Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion
Heping Wen,
Yiting Lin,
Shenghao Kang,
Xiangyu Zhang,
Kun Zou
Affiliations
Heping Wen
University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China; School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China; School of Automation, Guangdong University of Technology, Guangzhou 510006, China; Corresponding author
Yiting Lin
University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China; School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
Shenghao Kang
University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China
Xiangyu Zhang
University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China; School of Automation, Guangdong University of Technology, Guangzhou 510006, China
Kun Zou
University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China; School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu 611731, China
Summary: Aiming at the problem of insufficient security of image encryption technology, a secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion is proposed, which is based on a variant structure of classical permutation-diffusion. During the permutation phase, the encryption operations of dividing an image into sub-block, block scrambling, block rotation and block inversion, negative-positive transformation, color component shuffling are performed sequentially with chaotic sequences of plaintext association. In the chain diffusion stage, different encryption strategies are adopted for the high and low 4-bit planes according to the weight of image information. Theoretical analyses and empirical results substantiate that the algorithm conforms to the cryptographic requirements of confusion, diffusion, and avalanche effects, while possessing excellent numerical statistical properties with a large cryptographic space. Therefore, the cryptanalysis-propelled security enhancement mechanism proposed in this paper effectively amplifies the aptitude of the algorithm to withstand cryptographic attacks.