Abstract
In this paper we presented a image encryption based on permutation-substitution using chaotic map and Latin square image cipher. The proposed method consists of permutation and substitution process. In permutation process, plain image is permuted according to chaotic sequence generated using chaotic map. In substitution process, based on secrete key of 256 bit generate a Latin Square Image Cipher (LSIC) and this LSIC is used as key image and perform XOR operation between permuted image and key image. The proposed method can applied to any plain image with unequal width and height as well and also resist statistical attack, differential attack. Experiments carried out for different images of different sizes. The proposed method possesses large key space to resist brute force attack.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Salleh, Mazleena, Ibrahim, J. Teknol. 39, 1 (2012)
Usama, Muhammad, Khan, Biom. Sec. Technol., 1 (2008)
Wang, Xingyuan, Yang, Lei, Opt. Comm. 285, 4033 (2013)
Ye, Ruisong, J. Teknol. 284, 5290 (2011)
Abd El-Latif, Ahmed A., Niu, AEU-International J. Electron. Comm. (2012)
Wang, Xingyuan, Teng, Lin, Qin, Xue, Signal Proc. 92, 1101 (2012)
Patidar, Vinod, Pareek, Opt. Comm. 284, 4331 (2011)
Fu, Chong, Lin, Bin-bin, Miao, Opt. Comm. 284, 5415 (2011)
Wu, Yue, Zhou, Yicong, Noonan, Joseph P., Panetta, SPIE Defense, Sec. Sensing, 77080 (2010)
Wu, Yue, Zhou, arXiv preprint [arXiv:1204.2310] (2012)
Wu, Yue, Agaian, arXiv preprint [arXiv:1207.5856] (2012)
Azzaz, M.S., Tanougast, Signals Syst. Conf. 1 (2009)
Chang, Chin-Chen, Lin, J. Comm. 5, 5 (2010)
Azzaz, M.S., Tanougast, NEWCAS Conf. 92, 61 (2010)
Wang, Xingyuan, Teng, Lin, Qin, Xue, Adv. Recent Technol. Comm. Comput., 623 (2009)
Tong, Xiaojun, Cui, Image Vision Comput. 26, 843 (2008)
F. Sun, Z.L.S. Liu, Opt. Comm. 283, 2066 (2010)
Abdullah, Abdul Hanan, AEU-Int. J. Electron. Comm. 66, 806 (2012)
Wang, Xingyuan, Jin, J. Comm. 5, 5 (2010)
Pareek, Narendra K., Patidar, Digital Signal Proc. (2012)
Wu, Yue, Noonan, Joseph P., Agaian, arXiv preprint [arXiv:1103.5520] (2011)
Wu, Yue, Noonan, Joseph P., Agaian, Cyber J.: Multidiscipl. J. Sci. Technol., 31 (2011)
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Panduranga, H., Naveen Kumar, S. & Kiran Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher. Eur. Phys. J. Spec. Top. 223, 1663–1677 (2014). https://doi.org/10.1140/epjst/e2014-02119-9
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1140/epjst/e2014-02119-9