Abstract
This study proposes a highly efficient image encryption algorithm by employing a rapid key generation approach and permutation structure. The image is converted to a matrix, and then an encryption algorithm based on factorial decomposition permutation is applied. Two variants of the algorithm have been proposed in this study, where each variant is distinguished by the elements of the matrix to be permutated. The first variant is based on the permutation of the pixels of the image. In the second variant, the permutation is applied to both columns and rows of the matrix. These variants of the algorithm have been tested and compared. To create a permutation of a collection of elements, the factorial decomposition mathematical technique is applied, where the Euclidian division of a given key is obtained by adding the factorials of all the integers. The experimental results indicate that the proposed approach provides sufficient and optimistic results in terms of computational complexity, Keyspace analysis, Statistical analysis, and Sensitivity analysis attacks. The statistical analysis shows the superiority of the algorithm using two permutation methods, where sensitivity analysis indicates that the number of pixels changing rate (NPCR) achieved around 99.7 and the unified average changed intensity (UACI) is around 33.5, which showed better performance than the other approaches in the literature. Moreover, the proposed approach provided less computational complexity compared with the existing approaches.






Similar content being viewed by others
Data availability
The data that support the findings of this study are openly available in [Volume 3: Miscellaneous] at https://sipi.usc.edu/database/database.php?volume=misc.
References
Heron S (2009) Advanced encryption standard (AES). Netw Secur 2009(12):8–12
Dhany HW et al. (2017) Encryption and decryption using password based encryption, MD5, and DES. International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Atlantis Press
Williams H (1980) A modification of the RSA public-key encryption procedure (Corresp.). IEEE Trans Inf Theory 26(6):726–729
Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1-2):50–54
Belazi A, Abd El-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170
Belazi A et al (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynam 87(1):337–361
Kaliswaran S, Parvees MYM (2022) War Optimization Method for Image Encryption Algorithm Based on A Chaotic Bit-Plane Decomposition. J Pharmaceut Negative Results 2657-2671
Li S, Chen G, Zheng X. (2006) Chaos-based encryption for digital image and video. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publications. 129-163
El-Khamyl S, Abou El-Nasr M, and El-Zein A (2009) An encryption scheme for images based on the DWT and a chaotic cipher. 2009 National Radio Science Conference. IEEE
Morankar G (2022) Robust Image Encryption Scheme for Biometric Finger Print Images using Bit Planes, DWT and Cubic Map. Intl J Next-Gen Comput 13.5
Li M et al. (2019) Cryptanalysis of permutation–diffusion-based lightweight chaotic image encryption scheme using CPA. Appl Sci 9.3 494
Alanezi A et al. (2021) Securing digital images through simple permutation-substitution mechanism in cloud-based smart city environment. Secur Commun Netw (2021): 1-17
Arif J et al (2022) A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access 10:12966–12982
Alghamdi Y, Munir A, Ahmad J (2022) A Lightweight Image Encryption Algorithm Based on Chaotic Map and Random Substitution. Entropy 24(10):1344
Shen H et al. (2022) A new chaotic image encryption algorithm based on transversals in a Latin square. Entropy 24.11 1574
Sam I, Shatheesh PD, Bhuvaneswaran RS (2014) An efficient quasigroup based image encryption using modified nonlinear chaotic maps. Sens Imaging 15:1–21
Zhang X et al. (2021) A novel chaotic image encryption algorithm based on latin square and random shift. Comput Intell Neurosci 2021
Wu Y et al (2014) Design of image cipher using latin squares. Inf Sci 264:317–339
Hua Z et al (2021) Design and application of an S-box using complete Latin square. Nonlinear Dynam 104(1):807–825
Xu M, Tian Z (2018) A novel image encryption algorithm based on self-orthogonal Latin squares. Optik 171:891–903
Wang X et al (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dynam 107:1277–1293
Hua Z et al (2021) Color image encryption using orthogonal Latin squares and a new 2D chaotic system. Nonlinear Dynam 104:4505–4522
Xu M, Tian Z (2019) A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci 478:1–14
