Skip to main content
Log in

A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Secure communication has become a challenging task for researchers. In these circumstances, several encryption techniques for digital images have been proposed. In this paper, a new cryptosystem for color images is proposed based on the bit-plane decomposition, chaos theory and discrete wavelet transform (DWT). Bit plane decomposition and DWT are incorporated in order to reduce the overall computational time of the proposed encryption algorithm. To achieve the desired purpose, only the low frequency band is considered for the encryption, because a major part of the plaintext image lies in the low-frequency components. Moreover, chaotic maps are deployed to generate the random sequences and the key-image, which are used to create the diffusion in the plaintext image. For creating the randomness in the plaintext image, the seed values are selected based on the analysis of Gauss Iterated Map (GIM). The cipher image generated using the proposed encryption algorithm can also tolerate channel noise. If the ciphered data are altered by an unauthorized person or by the noisy channel, the plaintext image can still be recovered with little loss of information. The proposed work’s noise tolerance is assessed using cropping and noise attack analysis. To figure out the strength of the proposed cryptosystem, security parameters such as unified average change intensity (UACI) and number of pixels change rate (NPCR), entropy, energy, contrast correlation, and entropy are under consideration. The entropy values, NPCR and UACI, are larger than 7.99, 33 and 99.4%, respectively, which are remarkable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Optic Laser Eng 71:33–41

    Google Scholar 

  2. Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlin Sci Numer Simul 19(9):3106–3118

    MathSciNet  MATH  Google Scholar 

  3. Coppersmith D (1994) The data encryption standard (des) and its strength against attacks. IBM J Res Develop 38(3):243–250

    MATH  Google Scholar 

  4. Selent D (2010) Advanced encryption standard. Rivier Acad J 6(2):1–14

    Google Scholar 

  5. Mahajan P, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol

  6. Bai B, Nazir S, Bai Y, Anees A (2021) Security and provenance for internet of health things: a systematic literature review. J Softw: Evolut Process 33(5):e2335

    Google Scholar 

  7. Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic lorenz system and novel primitive polynomial s-boxes, Multimedia Tools and Applications, pp. 1–22

  8. Anees A, Chen Y-PP (2020) Designing secure substitution boxes based on permutation of symmetric group. Neural Comput Appl 32(11):7045–7056

    Google Scholar 

  9. Shafique A (2020) A new algorithm for the construction of substitution box by using chaotic map. Eur Phys J Plus 135(2):1–13

    Google Scholar 

  10. Shafique A, Ahmed F (2020) Image encryption using dynamic s-box substitution in the wavelet domain. Wirel Person Commun 115(3):2243–2268

    Google Scholar 

  11. Jamal SS, Anees A, Ahmad M, Khan MF, Hussain I (2019) Construction of cryptographic s-boxes based on mobius transformation and chaotic tent-sine system. IEEE Access 7:173273–173285

    Google Scholar 

  12. Anees A, Hussain I (2019) A novel method to identify initial values of chaotic maps in cybersecurity. Symmetry 11(2):140

    MATH  Google Scholar 

  13. Hussain I, Anees A, Al-Maadeed TA, Mustafa MT (2019) Construction of s-box based on chaotic map and algebraic structures. Symmetry 11(3):351

    Google Scholar 

  14. Shafique A, Ahmed J (2021) Dynamic substitution based encryption algorithm for highly correlated data. Multidimen Sys Sig Process 32:91–114

    MATH  Google Scholar 

  15. Wadi SM, Zainal N (2013) Rapid encryption method based on AES algorithm for grey scale HD image encryption. Procedia Tech 11:51–56

    Google Scholar 

  16. Hussain I, Anees A, Alkhaldi AH, Aslam M, Siddiqui N, Ahmed R (2019) Image encryption based on chebyshev chaotic map and s8 s-boxes. Optica Applicata 49(2):317–330

