Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Digital data plays a paramount part in various fields of life, in which multimedia data represent the majority of transferred digital data via communication networks. Consequently, cryptographers and researchers have paid attention to the security of multimedia. Chaotic models are utilised intensely with optimisation techniques for designing modern multimedia cryptosystems, but the role of optimisation approaches is to improve experimental outcomes rather than complex computations in designing cryptosystems. Amidst the rapid evolution of quantum resources, current multimedia cryptosystems may be cracked because their construction relies on mathematical paradigms. This paper introduces a robust image cryptosystem that leverages bit-level permutation, particle swarm optimization, the 3D logistic system, and quantum walk. In the presented cryptosystem, the probability distribution generated by quantum walk and the chaotic sequences produced by the 3D logistic function are utilized as inputs for a customized particle swarm optimization algorithm. The resulting keystreams are then employed in both the permutation phase (at the pixel and bit levels) and substitution phase of the image cryptosystem. Experimental results indicate that the suggested cryptosystem has high-security contra different raids such as differential, statistical, and occlusion attacks. The average outcome for local entropy, global entropy, NPCR (Number of Pixel Change Rate), UACI (Unified Average Changed Intensity), Chi-square, and encryption speed are measured at 7.9025, 7.99985, 99.61306%, 33.4657%, 256.960725, and 1.7081 megabits per second, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data Availability Statement

The data used in the study can be accessed upon your request to the corresponding author.

References

  1. Tao L, Liang X, Hu B, Han L (2022) Compound encryption of multiple images by utilizing a novel chaos and nonlinear transform. Neural Comput Appl

  2. Jin M, Wang W, Wang X (2022) Optical color image cryptosystem based on interference principle and deep learning. Optik 251:168474

    Article  Google Scholar 

  3. Gan Z, Bi J, Ding W, Chai X (2021) Exploiting 2d compressed sensing and information entropy for secure color image compression and encryption. Neural Comput Appl 33:12845–12867

    Article  Google Scholar 

  4. Wang K, Wu X, Gao T (2021) Double color images compression-encryption via compressive sensing. Neural Comput Appl 33:12755–12776

    Article  Google Scholar 

  5. Li H-S, Li C, Chen X, Xia H (2019) Quantum image encryption based on phase-shift transform and quantum Haar wavelet packet transform. Mod Phys Lett A 34:1950214

    Article  MathSciNet  MATH  Google Scholar 

  6. Lai Q, Zhang H, Kuate PDK, Xu G, Zhao X-W (2022) Analysis and implementation of no-equilibrium chaotic system with application in image encryption. Appl Intell 52:11448–11471

    Article  Google Scholar 

  7. Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52:2556–2585

    Article  Google Scholar 

  8. Alanezi A, Abd-El-Atty B, Kolivand H, El-Latif AAA, El-Rahiem BA, Sankar S, Khalifa HS (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw 2021:1–17

    Article  Google Scholar 

  9. Zheng J, Zeng Q (2022) An image encryption algorithm using a dynamic s-box and chaotic maps. Appl Intell

  10. Riyahi M, Rafsanjani MK, Motevalli R (2021) A novel image encryption scheme based on multi-directional diffusion technique and integrated chaotic map. Neural Comput Appl 33:14311–14326

    Article  Google Scholar 

  11. Gan Z, Chai X, Han D, Chen Y (2018) A chaotic image encryption algorithm based on 3-d bit-plane permutation. Neural Comput Appl 31:7111–7130

    Article  Google Scholar 

  12. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  MATH  Google Scholar 

  13. Wang X, Li Y (2021) Chaotic image encryption algorithm based on hybrid multi-objective particle swarm optimization and DNA sequence. Opt Lasers Eng 137:106393

    Article  Google Scholar 

  14. Ferdush J, Mondol G, Prapti AP, Begum M, Sheikh MNA, Galib SM (2019) An enhanced image encryption technique combining genetic algorithm and particle swarm optimization with chaotic function. Int J Comput Appl 43:960–967

    Google Scholar 

  15. Ahmad M, Alam MZ, Umayya Z, Khan S, Ahmad F (2018) An image encryption approach using particle swarm optimization and chaotic map. Int J Inf Technol 10:247–255

    Google Scholar 

  16. Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25:5299–5322

    Article  Google Scholar 

  17. Luo Y, Ouyang X, Liu J, Cao L, Zou Y (2022) An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Comput 26:5409–5435

    Article  Google Scholar 

  18. Abd-El-Atty B (2022) Quaternion with quantum walks for designing a novel color image cryptosystem. J Inf Secur Appl 71:103367

    Google Scholar 

  19. Abd-El-Atty B, ElAffendi M, El-Latif AAA (2022) A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications. Complex Intell Syst

  20. Yang Y-G, Zhao Q-Q (2016) Novel pseudo-random number generator based on quantum random walks. Sci Rep 6

  21. Abd-El-Atty B (2023) A robust medical image steganography approach based on particle swarm optimization algorithm and quantum walks. Neural Comput Appl 35(1):773–785

    Article  Google Scholar 

  22. Li Y, Li X, Jin X, Zhao G, Ge S, Tian Y, Zhang X, Zhang K, Wang Z (2015) An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. In: Applications and techniques in information security, pp 3–13, Springer, Berlin

  23. Abd-El-Atty B, El-Latif AAA, Venegas-Andraca SE (2019) An encryption protocol for NEQR images based on one-particle quantum walks on a circle. Quant Inf Process 18

  24. True color kodak images. http://r0k.us/graphics/kodak/. Accessed 7 July 2022

  25. Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Barker EB, Leigh SD, Levenson M, Vangel M, Banks DL, Heckert NA, Dray JF, Vo S (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech Rep

Download references

Acknowledgements

Ahmed A. Abd El-Latif would like to thank Prince Sultan University for their support. Also, the authors gratefully acknowledge the unconditional support of their families.

Funding

This research received no funding.

Author information

Authors and Affiliations

Authors

Contributions

These authors contributed equally to this research.

Corresponding author

Correspondence to Bassem Abd-El-Atty.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest.

Ethics Approval

This research contains neither human nor animal studies.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abd-El-Atty, B., Abd EL-Latif, A.A. Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks. Neural Comput & Applic 35, 18325–18341 (2023). https://doi.org/10.1007/s00521-023-08643-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-023-08643-5

Keywords

Navigation