Skip to main content
Log in

Lightweight image encryption algorithm using NLFSR and CBC mode

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The digital images are widely captured, transmitted, and stored by limited resource devices. Those devices need lightweight encryption (LWE) techniques to protect secret and personal images. Designing LWE algorithms for digital images is challenging due to the large size and high inter-pixel correlations of digital images. This paper presents an image encryption technique based on the Nonlinear feedback shift register (NLFSR) and DNA computation. The image is permuted first using pseudorandom sequence generated by a NLSFR based Key stream generator followed by a substitution of pixel values using DNA computations in cipher block chaining mode. Furthermore, security analysis tests, histograms, correlation, entropy, NPCR, and UACI are used to verify our scheme. The security and performance analysis of the proposed techniques analyses showed their efficacy and resistance to attacks. The analysis of the results certainly indicates the scheme is highly secure and lightweight. The proposed scheme can be used for secure image transmission and storage in medical IoT, smart surveillance, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data availability

No data were generated during the research to disclose. No Code is available to share.

References

  1. Gong L, Qiu K, Deng C, Zhou N (2019) An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt Laser Technol 115:257–267

    Article  Google Scholar 

  2. El-Shafai W, Mesrega AK, Ahmed HEH, El-Bahnasawy NA, Abd El-Samie FE (2022) An efficient multimedia compression-encryption scheme using Latin squares for securing internet-of-things networks. J Inf Secur Appl 64:103039

    Google Scholar 

  3. Hedayati R, Mostafavi S (2022) A lightweight image encryption algorithm for secure communications in multimedia internet of things. Wirel Pers Commun 123(2):1121–1143

    Article  Google Scholar 

  4. Zear A, Singh PK (2022) Secure and robust color image dual watermarking based on LWT-DCT-SVD. Multimed Tools Appl 81(19):26721–26738

    Article  Google Scholar 

  5. Mondal B (2018) Cryptographic image scrambling techniques, pp 37–65. https://doi.org/10.1201/9780429435461-2

  6. Arthi G, Thanikaiselvan V, Amirtharajan R (2022) 4d hyperchaotic map and DNA encoding combined image encryption for secure communication. Multimed Tools Appl 81(11):15859–15878

    Article  Google Scholar 

  7. Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimed Tools Appl 79(25):17497–17520

    Article  Google Scholar 

  8. Jasra B, Moon AH (2022) Color image encryption and authentication using dynamic DNA encoding and hyper chaotic system. Expert Syst Appl 206:117861

    Article  Google Scholar 

  9. Deb S, Bhuyan B (2021) Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimed Tools Appl 80(13):19803–19826

    Article  Google Scholar 

  10. Hussain S, Asif M, Shah T, Mahboob A, Eldin SM (2023) Redesigning the serpent algorithm by PA-Loop and its image encryption application. IEEE Access 11:29698–29710

    Article  Google Scholar 

  11. Mahboob A, Asif M, Nadeem M, Saleem A, Eldin SM, Siddique I (2022) A cryptographic scheme for construction of substitution boxes using quantic fractional transformation. IEEE Access 10:132908–132916. https://doi.org/10.1109/ACCESS.2022.3230141

    Article  Google Scholar 

  12. Khalid I, Shah T, Eldin SM, Shah D, Asif M, Saddique I (2023) An integrated image encryption scheme based on elliptic curve. IEEE Access 11:5483–5501. https://doi.org/10.1109/ACCESS.2022.3230096

    Article  Google Scholar 

  13. Gabr M, Younis H, Ibrahim M, Alajmy S, Khalid I, Azab E, Elias R, Alexan W (2022) Application of DNA coding, the lorenz differential equations and a variation of the logistic map in a multi-stage cryptosystem. Symmetry 14(12):2559

    Article  Google Scholar 

  14. Mondal B, Mandal T, Kumar P, Biswas N (2017) A secure partial encryption scheme based on bit plane manipulation. In: 2017 7th international symposium on embedded computing and system design (ISED), pp 1–5. IEEE

  15. Tiwari D, Mondal B, Singh SK, Koundal D (2022) Lightweight encryption for privacy protection of data transmission in cyber physical systems. Cluster Comput, 1–15

  16. Mondal B, Singh JP (2022) A lightweight image encryption scheme based on chaos and diffusion circuit. Multimed Tools Appl, 1–25

  17. Bao W, Zhu C (2022) A secure and robust image encryption algorithm based on compressive sensing and DNA coding. Multimed Tools Appl 81(11):15977–15996

