Skip to main content
Log in

Multimedia contents confidentiality preservation in constrained environments: a dynamic approach

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel image cryptographic scheme is introduced in this paper. The proposed method incorporates two modules: confusion module and diffusion module. A dynamic key, changed for every input image is generated, and employed as a base to produce sub-keys in both confusion and diffusion mechanisms. This dynamics conducted to random-like key-generation, rendered the cryptographic scheme with dynamic encryption structure, and hence only one round is needed to achieve good combination between efficient time-consuming and sufficient security. In the confusion module, pixels’ positions are non-linearly first forwardly permuted and then backwardly permuted, without changing their values, aiming to de-correlate the relations among neighboring pixels. In the diffusion module, pixels’ values are changed, firstly discrete dynamical system with delay defined by non-linear boolean function is employed, in which each pixel value is non-linearly modified to achieve the mixing effect of pixel value and introduce more the non-linearity property, and then memory reversible two-dimensional cellular automata is performed, in which each pixel value is sequentially modified to further attain high diffusion mechanism. We have conducted the most important experiments to assess the effectiveness of the proposed cryptographic scheme. The obtained results are interesting in terms of security degrees and time-consuming, and point to the advocacy of proposal and its suitability to be a good encryption candidate for constrained environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

The datasets employed during security and performance analysis during the current study are available in https://sipi.usc.edu/database/

References

  1. Adnan J, Tariq S et al (2020) Lightweight secure image encryption scheme based on chaotic differential equation. Chin J Phys 66:645–659

    Article  MathSciNet  Google Scholar 

  2. Almalkawi Islam T, Rami H, Ayoub A et al (2019) A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications. J Inform Sec Appl 49:102384

    Google Scholar 

  3. Bakoev V (2017) Fast bitwise implementation of the algebraic normal form transform. Serdica J Comput 11(1):045p–057p

    Article  MathSciNet  MATH  Google Scholar 

  4. Del Rey AM (2015) A multi-secret sharing scheme for 3D solid objects. Expert Syst Appl 42(4):2114–2120

    Article  Google Scholar 

  5. del Rey, A.M, Sánchez G, De La Villa Cuenca, A. A protocol to encrypt digital images using chaotic maps and memory cellular automata. Logic J IGPL, 2015, vol. 23, no 3, p. 485–494.

  6. Encinas LH, Del Rey ÁM (2018) Boolean differential operators. Turk J Math 42(1):57–68. https://doi.org/10.3906/mat-1607-22

    Article  MathSciNet  MATH  Google Scholar 

  7. Hassan N, Ali C, Lama S et al (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413

    Article  Google Scholar 

  8. Hassan N, Christophe G, Ali C et al (2019) Efficient chaotic encryption scheme with ofb mode. Int J Bifurca Chaos 29(05):1950059

    Article  MathSciNet  MATH  Google Scholar 

  9. Hore A, Ziou D (2010) Image quality metrics: PSNR vs. SSIM. In: 2010 20th international conference on pattern recognition. IEEE. p. 2366–2369

  10. Jin J (2012) An image encryption based on elementary cellular automata. Opt Lasers Eng 50(12):1836–1843

    Article  Google Scholar 

  11. Li J, Wang J, Di X (2022) Image encryption algorithm based on bit-level permutation and “Feistel-like network” diffusion. Multimed Tools Appl 81:44335–44362. https://doi.org/10.1007/s11042-022-12736-z

    Article  Google Scholar 

  12. Michael F, Thomas G, Dominique B, et al (2012) Image encryption algorithm based on a chaotic iterative process

  13. Mohamed FK (2017) Design of a new efficient and secure multi-secret images sharing scheme. Multimed Tools Appl 76(5):6247–6261

    Article  Google Scholar 

  14. Nestor T, Jacques K, Abd-el-atty B et al (2020) Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryption. Inf Sci 515:191–217

    Article  Google Scholar 

  15. Nestor T, Syam S, Abd-el-atty B et al (2020) A new chaotic map with dynamic analysis and encryption application in internet of health things. IEEE Access 8:137731–137744