    Google Scholar 

  17. Shafique A, Ahmed J, Rehman MU, Hazzazi MM (2021) Noise-resistant image encryption scheme for medical images in the chaos and wavelet domain. IEEE Access 9:59108–59130

    Google Scholar 

  18. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics Laser Eng 90:238–246

    Google Scholar 

  19. Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Person Commun 77(4):2771–2791

    Google Scholar 

  20. Shafique A, Shahid J (2018) Novel image encryption cryptosystem based on binary bit planes extraction and multiple chaotic maps. Eur Phys J Plus 133(8):331

    Google Scholar 

  21. Wang L, Song H, Liu P (2016) A novel hybrid color image encryption algorithm using two complex chaotic systems. Optics Laser Eng 77:118–125

    Google Scholar 

  22. Haroun MF, Gulliver TA (2015) Real-time image encryption using a low-complexity discrete 3d dual chaotic cipher. Nonlin Dyn 82(3):1523–1535

    MathSciNet  MATH  Google Scholar 

  23. Hussain I, Ahmed F, Khokhar UM, Anees A (2018) Applied cryptography and noise resistant data security. Secur Commun Netw. https://doi.org/10.1155/2018/3962821

    Article  Google Scholar 

  24. Hilborn RC et al (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers. Oxford University Press, Oxford

    MATH  Google Scholar 

  25. Vaidyanathan S (2013) Analysis, control and synchronization of hyperchaotic zhou system via adaptive control, in Advances in Computing and Information Technology, pp. 1–10, Springer, Berlin

  26. Anees A, Siddiqui AM, Ahmed J, Hussain I (2014) A technique for digital steganography using chaotic maps. Nonlin Dyn 75(4):807–816

    Google Scholar 

  27. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 21(3):749–761

    MathSciNet  MATH  Google Scholar 

  28. Anees A, Hussain I, Algarni A, Aslam M (2018) A robust watermarking scheme for online multimedia copyright protection using new chaotic map. Secur Commun Netw. https://doi.org/10.1155/2018/1840207

    Article  Google Scholar 

  29. Hussain I, Anees A, Algarni A (2018) A novel algorithm for thermal image encryption. J Integrat Neurosci 17(3–4):447–461

    Google Scholar 

  30. Moysis L, Volos C, Jafari S, Munoz-Pacheco JM, Kengne J, Rajagopal K, Stouboulos I (2020) Modification of the logistic map using fuzzy numbers with application to pseudorandom number generation and image encryption. Entropy 22(4):474

    MathSciNet  Google Scholar 

  31. Tang WK, Liu Y (2011) Formation of high-dimensional chaotic maps and their uses in cryptography, in Chaos-based cryptography, pp. 99–136, Springer, Berlin

  32. Hua Z, Zhou Y, Pun C-M, Chen CP (2015) 2d sine logistic modulation map for image encryption. Info Sci 297:80–94

    Google Scholar 

  33. Wang X, Xu D (2014) A novel image encryption scheme based on brownian motion and pwlcm chaotic system. Nonlin Dyn 75(1–2):345–353

    Google Scholar 

  34. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Optics Commun 284(16–17):3895–3903

    Google Scholar 

  35. Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlin Dyn 79(2):1141–1149

    MathSciNet  Google Scholar 

  36. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Google Scholar 

  37. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Sign Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  38. Fu C, Chen J-J, Zou H, Meng W-H, Zhan Y-F, Yu Y-W (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Exp 20(3):2363–2378

    Google Scholar 

  39. Huang X, Ye G (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Communicat Nonlin Sci Numer Simul 19(12):4094–4104

    MATH  Google Scholar 

  40. Gu G, Ling J (2014) A fast image encryption method by using chaotic 3d cat maps. Optik-Int J Light Electr Opt 125(17):4700–4705

    Google Scholar 

  41. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372(4):394–400

    MATH  Google Scholar 

  42. Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Optics Commun 282(11):2123–2127

    Google Scholar 

  43. Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Optics Commun 283(2):232–236

