Abstract
Exploring the conception of robust encryption techniques for the security of digital images is a permanent necessity due to the existence of the Internet where sending and receiving information to establish communication is a high priority activity. Encryption process is carried out by data transformation, i.e. shuffled or scrambled, so that the information can not be read by an unauthorized receiver and it can exclusively be decrypted using valid-keys. In this paper, a novel fusion-scheme based on mathematical equation system for encryption-image algorithm is explored. In order to do that, numerical pixels are introduced in a system of equations for fusing images with three different private-keys. In addition, classical tests between original and encrypted images such as correlation coefficient, number of changing pixel rate (NPCR), unified average changed intensity (UACI) and entropy have been carried out to support the effectiveness of image fusion for image encryption.











Similar content being viewed by others
References
Bansal R, Chawla R, Gupta S (2016) A comparison of image encryption techniques based on chaotic maps. In: 2016 3Rd international conference on computing for sustainable global development (INDIACom), pp 933–938
Borujeni Shahram Etemadi EM (2009) Chaotic image encryption design using tompkins-paige algorithm. In: Mathematical problems in engineering 2009, vol 22, pp 762–652
Chen H (2019) Component Fusion Image Encryption Method Based on Composite Chaotic Model 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). Hohhot, China, pp 493–4934
Chen D, Zhu Z, Yang G (2008) An improved image encryption algorithm based on chaos. In: 2008 The 9th international conference for young computer scientists, pp 2792–2796
Chidambaram N, et al. (2018) A Logistic Approach to Route Image in a Protected Way-a Skeptimistic Image Image Encryption a Fusion, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore
Chunguang H, Hai C, Yu S, Qun D (2015) Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. In: 2015 Third international conference on robot, vision and signal process- ing (RVSP), pp 163–166
Cid C, Murphy S, Robshaw M (2004) Computational and algebraic aspects of the advanced encryption standard. In: Proceedings of the Seventh Inter- national Workshop on Computer Algebra in Scientific Computing, CASC 2004, pp 93–103
Dongfeng S, Jian H, Yingjian W, et al. (2017) Simultaneous fusion, imaging and encryption of multiple objects using a single-pixel detector. Sci Rep 7:13172
Essaid M, Akharraz I, Saaidi A, Mouhib A (2019) A novel image encryption scheme based on permutation/diffusion process using an improved 2D chaotic system,2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). Fez, Morocco, pp 1–6
Hamici Z (2017) Image cryptography based on the imitation of gene fusion and horizontal gene transfer, 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA). Montreal, QC, pp 1–6
Huang CK, Liao CW, Hsu SL, Jeng YC (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52(2):563–571
Kalubandi VKP, Vaddi H, Ramineni V, Loganathan A (2016) A novel image encryption algorithm using AES and visual cryptography. In: 2016 2Nd international conference on next generation computing technologies (NGCT), pp 808–813
Khan M (2018) W.H.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLOs one 13(11)
Liang Y, Xiao Z (2018) Image encryption algorithm based on compressive sensing and fractional DCT via polynomial interpolation. Int j Autom comput
Liu S, Sun J, Xu Z, Liu J (2008) Analysis on an image encryption algorithm. In: 2008 International workshop on education technology and training 2008 international workshop on geoscientific and remote sensing, vol 1, pp 803–806
Nag A, Singh JP, Khan S, Ghosh S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 International conference on signal processing, communication, computing and networking technologies, pp 309–312
Nasir Q, Abdlrudha HH (2012) High Security nested PWLCM chaotic map Bit-Level permutation based image encryption. In: International Journal of Communication, Network and System Sciences, vol 5, pp 548–556
Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. J Image Video Proc 2018 142
Ramasamy P, Ranganathan V, Kadry S, Damasevicius R, Blazauskas T (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced Logistic-Tent map. Entropy 21:656
Somaraj S, Hussain MA (2015) Performance and security analysis for image encryption using key image. In: Indian journal of science and technology 8(35)
Sun S, Guo Y, Wu R (2019). In: IEEE Access, vol 7, pp 28539–28547
Wolfram S (1999) The Mathematica book, version 4 cambridge university press
Wu Y, Member S, Noonan JP, Member L, Agaian S, Member S (2011) NPCR And UACI randomness tests for image encryption. In: Multidisciplinary journals in science and technology, journal of selected areas in telecommunications JSAT
Ye Z, Yin H, Ye Y (2017) Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain. In: 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), https://doi.org/10.1109/ICEEE.2017.8108905, pp 1–6
Yu G, Shen Y, Zhang G, Yang Y (2013) A chaos-based color image encryption algorithm. In: 2013 Sixth international symposium on computational intelligence and design, vol 2, pp 92–95
Zhang Y (2013) Encryption speed improvement on an improvement over an image encryption method based on total shuffling. In: Proceedings of 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, pp 201–205
Zhang X, Chen W (2008) A new chaotic algorithm for image encryption. In: 2008 International conference on audio, language and image processing, pp 889–892
Zhang Y, Zhang Z, Lei Y (2010) Research on chaotic cryptosystem based on time delay feedback Chua circuit. In: 2010 International conference on computer and communication technologies in agriculture engineering, vol 3, pp 187–190
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Torres-Muñoz, D., Vázquez-Leal, H. & Hernández-Mejía, C. Exploring a novel fusion-scheme based on mathematical equation system for encryption-image algorithm. Multimed Tools Appl 79, 24873–24888 (2020). https://doi.org/10.1007/s11042-020-09168-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-09168-y