Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

This article has been updated

Abstract

Present era is marked by exponential growth in transfer of multimedia data through internet. Most of the Internet-of-Things(IoT) applications send images to cloud storages through internet. However, in sensitive applications such as healthcare, defense, etc., these images should be encrypted before transmission through insecure public channels to gateway fog nodes. Conventional encryption algorithms cannot be used there due to the resource constraint characters of IoT devices. Here, Cellular Automata (CA) based encryption algorithms can be used because of their inherent simplicity in implementation in hardware, without affecting the capability of generating highly random sequences. In this paper, a lightweight, robust and secure image encryption technique has been proposed using 2-D Von-Neumann Cellular Automata (VCA), called IEVCA, which is lossless, correlation immune and has all the essential properties of a good image cipher. Additionally, the proposed technique passes all the randomness tests of DIEHARD and NIST statistical test suites. Moreover, several security and performance analyses of the IEVCA proved its efficiency and resistance against security attacks. Experimental results of the IEVCA show its better performance when compared to the existing encryption techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

Change history

  • 09 August 2021

    The original version of this paper was updated to present the correct ORCID of the corresponding author and to present the corrected data “??” in Algorithm 3

Notes

  1. https://web.archive.org/web/20160125103112/http://stat.fsu.edu/pub/diehard/

  2. https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic

  3. https://www.raspberrypi.org/documentation/hardware/raspberrypi/power/README.md

References

  1. Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik 203:164000

    Google Scholar 

  2. Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51 (6):665–673

    Google Scholar 

  3. Bernstein DJ (2008) Chacha, a variant of salsa20. In: Workshop Record of SASC, vol 8, pp 3–5

  4. Beyer WA, Sellers PH, Waterman MS (1985) Stanislaw m. ulam’s contributions to theoretical theory. Lett Math Phys 10(2):231–242

    MathSciNet  MATH  Google Scholar 

  5. Bouchemal N, Maamri R, Chihoub M (2013) Securing ambient agents groups by using verification, judgment and surveillance. International Journal of Ambient Computing and Intelligence (IJACI) 5(3):44–60

    Google Scholar 

  6. Chattopadhyay P, Choudhury PP, Dihidar K (1999) Characterisation of a particular hybrid transformation of two-dimensional cellular automata. Computers & Mathematics with Applications 38(5-6):207–216

    MathSciNet  MATH  Google Scholar 

  7. Chen R-J, Lai Y-T, Lai J-L (2006) Architecture design and vlsi hardware implementation of image encryption/decryption system using re-configurable 2d von neumann cellular automata. In: 2006 IEEE International Symposium on Circuits and Systems, IEEE, pp 4–pp

  8. Choudhury PP, Nayak BK, Sahoo S, Rath SP (2008) Theory and applications of two-dimensional, null-boundary, nine-neighborhood, cellular automata linear rules. arXiv:0804.2346

  9. Diffie W, Hellman M (1976) New directions in cryptography. IEEE transactions on Information Theory 22(6):644–654

    MathSciNet  MATH  Google Scholar 

  10. Dihidar K, Choudhury PP (2004) Matrix algebraic formulae concerning some exceptional rules of two-dimensional cellular automata. Inf Sci 165 (1-2):91–101

    MathSciNet  MATH  Google Scholar 

  11. Dong C (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Processing Image Communications 29(5):628–640

    Google Scholar 

  12. Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using dna sequence. Opt Lasers Eng 115:131–140

    Google Scholar 

  13. Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Google Scholar 

  14. Faheem M, Butt RA, Raza B, Ashraf MW, Ngadi MA, Gungor VC (2019) A multi-channel distributed routing scheme for smart grid real-time critical event monitoring applications in the perspective of industry 4.0. International Journal of Ad Hoc and Ubiquitous Computing 32(4):236–256

