Skip to main content

Advertisement

Log in

RADIANT - hybrid multilayered chaotic image encryption system for color images

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Rapid growth in the use of digitized images in commercial, business, government and medical use has led to the need for protecting the images against eavesdroppers and securely transmit them in the network. Images pertained to finance, medical and crime investigation fields are expected to be confidential because of its sensitivity. As reported in the literature most of encryption algorithms developed for gray images is only applied for color images. An exclusive system to exploit color spaces has been proposed that functions in a multilayered model. It is named as HybRid multilAyereD chaotic ImAge eNcrypTion (RADIANT) system to process sensitive color images especially applicable for medical and forensic domains. In the first layer, logistic mapping is done to perform chaotic masking, followed by DNA encoding in the second layer. This layer objective is to increase confusion diffusion level by substitution permutation. In the third layer, ECC over GF(p) that focus on spatial domain is adopted for encryption as it has been identified as a prominent encryption technique being popular for its mathematical strength. The proposed RADIANT system is hybrid in nature as it operates on both symmetric and asymmetric cryptosystem combination. Experimental results obtained by testing with bench mark images ascertain an ideal measure for MSE, PSNR that makes it more suitable for signal processing activities involving sensitive color images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Alassaf N, Alkazemi B, and Gutub A (2003) Applicable light-weight cryptography to secure medical data in iot systems. Arabia

  2. Al-Otaibi Nouf A., and Gutub A A (2014) Flexible stego-system for hiding text in images of personal computers based on user security priority. Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014)

  3. Bhatnagar G, Jonathan Wu QM, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci 223:297–316

    Article  MathSciNet  Google Scholar 

  4. Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimedia Tools and Applications 76(7):9907–9927

    Article  Google Scholar 

  5. Chen J et al (2018) Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353

    Article  Google Scholar 

  6. Clelland CT, Risca V, Bancroft C (1999) Hiding messages in DNA microdots. Nature 399(6736):533–534

    Article  Google Scholar 

  7. El-Latif AAA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU-International Journal of Electronics and Communications 67(2):136–143

    Article  Google Scholar 

  8. Gehani A, LaBean T, Reif J (2003) DNA-based cryptography. Lect Notes Comput Sci 2950:167–188

    Article  Google Scholar 

  9. Gutub A (2007) Efficient utilization of scalable multipliers in parallel to compute GF (p) elliptic curve cryptographic operations. Kuwait Journal of Science & Engineering (KJSE), December 2007 34(2):165–182

    Google Scholar 

  10. Gutub AA-A (2010) Preference of efficient architectures for GF (p) elliptic curve crypto operations using multiple parallel multipliers. International Journal of Security (IJS) 4(4):46

    Google Scholar 

  11. Gutub AA-A, El-Shafei A-RM, Aabed MA (2011) Implementation of a pipelined modular multiplier architecture for GF (p) elliptic curve cryptography computation. Kuwait J Sci Eng 38(2B):125–153

    Google Scholar 

  12. Gutub Adnan Abdul-Aziz, et al. (2013) Serial vs. parallel elliptic curve crypto processor designs. IADIS International Conference: Applied Computing

  13. Halvorsen K, Wong WP (2012) Binary DNA nanostructures for data encryption. PLoS One 7(9):e44212

    Article  Google Scholar 

  14. Head T et al (2000) Computing with DNA by operating on plasmids. Biosystems 57(2):87–93

    Article  Google Scholar 

  15. Kumar M, Mishra DC, Sharma RK (2014) A first approach on an RGB image encryption. Opt Lasers Eng 52:27–34

    Article  Google Scholar 

  16. Kumar M, Powduri P, Reddy A (2015) An RGB image encryption using diffusion process associated with chaotic map. Journal of Information Security and Applications 21:20–30

    Article  Google Scholar 

  17. Kumar M, Powduri P, Reddy A (2015) An diffusion process associated with chaotic map. Journal of Information Security and Applications 21:20–30

    Article  Google Scholar 

  18. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  19. Lang J (2012) A no-key-exchange secure image sharing scheme based on Shamir’s three-pass cryptography protocol and the multiple-parameter fractional Fourier transform. Opt Express 20(3):2386–2398

    Article  Google Scholar 

  20. Lang J (2015) Color image encryption based on color blend and chaos permutation in the reality-preserving multiple-parameter fractional Fourier transform domain. Opt Commun 338:181–192