Zhou J, Zhou N-R, Gong L-H (2020) Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Opt Laser Technol 131:106437
Li T et al. (2019) Image encryption based on pixel-level diffusion with dynamic filtering and DNA-level permutation with 3D Latin cubes. Entropy 21.3: 319
Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
Liu JL et al. (2022) Image compression and encryption algorithm based on 2D compressive sensing and hyperchaotic system. Multimedia Systems 1-16
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36
Som S et al (2015) Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator. Nonlinear Dynam 80:615–627
Ye G, Zhao H, Chai H (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dynam 83:2067–2077
Chen W, Quan C, Tay CJ (2009) Optical color image encryption based on Arnold transform and interference method. Opt Commun 282(18):3680–3685
Tong X-J et al (2016) A joint color image encryption and compression scheme based on hyper-chaotic system. Nonlinear Dynam 84:2333–2356
Tong X-J, Chen P, Zhang M (2017) A joint image lossless compression and encryption method based on chaotic map. Multimed Tools Appl 76:13995–14020
Aihara K, Takabe T, Toyoda M (1990) Chaotic neural networks. Phys Lett A 144(6-7):333–340
Hopfield JJ (1982) Neural networks and physical systems with emergent collective computational abilities. Proc Natl Acad Sci 79(8):2554–2558
Hopfield JJ (1984) Neurons with graded response have collective computational properties like those of two-state neurons. Proc Natl Acad Sci 81(10):3088–3092
Kassem A et al (2014) Efficient neural chaotic generator for image encryption. Digital Signal Process 25:266–274
Liu L et al (2019) A simultaneous scrambling and diffusion color image encryption algorithm based on Hopfield chaotic neural network. IEEE Access 7:185796–185810
Lakshmi C et al (2020) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput & Applic 32(15):11477–11489
Wang X-Y, Li Z-M (2019) A color image encryption algorithm based on Hopfield chaotic neural network. Opt Lasers Eng 115:107–118
Jolfaei A, Wu X-W, Muthukkumarasamy V (2015) On the security of permutation-only image encryption schemes. IEEE Trans Inform Forens Secur 11(2):235–246
Tirdad K, Sadeghian A (2010) Hopfield neural networks as pseudo random number generators. 2010 Annual meeting of the North American fuzzy information processing society. IEEE
Tlelo-Cuautle E et al. (2020) Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA. Sensors 20.5: 1326
Yu F et al (2019) Analysis and FPGA realization of a novel 5D hyperchaotic four-wing memristive system, active control synchronization, and secure communication application. Complexity 2019:1–18
Yu F et al. (2022) FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient. Chinese Physics B 31.2: 020505
Wang X et al (2022) A new image encryption algorithm based on Latin square matrix. Nonlinear Dynam 107(1):1277–1293
Cheng G, Wang C, Chen H (2019) A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Intl J Bifurcation Chaos 29(09):1950115
Liao X, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik-Intl J Light Electron Optics 153:117–134
Author information
Authors and Affiliations
Contributions
The authors' contributions statement of the paper is the introduction Muath and Malek, the second section is done by Mutasem and Ibrahim which is the related work. Section number three is done by Nabil, Mostefa and Rami, the proposed encryption and decryption approach process. The fourth section is done by Sultan and Malek. In the fifth section, we compare and provide a comparative analysis of the current and relevant approaches in the domain and this section is done by Neshat. Last section illustrates the conclusion of our research and is done by Muath, Malek and Nabil.
Corresponding author
Ethics declarations
Ethical approval and consent to participate
Our manuscript does not report on or involve the use of any animal or human data or tissue, “Not applicable”.
Consent for publication
Our manuscript does not contain data from any individual person, please state “Not applicable”
Competing interests
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
The authors declare that there is no financial interests/personal relationships which may be considered as potential competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
AlShaikh, M., Alzaqebah, M., Gmati, N. et al. Image encryption algorithm based on factorial decomposition. Multimed Tools Appl 83, 88447–88467 (2024). https://doi.org/10.1007/s11042-023-17663-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-023-17663-1