    Google Scholar 

  15. Faheem M, Gungor VC (2018) Mqrp: Mobile sinks-based qos-aware data gathering protocol for wireless sensor networks-based smart grid applications in the context of industry 4.0-based on internet of things. Futur Gener Comput Syst 82:358–374

    Google Scholar 

  16. Faheem M, Shah SBH, Butt RA, Raza B, Anwar M, Ashraf MW, Ngadi MA, Gungor VC, communication Smart grid (2018) Information technologies in the perspective of industry 4.0 Opportunities and challenges. Computer Science Review 30:1–30

    Google Scholar 

  17. Feistel H (1973) Cryptography and computer privacy. Scientific american 228(5):15–23

    Google Scholar 

  18. Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Optics communications 284(23):5415–5423

    Google Scholar 

  19. Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17(3):1294–1312

    Google Scholar 

  20. Heuer J, Hund J, Pfaff O (2015) Toward the web of things: Applying web technologies to the physical world. Computer 48(5):34–42

    Google Scholar 

  21. Hua Z, Zhou Y (2016) Image encryption using 2d logistic-adjusted-sine map. Inf Sci 339:237–253

    Google Scholar 

  22. Hua Z, Zhou B, Zhou Y (2018) Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans Ind Electron 66 (2):1273–1284

    Google Scholar 

  23. Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836–1843

    Google Scholar 

  24. Karmakar J, Nandi D, Mandal M (2020) A novel hyper-chaotic image encryption with sparse-representation based compression, multimedia tools and applications, 1–24

  25. Kaur M, Kumar V (2018) A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering 27:1–29

    Google Scholar 

  26. Khan AR, Choudhury PP, Dihidar K, Mitra S, Sarkar P (1997) Vlsi architecture of a cellular automata machine. Computers & Mathematics with Applications 33(5):79–94

    MathSciNet  MATH  Google Scholar 

  27. Khan AR, Choudhury PP, Dihidar K, Verma R (1999) Text compression using two-dimensional cellular automata. Computers & Mathematics with Applications 37(6):115–127

    MathSciNet  MATH  Google Scholar 

  28. Khan MA, Salah K (2018) Iot security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411

    Google Scholar 

  29. Khashan OA, AlShaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images, multimedia tools and applications, 1–20

  30. Khedmati Y, Parvaz R, Behroo Y (2020) 2D hybrid chaos map for image security transform based on framelet and cellular automata. Inf Sci 512:855–879

    MathSciNet  Google Scholar 

  31. Kimbahune VV, Deshpande AV, Mahalle PN (2017) Lightweight key management for adaptive addressing in next generation internet. International Journal of Ambient Computing and Intelligence (IJACI) 8 (1):50–69

    Google Scholar 

  32. Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5):1125–1142

    Google Scholar 

  33. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327

    MathSciNet  MATH  Google Scholar 

  34. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–3903

    Google Scholar 

  35. Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Google Scholar 

  36. Makri E, ten Brinke J, Evers R, Man P, Olthof H (2018) Privacy-friendly wi-fi-based occupancy estimation with minimal resources. International Journal of Ambient Computing and Intelligence (IJACI) 9(4):34–51

    Google Scholar 

  37. Mhetre NA, Deshpande AV, Mahalle PN (2016) Trust management model based on fuzzy approach for ubiquitous computing. International Journal of Ambient Computing and Intelligence (IJACI) 7(2):33–46

    Google Scholar 

  38. Mohamed FK (2014) A parallel block-based encryption schema for digital images using reversible cellular automata. Engineering Science and Technology, an International Journal 17(2):85–94

    Google Scholar 

  39. Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. Journal of information security and applications 45:117–130

    Google Scholar 

  40. Nandi S, Kar B, Chaudhuri PP (1994) Theory and applications of cellular automata in cryptography. IEEE Transactions on computers 43 (12):1346–1357

    MathSciNet  Google Scholar 

  41. Nayak P, Nayak SK, Das S (2018) A secure and efficient color image encryption scheme based on two chaotic systems and advanced encryption standard. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, pp 412–418

