IEEE Access (Jan 2022)

A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution

  • Jameel Arif,
  • Muazzam A. Khan,
  • Baraq Ghaleb,
  • Jawad Ahmad,
  • Arslan Munir,
  • Umer Rashid,
  • Ahmed Y. Al-Dubai

DOI
https://doi.org/10.1109/ACCESS.2022.3146792
Journal volume & issue
Vol. 10
pp. 12966 – 12982

Abstract

Read online

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks. This paper presents a novel chaos-based image encryption method based on permutation and substitution using a single Substitution Box (S-Box) to address issues in contemporary image encryption algorithms. The proposed encryption technique’s efficiency is validated through extensive experiments as compared to the state-of-the-art encryption algorithms using different measures and benchmarks. Precisely, the collected results demonstrate that the proposed technique is more resilient against well-known statistical attacks and performs well under plaintext attacks. Indeed, the proposed scheme exhibits very high sensitivity concerning the plaintext attack. A minor change in the encryption key or the plain text would result in a completely different encrypted image.

Keywords