Skip to main content
Log in

Multi-image cipher based on the random walk of Knight in a virtual 3D chessboard

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This study proposes a novel, efficient and a secured multiple color images encryption scheme based on the random walk of knight in a virtual 3D chessboard, chaotic system and SHA-256 hashing. First of all, a perfect square number of color images are input. These images are decomposed into their red, green and blue components. These components are stacked together to get a 3D image. Three intensity values from this 3D image are randomly chosen. These values serve as the starting address for the knight to start its scrambling project. This act increases both the key space and plaintext sensitivity. Next, this 3D image is converted into 1D image for the scrambling process. Knight \(\textemdash\) a chess piece, has been commissioned to walk randomly in the 3D chessboard in all the three coordinate planes for an arbitrary number of times. The movement of knight in the 3D chessboard has been linked with the transferring of pixels from the 1D image to the scrambled 3D image. In this way, the input images are abundantly scrambled. Lastly, an XOR operation has been carried out to throw the diffusion effects. The three chaotic vectors given by the intertwining logistic map have been used in the selection of planes, mode of movement of knight and the diffusion process. SHA-256 hash codes for the given input color images have been used for the plaintext sensitivity. Security analyses and the computer experiments suggest the desirable security effects and prospects for some real world application of the proposed cipher. Information entropy obtained by the proposed algorithm is 7.9999.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Data availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. (1985) Floating-Point Working Group, IEEE computer society: IEEE standard for binary floating-point arithmetic. Stand 754–1985

  2. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimedia Tools Appl 78(3):3649–3688

    Google Scholar 

  3. Bashir Z, Iqbal N, Hanif M (2021) A novel gray scale image encryption scheme based on pixel’s swapping operations. Multimedia Tools Appl 80(1):1029–1054

    Google Scholar 

  4. Berahmand K, Nasiri E, Forouzandeh S, Li Y (2021). A preference random walk algorithm for link prediction through mutual influence nodes in complex networks. Journal of king saud university-computer and information sciences

  5. Boreale M (2020) Complete algorithms for algebraic strongest postconditions and weakest preconditions in polynomial odes. Sci Comput Program 193:102441

    Google Scholar 

  6. Chai X, Fu X, Gan Z, Lu Y, Chen A (2019) color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Google Scholar 

  7. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 21(3):749–761

    MathSciNet  Google Scholar 

  8. Diaconu AV, Costea A, Costea MA (2014) Color image scrambling technique based on transposition of pixels between RGB channels using Knight’s moving rules and digital chaotic map. Math Probl Eng

  9. Diaconu AV, Loukhaoukha K (2013) An improved secure image encryption algorithm based on Rubik’s cube principle and digital chaotic cipher. Math Probl Eng

  10. Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Google Scholar 

  11. Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131–140

    Google Scholar 

  12. Forouzandeh S, Rostami M, Berahmand K (2021) Presentation a Trust Walker for rating prediction in recommender system with Biased Random Walk: Effects of H-index centrality, similarity in items and friends. Eng Appl Artif Intell 104:104325

    Google Scholar 

  13. Fu YG, Zhou J, Deng L (2014) Surveillance of a 2D plane area with 3D deployed cameras. Sensors 14(2):1988–2011

    Google Scholar 

  14. Gaurav A, Psannis K, Peraković D (2022) Security of cloud-based medical internet of things (miots): a survey. International Journal of Software Science and Computational Intelligence (IJSSCI) 14(1):1–16

    Google Scholar 

  15. Hammad M, Alkinani MH, Gupta BB, El-Latif A, Ahmed A (2021) Myocardial infarction detection based on deep neural network on imbalanced data. Multimedia Syst 1–13

  16. Hanif M, Naqvi RA, Abbas S, Khan MA, Iqbal N (2020) A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8:123536–123555

    Google Scholar 

  17. Hanif M, Abbas S, Khan MA, Iqbal N, Rehman ZU, Saeed MA, Mohamed EM (2020) A Novel and Efficient Multiple RGB Images Cipher Based on Chaotic System and Circular Shift Operations. IEEE Access 8:146408–146427

    Google Scholar 

  18. Hua Z, Xu B, Jin F, Huang H (2019) Image encryption using josephus problem and filtering diffusion. IEEE Access 7:8660–8674

    Google Scholar 

  19. Iqbal N, Abbas S, Khan MA, Alyas T, Fatima A, Ahmad A (2019) An RGB Image Cipher Using Chaotic Systems. 15-Puzzle Problem and DNA Computing. IEEE Access 7:174051–174071

    Google Scholar 

  20. Iqbal N, Hanif M, Abbas S, Khan MA, Almotiri SH, Al Ghamdi MA (2020) DNA strands level scrambling based color image encryption scheme. IEEE Access 8:178167–178182

    Google Scholar 

  21. Iqbal N, Abbas S, Khan MA, Fatima A, Ahmed A, Anwer N (2020) Efficient image cipher based on the movement of king on the chessboard and chaotic system. J Electron Imaging 29:023025

