Title of article :
Color image encryption using linear feedback shift registers by three-dimensional permutation and substitution operations
Author/Authors :
momeni asl, ali Departament of computer engineering - Qom Branch - Islamic Azad University - Qom, Iran , broumandnia, ali Departament of computer engineering - South Tehran Branch - Islamic Azad University - Tehran, Iran , mirabedini, javad Department of Computer engineering - Center Tehran Branch - Islamic Azad University, Tehran, Iran
Abstract :
This study proposes a scale-invariant digital color image encryption method that includes three main
steps the pre-substitution, the 3D scale-invariant modular chaotic map, and the post-substitution.
1) The pre-substitution: At the first stage, pixels of plain sub-images are XOR with different key
patterns. By starting from one of the plain sub-images, the pixels of the selected plain sub-image is
XOR with the initial key, and the result is used as the cipher sub-image and as the next key pattern
for performing XOR operations on the next plain sub-image. In other words, the XOR result of each
step is used as the next step key pattern, 2) the 3D permutation: At the second stage, first the red,
green, and blue components of a M*N color image is divided to m sub-images with size n*n. Then
m sub-images are partitioned into k =
*m
n
*
windows W1 to Wk with size n*n sub-images. The last
two Wk * 1 and Wk windows may be overlap in several sub-images. Finally, the three-dimensional
modular chaotic maps are performed on the W1 to Wk windows with MIPF keys and selected by
LFSR, 3) the post-substitution: At the nal stage, the M *N color image is initially divided into a
set of color sub-images. Then, the 24-bit pixels of each sub-images are circularly shifted with several
bits specied in the secret key. Modular arithmetic is used in the 3D scale-invariant chaotic maps to
increase keyspace and enhance security parameters. With repeat at least one round of main steps,
the proposed encryption scheme reaches optimum parameter values and it is highly sensitive to minor
differences in both secret key and plain image. The proposed encryption method for images improves
the standard parameters of evaluation such as entropy, adjacent pixel correlations, histogram, and
expanded keyspace.
Keywords :
Image encryption , 3D chaotic map , Modular arithmetic , LFSR , Keyspace
Journal title :
International Journal of Nonlinear Analysis and Applications