    Article  Google Scholar 

  18. Al-Hazaimeh OM, Al-Jamal MF, Alomari A, Bawaneh MJ, Tahat N (2022) Image encryption using anti-synchronisation and bogdanov transformation map. Int J Comput Sci Math 15(1):43–59

    Article  Google Scholar 

  19. Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71–85

    Article  Google Scholar 

  20. Al-Hazaimeh OM, Al-Jamal MF, Alhindawi N, Omari A (2019) Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys. Neural Comput Appl 31:2395–2405

    Article  Google Scholar 

  21. Wang T, Wang M-h (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding. Opt Laser Technol 132:106355

    Article  Google Scholar 

  22. Anandkumar R, Kalpana R (2019) Designing a fast image encryption scheme using fractal function and 3D Henon map. J Inf Secur Appl 49:102390

    Google Scholar 

  23. Khalid I, Shah T, Almarhabi KA, Shah D, Asif M, Usman Ashraf M (2022) The spn network for digital audio data based on elliptic curve over a finite field. IEEE Access 10:127939–127955. https://doi.org/10.1109/ACCESS.2022.3226322

    Article  Google Scholar 

  24. Pourjabbar Kari A, Habibizad Navin A, Bidgoli AM, Mirnia M (2021) A new image encryption scheme based on hybrid chaotic maps. Multimed Tools Appl 80(2):2753–2772

    Article  Google Scholar 

  25. Xu C, Sun J, Wang C (2020) A novel image encryption algorithm based on bit-plane matrix rotation and hyper chaotic systems. Multimed Tools Appl 79(9):5573–5593

    Article  Google Scholar 

  26. Kumari P, Mondal B (2023) An encryption scheme based on grain stream cipher and chaos for privacy protection of image data on internet-of-things network. Wirel Personal Commun, 1–20

  27. Ihsan A, Doğan N (2023) Improved affine encryption algorithm for color images using lfsr and xor encryption. Multimed Tools Appl 82(5):7621–7637

    Article  Google Scholar 

  28. Zhong J, Lin D (2018) On minimum period of nonlinear feedback shift registers in grain-like structure. IEEE Trans Inf Theory 64(9):6429–6442

    Article  MathSciNet  MATH  Google Scholar 

  29. Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613–25633

    Article  Google Scholar 

  30. Khedr WI (2020) A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl 79(23):16797–16821

    Article  Google Scholar 

  31. Sun Y-j, Zhang H, Wang X-y, Wang M-x (2021) Bit-level color image encryption algorithm based on coarse-grained logistic map and fractional chaos. Multimed Tools Appl 80:12155–12173

    Article  Google Scholar 

  32. Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010

    Article  Google Scholar 

  33. Roy S, Shrivastava M, Pandey CV, Nayak SK, Rawat U (2021) Ievca: An efficient image encryption technique for internet-of-things applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl 80(21):31529–31567

    Article  Google Scholar 

  34. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert N, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication (NIST SP), National Institute of Standards and Technology, Gaithersburg, MD

    Google Scholar 

  35. Mahboob A, Asif M, Siddique I, Saleem A, Nadeem M, Grzelczyk D, Awrejcewicz J (2022) A novel construction of substitution box based on polynomial mapped and finite field with image encryption application. IEEE Access 10:119244–119258

    Article  Google Scholar 

  36. Asif M, Mairaj S, Saeed Z, Ashraf MU, Jambi K, Zulqarnain RM et al (2021) A novel image encryption technique based on mobius transformation. Comput Intell Neurosci 2021

  37. Asif M, Shah T (2019) Bch codes with computational approach and its applications in image encryption. J Intell Fuzzy Syst 37(3):3925–3939

    Article  Google Scholar 

Download references

Funding

The authors hereby declare that there was no full or partial financial support from any organization.

Author information

Authors and Affiliations

Authors

Contributions

PK has drafted the manuscript and generated all the tables. BM has generated all the figures. Both authors have worked on literature surveys, simulations, and proofreading.

Corresponding author

Correspondence to Bhaskar Mondal.

Ethics declarations

Conflict of interest

The authors do not have any financial or personal conflict of interest to disclose related to this manuscript.

Ethical approval

No human and/ or animal studies have been presented in the manuscript. Hence, no ethical approval is needed.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumari, P., Mondal, B. Lightweight image encryption algorithm using NLFSR and CBC mode. J Supercomput 79, 19452–19472 (2023). https://doi.org/10.1007/s11227-023-05415-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05415-9

Keywords

Navigation