Abstract
An image encryption algorithm based on chaotic sequence and permutation matrix is presented in this paper, with the ability to create pseudo-features and realize one-time password mechanism. Firstly, the original image and the matrix which containing incremental key information are operated with XOR by chaotic matrix constructed by Logistic model. Then it is embedded in a larger matrix with pseudo-features. Finally, the permutation matrix is used to shuffle the pixel position of the image to get the encrypted image. The simulation results and security analysis show that the encryption algorithm has the advantages of stable one-time password mechanism, strong capacity to resist various attacks and ability to create pseudo-features.





Similar content being viewed by others

References
Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99. https://doi.org/10.1016/j.optlastec.2017.04.022
Akin E, Carlson JD (2012) Conceptions of topological transitivity. Topol Applic 159(12):2815–2830. https://doi.org/10.1016/j.topol.2012.04.016
Arroyo D, Diaz J, Rodriguez F (2013) Cryptanalysis of a one round chaosbased substitution permutation network. Signal Process 93 (5):1358–1364. https://doi.org/10.1016/j.sigpro.2012.11.019
Artiles JA, Chaves DP, Pimentel C (2019) Image encryption using block cipher and chaotic sequences. Signal Process: Image Commun 79:24–31. https://doi.org/10.1016/j.image.2019.08.014
Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inform Sci 324:197–207. https://doi.org/10.1016/j.ins.2015.06.049
Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170. https://doi.org/10.1016/j.sigpro.2016.03.021
Bianchi T, Piva A, Barni M (2009) On the implementation of the discrete fourier transform in the encrypted domain. IEEE Trans Inform Forens Secur 4 (1):86–97. https://ieeexplore.ieee.org/abstract/document/4768620
Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybern 46(5):1132–1143. https://ieeexplore.ieee.org/abstract/document/7098386
Curiac DI, Volosencu C (2014) A 2d chaotic path planning for mobile robots accomplishing boundary surveillance missions in adversarial conditions. Commun Nonlinear Sci Numer Simul 19(10):3617–3627. https://doi.org/10.1016/j.cnsns.2014.03.020
Dong C (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process: Image Commun 29(5):628–640. https://doi.org/10.1016/j.image.2013.09.006
Elgendy F, Sarhan AM, Eltobely TE, El-Zoghdy SF, El-Sayed HS, Faragallah OS (2016) Chaos-based model for encryption and decryption of digital images. Multimed Tools Applic 75(18):11529–11553. https://link.springer.com/article/10.1007/s11042-015-2883-z
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlin Dyn 83(3):1123–1136. https://link.springer.com/article/10.1007/s11071-015-2392-7
Hermassi H, Belazi A, Rhouma R, Belghith S (2014) Security analysis of an image encryption algorithm based on a dna addition combining with chaotic maps. Multimed Tools Applic 72(3):2211–2224. https://link.springer.com/article/10.1007/s11042-013-1533-6
Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148–161. https://doi.org/10.1016/j.sigpro.2018.03.010
Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and dna sequence. Multimed Tools Applic 72(1):57–70. shttps://link.springer.com/article/10.1007/s11042-012-1331-6
Kalpana J, Murali PA (2015) An improved color image encryption based on multiple dna sequence operations with dna synthetic image and chaos. Optik 126(24):5703–5709. https://doi.org/10.1016/j.ijleo.2015.09.091
Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210. https://doi.org/10.1016/j.sigpro.2015.07.008
Li C, Li S, Chen G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27 (8):1035–1039. https://doi.org/10.1016/j.imavis.2008.09.004
Liu Y, Tang J, Xie T (2014) Cryptanalyzing a rgb image encryption algorithm based on dna encoding and chaos map. Opt Laser Technol 60:111–115. https://doi.org/10.1016/j.optlastec.2014.01.015
