Abstract
Present era is marked by exponential growth in transfer of multimedia data through internet. Most of the Internet-of-Things(IoT) applications send images to cloud storages through internet. However, in sensitive applications such as healthcare, defense, etc., these images should be encrypted before transmission through insecure public channels to gateway fog nodes. Conventional encryption algorithms cannot be used there due to the resource constraint characters of IoT devices. Here, Cellular Automata (CA) based encryption algorithms can be used because of their inherent simplicity in implementation in hardware, without affecting the capability of generating highly random sequences. In this paper, a lightweight, robust and secure image encryption technique has been proposed using 2-D Von-Neumann Cellular Automata (VCA), called IEVCA, which is lossless, correlation immune and has all the essential properties of a good image cipher. Additionally, the proposed technique passes all the randomness tests of DIEHARD and NIST statistical test suites. Moreover, several security and performance analyses of the IEVCA proved its efficiency and resistance against security attacks. Experimental results of the IEVCA show its better performance when compared to the existing encryption techniques.
Similar content being viewed by others
Change history
09 August 2021
The original version of this paper was updated to present the correct ORCID of the corresponding author and to present the corrected data “??” in Algorithm 3
Notes
https://web.archive.org/web/20160125103112/http://stat.fsu.edu/pub/diehard/
https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic
https://www.raspberrypi.org/documentation/hardware/raspberrypi/power/README.md
References
Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik 203:164000
Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51 (6):665–673
Bernstein DJ (2008) Chacha, a variant of salsa20. In: Workshop Record of SASC, vol 8, pp 3–5
Beyer WA, Sellers PH, Waterman MS (1985) Stanislaw m. ulam’s contributions to theoretical theory. Lett Math Phys 10(2):231–242
Bouchemal N, Maamri R, Chihoub M (2013) Securing ambient agents groups by using verification, judgment and surveillance. International Journal of Ambient Computing and Intelligence (IJACI) 5(3):44–60
Chattopadhyay P, Choudhury PP, Dihidar K (1999) Characterisation of a particular hybrid transformation of two-dimensional cellular automata. Computers & Mathematics with Applications 38(5-6):207–216
Chen R-J, Lai Y-T, Lai J-L (2006) Architecture design and vlsi hardware implementation of image encryption/decryption system using re-configurable 2d von neumann cellular automata. In: 2006 IEEE International Symposium on Circuits and Systems, IEEE, pp 4–pp
Choudhury PP, Nayak BK, Sahoo S, Rath SP (2008) Theory and applications of two-dimensional, null-boundary, nine-neighborhood, cellular automata linear rules. arXiv:0804.2346
Diffie W, Hellman M (1976) New directions in cryptography. IEEE transactions on Information Theory 22(6):644–654
Dihidar K, Choudhury PP (2004) Matrix algebraic formulae concerning some exceptional rules of two-dimensional cellular automata. Inf Sci 165 (1-2):91–101
Dong C (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Processing Image Communications 29(5):628–640
Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using dna sequence. Opt Lasers Eng 115:131–140
Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41
Faheem M, Butt RA, Raza B, Ashraf MW, Ngadi MA, Gungor VC (2019) A multi-channel distributed routing scheme for smart grid real-time critical event monitoring applications in the perspective of industry 4.0. International Journal of Ad Hoc and Ubiquitous Computing 32(4):236–256
Faheem M, Gungor VC (2018) Mqrp: Mobile sinks-based qos-aware data gathering protocol for wireless sensor networks-based smart grid applications in the context of industry 4.0-based on internet of things. Futur Gener Comput Syst 82:358–374
Faheem M, Shah SBH, Butt RA, Raza B, Anwar M, Ashraf MW, Ngadi MA, Gungor VC, communication Smart grid (2018) Information technologies in the perspective of industry 4.0 Opportunities and challenges. Computer Science Review 30:1–30
Feistel H (1973) Cryptography and computer privacy. Scientific american 228(5):15–23
Fu C, Lin B, Miao Y, Liu X, Chen J (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Optics communications 284(23):5415–5423
Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Communications Surveys & Tutorials 17(3):1294–1312
Heuer J, Hund J, Pfaff O (2015) Toward the web of things: Applying web technologies to the physical world. Computer 48(5):34–42
Hua Z, Zhou Y (2016) Image encryption using 2d logistic-adjusted-sine map. Inf Sci 339:237–253
Hua Z, Zhou B, Zhou Y (2018) Sine chaotification model for enhancing chaos and its hardware implementation. IEEE Trans Ind Electron 66 (2):1273–1284
Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836–1843
Karmakar J, Nandi D, Mandal M (2020) A novel hyper-chaotic image encryption with sparse-representation based compression, multimedia tools and applications, 1–24
Kaur M, Kumar V (2018) A comprehensive review on image encryption techniques. Archives of Computational Methods in Engineering 27:1–29
Khan AR, Choudhury PP, Dihidar K, Mitra S, Sarkar P (1997) Vlsi architecture of a cellular automata machine. Computers & Mathematics with Applications 33(5):79–94
Khan AR, Choudhury PP, Dihidar K, Verma R (1999) Text compression using two-dimensional cellular automata. Computers & Mathematics with Applications 37(6):115–127
