A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution

Jameel Arif, Muazzam A. Khan, Baraq Ghaleb, Jawad Ahmad, Arslan Munir, Umer Rashid, Ahmed Y. Al-Dubai

Research output: Contribution to journalArticlepeer-review

Abstract

Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images' privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks. This paper presents a novel chaos-based image encryption method based on permutation and substitution using a single Substitution Box (S-Box) to address issues in contemporary image encryption algorithms. The proposed encryption technique's efficiency is validated through extensive experiments as compared to the state-of-the-art encryption algorithms using different measures and benchmarks. Precisely, the collected results demonstrate that the proposed technique is more resilient against well-known statistical attacks and performs well under plaintext attacks. Indeed, the proposed scheme exhibits very high sensitivity concerning the plaintext attack. A minor change in the encryption key or the plain text would result in a completely different encrypted image.

Original languageEnglish (US)
Pages (from-to)12966-12982
Number of pages17
JournalIEEE Access
Volume10
DOIs
StatePublished - 2022

Keywords

  • Chaotic system
  • image encryption
  • logistic map
  • permutation
  • substitution

ASJC Scopus subject areas

  • General Computer Science
  • General Materials Science
  • General Engineering

Fingerprint

Dive into the research topics of 'A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution'. Together they form a unique fingerprint.

Cite this