    MATH  Google Scholar 

  44. Anees A, Ahmed Z (2015) A technique for designing substitution box based on van der pol oscillator. Wirel Person Commun 82(3):1497–1503

    Google Scholar 

  45. Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Sign Process 48(8):2439–2451

    Google Scholar 

  46. Anees A, Khan WA, Gondal MA, Hussain I (2013) Application of mean of absolute deviation method for the selection of best nonlinear component based on video encryption. Zeitschrift für Naturforschung A 68(6–7):479–482

  47. Zhou N, Dong T, Wu J (2010) Novel image encryption algorithm based on multiple-parameter discrete fractional random transform. Optics Commun 283(15):3037–3042

    Google Scholar 

  48. Hussain I, Anees A, AlKhaldi AH, Algarni A, Aslam M (2018) Construction of chaotic quantum magnets and matrix lorenz systems s-boxes and their applications. Chinese J Phys 56(4):1609–1621

    Google Scholar 

  49. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Sign Process 90(9):2714–2722

    MATH  Google Scholar 

  50. Chen T-H, Tsao K-H, Lee Y-S (2012) Yet another multiple-image encryption by rotating random grids. Sign Process 92(9):2229–2237

    Google Scholar 

  51. Mosso F, Tebaldi M, Barrera JF, Bolognini N, Torroba R (2011) Pure optical dynamical color encryption. Optics Exp 19(15):13779–13786

    Google Scholar 

  52. Auli-Llinas F, Marcellin MW (2012) Scanning order strategies for bitplane image coding. IEEE Trans Image Process 21(4):1920–1933

    MathSciNet  MATH  Google Scholar 

  53. Agaian S, Astola J, Egiazarian K, Kuosmanen P (1995) Decompositional methods for stack filtering using fibonacci p-codes. Signal Process 41(1):101–110

    Google Scholar 

  54. Zhou Y, Panetta K, Agaian S, Chen CP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybern 43(2):515–529

    Google Scholar 

  55. Podesser M, Schmidt H-P, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments, in CD-ROM Proceedings of the 5th IEEE nordic signal processing symposium (NORSIG 2002), 2002

  56. Moon D, Chung Y, Pan SB, Moon K, Chung KI (2006) An efficient selective encryption of fingerprint images for embedded processors. ETRI J 28(4):444–452

    Google Scholar 

  57. Anees A (2015) An image encryption scheme based on lorenz system for low profile applications. 3D Resear 6(3):24

    Google Scholar 

  58. Zhu Z-L, Zhang W, Wong K-W, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Infor Sci 181(6):1171–1186

    Google Scholar 

  59. Wang Z, Bovik AC (2006) Modern image quality assessment. Synth Lect Image, Video Mult Process 2(1):1–156

    Google Scholar 

  60. Anees A, iddiqui AM (2013) A technique for digital watermarking in combined spatial and transform domains using chaotic maps, in 2013 2nd national conference on information assurance (NCIA), pp. 119–124, IEEE

  61. Rehman MU, Shafique A, Khalid S, Hussain I (2021) Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps. IEEE Access 9:52277–52291

    Google Scholar 

  62. Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42

    Google Scholar 

  63. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 16(08):2129–2151

    MathSciNet  MATH  Google Scholar 

  64. Noshadian S, Ebrahimzade A, Kazemitabar SJ (2018) Optimizing chaos based image encryption. Multim Tool Appl 77(19):25569–25590

    Google Scholar 

  65. Luo Y, Zhou R, Liu J, Qiu S, Cao Y (2018) An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers. Multimed Tool Appl 77(20):26191–26217

    Google Scholar 

  66. Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tool Appl 78(8):10013–10034

    Google Scholar 

  67. Li Z, Peng C, Li L, Zhu X (2018) A novel plaintext-related image encryption scheme using hyper-chaotic system. Nonlin Dyn 94(2):1319–1333