    Google Scholar 

  22. Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, Hussain D (2021) On the image encryption algorithm based on the chaotic system. DNA encoding and Castle, IEEE Access

    Google Scholar 

  23. Iqbal N, Hanif M, Abbas S, Khan MA, Rehman ZU (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. J Inf Secur Appl 58:102809

    Google Scholar 

  24. Iqbal N, Hanif M (2021) An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multimedia Tools Appl 1–35

  25. Kaur M, Singh D, Kumar V, Gupta BB, Abd El-Latif AA (2021) Secure and energy efficient-based E-health care framework for green internet of things. IEEE Trans Green Commun Netw 5(3):1223–1231

    Google Scholar 

  26. Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA (2017) A novel image encryption based on Lorenz equation, Gingerbreadman chaotic map and S 8 permutation. J Intell Fuzzy Syst 33(6):3753–3765

    Google Scholar 

  27. Kong D, Shen X, Xu Q, Xin W, Guo H (2013) Multiple-image encryption scheme based on cascaded fractional Fourier transform. Appl Opt 52(12):2619–2625

    Google Scholar 

  28. Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75(1):1–23

    Google Scholar 

  29. Kumar J, Nirmala S (2018) A Novel and Efficient Perceptual Image Encryption Based on Knight Moves and Genetic Operations. In: Progress in Advanced Computing and Intelligent Engineering 233–243

  30. Li Y, Zhang F, Li Y, Tao R (2015) Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform. Opt Lasers Eng 72:18–25

    Google Scholar 

  31. Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432–447

    Google Scholar 

  32. Liao X, Kulsoom A, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241–11266

    Google Scholar 

  33. Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117–134

    Google Scholar 

  34. Malik MA, Bashir Z, Iqbal N, Imtiaz MA (2020) Color image encryption algorithm based on hyper-chaos and DNA computing. IEEE Access 8:88093-s88107

    Google Scholar 

  35. Mani N, Moh M, Moh TS (2021) Defending deep learning models against adversarial attacks. International Journal of Software Science and Computational Intelligence (IJSSCI) 13(1):72–89

    Google Scholar 

  36. Mirsadeghi F, Rafsanjani MK, Gupta BB (2021) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer-to-Peer Netw Appl 14(4):2537–2553

    Google Scholar 

  37. Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-Hernández C (2019) Suggested integral analysis for chaos-based image cryptosystems. Entropy 21:815

    MathSciNet  Google Scholar 

  38. Nasiri E, Berahmand K, Li Y (2021) A new link prediction in multiplex networks using topologically biased random walks. Chaos Solitons Fractals 151:111230

    Google Scholar 

  39. Nguyen GN, Le Viet NH, Elhoseny M, Shankar K, Gupta BB, Abd El-Latif AA (2021) Secure blockchain enabled Cyber-physical systems in healthcare using deep belief network with ResNet model. J Parallel Distrib Comput 153:150–160

    Google Scholar 

  40. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007

    MathSciNet  Google Scholar 

  41. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech j 18:656–715

    MathSciNet  Google Scholar 

  42. Singh M, Kakkar A, Singh M (2015) Image Encryption Scheme Based on Knight’s Tour Problem. Procedia Comput Sci 70:245–250

    Google Scholar 

  43. Sivakumar T, Venkatesan R (2016) A New Image Encryption Method Based on Knight’s Travel Path and True Random Number. J Inf Sci Eng 32(1):133–152

    Google Scholar 

  44. Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11

    Google Scholar 

  45. Wang H, Li Z, Li Y, Gupta BB, Choi C (2020) Visual saliency guided complex image retrieval. Pattern Recogn Lett 130:64–72

    Google Scholar 

  46. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169

    MathSciNet  Google Scholar 

  47. Xiaoyong J, Sen B, Guibin Z, Bing Y (2017) Image encryption and compression based on the generalized knight’ss tour, discrete cosine transform and chaotic maps. Multimed Tools Appl 76(10):12965–12979

    Google Scholar 

  48. Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 1–21

  49. Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1–14

    Google Scholar 

  50. Zarebnia M, Pakmanesh H, Parvaz R (2019) A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images. Optik 179:761–773

    Google Scholar 

  51. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351

    Google Scholar 

  52. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6–16

    Google Scholar 

  53. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Comput Electr Eng 62:401–413

    Google Scholar 

  54. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6–16

    Google Scholar 

  55. Zhang X, Wang X (2018) Multiple-Image Encryption Algorithm Based on the 3D Permutation Model and Chaotic System. Symmetry 10(11):660

    Google Scholar 

  56. Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadeem Iqbal.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Iqbal, N., Khan, M.A. & Lee, SW. Multi-image cipher based on the random walk of Knight in a virtual 3D chessboard. Multimed Tools Appl 83, 8629–8661 (2024). https://doi.org/10.1007/s11042-023-15701-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15701-6

Keywords