Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Researchers have paid increasing attention towards the usage of scrambled image for the image encryption in recent years. 2D and 3D scrambled images have already been employed to write the different image encryption algorithms. On the other hand, we need speedy and efficient ciphers to meet the rising demands of our society. The current study has used 1D scrambled image to develop a novel and a speedy image encryption algorithm. As the gray scale image is given to the encryption algorithm, its pixels are inserted randomly to the different positions of the scrambled image. This act has been iterated for a number of times. To throw the diffusion effects in the proposed cipher, Exclusive-OR (XOR) operation has been carried out. 2D logistic map has been selected for the chaotic vectors. First vector served the purpose of scrambling and the second one, the purpose of diffusion. The average time taken by the proposed image cipher is 0.0997 seconds, the information entropy of the cipher image came out to be 7.9975 and the number of pixels change rate (NPCR) is 99.6048%. Simulation and an exhaustive performance analyses depict that the proposed scheme has the desirable security effects and has the prospects for some real world application.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Fig. 3
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data Availability

The program will be available to the readers upon request.

References

  1. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Google Scholar 

  2. Bashir Z, Iqbal N, Hanif M (2021) A novel gray scale image encryption scheme based on pixels’ swapping operations. Multimed Tools Appl 80 (1):1029–1054

    Google Scholar 

  3. Bashir Z, Malik MG, Hussain M, Iqbal N (2021) Multiple RGB images encryption algorithm based on elliptic curve, improved Diffie Hellman protocol. Multimed Tools Appl:1–31

  4. Boreale M (2020) Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial odes. Sci Comput Program 193:102441

    Google Scholar 

  5. Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95:92–101

    MATH  Google Scholar 

  6. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Google Scholar 

  7. Chen J, Chen L, Zhou Y (2020) Cryptanalysis of a DNA-based image encryption scheme. Inf Sci 520:130–141

    MathSciNet  MATH  Google Scholar 

  8. Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map. Nonlinear Dyn 87(3):1797–1807

    MATH  Google Scholar 

  9. Eckmann JP, Ruelle D (1985) Ergodic theory of chaos and strange attractors. In: Hunt BR, Li TY, Kennedy JA, Nusse HE (eds) The theory of chaotic attractors. Springer, New York, NY. https://doi.org/10.1007/978-0-387-21830-4_17

  10. ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy 22(2):180

    MathSciNet  Google Scholar 

  11. Fournier-Prunaret D, Lopez-Ruiz R (2003) Basin bifurcations in a two-dimensional logistic map. arXiv:nlin/0304059

  12. Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. Int J Softw Sci Computat Intell (IJSSCI) 14(1):1–16

    Google Scholar 

  13. Hanif M, Abbas S, Khan MA, Iqbal N, Rehman ZU, Saeed MA, Mohamed EM (2020) A novel and efficient multiple RGB images cipher based on chaotic system and circular shift operations. IEEE Access 8:146408–146427

    Google Scholar 

  14. Hanif M, Naqvi RA, Abbas S, Khan MA, Iqbal N (2020) A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8:123536–123555

    Google Scholar 

  15. Hoang TM, Thanh HX (2018) Cryptanalysis and security improvement for a symmetric color image encryption algorithm. Optik 155:366–383

    Google Scholar 

  16. Huang H, Yang S, Ye R (2020) Efficient symmetric image encryption by using a novel 2D chaotic system. IET Image Process 14(6):1157–1163

    Google Scholar 

  17. Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A (2019) An rgb image cipher using chaotic systems, 15-puzzle problem and dna computing. IEEE Access 7:174051–174071

    Google Scholar 

  18. Iqbal N, Abbas S, Khan MA, Fatima A, Ahmed A, Anwer N (2020) Efficient image cipher based on the movement of king on the chessboard and chaotic system. J Electron Imaging 29(2):023025

    Google Scholar 

  19. Iqbal N, Hanif M, Abbas S, Khan MA, Rehman ZU (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Security Appl 58:102809

    Google Scholar 

  20. Iqbal N, Hanif M, Rehman ZU, Zohaib M (2022) On the novel image encryption based on chaotic system and DNA computing. Multimed Tools Appl 81(6):8107–8137

    Google Scholar 

  21. Iqbal N, Hasan O, Siddique U, Awwad F (2019) Formalization of asymptotic notations in HOL4. In: 2019 IEEE 4th international conference on computer and communication systems (ICCCS). IEEE, pp 383–387

  22. Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, Hussain D (2021) On the Image Encryption Algorithm Based on the Chaotic System, DNA Encoding, and Castle. IEEE Access 9:118253–118270

