Abstract
This paper proposes an efficient image encryption method based on a hybrid of watermarking and cryptographic techniques. It is based on two-level security for the secure and error-free transmission of images between the IoT enabled devices. A discrete wavelet transform (DWT) based watermarking scheme is used at the first level, while at another level, an efficient image encryption technique based on a hybrid of logistic chaotic map and crossover is applied. In the DWT scheme, an encrypted secret image is used as a watermark image, where the secret image is encrypted via the lightweight cryptographic scheme. Here the hybrid of logistic chaotic map and crossover is used to produce random session keys for encryption of digital images. The use of DWT and 1-D logistic map along with crossover operation enhances the encryption effect compared to ordinary, chaotic encryption algorithms. The significance of this scheme is to improve security by using the hybrid concept. The strength of the proposed image encryption method is estimated by checking the proposed technique on various types of cryptographic attacks such as differential attack (NPCR), statistical attack (information entropy, histogram analysis, and correlation coefficient), noise attack, and prone to the secret user key. The higher value of NPCR (99.63) and information entropy (7.9973) are achieved, reflecting the effectiveness of this work.
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig1_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig2_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig3_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig4_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig5_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig6_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig7_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig8_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig9_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig10_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig11_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig12_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig13_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig14_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig15_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig16_HTML.png)
![](http://media.springernature.com/m312/springer-static/image/art%3A10.1007%2Fs11042-022-12169-8/MediaObjects/11042_2022_12169_Fig17_HTML.png)
Similar content being viewed by others
References
Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 80:16549–16564. https://doi.org/10.1007/s11042-020-08814-9
Arpacı B, Kurt E, Çelik K, Ciylan B (2020) Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit. J Electr Eng Technol, 1-17 15:1413–1429
Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput, 1–14 58:1445–1458
Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Clust Comput 20(3):2415–2422
Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108(1):591–612
Demir FB, Tuncer T, Kocamaz AF (2020) A chaotic optimization method based on logistic-sine map for numerical function optimization. Neural Comput Appl, 1-13 32:14227–14239
Ding L, Ding Q (2020) A novel image encryption scheme based on 2D fractional chaotic map, DWT and 4D hyper-chaos. Electronics 9(8):1280
Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Des Test 24(6):522–533
Eisenbarth T, Gong Z, Güneysu T, Heyse S, Indesteege S, Kerckhof S, tot Oldenzeel LVO (2012, July) Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: International conference on cryptology in Africa. Springer, Berlin, Heidelberg, 2012 (pp. 172-187)
Gupta M, Gupta KK, Shukla PK (2021) Session key-based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80:10391–10416. https://doi.org/10.1007/s11042-020-10116-z
Hameed S, Khan FI, Hameed B (2019) Understanding security requirements and challenges in internet of things (IoT): a review. J Comput Netw Commun 2019:1–14
Koo WK, Lee H, Kim YH, Lee DH (2008, April) Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. In: 2008 international conference on information security and assurance (Isa 2008). IEEE pp. 73-76
Kricha Z, Kricha A, Sakly A (2018) A robust watermarking scheme based on the mean modulation of DWT coefficients Security and Communication Networks, 2018
Liu B, Li Y, Zeng B, Lei C (2016) An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front Comput Sci 10(3):543–558
Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl, 1-37 79:17669–17705
Mehta R, Gupta K, Yadav AK (2020) An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain. Multimed Tools Appl, 1-22 79:18657–18678
Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD, et al (2020) Digital watermarking techniques for image security: a review. J Ambient Intell Human Comput 11:3221–3229. https://doi.org/10.1007/s12652-019-01500-1
Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimed Tools Appl, 1-24 79:17497–17520
Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613–25633
Peng S, Yang A, Cao L, Yu S, Xie D (2017) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146–159
Poettering B (2013) RijndaelFurious AES-128 implementation for AVR devices, 2007
Rayachoti E, Tirumalasetty S, Prathipati SC (2020) SLT based watermarking system for secure telemedicine. Clust Comput, 1-10 23:3175–3184
Salimi L, Haghighi A, Fathi A (2020) A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimed Tools Appl:1–18
Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197
Singha A, Ullah MA (2020) An image watermarking technique using hybrid signals as watermarks. Multimedia Systems:1–21
Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc:1–14
Tankard C (2015) The security issues of the internet of things. Comput Fraud Secur 2015(9):11–14
Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688
Vidhya R, Brindha M (2020) A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation. Multimed Tools Appl 79(41):30281–30310
Wang H, Zheng Z, Wu L, Li P (2017) New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust Comput 20(3):2385–2392
Wu D, Si S, Wu S, Wang R (2017) Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet Things J 5(4):2958–2970
Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530–1540
You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput, 1-15 24:12413–12427
Zhang W, Zhu Z, Yu H (2019) A symmetric image encryption algorithm based on a coupled logistic–bernoulli map and cellular automata diffusion strategy. Entropy 21(5):504
Zheng P, Zhang Y (2020) A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimed Tools Appl 79:1–23
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Ethical approval
This article does not contain any studies with human participants or animals by any authors
Conflict of interest/competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gupta, M., Singh, V.P., Gupta, K.K. et al. An efficient image encryption technique based on two-level security for internet of things. Multimed Tools Appl 82, 5091–5111 (2023). https://doi.org/10.1007/s11042-022-12169-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12169-8