  42. Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying iot security: an exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations. IEEE Communications Surveys & Tutorials 21(3):2702–2733

    Google Scholar 

  43. Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237

    Google Scholar 

  44. Noura H, Chehab A, Noura M, Couturier R, Mansour MM (2019) Lightweight, dynamic and efficient image encryption scheme. Multimedia Tools and Applications 78(12):16527–16561

    MATH  Google Scholar 

  45. Omoniwa B, Hussain R, Javed MA, Bouk SH, Malik SA (2018) Fog/edge computing-based iot (feciot): architecture, applications, and research issues. IEEE Internet Things J. 6(3):4118–4149

    Google Scholar 

  46. Panarello A, Tapas N, Merlino G, Longo F, Puliafito A (2018) Blockchain and iot integration: a systematic survey. Sensors 18(8):2575

    Google Scholar 

  47. Pareek N, Patidar V, Sud K (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simul 10(7):715–723

    MathSciNet  MATH  Google Scholar 

  48. Ping P, Xu F, Wang Z-J (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429

    Google Scholar 

  49. Prasithsangaree P, Krishnamurthy P (2003) Analysis of energy consumption of rc4 and aes algorithms in wireless lans. In: GLOBECOM’03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489), ieee, vol 3, pp 1445–1449

  50. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    MathSciNet  MATH  Google Scholar 

  51. Sanchez-Avila C, Sanchez-Reillol R (2001) The rijndael block cipher (aes proposal): a comparison with des. In: Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186), IEEE, pp 229–234

  52. Siap I, Akin H, Sah F (2011) Characterization of two-dimensional cellular automata over ternary fields. J Frankl Inst 348(7):1258–1275

    MathSciNet  MATH  Google Scholar 

  53. Tong X-J, Wang Z, Zhang M, Liu Y (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2):229–241

    MathSciNet  Google Scholar 

  54. Torres-Huitzil C (2013), IEEE, LASCAS

  55. Uguz S, Sahin U, Sahin F (2013) Uniform cellular automata linear rules for edge detection. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics, IEEE, pp 2945–2950

  56. Von Neumann J, Burks AW, et al. (1966) Theory of self-reproducing automata. IEEE Transactions on Neural Networks 5(1):3–14

    Google Scholar 

  57. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    MATH  Google Scholar 

  58. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Inf Sci 539:195–214

    MathSciNet  Google Scholar 

  59. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    MathSciNet  MATH  Google Scholar 

  60. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Google Scholar 

  61. Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18 (11):3075–3085

    MathSciNet  MATH  Google Scholar 

  62. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  63. Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218–232

    Google Scholar 

  64. Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615–621

    MathSciNet  MATH  Google Scholar 

  65. Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53–61

    Google Scholar 

  66. Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on dna encryption and entropy. Nonlinear Dynamics 90(2):855–875

    MathSciNet  MATH  Google Scholar 

  67. Xu Y, Helal A (2015) Scalable cloud–sensor architecture for the internet of things. IEEE Internet Things J. 3(3):285–298

    Google Scholar 

  68. Yang Y-G, Tian J, Lei H, Zhou Y-H, Shi W-M (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270

    Google Scholar 

  69. Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5):1250–1258

    Google Scholar 

  70. Zhang Y-Q, He Y, Li P, Wang X-Y (2020) A new color image encryption scheme based on 2dnlcml system and genetic operations. Opt Lasers Eng 128:106040

    Google Scholar 

  71. Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based iot: Challenges. IEEE Commun Mag 55(1):26–33

    Google Scholar 

  72. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Optics communications 285(1):29–37

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manu Shrivastava.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Roy, S., Shrivastava, M., Pandey, C.V. et al. IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl 80, 31529–31567 (2021). https://doi.org/10.1007/s11042-020-09880-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-09880-9

Keywords

Navigation