Skip to main content
Log in

A novel multi-dimensional multiple image encryption technique

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a novel secure and fast multiple image encryption technique to encrypt multiple images of arbitrary sizes. In the proposed technique, a group of images is divided into non-overlapping blocks of size 2 × 2 pixels. For odd numbered image size, separate 2 × 2 sized blocks are formed from the last row and/or column pixels. The generated blocks and the remaining pixels (if any) are then arranged in separate arrays. Finally, the array of blocks and remaining pixels are separately permuted and diffused using different piece-wise linear chaotic map (PWLCM) systems. The significance of this algorithm is the use of arbitrary sized multiple images to perform multiple image encryptions. Another significance of this algorithm is the use of only PWLCM systems in permutation and diffusion operations to make the algorithm secure and efficient in both software and hardware platforms. The computer simulation reveals the good encryption results of the proposed cryptosystem. The security analysis shows that the proposed method performs better against widely known security attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images. IEEE Trans Inf Tech Biomedicine16:891–899.

    Google Scholar 

  2. Brindha M, Gounden NA (2016) A chaos based image encryption and lossless compression algorithm using hash table and Chinese remainder theorem. Appl Soft Comput 40:379–390

    Google Scholar 

  3. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Google Scholar 

  4. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps.ChaosSolitons fractals 21:749–61.

  5. Cheng H, Li X (2000) Partial encryption of compressed images and videos. IEEE Trans Signal Process 48:2439–2451

    Google Scholar 

  6. Coppersmith D (1994) The data encryption standard (DES) and its strengths against attacks. IBM J Res Dev38:243–250.

    MATH  Google Scholar 

  7. Dang PP, Chau PM (2000) Image encryption for secure internet multimedia applications. IEEE Trans Consum Electron 46:395–403

    Google Scholar 

  8. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Solitons Fractals29:393–399.

    MATH  Google Scholar 

  9. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos.Multimed tools Appl 75:4753–4769.

    Google Scholar 

  10. Guesmi R, Farah MAB, Kachouri A, Samet M (2016)A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2.Nonlinear Dyn 83:1123–1136.

    MathSciNet  MATH  Google Scholar 

  11. Gupta A, Thawait R, Patro KAK, Acharya B (2016) A novel image encryption based on bit-shuffled improved tent map. Int J Control Theory Appl 9:1–16

    Google Scholar 

  12. He J, Huang S, Tang S, Huang J (2018) JPEG image encryption with improved format compatibility and file size preservation. IEEE Trans Multimed.

    Google Scholar 

  13. Hu T, Liu Y, Gong LH, Ouyang CJ (2017) An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn 87:51–66

    Google Scholar 

  14. IEEE Standard for Binary Floating-Point Arithmetic. Floating-point Working Group. ANSI. IEEE Standard 1985:754–1985.

  15. Joshi M, Singh K (2008) Color image encryption and decryption for twin images in fractional Fourier domain. OptCommun281:5713–5720.

  16. Kong D, Shen X, Xu Q, Xin W, Guo H (2013) Multiple-image encryption scheme based on cascaded fractional Fourier transform. Appl Opt 52:2619–2625

    Google Scholar 

  17. KulsoomA XD, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75:1–23

    Google Scholar 

  18. Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inform Secur 7:265–270

    Google Scholar 

  19. Li H, Wang Y (2008) Double-image encryption based on iterative gyrator transform. OptCommun 281:5745–5749

    Google Scholar 

  20. Li H, Wang Y (2011) Double-image encryption based on discrete fractional random transform and chaotic maps. Opt Laser Eng 49:753–757

    Google Scholar 

  21. Li Y, Zhang F, Li Y, Tao R (2015) Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform. Opt Lasers Eng 72:18–25

    Google Scholar 

  22. Liu Z, Liu S (2007) Double image encryption based on iterative fractional Fourier transform. OptCommun 275:324–329

    Google Scholar 

  23. Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Sys Software 86:826–834

    Google Scholar 

  24. Liu Z, Dai J, Sun X, Liu S (2009) Triple image encryption scheme in fractional Fourier transform domains. OptCommun 282:518–522

    Google Scholar 

  25. Liu Z, Chen H, Liu T et al (2010) Double-image encryption based on the affine transform and the gyrator transform. J Opt 12:035407

    Google Scholar 

  26. Luo Y, Yu J, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tool Appl:1–21

  27. Mao Y, Wu M (2006) A joint signal processing and cryptographic approach to multimedia encryption. IEEE Trans Img Process15:2061–2075.

  28. Mohanty S, Shende A, Patro KAK, Acharya B (2017) A DNA based chaotic image fusion encryption scheme using LEA–256 and SHA–256. Indian J Sci Res14:190–201.

