A RGB image encryption algorithm based on total plain image characteristics and chaos

Currently, color image encryption is important to ensure its confidentiality during its transmission on insecure networks or its storage. The fact that chaotic properties are related with cryptography properties in confusion, diffusion, pseudorandom, etc., researchers around the world have presented...

Full description

Saved in:
Bibliographic Details
Published inSignal processing Vol. 109; pp. 119 - 131
Main Authors Murillo-Escobar, M.A., Cruz-Hernández, C., Abundiz-Pérez, F., López-Gutiérrez, R.M., Acosta Del Campo, O.R.
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.04.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Currently, color image encryption is important to ensure its confidentiality during its transmission on insecure networks or its storage. The fact that chaotic properties are related with cryptography properties in confusion, diffusion, pseudorandom, etc., researchers around the world have presented several image (gray and color) encryption algorithms based on chaos, but almost all them with serious security problems have been broken with the powerful chosen/known plain image attack. In this work, we present a color image encryption algorithm based on total plain image characteristics (to resist a chosen/known plain image attack), and 1D logistic map with optimized distribution (for fast encryption process) based on Murillo-Escobar׳s algorithm (Murillo-Escobar et al. (2014) [38]). The security analysis confirms that the RGB image encryption is fast and secure against several known attacks; therefore, it can be implemented in real-time applications where a high security is required. •We use 1D chaotic logistic map with optimized distribution for fast RGB image encryption.•The encryption uses just one permutation/diffusion round.•The chaotic stream used in encryption is dependent on total plain image characteristics and secret key.•The proposed algorithm resist the powerful chosen/known plain image attack.•Security analysis shows the effectiveness of the encryption for real-time applications.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:0165-1684
1872-7557
DOI:10.1016/j.sigpro.2014.10.033