    Article  Google Scholar 

  16. Noor M, Hazzazi KM, Mazyad M et al (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678–105685

    Article  Google Scholar 

  17. Noor M, Majid K, Mazyad HM et al (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678–105685

    Article  Google Scholar 

  18. Noura Hassan N, Mohamad N, Ali C et al (2019) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl 78(11):14837–14866

    Article  Google Scholar 

  19. Noura HN, Noura M, Chehab A et al (2019) Efficient and secure cipher scheme for multimedia contents. Multimed Tools Appl 78(11):14837–14866

    Article  Google Scholar 

  20. Noura H, Chehab A, Noura M et al (2019) Lightweight, dynamic and efficient image encryption scheme. Multimed Tools Appl 78(12):16527–16561

    Article  Google Scholar 

  21. Noura HN, Chehab A, Couturier R (2019) Efficient & secure cipher scheme with dynamic key-dependent mode of operation. Signal Process Image Commun 78:448–464

    Article  Google Scholar 

  22. Safwan EA, Mousa F (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  23. Satyabrata R, Manu S, Umashankar R et al (2021) IESCA: an efficient image encryption scheme using 2-D cellular automata. J Inform Sec Appl 61:102919

    Google Scholar 

  24. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423

    Article  MathSciNet  MATH  Google Scholar 

  25. Smid Miles E. Branstad Dennis K.. Data encryption standard: past and future. Proc IEEE, 1988, vol. 76, no 5, p. 550–559.

  26. Souyah A, Mohamed FK. Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata. Nonlinear Dynam, 2016, vol. 84, no 2, p. 715–732.

  27. Souyah A, Mohamed FK (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dynam 86(1):639–653

    Article  MathSciNet  Google Scholar 

  28. Souyah A, Mohamed FK (2018) An efficient and secure chaotic cipher algorithm for image content preservation. Commun Nonlinear Sci Numer Simul 60:12–32

    Article  MATH  Google Scholar 

  29. Su Y, Wo Y, Han G (2019) Reversible cellular automata image encryption for similarity search. Signal Process Image Commun 72:134–147

    Article  Google Scholar 

  30. Von Neumann J (1966) Theory of self-reproducing automata. Edited by Arthur W. Burks. https://cdn.patentlyo.com/media/docs/2012/04/VonNeumann.pdf

  31. Wang Z, Bovik AC, Sheikh HR et al. image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process, 2004, vol. 13, no 4, p. 600–612.

  32. Wolfram S (2002) A new kind of science. Wolfram media, Champaign, IL

    MATH  Google Scholar 

  33. Xiaolin W, Bin Z, Yutong H et al (2017) A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5:6429–6436. https://doi.org/10.1109/ACCESS.2017.2692043

    Article  Google Scholar 

  34. Xingyuan W, Le F, Hongyu Z (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  MATH  Google Scholar 

  35. Xiupin LV, Liao X, Yang B. A novel scheme for simultaneous image compression and encryption based on wavelet packet transform and multi-chaotic systems. Multimed Tools Appl, 2018, vol. 77, no 21, p. 28633–28663.

  36. Yavuz E (2021) A new parallel processing architecture for accelerating image encryption based on chaos. J Inform Sec Appl 63:103056

    Google Scholar 

  37. Youheng D, Geng Z, Yingjie MA et al (2022) A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Inf Sci 593:121–154

    Article  Google Scholar 

  38. Zeinab F, Hassan N, Ahmed M (2016) An efficient and secure cipher scheme for images confidentiality preservation. Signal Process Image Commun 42:90–108

    Article  Google Scholar 

  39. Zeinab F, Hassan N, Ahmed M (2018) Securing jpeg-2000 images in constrained environments: a dynamic approach. Multimedia Systems 24(6):669–694

    Article  Google Scholar 

  40. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

  41. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

  42. Zhang, M., Peng, B. and Chen, Y (2019) An efficient image encryption scheme for industrial Internet-of-Things devices. In: Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things. p. 38–43

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amina Souyah.

Ethics declarations

Competing interests

The author has no competing interests to declare that are relevant to the content of the submitted work.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Souyah, A. Multimedia contents confidentiality preservation in constrained environments: a dynamic approach. Multimed Tools Appl 82, 21775–21800 (2023). https://doi.org/10.1007/s11042-023-14863-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14863-7

Keywords

Navigation