Skip to main content
Log in

Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Along with the growth of the internet, multimedia communication has also increased rapidly over the years. The digital image is an essential part of multimedia technology; thus, secure image transmission is essential to maintain privacy. To achieve privacy, several image encryption schemes have been developed. Inspired by those techniques, a new tri-layer image encryption algorithm based on CMVC (Calendar Month Vowel Count) coding logic has been proposed. The key used in this algorithm is generated based on the number of vowels in each month of the year. Using this concept, the scheme has ended up with a 24-bit key. This key has been used to encrypt the image using three-level substitution, scrambling, and cyclic shift. Further, the Chen attractor has been utilized to induce more randomness in the pixel values. The encryption technique proposed is much more robust, which resist unauthorized users from decrypting the image. This encryption technique offers good resistance to ciphertext attacks, which was a significant disadvantage in DNA coding. Also, this proposed scheme yields an average entropy of 7.99 and a near-zero correlation. It has a maximum keyspace of 3(33.24915 × 10168) to resist the brute force attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28
Fig. 29

Similar content being viewed by others

References

  1. Aashiq Banu S, Amirtharajan R (2020) Tri-level scrambling and enhanced diffusion for DICOM image cipher- DNA and chaotic fused approach. Multimed Tools Appl 79:28807–28824. https://doi.org/10.1007/s11042-020-09501-5

    Article  Google Scholar 

  2. Askar SS, Karawia AA, Alammar FS (2018) Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map. IET Image Process 12(1):158–167. https://doi.org/10.1049/iet-ipr.2016.0906

    Article  Google Scholar 

  3. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128(Supplement C):155–170. https://doi.org/10.1016/j.sigpro.2016.03.021

    Article  Google Scholar 

  4. Chidambaram N, Raj P, Thenmozhi K, Amirtharajan R (2020) Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process 14(13):3143–3153. https://doi.org/10.1049/iet-ipr.2018.5654

    Article  Google Scholar 

  5. Elogri O, Karmouni H, Sayyouri M, Qjidaa H (2021) A novel image encryption method based on fractional discrete Meixner moments. Opt Lasers Eng 137. https://doi.org/10.1016/j.optlaseng.2020.106346

  6. Girdhar A, Kumar V (2018) A RGB image encryption technique using Lorenz and Rossler chaotic system on DNA sequences. Multimed Tools Appl 77:27017–27039. https://doi.org/10.1007/s11042-018-5902-z

    Article  Google Scholar 

  7. Hayat U, Azam NA (2019) A novel image encryption scheme based on an elliptic curve. Signal Process 155:391–402. https://doi.org/10.1016/j.sigpro.2018.10.011

    Article  Google Scholar 

  8. Hui Y, Liu H, Fang P (2021) A DNA image encryption based on a new hyperchaotic system. Multimed Tools Appl. https://doi.org/10.1007/s11042-021-10526-7

  9. Iqbal N, Hanif M, Abbas S, Adnan M (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Secur Appl 58. https://doi.org/10.1016/j.jisa.2021.102809

  10. Kaur G, Agarwal R, Patidar V (2021) Color image encryption system using combination of robust chaos and chaotic order fractional Hartley transformation. J King Saud Univ Comput Inf Sci. https://doi.org/10.1016/j.jksuci.2021.03.007 Available from: https://linkinghub.elsevier.com/retrieve/pii/S1319157821000719

  11. Khaitan S, Sagar S, Agarwal R (2021) Materials today: proceedings chaos based image encryption using 3-dimension logistic map. Mater Today Proc. https://doi.org/10.1016/j.matpr.2021.05.251 Available from: https://www.sciencedirect.com/science/article/pii/S2214785321038426

  12. Kumar V, Girdhar AA (2021) 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach. Multimed Tools Appl 80:3749–3773. https://doi.org/10.1007/s11042-020-09854-x

    Article  Google Scholar 

  13. Kumar A, Raghava NS (2021) An efficient image encryption scheme using elementary cellular automata with novel permutation box. Multimed Tools Appl 80:21727–21750. https://doi.org/10.1007/s11042-021-10750-1

    Article  Google Scholar 

  14. Li R, Liu Q, Liu L (2019) Novel image encryption algorithm based on improved logistic map. IET Image Process 13(1):125–134. https://doi.org/10.1049/iet-ipr.2018.5900

    Article  MathSciNet  Google Scholar 

  15. Li CL, Zhou Y, Li HM, Feng W, Du JR (2021) Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl 80:18479–18501. https://doi.org/10.1007/s11042-021-10631-7

    Article  Google Scholar 

  16. Manikandan V, Amirtharajan R (2021) On dual encryption with RC6 and combined logistic tent map for grayscale and DICOM. Multimed Tools Appl 80:23511–23540. https://doi.org/10.1007/s11042-021-10943-8

    Article  Google Scholar 

  17. Movafegh Ghadirli H, Nodehi A, Enayatifar R (2021) Color image DNA encryption using mRNA properties and non-adjacent coupled map lattices. Multimed Tools Appl 80:8445–8469. https://doi.org/10.1007/s11042-020-10014-4

    Article  Google Scholar 

  18. Naseer Y, Shah T, Shah D (2021) A novel hybrid permutation substitution base colored image encryption scheme for multimedia data. J Inf Secur Appl 59:102829

