Skip to main content
Log in

A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital multimedia information is frequently transferred over the Internet due to its widespread usage. A novel Butterfly Network Topology (BNT) based block-level permutation (\(\mathrm{B}^{2}\)LP) and Crown Graph-based Bit-wise Substitution (CGBS) is proposed in this work to securely transfer images over untrusted networks, such as social networks. First, a plain image related initial vector generation is suggested to obtain good plain image sensitivity to withstand chosen/known plain text attacks. Using these initial vectors, Henon map is iterated to produce the random key sequence values to be utilized over the confusion and diffusion processes. Second, BNT based block-level scrambling is proposed by which the plain image is transformed into blocks to attain the block level confused image. Additionally, simple sorting based confusion is applied to obtain the final confused image. Third, crown graph-based bit-wise diffusion is proposed to attain the final encrypted image. General security measures are carried out for the proposed method to validate its security level. It is shown from the simulations that the suggested approach has good randomness, high key sensitivity, good key space, and flat cipher image pixel distribution. Differential cryptanalysis for the proposed system is also conducted to show its efficacy against differential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abdulla AA (2015) Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography. Ph.D. thesis, University of Buckingham

  2. Ali TS, Ali R (2020) A new chaos based color image encryption algorithm using permutation substitution and boolean operation. Multimedia Tools and Applications 79(27):19853–19873

    Article  Google Scholar 

  3. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International journal of bifurcation and chaos 16(08):2129–2151

    Article  MathSciNet  Google Scholar 

  4. Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik 203:164000

    Article  Google Scholar 

  5. Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimedia Tools and Applications 79(43):31715–31738

    Article  Google Scholar 

  6. Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Processing 143:122–133

    Article  Google Scholar 

  7. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dna sequence operations. Optics and Lasers in engineering 88:197–213

    Article  Google Scholar 

  8. Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operations. Signal Processing: Image Communication 52:6–19

    Google Scholar 

  9. Dalhoum A, Latif A, Mahafzah BA, Awwad AA, Aldhamari I, Ortega A, Alfonseca M (2012) Digital image scrambling using 2d cellular automata. IEEE Multimedia

  10. Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Information Sciences 355:314–327

    Article  Google Scholar 

  11. Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Optics and Lasers in Engineering 90:146–154

    Article  Google Scholar 

  12. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos 8(06):1259–1284

    Article  MathSciNet  Google Scholar 

  13. Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on lft based s-boxes and chaos. Multimedia Tools and Applications 77(7):8759–8783

    Article  Google Scholar 

  14. Hua Z, Zhou Y (2016) Image encryption using 2d logistic-adjusted-sine map. Information Sciences 339:237–253

    Article  Google Scholar 

  15. Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Optics and Lasers in Engineering 115:7–20

    Article  Google Scholar 

  16. Kahan W (1996) Ieee standard 754 for binary floating-point arithmetic. Lecture Notes on the Status of IEEE 754(94720–1776):11

    Google Scholar 

  17. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimedia Tools and Applications 78(18):26203–26222

    Article  Google Scholar 

  18. Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits and Systems Magazine 1(3):6–21

    Article  Google Scholar 

  19. Li P, Lo KT (2017) A content-adaptive joint image compression and encryption scheme. IEEE Transactions on Multimedia 20(8):1960–1972

    Article  Google Scholar 

  20. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering 90:238–246

    Article  Google Scholar 

  21. Liu H, Xu Y, Ma C (2020) Chaos-based image hybrid encryption algorithm using key stretching and hash feedback. Optik 216:164925

    Article  Google Scholar 

  22. Murugan B, Nanjappa Gounder AG (2016) Image encryption scheme based on block-based confusion and multiple levels of diffusion. IET Computer Vision 10(6):593–602

    Article  Google Scholar 

  23. Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Optics & Laser Technology 101:30–41

    Article  Google Scholar 

  24. Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation-substitution image encryption networks with henon map. Neurocomputing 283:53–63

    Article  Google Scholar 

  25. Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Transactions on Information Forensics and Security 13(9):2137–2150

    Article  Google Scholar 

  26. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep, Booz-allen and hamilton inc mclean va

    Google Scholar 

  27. Shannon CE (1949) Communication theory of secrecy systems. The Bell system technical journal 28(4):656–715

    Article  MathSciNet  Google Scholar 

  28. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1d chaotic map. Signal processing 144:444–452

    Article  Google Scholar 

  29. Wang J, Zhi X, Chai X, Lu Y (2021) Chaos-based image encryption strategy based on random number embedding and dna-level self-adaptive permutation and diffusion. Multimedia Tools and Applications 80(10):16087–16122

    Article  Google Scholar 

  30. Wang T, Wang MH (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and dna encoding. Optics & Laser Technology 132:106355

    Article  Google Scholar 

  31. Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dynamics 84(3):1417–1429

    Article  MathSciNet  Google Scholar 

  32. Wang Y, Lei P, Yang H, Cao H (2015) Security analysis on a color image encryption based on dna encoding and chaos map. Computers & Electrical Engineering 46:433–446

    Article  Google Scholar 

  33. Wu Y, Noonan JP, Agaian S et al (2011) Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  34. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local shannon entropy measure with statistical tests for image randomness. Information Sciences 222:323–342

    Article  MathSciNet  Google Scholar 

  35. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Optics and Lasers in Engineering 78:17–25

    Article  Google Scholar 

  36. Yavuz E (2019) A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Optics & Laser Technology 114:224–239

    Article  Google Scholar 

  37. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new beta chaotic maps. Optics and Lasers in Engineering 96:39–49

    Article  Google Scholar 

  38. Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimedia Tools and Applications 77(6):6647–6669

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Brindha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vidhya, R., Brindha, M. A novel approach for Chaotic image Encryption based on block level permutation and bit-wise substitution. Multimed Tools Appl 81, 3735–3772 (2022). https://doi.org/10.1007/s11042-021-11720-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11720-3

Keywords

Navigation