Abstract
Sending and receiving information in today’s world has become easy. Recent advancements in the technology have made the world shrink. The transfer of data hence has become effortless. At one touch of the ‘send’ button, the data is made available to the required receiver. This has put the sender and receiver at ease to communicate. Ensuring the safety of the data being transmitted and also that it is in the right hands are the prime aspects of the communication process. Anyone who is interested in knowing the information may mess about the data. Hence it is required to protect the information from the unauthorized user. The very intention of this work is to provide enough security to the confidential color images that are to reach only the legitimate receiver. This paper focuses on the essential quantum of work required to ensure that the confidential images are out of harm’s way. It also is a sincere effort to accomplish the same using not very complicated techniques and to make use of a combination of simple algorithms like tent map and logistic map. The goal of the work is achieved with exertion which employs the technique of splitting the image into required number of appropriate blocks followed by the implementation of the vital processes: confusion and diffusion to achieve the mission. Confusion involves shuffling of the blocks and diffusion is implemented using a random sequence. This technique applied has helped to reach the least amount of correlation between the pixels in the ciphered image. The lesser is the degree of association between the nearby pixels in the encrypted image, higher is the efficiency of the encryption. The method implemented in this work is a simple version of the combination of tent map and logistic map and is trouble free and at the same time gives the required security to the image so that no unauthenticated user can make out the data even if he manages to get the ciphered adaptation of it.

























Similar content being viewed by others
References
Abuturab MR An Asymmetric Color Image Cryptosystem Based on Schur Decomposition in Gyrator Transform Domain. Opt Lasers Eng 582014:39–47. https://doi.org/10.1016/j.optlaseng.2014.01.025
Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel Tolerant Image Encryption Scheme. Wirel Pers Commun 77:2771–2791. https://doi.org/10.1007/s11277-014-1667-5
Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547. https://doi.org/10.1007/s11042-016-4206-4
Beloucif A, Noui O, Noui L (2016) Design of a Tweakable Image Encryption Algorithm Using Chaos-Based Schema. Int J Inf Comput Secur 8(3):205–220. https://doi.org/10.1504/IJICS.2016.079183
Brindha M, Ammasai Gounden NG, Sriram M (2015) A Hybrid Image Encryption Algorithm using Ahao and Conway's Game-of-Life Cellular Automata. Security and Communication Networks, Hoboken
Chai X et al A Fast Chaos-Based Image Encryption Scheme with a Novel Plain Image-Related Swapping Block Permutation and Block Diffusion. Multimed Tools Appl 76(142017):15561–15585. https://doi.org/10.1007/s11042-016-3858-4
Chen R-J, Chen Y-H, Chen C-S, Lai J-L Image encryption/decryption system using 2-D cellular automataİ. IEEE 10th International Symposium on Consumer Electronics 2006:1–6
Chen R-J, Wen-Kai L, Lai J-L (2005) Image encryption using progressive cellular Automata substitution and SCAN. IEEE International Symposium on Circuits and Systems 2:1690–1693
Chong F, Chen J-J, Zou H, Meng W-H, Zhan Y-F, Ya-Wen Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378. https://doi.org/10.1364/OE.20.002363
Jin J (2012) An image encryption based on elementary cellular automataİ. Optics and Lasers in Engineering, Elsevier Publication 50(12):1836–1843
Kumar S et al. (2015) Comparative Analysis of Color Image Encryption Using 2D Chaotic Maps, pp. 379–87, 10.1007/978-81-322-2247-7_39
Mollaeefar M et al (2017) A Novel Encryption Scheme for Colored Image Based on High Level Chaotic Maps. Multimed Tools Appl 76(1):607–629. https://doi.org/10.1007/s11042-015-3064-9
Pak C, Huang L (2017) A New Color Image Encryption Using Combination of the 1D Chaotic Map. Signal Process 138, Elsevier B.V.:129–137. https://doi.org/10.1016/j.sigpro.2017.03.011
Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing 2018:142. https://doi.org/10.1186/s13640-018-0386-3
Pareek NK, Patidar V (2006) Image encryption using chaotic logistic map, image and vision computing. Elsevier Publication 24(9):926–934
Qiang Z, Wei X (2013) RGB Color Image Encryption Method Based on Lorenz Chaotic System and DNA Computation. IETE Tech Rev 30(5):404–409. https://doi.org/10.4103/0256-4602.123123
Sharma M (2016) Chaos Based Image Encryption Using Two Step Iterated Logistic Map. pp. 1–5
Sharma V, Agnihotri HC, Chetan HP An Image Encryption and Decryption Techniques Using Two Chaotic Schemes. International Journal of Research in Advent Technology 2(2) E-ISSN: 2321-9637
Swathi Suresh M, Varghese DA (2015) An Efficient and optimized RC5 Image Encryption Algorithm for Secured Image Transmission. International Journal of Imaging and Robotics 15(3):117–125
Toughi S et al (2017) An Image Encryption Scheme Based on Elliptic Curve Pseudo Random and Advanced Encryption System. Signal Process 141, Elsevier B.V.:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010
Xuelong Z, Li Q, Manwu X, Fengyu L (2005) A symmetric cryptography based on Extended cellular automataİ. IEEE International Conference on Systems Man and Cybernetics 1:499–503
Yang Y-G, Xia J, Jia X, Zhang H (2013) Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf Process 12:3477–3493. https://doi.org/10.1007/s11128-013-0612-y
Ye R (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Opt Commun 284(22, Elsevier B.V.):5290–5298. https://doi.org/10.1016/j.optcom.2011.07.070
Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks, Hoboken
Ye G, Pan C, Huang X, Zhao Z, He J (2018) A Chaotic Image Encryption Algorithm Based on Information Entropy. International Journal of Bifurcation and Chaos 28(1). https://doi.org/10.1142/S0218127418500104
Ye G, Zhao H (2016) Huajin ChaiChaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067–2077. https://doi.org/10.1007/s11071-015-2465-7
Yun-Peng Z, Wei L, Shui-Ping C, Zhengjun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems Man and Cybernetics, pp. 474–479
Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647–6669. https://doi.org/10.1007/s11042-017-4577-1
Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Optics Communications, Elsevier Publication 285(5):594–608
Ziba Eslami N, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Sumathi, R., Raajan, N.R. A multilevel distributed image based encryption for full integrity. Multimed Tools Appl 79, 2161–2183 (2020). https://doi.org/10.1007/s11042-019-08104-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08104-z