Skip to main content
Log in

Image encryption algorithm based on factorial decomposition

  • 1233: Robust Enhancement, Understanding and Assessment of Low-quality Multimedia Data
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure. The image is converted to a matrix, and then an encryption algorithm based on factorial decomposition permutation is applied. Two variants of the algorithm have been proposed in this study, where each variant is distinguished by the elements of the matrix to be permutated. The first variant is based on the permutation of the pixels of the image. In the second variant, the permutation is applied to both columns and rows of the matrix. These variants of the algorithm have been tested and compared. To create a permutation of a collection of elements, the factorial decomposition mathematical technique is applied, where the Euclidian division of a given key is obtained by adding the factorials of all the integers. The experimental results indicate that the proposed approach provides sufficient and optimistic results in terms of computational complexity, Keyspace analysis, Statistical analysis, and Sensitivity analysis attacks. The statistical analysis shows the superiority of the algorithm using two permutation methods, where sensitivity analysis indicates that the number of pixels changing rate (NPCR) achieved around 99.7 and the unified average changed intensity (UACI) is around 33.5, which showed better performance than the other approaches in the literature. Moreover, the proposed approach provided less computational complexity compared with the existing approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

The data that support the findings of this study are openly available in [Volume 3: Miscellaneous] at https://sipi.usc.edu/database/database.php?volume=misc.

References

  1. Heron S (2009) Advanced encryption standard (AES). Netw Secur 2009(12):8–12

    Article  Google Scholar 

  2. Dhany HW et al. (2017) Encryption and decryption using password based encryption, MD5, and DES. International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Atlantis Press

  3. Williams H (1980) A modification of the RSA public-key encryption procedure (Corresp.). IEEE Trans Inf Theory 26(6):726–729

    Article  Google Scholar 

  4. Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1-2):50–54

    Article  MathSciNet  Google Scholar 

  5. Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Article  Google Scholar 

  6. Belazi A et al (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynam 87(1):337–361

    Article  Google Scholar 

  7. Kaliswaran S, Parvees MYM (2022) War Optimization Method for Image Encryption Algorithm Based on A Chaotic Bit-Plane Decomposition. J Pharmaceut Negative Results 2657-2671

  8. Li S, Chen G, Zheng X. (2006) Chaos-based encryption for digital image and video. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publications. 129-163

  9. El-Khamyl S, Abou El-Nasr M, and El-Zein A (2009) An encryption scheme for images based on the DWT and a chaotic cipher. 2009 National Radio Science Conference. IEEE

  10. Morankar G (2022) Robust Image Encryption Scheme for Biometric Finger Print Images using Bit Planes, DWT and Cubic Map. Intl J Next-Gen Comput 13.5

  11. Li M et al. (2019) Cryptanalysis of permutation–diffusion-based lightweight chaotic image encryption scheme using CPA. Appl Sci 9.3 494

  12. Alanezi A et al. (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw (2021): 1-17

  13. Arif J et al (2022) A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access 10:12966–12982

    Article  Google Scholar 

  14. Alghamdi Y, Munir A, Ahmad J (2022) A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy 24(10):1344

    Article  MathSciNet  Google Scholar 

  15. Shen H et al. (2022) A new chaotic image encryption algorithm based on transversals in a Latin square. Entropy 24.11 1574

  16. Sam I, Shatheesh PD, Bhuvaneswaran RS (2014) An efficient quasigroup based image encryption using modified nonlinear chaotic maps. Sens Imaging 15:1–21

    Article  Google Scholar 

  17. Zhang X et al. (2021) A novel chaotic image encryption algorithm based on latin square and random shift. Comput Intell Neurosci 2021

  18. Wu Y et al (2014) Design of image cipher using latin squares. Inf Sci 264:317–339

    Article  MathSciNet  Google Scholar 

  19. Hua Z et al (2021) Design and application of an S-box using complete Latin square. Nonlinear Dynam 104(1):807–825

    Article  Google Scholar 

  20. Xu M, Tian Z (2018) A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171:891–903

    Article  Google Scholar 

  21. Wang X et al (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dynam 107:1277–1293

    Article  Google Scholar 

  22. Hua Z et al (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynam 104:4505–4522

    Article  Google Scholar 

  23. Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1–14

    Article  Google Scholar 

  24. Zhou J, Zhou N-R, Gong L-H (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt Laser Technol 131:106437

    Article  Google Scholar 

  25. Li T et al. (2019) Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy 21.3: 319

  26. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715

    Article  MathSciNet  Google Scholar 

  27. Liu JL et al. (2022) Image compression and encryption algorithm based on 2D compressive sensing and hyperchaotic system. Multimedia Systems 1-16