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Applic 59 (10):3320–3327. https://doi.org/10.1016/j.camwa.2010.03.017
Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86(3):826–834. https://doi.org/10.1016/j.jss.2012.11.026
Merah L, AliPacha A, Said NH, Mamat M (2013) A pseudo random number generator based on the chaotic system of Chua’s circuit, and its real time fpga implementation. Appl Math Sci 7(55):2719–2734. http://m-hikari.com/ams/ams-2013/ams-53-56-2013/mamatAMS53-56-2013.pdf
Ozkaynak F, Ozer AB, Yavuz S (2012) Cryptanalysis of a novel image en- cryption scheme based on improved hyperchaotic sequences. Opt Commun 285(24):4946–4948. https://doi.org/10.1016/j.optcom.2012.07.106
Quyen NX, Duong TQ, Vo NS, Xie Q, Shu L (2016) Chaotic directsequence spread-spectrum with variable symbol period: a technique for enhancing physical layer security. Comput Netw 109:4–12. https://doi.org/10.1016/j.comnet.2016.06.022. Special issue on Recent Advances in Physical-Layer Security
Sarvabhatla M, Reddy MCM, Vorugunti CS (2015) A secure and light weight authentication service in hadoop using one time pad. Procedia Comput Sci 50:81–86. https://doi.org/10.1016/j.procs.2015.04.064
Sokouti M, Sokouti B (2018) A prisma-compliant systematic review and analysis on color image encryption using dna properties. Comput Sci Rev 29:14–20. https://doi.org/10.1016/j.cosrev.2018.05.002
Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232–236. https://doi.org/10.1016/j.optcom.2009.09.070Get
Stöckmann H-J (2000) Quantum chaos: an introduction, https://doi.org/10.1119/1.19544
Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202
Tuna M, Alçın M, Koyuncu İ, Fidan CB, Pehlivan İ (2019) High speed fpga-based chaotic oscillator design. Microprocess Microsyst 66:72–80. https://doi.org/10.1016/j.micpro.2019.02.012
Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on sha-3 and multiple chaotic systems. Opt Lasers Eng 103:1–8. https://doi.org/10.1016/j.optlaseng.2017.11.009
Wang X, Zhu X, Wu X, Zhang Y (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370–379. https://doi.org/10.1016/j.optlaseng.2017.06.015
Wong KW (2002) A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A 298(4):238–242. https://doi.org/10.1016/S0375-9601(02)00431-0
Wu Y (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Journal of Selected Areas in Telecommunications
Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image dna encryption using nca map-based cml and one-time keys. Signal Process 148:272–287. https://doi.org/10.1016/j.sigpro.2018.02.028
Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 First international conference on information science and engineering. IEEE, pp 1164– 1167. https://doi.org/10.4304/jmm.6.2.107-114
Zeng L, Liu R (2015) Cryptanalyzing a novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik 126(24):5022–5025. https://doi.org/10.1016/j.ijleo.2015.09.219
Zhang Y, Li Y, Wen W, Wu Y, Chen J x (2015) Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlin Dyn 82(4):1831–1837. https://link.springer.com/article/10.1007/s11071-015-2280-1
Zhang LY, Zhang Y, Liu Y, Yang A, Chen G (2017) Security analysis of some diffusion mechanisms used in chaotic ciphers. Int J Bifur Chaos 27 (10):1750155. https://doi.org/10.1142/S0218127417501553
Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182. https://doi.org/10.1016/j.sigpro.2013.10.034
Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression–encryption scheme based on hyper-chaotic system and 2d compressive sensing. Opt Laser Technol 82:121–133. https://doi.org/10.1016/j.optlastec.2016.02.018
Acknowledgements
Thanks are due to Liqiang Chen(Zhejiang Normal University) for valuable discussion.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Lu, Y., Yu, K. & Lv, X. Image encryption with one-time password mechanism and pseudo-features. Multimed Tools Appl 80, 15041–15055 (2021). https://doi.org/10.1007/s11042-021-10522-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10522-x