Skip to main content
Log in

A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256

  • 1183: Multimedia Processing to Tackle the Dark Side of Social Life
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

We present an algorithm for image encryption for secure transmission and storage of images over insecure public networks. Our algorithm uses Composite Logistic Sine Map (CLSM) and Secure Hash Algorithm-256 (SHA-256). The algorithm first scrambles the pixels of the plain image based on pseudo random number sequence (PRNS) generated by the CLSM. This is followed by diffusing the pixel values by using values generated by SHA-256. The initial conditions and parameters of the CLSM together with a nonce chosen by the user act as key for the algorithm. The nonce is used to initialize the SHA-256 that generates hash values for the diffusion phase. The algorithm has a very wide key space to defeat any brute force or guessing attack. The proposed algorithm was tested with several images of different characteristics against nine security measures. The tests results show that the scheme is robust, scalable and capable of providing strong security to data. The lightweight arithmetic and logical operations involved in the used chaotic map and in permutation-substitution steps enable it to have fast speed due to low computational overhead. This makes it suitable for low power battery operated devices equipped with inexpensive processors having limited computing speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Broumandnia Ali (2019) The 3d modular chaotic map to digital color image encryption. Futur Gener Comput Syst 99:489–499

    Article  Google Scholar 

  2. Cao Chun, Sun Kehui, Liu Wenhao (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  3. Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, Abd El-Samie FE, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl. pages 1–23

  4. Essaid M, Akharraz I, Saaidi A (2019) Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps. J Inform Sec Appl. 47:173 – 187

  5. Gueron S, Johnson S, Walker J (2011) Sha-512/256. In 2011 Eighth International Conference on Information Technology: New Generations, pages 354–358. IEEE

  6. Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on pwlcm chaotic map. Optik 184:205–213

    Article  Google Scholar 

  7. Hongyue X, Lingfeng L (2020) An improved digital logistic map and its application in image encryption. Multimed Tools Appl 79(41):30329–30355

    Google Scholar 

  8. Jian Z, Da H (2019) Image encryption algorithm based on quantum chaotic map and dna coding. Multimed Tools Appl. 78(11):15605–15621

    Article  Google Scholar 

  9. Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimed Tools and Appl 79(27):20263–20279

    Article  Google Scholar 

  10. Lee WK, Phan RCW, Yap WS, Goi BM (2018) Spring: a novel parallel chaos-based image encryption scheme. Nonlinear Dynamics, 92(2):575–593

  11. Lei Z, Xiaoqiang Z (2020) Multiple-image encryption algorithm based on bit planes and chaos. Multimed Tools Appl 79:20753–20771

    Article  Google Scholar 

  12. Li H, Yu C, Wang X (2020) A novel 1d chaotic system for image encryption, authentication and compression in cloud. Multimed Tools Appl. pages 1–38

  13. Liansheng S, Cong D, Xiao Z, Ailing T, Anand A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113–122

    Article  Google Scholar 

  14. Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on chua’s circuit and compressive sensing. Signal Process 161:227–247

    Article  Google Scholar 

  15. Luo Y, Jin y, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appls 78(15):22023–22043

    Article  Google Scholar 

  16. Mondal B, Biswas N, Mandal T (2017) A comparative study on cryptographic image scrambling. In 2nd International Conference on Research in Intelligent and Computing in Engineering (RICE-2017), volume10, pages 261–268. Annals of Computer Science and Information Systems

  17. Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimed Tools Appls 79:17497–17520

    Article  Google Scholar 

  18. Mondal B, Sinha D, Gupta NK, Kumar N, Goyal P (2012) An optimal (n, n) secret image sharing scheme. UACEE Int J Comp Sci Appl. 2(3):61–66

  19. Montero-Canela R, Zambrano-Serrano E, Tamariz-Flores EI, Muñoz-Pacheco JM, Torrealba-Meléndez R (2020) Fractional chaos based-cryptosystem for generating encryption keys in ad hoc networks. Ad Hoc Networks 97

  20. Mozaffari S (2018) Parallel image encryption with bitplane decomposition and genetic algorithm. Multimedia Tools and Applications 77(19):25799–25819

    Article  Google Scholar 

  21. Naskar PK, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dynamics

  22. Nashreen N, Tania G, Indrajit B (2019) Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. J Inf Secur Appl 47:320–328

    Google Scholar 

  23. Ping P, Xu F, Yingchi M, Zhijian W (2018) Designing permutation substitution image encryption networks with henon map. Neurocomputing 283:53–63

    Article  Google Scholar 

  24. Rayappan, D, Pandiyan, M (2020) Lightweight feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment. Wireless Networks, pages 1–19

  25. Shoukat IA, Iqbal U, Rauf A, Faheem MR (2020) Randomized substitution method for effectively secure block ciphers in iot environment. Arab J Sci Eng. 45(12):11019–11036

  26. Talhaoui MZ, Wang X, Midoun MA (2020) A new one-dimensional cosine polynomial chaotic map and its use in image encryption. The Visual Computer, pages 1–11

  27. Valandar MY, Barani MJ, Ayubi P (2019) A fast color image encryption technique based on three dimensional chaotic map. Optik, 193:162921

  28. Yang L, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on dna coding. Multimed Tools Appl

  29. Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Processing 97:172–182

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajiv Ranjan Suman.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Suman, R.R., Mondal, B. & Mandal, T. A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256. Multimed Tools Appl 81, 27089–27110 (2022). https://doi.org/10.1007/s11042-021-11460-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11460-4

Keywords

Navigation