Khan MA, Salah K (2018) Iot security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411
Khashan OA, AlShaikh M (2020) Edge-based lightweight selective encryption scheme for digital medical images, multimedia tools and applications, 1–20
Khedmati Y, Parvaz R, Behroo Y (2020) 2D hybrid chaos map for image security transform based on framelet and cellular automata. Inf Sci 512:855–879
Kimbahune VV, Deshpande AV, Mahalle PN (2017) Lightweight key management for adaptive addressing in next generation internet. International Journal of Ambient Computing and Intelligence (IJACI) 8 (1):50–69
Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5):1125–1142
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–3903
Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466
Makri E, ten Brinke J, Evers R, Man P, Olthof H (2018) Privacy-friendly wi-fi-based occupancy estimation with minimal resources. International Journal of Ambient Computing and Intelligence (IJACI) 9(4):34–51
Mhetre NA, Deshpande AV, Mahalle PN (2016) Trust management model based on fuzzy approach for ubiquitous computing. International Journal of Ambient Computing and Intelligence (IJACI) 7(2):33–46
Mohamed FK (2014) A parallel block-based encryption schema for digital images using reversible cellular automata. Engineering Science and Technology, an International Journal 17(2):85–94
Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. Journal of information security and applications 45:117–130
Nandi S, Kar B, Chaudhuri PP (1994) Theory and applications of cellular automata in cryptography. IEEE Transactions on computers 43 (12):1346–1357
Nayak P, Nayak SK, Das S (2018) A secure and efficient color image encryption scheme based on two chaotic systems and advanced encryption standard. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), IEEE, pp 412–418
Neshenko N, Bou-Harb E, Crichigno J, Kaddoum G, Ghani N (2019) Demystifying iot security: an exhaustive survey on iot vulnerabilities and a first empirical look on internet-scale iot exploitations. IEEE Communications Surveys & Tutorials 21(3):2702–2733
Niyat AY, Moattar MH, Torshiz MN (2017) Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt Lasers Eng 90:225–237
Noura H, Chehab A, Noura M, Couturier R, Mansour MM (2019) Lightweight, dynamic and efficient image encryption scheme. Multimedia Tools and Applications 78(12):16527–16561
Omoniwa B, Hussain R, Javed MA, Bouk SH, Malik SA (2018) Fog/edge computing-based iot (feciot): architecture, applications, and research issues. IEEE Internet Things J. 6(3):4118–4149
Panarello A, Tapas N, Merlino G, Longo F, Puliafito A (2018) Blockchain and iot integration: a systematic survey. Sensors 18(8):2575
Pareek N, Patidar V, Sud K (2005) Cryptography using multiple one-dimensional chaotic maps. Commun Nonlinear Sci Numer Simul 10(7):715–723
Ping P, Xu F, Wang Z-J (2014) Image encryption based on non-affine and balanced cellular automata. Signal Process 105:419–429
Prasithsangaree P, Krishnamurthy P (2003) Analysis of energy consumption of rc4 and aes algorithms in wireless lans. In: GLOBECOM’03. IEEE Global Telecommunications Conference (IEEE Cat. No. 03CH37489), ieee, vol 3, pp 1445–1449
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Sanchez-Avila C, Sanchez-Reillol R (2001) The rijndael block cipher (aes proposal): a comparison with des. In: Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No. 01CH37186), IEEE, pp 229–234
Siap I, Akin H, Sah F (2011) Characterization of two-dimensional cellular automata over ternary fields. J Frankl Inst 348(7):1258–1275
Tong X-J, Wang Z, Zhang M, Liu Y (2013) A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2):229–241
Torres-Huitzil C (2013), IEEE, LASCAS
Uguz S, Sahin U, Sahin F (2013) Uniform cellular automata linear rules for edge detection. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics, IEEE, pp 2945–2950
Von Neumann J, Burks AW, et al. (1966) Theory of self-reproducing automata. IEEE Transactions on Neural Networks 5(1):3–14
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a boolean network. Inf Sci 539:195–214
Wang X, Gao S (2020) Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18 (11):3075–3085
Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108
Wang H, Xiao D, Li M, Xiang Y, Li X (2019) A visually secure image encryption scheme based on parallel compressive sensing. Signal Process 155:218–232
Wang X-Y, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615–621
Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using dna sequence operations. Opt Lasers Eng 73:53–61
Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on dna encryption and entropy. Nonlinear Dynamics 90(2):855–875
Xu Y, Helal A (2015) Scalable cloud–sensor architecture for the internet of things. IEEE Internet Things J. 3(3):285–298
Yang Y-G, Tian J, Lei H, Zhou Y-H, Shi W-M (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270
Yang Y, Wu L, Yin G, Li L, Zhao H (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J. 4(5):1250–1258
Zhang Y-Q, He Y, Li P, Wang X-Y (2020) A new color image encryption scheme based on 2dnlcml system and genetic operations. Opt Lasers Eng 128:106040
Zhou J, Cao Z, Dong X, Vasilakos AV (2017) Security and privacy for cloud-based iot: Challenges. IEEE Commun Mag 55(1):26–33
Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Optics communications 285(1):29–37
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Roy, S., Shrivastava, M., Pandey, C.V. et al. IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl 80, 31529–31567 (2021). https://doi.org/10.1007/s11042-020-09880-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09880-9