scale-invariant modular chaotic map, and the post-substitution. 1) The pre-substitution: At the first stage, pixels of plain sub-images are XOR with different key patterns. By starting from one of the plain sub-images, the pixels of the selected plain sub-image is XOR with the initial key, and the result is used as the cipher sub-image and as the next key pattern for performing XOR operations on the next plain sub-image. In other words, the XOR result of each step is used as the next step key pattern, 2) the 3D permutation: At the second stage, first the red, green, and blue components of a M*N color image is divided to m sub-images with size n*n. Then m sub-images are partitioned into k = *m n * windows W1 to Wk with size n*n sub-images. The last two Wk * 1 and Wk windows may be overlap in several sub-images. Finally, the three-dimensional modular chaotic maps are performed on the W1 to Wk windows with MIPF keys and selected by LFSR, 3) the post-substitution: At the nal stage, the M *N color image is initially divided into a set of color sub-images. Then, the 24-bit pixels of each sub-images are circularly shifted with several bits specied in the secret key. Modular arithmetic is used in the 3D scale-invariant chaotic maps to increase keyspace and enhance security parameters. With repeat at least one round of main steps, the proposed encryption scheme reaches optimum parameter values and it is highly sensitive to minor differences in both secret key and plain image. The proposed encryption method for images improves the standard parameters of evaluation such as entropy, adjacent pixel correlations, histogram, and expanded keyspace.
Keywords :
Image encryption , 3D chaotic map , Modular arithmetic , LFSR , Keyspace
Journal title :
International Journal of Nonlinear Analysis and Applications
Serial Year :
2021
Record number :
2702972
Link To Document :
بازگشت