    Google Scholar 

  68. Gao X, An L, Yuan Y, Tao D, Li X et al (2011) Lossless data embedding using generalized statistical quantity histogram. IEEE Trans Circuit Syst Video Tech 21(8):1061–1070

    Google Scholar 

  69. An L, Gao X, Yuan Y, Tao D, Deng C, Ji F (2012) Content-adaptive reliable robust lossless data embedding. Neurocomputing 79:1–11

    Google Scholar 

  70. Shafique A, Ahmed J, Boulila W, Ghandorh H, Ahmad J, Rehman MU (2020) Detecting the security level of various cryptosystems using machine learning models. IEEE Access 9:9383–9393

    Google Scholar 

  71. J. Khan, J. Ahmad, and S. O. Hwang (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box, In: 2015 6th International conference on modeling, simulation, and applied optimization (ICMSAO), pp. 1–6, IEEE

  72. Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Sign Process 155:391–402

    Google Scholar 

  73. Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Sign process 141:217–227

    Google Scholar 

  74. Balajee MK, Gnanasekar J (2016) Evaluation of key dependent s-box based data security algorithm using hamming distance and balanced output. TEM J 5(1):67

    Google Scholar 

  75. Katiyar S , Jeyanthi N (2016) Pure dynamic s-box construction,” Int J Comput vol. 1

  76. Ao T, Rao J, Dai K, Zou X (2017) Construction of high quality key-dependent s-boxes. Nonlinearity 13(14):15

    Google Scholar 

  77. Ahmad J, Tahir A, Khan JS, Khan MA, Khan FA, Habib Z, et al., (2019) A partial ligt-weight image encryption scheme, In: 2019 UK/China Emerging Technologies (UCET), pp. 1–3, IEEE

  78. Sayed WS, Radwan AG, Fahmy HA, Elsedeek A (2021) Trajectory control and image encryption using affine transformation of lorenz system. Egypt Infor J 22(2):155–166

    Google Scholar 

  79. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electr Commun 66(10):806–816

    Google Scholar 

  80. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons & Fractals 26(1):117–129

    MATH  Google Scholar 

  81. Ye R (2011) A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Optics Commun 284(22):5290–5298

    Google Scholar 

  82. Zhang X, Zhu G, Ma S (2012) Remote-sensing image encryption in hybrid domains. Optics Commun 285(7):1736–1743

    Google Scholar 

  83. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput & Math Appl 59(10):3320–3327

    MathSciNet  MATH  Google Scholar 

  84. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve diffie-hellman cryptography. Sign Process 125:187–202

    Google Scholar 

  85. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d DWT and 6d hyperchaotic system. Info Sci 349:137–153

    Google Scholar 

  86. Firdous A, urRehman A, Missen MMS (2019) A highly efficient color image encryption based on linear transformation using chaos theory and sha-2. Multimed Tool Appl 78(17):24809–24835

    Google Scholar 

  87. Musanna F, Kumar S (2019) A novel fractional order chaos-based image encryption using fisher yates algorithm and 3-d cat map. Multimed Tool Appl 78(11):14867–14895

    Google Scholar 

  88. Zhang Y (2020) The fast image encryption algorithm based on lifting scheme and chaos. Info Sci 520:177–194

    MathSciNet  MATH  Google Scholar 

  89. Iqbal N, Hanif M, Abbas S, Khan MA, Almotiri SH, Al Ghamdi MA (2020) Dna strands level scrambling based color image encryption scheme. IEEE Access 8:178167–178182

    Google Scholar 

  90. Kamal ST, Hosny KM, Elgindy TM, Darwish MM, Fouda MM (2021) A new image encryption algorithm for grey and color medical images. IEEE Access 9:37855–37865

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arslan Shafique.

Ethics declarations

Conflict of interest

This manuscript is neither submitted nor in under review at any other journal for publication.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shafique, A. A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map. Neural Comput & Applic 34, 16805–16828 (2022). https://doi.org/10.1007/s00521-022-07327-w

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-022-07327-w

Keywords

Navigation