Abstract
Partial encryption is one of the viable solutions for low power, high speed, real time secure multimedia communication. In this paper, a chaotic tent map based selective bitplane encryption technique is proposed for both gray scale and color images. After decomposing the original image into eight bitplanes, each bitplane is classified into either significant or non-significant category by defining a flexible threshold value of 0.3, deduced experimentally. Following this segregation, only the significant bitplanes are encrypted with the key stream sequences generated by a chaos-based pseudo-random binary number generator. The cipher image is then transmitted through public channel. The proposed scheme has three important contributions v.i.z. a) determination of significant bitplanes, b) encryption of only the significant bitplanes leading to reduction in computational complexity and c) elimination of the need for separate channel for transmitting the information about the significant bitplanes. It is shown that the proposed partial encryption scheme saves around 35% computation on the image database used here. Different types of attacks against this scheme are also analysed to show the robustness of this approach.

















Similar content being viewed by others
References
Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image based steganography using truth table based and determinate array on RGB indicator. Int J Signal Image Process (IJSIP) 1(3):196–204
Al-Otaibi NA, Gutub A (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lect Notes Inf Theory 2(2):151–157. Engineering and Technology Publishing
Al-Otaibi NA, Gutub A (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. In: Proceedings of international conference on advanced engineering technologies (AET-2014). Dubai, pp 250–256
Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci (JREAS) 2(2):50–58
Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76 (22):24527–24547. ISSN: 1573-7721
Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2018) Impact of digital fingerprint image quality on the fingerprint recognition accuracy, multimedia tools and applications. https://doi.org/10.1007/s11042-017-5537-5
Arroyo D, Alvarez G, Fernandez V (2008) On the inadequacy of the logistic map for cryptographic applications. In: Proceedings X reunión española sobre criptología y Seguridad de la información (X RECSI). ISBN 978–84–691–5158–7. Universidad de Salamanca, Salamanca, pp 77–82
Bourbakis N, Alexopoulos C (1992) Picture data encryption using SCAN patterns. Pattern Recogn 25(6):567–581
Box GEP, Jenkins GM, Reinsel GC (1994) Time series analysis: forecasting and control, 3rd edn. Prentice-Hall, Upper Saddle River
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons & Fractals 21(3):749–761
Chen X, Huang X, Li J, Ma J, Lou W, Wong DS (2015) New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans Inf Forens Secur 10(1):69–78
Granado JM, Vega-Rodriguez MA, Sanchez-Perez JM, Gomez-Pulido JA (2009) IDEA and AES, two cryptographic algorithms implemented using partial and dynamic reconfiguration. Microelectron J 40(6):1032–1040
Gutub A, Al-Qahtani A, Tabakh A (2009) Triple-A: secure RGB image steganography based on randomization. In: 2009 IEEE/ACS International conference on computer systems and applications. Rabat, pp 400-403. https://doi.org/10.1109/AICCSA.2009.5069356
Gutub A, Al-Juaid N, Khan E Counting-based secret sharing technique for multimedia applications, multimedia tools and applications. Springer. https://doi.org/10.1007/s11042-017-5293-6
Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417
Huang Z, Liu S, Mao X, Chen K, Li J (2017) Insight of the protection for data security under selective opening attacks. Inf Sci 412–413:223–241
Hussain I, Shah T, Gondol MA (2012) Image encryption algorithm based on PGL(2,GF(28)) S-boxes and TD-ERCS chaotic sequence. Nonlinear Dyn
IEEE Computer Society (1985) IEEE Standard for binary floating-point arithmetic. In: ANSI/IEEE STANDARD 754-1985, pp. 0_1-. https://doi.org/10.1109/IEEESTD.1985.82928
Jin X, Yin S, Liu N, Li X, Zhao G, Ge S (2017) Color image encryption in non-rgb color space, multimedia tools & applications, ISSN: 1573-7721, pp 1–23
Jolfaei A, Mirghadri A (2011) Image encryption using chaos and block cipher. Comput Inf Sci 4(1):172–185
Khan F, Gutub A (2007) Message concealment techniques using image based steganography. In: 4Th IEEE GCC conference and exhibition, gulf international convention centre. Manamah
Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Euro J Publ Inc 32(1):48–58. ISSN 1450-216X, EuroJournals Publishing Inc.