    Article  Google Scholar 

  21. Li L, Abd El-Latif AA, Niu X (2012) Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Signal Process 92(4):1069–1078

    Article  Google Scholar 

  22. Lima JB, Novaes LFG (2014) Image encryption based on the fractional Fourier transform over finite fields. Signal Process 94:521–530

    Article  Google Scholar 

  23. Liu S, Sheridan JT (2013) Optical encryption by combining image scrambling techniques in fractional Fourier domains. Opt Commun 287:73–80

    Article  Google Scholar 

  24. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327

    Article  MathSciNet  Google Scholar 

  25. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903

    Article  Google Scholar 

  26. Liu H, Wang X (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Article  Google Scholar 

  27. Liu Zeyu, and Xia T. (2017) Novel two dimensional fractional-order discrete chaotic map and its application to image encryption. Applied Computing and Informatics

  28. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Computers & Electrical Engineering 38(5):1240–1248

    Article  Google Scholar 

  29. Luo Y, Minghui D, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460

    Article  Google Scholar 

  30. Mishra DC et al (2014) Security of color image data designed by public-key cryptosystem associated with 2D-DWT. Fractals 22(04):1450011

    Article  MathSciNet  Google Scholar 

  31. Mondal B, Mandal T (2017) A light weight secure image encryption scheme based on chaos & DNA computing. Journal of King Saud University-Computer and Information Sciences 29(4):499–504

    Article  Google Scholar 

  32. Murillo-Escobar MA et al (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Process 109:119–131

    Article  Google Scholar 

  33. Ning K 2009 A pseudo DNA cryptography method. arXiv preprint arXiv:0903.2693

  34. Niu Y, Wang X (2011) An anonymous key agreement protocol based on chaotic maps. Commun Nonlinear Sci Numer Simul 16(4):1986–1992

    Article  MathSciNet  Google Scholar 

  35. Pan SM et al (2017) Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform. Multimedia Tools and Applications 76(2):2933–2295

    Article  Google Scholar 

  36. Ponuma R, Amutha R (2017) Compressive sensing based image compression-encryption using novel 1D-chaotic map. Multimedia Tools and Applications:1–26

  37. Radhika KR, and Nalini MK (2017) Biometric Image Encryption Using DNA Sequences and Chaotic Systems. Recent Advances in Electronics and Communication Technology (ICRAECT), International Conference on. IEEE

  38. Shukla A (2015) Image encryption using elliptic curve cryptography. International Journal of Students' Research in Technology & Management 1(2):115–117

    Google Scholar 

  39. Singh LD, Singh KM (2015) Image encryption using elliptic curve cryptography. Procedia Computer Science 54:472–481

    Article  Google Scholar 

  40. Sui L et al (2014) Asymmetric multiple-image encryption based on coupled logistic maps in fractional Fourier transform domain. Opt Lasers Eng 62:139–152

    Article  Google Scholar 

  41. Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217–227

    Article  Google Scholar 

  42. Wang X-Y et al (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615–621

    Article  MathSciNet  Google Scholar 

  43. Wang X, Lin T, Xue Q (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Article  MathSciNet  Google Scholar 

  44. Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124

    Article  Google Scholar 

  45. Zhang Y-Q, Wang X-Y (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  46. Zhang Q, Wei X (2013) RGB color image encryption method based on Lorenz chaotic system and DNA computation. IETE Tech Rev 30(5):404–409

    Article  MathSciNet  Google Scholar 

  47. Zhang Y, Xiao D (2013) Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform. Opt Lasers Eng 51(4):472–480

    Article  Google Scholar 

  48. Zheng X, Xu J, Li W (2009) Parallel DNA arithmetic operation based on n-moduli set. Appl Math Comput 212(1):177–184

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

The part of this research work is supported by Department of Science and Technology (DST), Science and Engineering Board (SERB), Government of India under the ECR grant (ECR/2017/000679/ES)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Sasikaladevi.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sasikaladevi, N., Geetha, K., Sriharshini, K. et al. RADIANT - hybrid multilayered chaotic image encryption system for color images. Multimed Tools Appl 78, 11675–11700 (2019). https://doi.org/10.1007/s11042-018-6711-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6711-0

Keywords