  28. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  Google Scholar 

  29. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  30. Som S et al (2015) Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator. Nonlinear Dynam 80:615–627

    Article  Google Scholar 

  31. Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dynam 83:2067–2077

    Article  MathSciNet  Google Scholar 

  32. Chen W, Quan C, Tay CJ (2009) Optical color image encryption based on Arnold transform and interference method. Opt Commun 282(18):3680–3685

    Article  Google Scholar 

  33. Tong X-J et al (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynam 84:2333–2356

    Article  Google Scholar 

  34. Tong X-J, Chen P, Zhang M (2017) A joint image lossless compression and encryption method based on chaotic map. Multimed Tools Appl 76:13995–14020

    Article  Google Scholar 

  35. Aihara K, Takabe T, Toyoda M (1990) Chaotic neural networks. Phys Lett A 144(6-7):333–340

    Article  MathSciNet  Google Scholar 

  36. Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Proc Natl Acad Sci 79(8):2554–2558

    Article  MathSciNet  Google Scholar 

  37. Hopfield JJ (1984) Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci 81(10):3088–3092

    Article  Google Scholar 

  38. Kassem A et al (2014) Efficient neural chaotic generator for image encryption. Digital Signal Process 25:266–274

    Article  Google Scholar 

  39. Liu L et al (2019) A simultaneous scrambling and diffusion color image encryption algorithm based on Hopfield chaotic neural network. IEEE Access 7:185796–185810

    Article  Google Scholar 

  40. Lakshmi C et al (2020) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput & Applic 32(15):11477–11489

    Article  Google Scholar 

  41. Wang X-Y, Li Z-M (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118

    Article  Google Scholar 

  42. Jolfaei A, Wu X-W, Muthukkumarasamy V (2015) On the security of permutation-only image encryption schemes. IEEE Trans Inform Forens Secur 11(2):235–246

    Article  Google Scholar 

  43. Tirdad K, Sadeghian A (2010) Hopfield neural networks as pseudo random number generators. 2010 Annual meeting of the North American fuzzy information processing society. IEEE

  44. Tlelo-Cuautle E et al. (2020) Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA. Sensors 20.5: 1326

  45. Yu F et al (2019) Analysis and FPGA realization of a novel 5D hyperchaotic four-wing memristive system, active control synchronization, and secure communication application. Complexity 2019:1–18

    Article  Google Scholar 

  46. Yu F et al. (2022) FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient. Chinese Physics B 31.2: 020505

  47. Wang X et al (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dynam 107(1):1277–1293

    Article  Google Scholar 

  48. Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Intl J Bifurcation Chaos 29(09):1950115

    Article  MathSciNet  Google Scholar 

  49. Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik-Intl J Light Electron Optics 153:117–134

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Contributions

The authors' contributions statement of the paper is the introduction Muath and Malek, the second section is done by Mutasem and Ibrahim which is the related work. Section number three is done by Nabil, Mostefa and Rami, the proposed encryption and decryption approach process. The fourth section is done by Sultan and Malek. In the fifth section, we compare and provide a comparative analysis of the current and relevant approaches in the domain and this section is done by Neshat. Last section illustrates the conclusion of our research and is done by Muath, Malek and Nabil.

Corresponding author

Correspondence to Muath AlShaikh.

Ethics declarations

Ethical approval and consent to participate

Our manuscript does not report on or involve the use of any animal or human data or tissue, “Not applicable”.

Consent for publication

Our manuscript does not contain data from any individual person, please state “Not applicable”

Competing interests

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

The authors declare that there is no financial interests/personal relationships which may be considered as potential competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

AlShaikh, M., Alzaqebah, M., Gmati, N. et al. Image encryption algorithm based on factorial decomposition. Multimed Tools Appl 83, 88447–88467 (2024). https://doi.org/10.1007/s11042-023-17663-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17663-1

Keywords