    Google Scholar 

  19. Rajagopalan S, Sharma S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) YRBS coding with logistic map—a novel Sanskrit aphorism and chaos for image encryption. Multimed Tools Appl 78:10513–10541. https://doi.org/10.1007/s11042-018-6574-4

    Article  Google Scholar 

  20. Ravichandran D, Aashiq Banu S, Murthy BK, Balasubramanian V, Fathima S, Amirtharajan R (2021) An efficient medical image encryption using hybrid DNA computing and chaos in transform domain. Med Biol Eng Comput 59:589–605. https://doi.org/10.1007/s11517-021-02328-8

    Article  Google Scholar 

  21. Rehman AU, Khan JS, Ahmad J et al (2016) A new image encryption scheme based on dynamic S-boxes and chaotic maps. 3D Res 7:7. https://doi.org/10.1007/s13319-016-0084-9

    Article  Google Scholar 

  22. Shah T, Ali A, Khan M, Farooq G, de Andrade AA (2020) Galois ring GR(2 3, 8) dependent 24 × 24 S-box design: an RGB image encryption application. Wirel Pers Commun 113:1201–1224. https://doi.org/10.1007/s11277-020-07274-6

    Article  Google Scholar 

  23. Sivaraman R, Rajagopalan S, Rayappan JBB, Amirtharajan R (2020) Ring oscillator as confusion—diffusion agent: a complete TRNG drove image security. IET Image Process 14(13):2987–2997. https://doi.org/10.1049/iet-ipr.2019.0168

    Article  Google Scholar 

  24. Wang X, Liu L (2021) Application of chaotic Josephus scrambling and RNA computing in image encryption. Multimed Tools Appl 80:23337–23358. https://doi.org/10.1007/s11042-020-10209-9

    Article  Google Scholar 

  25. Wang X, Wang S, Wei N et al (2018) A novel chaotic image encryption scheme based on hash function and cyclic shift. IETE Tech. Rev. (Institution Electron. Telecommun. Eng. India), 4602, pp 1–10. https://doi.org/10.1080/02564602.2017.1393352

  26. Wang K, Wu X, Wang H, Kan H, Kurths J (2021) New color image cryptosystem via SHA-512 and hybrid domain. Multimed Tools Appl 80:18875–18899. https://doi.org/10.1007/s11042-021-10511-0

    Article  Google Scholar 

  27. Wu J, Liao X, Yang B (2017) Colour image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124. https://doi.org/10.1016/j.sigpro.2017.04.006

    Article  Google Scholar 

  28. Xiang H, Liu L (2021) A new perturbation-feedback hybrid control method for reducing the dynamic degradation of digital chaotic systems and its application in image encryption. Multimed Tools Appl 80:19237–19261. https://doi.org/10.1007/s11042-021-10680-y

    Article  Google Scholar 

  29. Xu L, Gou X, Li Z, Li J (2016) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng J 2017(91):41–52. https://doi.org/10.1016/j.optlaseng.2016.10.012

    Article  Google Scholar 

  30. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25. https://doi.org/10.1016/j.optlaseng.2015.09.007

    Article  Google Scholar 

  31. Yan X, Wang X, Xian Y (2021) Chaotic image encryption algorithm based on arithmetic sequence scrambling model and DNA encoding operation. Multimed Tools Appl 80:10949–10983. https://doi.org/10.1007/s11042-020-10218-8

    Article  Google Scholar 

  32. Yildirim M (2020) DNA encoding for RGB image encryption with memristor based neuron model and chaos phenomenon. Microelectron J 104(2020):104878. https://doi.org/10.1016/j.mejo.2020.104878

    Article  Google Scholar 

  33. Zhang Y (2016) The image encryption algorithm with plaintext-related shuffling. IETE Tech Rev 33(3):310–322. https://doi.org/10.1080/02564602.2015.1087350

    Article  Google Scholar 

  34. Zhang Q, Han J (2021) A novel color image encryption algorithm based on image hashing, 6D hyperchaotic and DNA coding. Multimed Tools Appl 80:13841–13864. https://doi.org/10.1007/s11042-020-10437-z

    Article  Google Scholar 

  35. Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74–82. https://doi.org/10.1016/j.cnsns.2013.06.031

    Article  MATH  Google Scholar 

Download references

Acknowledgements

The authors thank the Department of Science & Technology, New Delhi, for the FIST funding (SR/FST/ET-I/2018/221(C). Furthermore, the authors extend their sincere thanks to Palem Anusha, Software Engineer, Wipro Ltd., for her initial technical support. Also, they wish to thank the Intrusion Detection Lab at the School of Electrical & Electronics Engineering, SASTRA Deemed University, for providing infrastructural support to carry out this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rengarajan Amirtharajan.

Ethics declarations

Conflict of interest

The authors have no relevant conflicts of interest to disclose.

Ethical approval

This article does not contain any studies with human participants or animals performed by any authors.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Manikandan, C., Gamana, A., Sridevi, A. et al. Design of tri-layer image encryption scheme using Calendar Month Vowel Count (CMVC) approach. Multimed Tools Appl 81, 10337–10371 (2022). https://doi.org/10.1007/s11042-022-11930-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-11930-3

Keywords

Navigation