  29. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71:1469–1497

    Google Scholar 

  30. Pan X, Meng X, Yang X et al (2015) Triple-image encryption based on phase-truncated Fresnel transform and basic vector operation. Appl Opt 54:8485–8493

    Google Scholar 

  31. Patro KAK, Acharya B (2018) Secure multi–level permutation operation based multiple colour image encryption. J Inf Sec Appl 40:111–133

    Google Scholar 

  32. Patro KAK, Acharya B,Nath V (2018) A secure multi-stage one-round bit-plane permutation operation based chaotic image encryption. MicrosystTechnol 1-8.

  33. PatroKAK BA, Acharya B (2017) A simple, secure and time efficient multi-way rotational permutation and diffusion based image encryption by using multiple 1-D chaotic maps. ProcIntConfNext Gen ComputTechnol, Springer, Singapore, pp 396–418

    Google Scholar 

  34. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2015) Triple chaotic image scrambling on RGB–a random image encryption approach. Sec CommunNetw8:3335–3345.

    Google Scholar 

  35. Pub NF 197 (2001) Advanced encryption standard (AES). Federal Information Processing Standards Publication, US Department of Commerce/NIST

    Google Scholar 

  36. Samhita P, Prasad P, Patro KAK,Acharya B (2016) A secure chaos-based image encryption and decryption using crossover and mutation operator. Int J Control Theory Appl9:17–28.

  37. Shadangi V, Choudhary SK, Patro KAK, Acharya B (2017) Novel Arnold scrambling based CBC-AES image encryption. Int J Control Theory Appl 10:93–105

    Google Scholar 

  38. Singh N, Sinha A (2010) Chaos based multiple image encryption using multiple canonical transforms. Opt Laser Tech 42:724–731

    Google Scholar 

  39. Sui L, Lu H, Wang Z, Sun QL (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Laser Eng 56:1–12

    Google Scholar 

  40. Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Laser Eng 80:1–11

    Google Scholar 

  41. Tao R,Meng XY, Wang Y (2010) Image encryption with multiorders of fractional Fourier transforms. IEEE Trans Inf Forensic Secur5:734–738.

    Google Scholar 

  42. Ur Rehman A, Xiao D, Kulsoom A, Hashmi MA, Abbas SA (2019) Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tool Appl 78:9355–9382

    Google Scholar 

  43. USC-SIPI image database for research in image processing, image analysis, and machine vision. http://sipi.usc.edu/database/ (1977). Accessed July 2016.

  44. Wang XY, Gu SX (2014) New chaotic encryption algorithm based on chaotic sequence and plain text. IET Inform Secur 8:213–216

    Google Scholar 

  45. Wang X, Zhang HL (2016) A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems. Nonlinear Dyn 83:333–346

    MathSciNet  Google Scholar 

  46. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62:615–621

    MATH  Google Scholar 

  47. Wu CP, Kuo CC (2005) Design of integrated multimedia compression and encryption systems.IEEE trans multimed 7:828-839.

  48. Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-sine map and DNA approach. Sig Process 153:11–23

    Google Scholar 

  49. Xiang T, Liao X, Wong KW (2007) An improved particle swarm optimization algorithm combined with piecewise linear chaotic map. Appl Math Comput 190:1637–1645

    MathSciNet  MATH  Google Scholar 

  50. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Google Scholar 

  51. Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94:745–756

    Google Scholar 

  52. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Comput Elect Eng 62:401–413

    Google Scholar 

  53. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Laser Eng 92:6–16

    Google Scholar 

  54. Zhang J, Fang D,Ren H (2014) Image encryption algorithm based on DNA encoding and chaotic maps. Math Prob Eng.

  55. Zhou N, Jiang H, Gong L, Xie X (2018) Double-image compression and encryption algorithm based on co-sparse representation and random pixel exchanging. Opt Laser Eng 110:72–79

    Google Scholar 

  56. Zhou N, Yan X, Liang H, Tao X, Li G (2018) Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quant Inform Process 17:338

    MATH  Google Scholar 

  57. Zhou N, Chen W, Yan X, Wang Y (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system. Quant Inform Process 17:1–24

    MathSciNet  MATH  Google Scholar 

  58. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. OptCommun 285:29–37

    Google Scholar 

  59. Zhu W, Yang G, Chen L, Xu J (2014) Multiple-image encryption based on wavelet transform and improved double random phase encoding. J Nanjing Univ Posts Telecommun (Nat Science) 34:87–92

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bibhudendra Acharya.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Patro, K.A.K., Acharya, B. A novel multi-dimensional multiple image encryption technique. Multimed Tools Appl 79, 12959–12994 (2020). https://doi.org/10.1007/s11042-019-08470-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08470-8

Keywords

Navigation