Kuppusamy K, Thamodaran K (2012) Optimized partial image encryption scheme using PSO. In: Proceedings international conference on pattern recognition, informatics and medical engineering, pp 236–241
Larson EC, Chandler DM (2010) Most apparent distortion: full-reference image quality assessment and the role of strategy. J Electron Imag, 19:1
Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25 (8):2201–2210
Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437
Li J, Li YK, Chen X, Lee PPC, Lou W (2015) A hybrid cloud approach for secure authorized deduplication. IEEE Trans Parallel Distrib Syst 26(5):1206–1216
Li P, Li J, Huang Z, Li T, Gao C-Z, Yiu S-M, Chen K (2017) Multi-key privacy-preserving deep learning in cloud computing. Futur Gener Comput Syst 74:76–85
Marsaglia G (1995) DIEHARD Statistical tests, available at stat.fsu.edu/∼geo/diehard.html. Florida State University
Menezes AJ, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton
Mitra A, Palit S, Chaudhuri BB, Kundu S, Pathak S, Dutta R (2008) A new partial image encryption method for secured multimedia communication. In: Proceedings Workshop on mobile systems (WoMS), WBUT. Kolkata, India, 125–131, Jul
Panduranga HT, Naveen Kumar SK (2012) Advanced partial image encryption using two-stage hill cipher technique, vol 60
Panduranga HT, Naveen S, Kiran K (2013) Partial image encryption using block wise shuffling and chaotic map. In: Proceedings of IEEE int. conf. on optical imaging sensor and security. India, 1–5, Jul
Parameshachari BD, Soyjaudah KMS, Devi KAS (2013) Secure transmission of an image using partial encryption based algorithm. Int J Comput Appl 63(16):33–36. ISSN:0975-8887
Pareek NK, Patidar V, Sud KK (2010) A random bit generator using chaotic maps. Int J Netw Secur 10(1):32–38
Parvez MT, Gutub A (2008) RGB intensity based variable-bits image steganography. In: 3rd IEEE Asia-Pacific services computing conference. Yilan, pp 1322–1327. https://doi.org/10.1109/APSCC.2008.105
Parvez MT, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng (KJSE) 38(1B):127–142
Podesser M, Schmidt HP, Uhl A (2002) Selective bitplane encryption for secure transmission of image data in mobile environments. In: Proceedings of 5th nordic signal processing symposium (NORSIG’2002). Norway
Rakhi PR (2015) Partial image encryption using block shuffling and affine transform. Int J Comput Sci Inf Technol 6(3):2204–2207
Rukhin A, et al. (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications, information technology laboratory. National Institute of Standards and Technology
Sasidharan S, Philip DS (2011) Fast partial image encryption scheme with wavelet transform and Rc4. Int J Adv Eng Technol 1(4):322–33. ISSN: 2231-1963
Som S, Kotal A, Mitra A, Palit S, Chaudhuri BB (2014) A chaos based partial image encryption scheme. InL Proceedings 2nd IEEE int. conf. on business & information management, national institute of technology. Durgapur, India, 58–63, Jan
Uhl A, Pommer A (2005) Image and video encryption. From digital rights management to secured personal communication, advances in information security, vol 15. Springer
Wang X, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943–1950
Wang X, Xu D (2013) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dyn 75:345–353
Wang X, Xu D (2015) A novel image encryption scheme using chaos and Langton’s Ant cellular automaton. Nonlinear Dyn 79:2449–2456
Wang X, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621
Yen JC, Guo JI (1999) A new image encryption algorithm and its VLSI architecture. In: Proceedings of IEEE workshop on signal processing systems, pp 430–437
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram, vol 77
Zhang X, Wang X (2013) Chaos-based partial encryption of SPIHT coded color images. Signal Process 93:2422–2431
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Som, S., Mitra, A., Palit, S. et al. A selective bitplane image encryption scheme using chaotic maps. Multimed Tools Appl 78, 10373–10400 (2019). https://doi.org/10.1007/s11042-018-6539-7
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6539-7