Abstract
This study proposes a novel, efficient and a secured multiple color images encryption scheme based on the random walk of knight in a virtual 3D chessboard, chaotic system and SHA-256 hashing. First of all, a perfect square number of color images are input. These images are decomposed into their red, green and blue components. These components are stacked together to get a 3D image. Three intensity values from this 3D image are randomly chosen. These values serve as the starting address for the knight to start its scrambling project. This act increases both the key space and plaintext sensitivity. Next, this 3D image is converted into 1D image for the scrambling process. Knight \(\textemdash\) a chess piece, has been commissioned to walk randomly in the 3D chessboard in all the three coordinate planes for an arbitrary number of times. The movement of knight in the 3D chessboard has been linked with the transferring of pixels from the 1D image to the scrambled 3D image. In this way, the input images are abundantly scrambled. Lastly, an XOR operation has been carried out to throw the diffusion effects. The three chaotic vectors given by the intertwining logistic map have been used in the selection of planes, mode of movement of knight and the diffusion process. SHA-256 hash codes for the given input color images have been used for the plaintext sensitivity. Security analyses and the computer experiments suggest the desirable security effects and prospects for some real world application of the proposed cipher. Information entropy obtained by the proposed algorithm is 7.9999.














Similar content being viewed by others
Data availability
Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.
References
(1985) Floating-Point Working Group, IEEE computer society: IEEE standard for binary floating-point arithmetic. Stand 754–1985
Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools Appl 78(3):3649–3688
Bashir Z, Iqbal N, Hanif M (2021) A novel gray scale image encryption scheme based on pixel’s swapping operations. Multimedia Tools Appl 80(1):1029–1054
Berahmand K, Nasiri E, Forouzandeh S, Li Y (2021). A preference random walk algorithm for link prediction through mutual influence nodes in complex networks. Journal of king saud university-computer and information sciences
Boreale M (2020) Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial odes. Sci Comput Program 193:102441
Chai X, Fu X, Gan Z, Lu Y, Chen A (2019) color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62
Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3):749–761
Diaconu AV, Costea A, Costea MA (2014) Color image scrambling technique based on transposition of pixels between RGB channels using Knight’s moving rules and digital chaotic map. Math Probl Eng
Diaconu AV, Loukhaoukha K (2013) An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher. Math Probl Eng
Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154
Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131–140
Forouzandeh S, Rostami M, Berahmand K (2021) Presentation a Trust Walker for rating prediction in recommender system with Biased Random Walk: Effects of H-index centrality, similarity in items and friends. Eng Appl Artif Intell 104:104325
Fu YG, Zhou J, Deng L (2014) Surveillance of a 2D plane area with 3D deployed cameras. Sensors 14(2):1988–2011
Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. International Journal of Software Science and Computational Intelligence (IJSSCI) 14(1):1–16
Hammad M, Alkinani MH, Gupta BB, El-Latif A, Ahmed A (2021) Myocardial infarction detection based on deep neural network on imbalanced data. Multimedia Syst 1–13
Hanif M, Naqvi RA, Abbas S, Khan MA, Iqbal N (2020) A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8:123536–123555
Hanif M, Abbas S, Khan MA, Iqbal N, Rehman ZU, Saeed MA, Mohamed EM (2020) A Novel and Efficient Multiple RGB Images Cipher Based on Chaotic System and Circular Shift Operations. IEEE Access 8:146408–146427
Hua Z, Xu B, Jin F, Huang H (2019) Image encryption using josephus problem and filtering diffusion. IEEE Access 7:8660–8674
Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A (2019) An RGB Image Cipher Using Chaotic Systems. 15-Puzzle Problem and DNA Computing. IEEE Access 7:174051–174071
Iqbal N, Hanif M, Abbas S, Khan MA, Almotiri SH, Al Ghamdi MA (2020) DNA strands level scrambling based color image encryption scheme. IEEE Access 8:178167–178182
Iqbal N, Abbas S, Khan MA, Fatima A, Ahmed A, Anwer N (2020) Efficient image cipher based on the movement of king on the chessboard and chaotic system. J Electron Imaging 29:023025
Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, Hussain D (2021) On the image encryption algorithm based on the chaotic system. DNA encoding and Castle, IEEE Access
Iqbal N, Hanif M, Abbas S, Khan MA, Rehman ZU (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Secur Appl 58:102809
Iqbal N, Hanif M (2021) An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multimedia Tools Appl 1–35
Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure and energy efficient-based E-health care framework for green internet of things. IEEE Trans Green Commun Netw 5(3):1223–1231
Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA (2017) A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation. J Intell Fuzzy Syst 33(6):3753–3765
Kong D, Shen X, Xu Q, Xin W, Guo H (2013) Multiple-image encryption scheme based on cascaded fractional Fourier transform. Appl Opt 52(12):2619–2625
Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75(1):1–23
Kumar J, Nirmala S (2018) A Novel and Efficient Perceptual Image Encryption Based on Knight Moves and Genetic Operations. In: Progress in Advanced Computing and Intelligent Engineering 233–243
Li Y, Zhang F, Li Y, Tao R (2015) Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform. Opt Lasers Eng 72:18–25
Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447
Liao X, Kulsoom A, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241–11266
Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117–134
Malik MA, Bashir Z, Iqbal N, Imtiaz MA (2020) Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8:88093-s88107
Mani N, Moh M, Moh TS (2021) Defending deep learning models against adversarial attacks. International Journal of Software Science and Computational Intelligence (IJSSCI) 13(1):72–89
Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl 14(4):2537–2553
Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-Hernández C (2019) Suggested integral analysis for chaos-based image cryptosystems. Entropy 21:815
Nasiri E, Berahmand K, Li Y (2021) A new link prediction in multiplex networks using topologically biased random walks. Chaos Solitons Fractals 151:111230
Nguyen GN, Le Viet NH, Elhoseny M, Shankar K, Gupta BB, Abd El-Latif AA (2021) Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with ResNet model. J Parallel Distrib Comput 153:150–160
Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech j 18:656–715
Singh M, Kakkar A, Singh M (2015) Image Encryption Scheme Based on Knight’s Tour Problem. Procedia Comput Sci 70:245–250
Sivakumar T, Venkatesan R (2016) A New Image Encryption Method Based on Knight’s Travel Path and True Random Number. J Inf Sci Eng 32(1):133–152
Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11
Wang H, Li Z, Li Y, Gupta BB, Choi C (2020) Visual saliency guided complex image retrieval. Pattern Recogn Lett 130:64–72
Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169
Xiaoyong J, Sen B, Guibin Z, Bing Y (2017) Image encryption and compression based on the generalized knight’ss tour, discrete cosine transform and chaotic maps. Multimed Tools Appl 76(10):12965–12979
Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 1–21
Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1–14
Zarebnia M, Pakmanesh H, Parvaz R (2019) A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images. Optik 179:761–773
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351
Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6–16
Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Comput Electr Eng 62:401–413
Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6–16
Zhang X, Wang X (2018) Multiple-Image Encryption Algorithm Based on the 3D Permutation Model and Chaotic System. Symmetry 10(11):660
Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Iqbal, N., Khan, M.A. & Lee, SW. Multi-image cipher based on the random walk of Knight in a virtual 3D chessboard. Multimed Tools Appl 83, 8629–8661 (2024). https://doi.org/10.1007/s11042-023-15701-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-15701-6