    Google Scholar 

  23. Kahan W (1996) IEEE standard 754 for binary floating-point arithmetic. Lect Notes Status IEEE 754(94720-1776):11

    Google Scholar 

  24. Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure and energy efficient-based E-health care framework for green internet of things. IEEE Trans Green Commun Netw 5(3):1223–1231

    Google Scholar 

  25. Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447

    Google Scholar 

  26. Li T, Du B, Liang X (2020) Image encryption algorithm based on logistic and two-dimensional lorenz. IEEE Access 8:13792–13805

    Google Scholar 

  27. Liu L, Hao S, Lin J, Wang Z, Hu X, Miao S (2018) Image block encryption algorithm based on chaotic maps. IET Signal Process 12 (1):22–30

    Google Scholar 

  28. Liu M, Zhao F, Jiang X, Liu X, Liu Y (2019) A novel image encryption algorithm based on plaintext-related hybrid modulation map. J Internet Technol 20(7):2141–2155

    Google Scholar 

  29. Ma Y, Li C, Ou B (2020) Cryptanalysis of an image block encryption algorithm based on chaotic maps. J Inf Security Appl 54:102566

    Google Scholar 

  30. Malik MA, Bashir Z, Iqbal N, Imtiaz MA (2020) Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8:88093–88107

    Google Scholar 

  31. Mani N, Moh M, Moh TS (2021) Defending deep learning models against adversarial attacks. Int J Softw Sci Computat Intell (IJSSCI) 13(1):72–89

    Google Scholar 

  32. Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy 22(3):274

    MathSciNet  Google Scholar 

  33. Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl 14(4):2537–2553

    Google Scholar 

  34. Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-Hernández C (2019) Suggested integral analysis for chaos-based image cryptosystems. Entropy 21(8):815

    MathSciNet  Google Scholar 

  35. Nguyen GN, Le Viet NH, Elhoseny M, Shankar K, Gupta BB, Abd El-Latif AA (2021) Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model. J Parallel Distrib Comput 153:150–160

    Google Scholar 

  36. Norouzi B, Mirzakuchaki S (2014) A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn 78(2):995–1015

    Google Scholar 

  37. Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ (2020) Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8:140876–140895

    Google Scholar 

  38. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    MathSciNet  MATH  Google Scholar 

  39. Sivakumar T, Venkatesan R (2016) A new image encryption method based on knight’s travel path and true random number. J Inf Sci Eng, vol 32(1)

  40. Strogatz SH (2018) Nonlinear dynamics and chaos: with applications to physics, biology, chemistry, and engineering. CRC Press

  41. Taneja N, Raman B, Gupta I (2012) Combinational domain encryption for still visual data. Multimed Tools Appl 59(3):775–793

    Google Scholar 

  42. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    MathSciNet  MATH  Google Scholar 

  43. Wang X, Xu D (2015) A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dyn 79(4):2449–2456

    MathSciNet  Google Scholar 

  44. Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300

    Google Scholar 

  45. Wu J, Liao X, Yang B (2018) Image encryption using 2D Hé,non-Sine map and DNA approach. Signal Process 153:11–23

    Google Scholar 

  46. Wu Y, Noonan JP, Yang G, Jin H (2012) Image encryption using the two-dimensional logistic chaotic map. J Electron Imaging 21(1):013014

    Google Scholar 

  47. Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272–287

    Google Scholar 

  48. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169

    MathSciNet  MATH  Google Scholar 

  49. Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78 (22):31035–31055

    Google Scholar 

  50. Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1–14

    Google Scholar 

  51. Yavuz E, Yazici R, Kasapbaşi MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Google Scholar 

  52. Zaman JKMS, Ghosh R (2012) Review on fifteen statistical tests proposed by NIST. J Theo Phys Crypto 1:18–31

    Google Scholar 

  53. Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584–600

    MathSciNet  MATH  Google Scholar 

  54. Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Google Scholar 

  55. Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169:150–157

    Google Scholar 

  56. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Optics Commun 285(1):29–37

    Google Scholar 

  57. Zhu C, Wang G, Sun K (2018) Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based S-box. Symmetry 10(9):399

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Nadeem Iqbal or Muhammad Adnan Khan.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Iqbal, N., Hussain, I., Khan, M.A. et al. An efficient image cipher based on the 1D scrambled image and 2D logistic chaotic map. Multimed Tools Appl 82, 40345–40373 (2023). https://doi.org/10.1007/s11042-023-15037-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15037-1

Keywords

Navigation