Journal of Information Security and Applications 45 (2019) 117–130 Contents lists available at ScienceDirect Journal of Information Security and Applications journal homepage: www.elsevier.com/locate/jisa A secure image encryption scheme based on cellular automata and chaotic skew tent map Bhaskar Mondal a, , Shrey Singh b , Prabhakar Kumar b a Xavier School of Computer Science and Engineering, Xavier University Bhubaneshwar, Orissa, 752050, India b Department of Computer Science and Engineering, National Institute of Technology Jamshedpur Jamshedpur, Jharkhand, 831014, India a r t i c l e i n f o Article history: MSC: 37B15 68P25 65P20 Keywords: Cellular automata Chaotic skew tent map Image encryption Security a b s t r a c t This paper presents a highly secure image encryption scheme for secure image communication and stor- age. The scheme is based on a chaotic skew tent map and cellular automata (CA). The chaotic skew tent map is used as the initial vector generator for the CA which needs a 128 bit initial bit sequence to gener- ate pseudo random number sequence (PRNS). Using the PRNS, the plain image pixels are first permuted to remove the high correlation among the adjacent pixels in the image. Then the permuted image is en- crypted based on a single random number generated by the chaotic skew tent map. The chaotic skew tent map has a very large key space, on the other hand, CA generates PRNS faster than a chaotic pseudo random number generator (PRNG). Therefore, a combination of both chaotic map and CA gives a sys- tem with higher key space and faster PRNS generator. The experimental results show a good encryption effects which are capable to resist any kind of known attacks. © 2019 Elsevier Ltd. All rights reserved. 1. Introduction Over last few years, several cryptographic schemes have been proposed based on confusion and diffusion. The confusion and dif- fusion based encryption schemes involve two basic phases; first phase is confusion in which the pixels positions are scrambled to destroy inter-pixel correlation and the second phase is diffusion which involves some reversible operations that alter the pixel val- ues [1]. The confusion and diffusion processes may be applied for m and n rounds such that m, n > 0. The confusion and diffusion processes use pseudo random number sequences (PRNSs). PRNS are generated by chaotic maps [2,3]. There are several techniques to generate PRNS. For example, a Chebyshev chaotic map is used to generate PRNS [4], which stores the eight bit planes separately (assuming 8-bit gray level images) and handles a matrix of size eight times the size of original im- age. Then the PRNS permutes the pixel bits. For permutation, this scheme needs to sort the PRNS which adds additional computa- tional overhead for sorting the long chaotic sequence. In the sec- ond part, the scheme again permutes the bit plain based on an Arnold’s cat map. But, the number of rounds needed to achieve the results is not mentioned. As the scheme permutes the bit planes twice, it generates a diffusion effect on encrypted image. As the Corresponding author. E-mail address: bmondal@xub.edu.in (B. Mondal). permutation-only ciphers are weak to the cryptanalysis, the overall scheme results in high complexity and low security scheme. There- fore, another scheme which involves permutation and diffusion is needed. For example, in [5], Mondal and Mandal proposed an im- age encryption scheme based on cross-chaotic logistic maps and DNA computations. The cross-chaotic logistic maps are used for generating PRNSs which are used for permutation of image pixels. and DNA computations are used for diffusion of the pixel values. It has been proved that in all permutation-only image ciphers, re- gardless of the cipher structure, the correct permutation mapping is recovered completely by a chosen-plaintext attack [6]. The Fu’s scheme [4] and Rahman’s Scheme which are permutation-only ci- pher were successfully broken where the plain-images are of size M × N and L different color intensities, the number of chosen plain- images n required to break the permutation-only image encryption algorithm is n = (log L (MN)).(O(n.MN))[6]. In [7], Premkumar and Anand proposed a Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. In this proposed scheme arithmetic crossover and multi-point crossovers operator are used for permutation of the image. By using arith- metic crossover, two new individuals sequences are produced and a new sequence is decomposed into bit planes. Multiple crossovers are used to swap these bit-planes. In substitution they have used hybrid mutation i.e. boundary mutation for replacing the array size from top to bottom, non-uniform mutation to add pixel row wise, column-wise or diagonally, and uniform mutation to replace the pixels by circular shift. A 3-D CSI map is used to produce an https://doi.org/10.1016/j.jisa.2019.01.010 2214-2126/© 2019 Elsevier Ltd. All rights reserved.