Skip to main content
Log in

Real time region of interest based chaotic image cryptosystem for IoT applications

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, internet of things (IoT) is extensively used in wide applications like industry, e-healthcare, agriculture to send images through internet for the cloud storage. However, these images should be secured before the transmission. In this context, a novel cryptosystem for region of interest protection of images is proposed in this article. The proposed cryptosystem employs You Only Look Once v3 (YOLOv3) to detect regions of interest (ROI) in the original image and a new row column shift (RCS) image encryption algorithm based on two dimensional modified Henon map (2D-MHM) in order to obtain encrypted object image. A series of analyses are carried out to validate the proposed cryptosystem which includes histogram analysis, correlation coefficient analysis, information entropy analysis etc. The experimental results reveal that the ROI based image encryption algorithm shows strong performance with respect to security. Moreover, it reduces the time and computational complexity when compared to full encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and material

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. Adarsh P, Rathi P, Kumar M (2020) YOLO v3-Tiny: object detection and recognition using one stage improved model. In: IEEE International Conference on Advanced Computing and Communication Systems (ICACCS). pp 687–694

  2. Asgari-Chenaghlu M, Feizi-Derakhshi MR, Nikzad-Khasmakhi N et al (2021) Cy: chaotic yolo for user intended image encryption and sharing in social media. Inf Sci 542:212–227

    Article  Google Scholar 

  3. Gupta BB, Li KC, Leung VC, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Autom Sin 8(12):1877–1890

    Article  Google Scholar 

  4. Hanchinamani G, Kulkarni L (2015) An efficient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. 3D Res 6(3):1–15

  5. Hao Z, Xing-yuan W, Si-wei W, Kang G, Xiao-hui L (2017) Application of coupled map lattice with parameter q in image encryption. Opt Lasers Eng 88:65–74

    Article  Google Scholar 

  6. Hosny KM (ed) (2020) Multimedia security using chaotic maps: principles and methodologies, vol 884. Springer, New York

    Google Scholar 

  7. https://sipi.usc.edu/database/database.php?volume=misc Accessed 12 May 2022

  8. https://www.imageprocessingplace.com/ Accessed 12 May 2022

  9. Jawad LM, Sulong G (2015) Classification of novel selected region of interest for color image encryption. Res J Appl Sci Eng Technol 9(11):969–981

    Article  Google Scholar 

  10. Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Perakovic D (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. International Journal of Cloud Applications and Computing (IJCAC) 12(1):1–11

    Google Scholar 

  11. L’ecuyer P, Simard R (2007) TestU01: AC library for empirical testing of random number generators. ACM Trans Math Softw (TOMS) 33(4):1–40

    Article  Google Scholar 

  12. Liu Y, Tang J, Xie T (2014) Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map. Opt Laser Technol 60:111–115

    Article  Google Scholar 

  13. Liu Y, Zhang J, Han D et al (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79(25):17669–17705

    Article  Google Scholar 

  14. Machkour M, Saaidi A, Benmaati AL (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the Latin square image cipher. 3D Res 6(4):1–18

  15. Mao QC, Sun HM, Liu YB, Jia RS (2019) Mini-YOLOv3: real-time object detector for embedded applications. IEEE Access 7:133529–133538

    Article  Google Scholar 

  16. Murali P, Niranjana G, Paul AJ, Muthu JS (2022) Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis Comput 1–23

  17. Noori Ghanim Z, Raheem Khoja SA (2022) A partial image encryption scheme based on DWT and texture segmentation. Cogent Eng 9(1):2026555

    Article  Google Scholar 

  18. Nykvist C, Larsson M, Sodhro A, Gurtov A (2020) A lightweight portable intrusion detection communication system for auditing applications. Int J Commun Syst 33(7):e4327

    Article  Google Scholar 

  19. Pandurangi Ramacharya B, Patil MR, Keralkar S (2022) Fast partial image encryption with fuzzy logic and chaotic mapping. Evol Intell 1–17

  20. Raj MG, Pani SK (2022) Chaotic whale crow optimization algorithm for secure routing in the IoT environment. Int J Semant Web Inf Syst (IJSWIS) 18(1):1–25

    Article  Google Scholar 

  21. Schneier B (2007) Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons

  22. Sheela SJ, Suresh KV, Tandur D (2018) Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimed Tools Appl 77(19):25223–25251

    Article  Google Scholar 

  23. Song W, Fu C, Zheng Y et al (2022) Protection of image ROI using chaos-based encryption and DCNN-based object detection. Neural Comput Appl 34(7):5743–5756

    Article  Google Scholar 

  24. Xiao D, Fu Q, Xiang T, Zhang Y (2016) Chaotic image encryption of regions of interest. Int J Bifurcation Chaos 26(11):1650193

    Article  Google Scholar 

  25. Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  26. Yuan HM, Liu Y, Gong LH, Wang J (2017) A new image cryptosystem based on 2D hyper-chaotic system. Multimed Tools Appl 76(6):8087–8108

    Article  Google Scholar 

  27. Zhang W, Yu H, Zhao YL et al (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Article  Google Scholar 

  28. Zhou Y, Bao L, Chen CP (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. J. Sheela.

Ethics declarations

Ethics approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

The authors declare that there are no conflicts of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sheela, S.J., Suresh, K.V. Real time region of interest based chaotic image cryptosystem for IoT applications. Multimed Tools Appl 83, 16161–16177 (2024). https://doi.org/10.1007/s11042-023-16093-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16093-3

Keywords

Navigation