Abstract
In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only \(\sqrt{N}\) chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.













Similar content being viewed by others
References
Kim, M., Lee, H.T., Ling, S., Tan, B.H.M., Wang, H.: Private compound wildcard queries using fully homomorphic encryption. IEEE Trans. Depend. Secure. Comput. 16(5), 743–756 (2017)
Hellman, M.: An overview of public-key cryptography. IEEE Commun. Soc. Mag. 16(6), 24–32 (1978)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Navnish, G., Amitabh, M., Babloo, K.: Information security: encryption and decryption with polyalphabetic substitution. Int. J. Comput. Sci. Commun. 2(1), 1–4 (2011)
Stallings, W.: Cryptography and network security: principles and practice. Pearson Education India, Bengaluru (2003)
Forouzan, B.A., Mukhopadhyay, D.: Cryptography and network security (Sie). McGraw-Hill Education, New York (2011)
Manogaran, C.T.G., Priyan, M.: Centralized fog computing security platform for IoT and cloud in the healthcare system. Exploring the convergence of big data and the internet of things, pp. 141–154. IGI Global, Pennysylvania (2017)
Parah, S.A., Sheikh, J.A., Bhat, G.M.: On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Elixir Comp. Sci. Eng. 49, 10141–10146 (2012)
Bhat, G.M., Sheikh, J.A, Parah, S.A.: Data hiding in ISB planes: a high capacity blind stenographic technique. Proceedings of IEEE sponsored international conference INCOSET-2012, Tiruchirapalli Tamilnadu, India, pp. 192–197 (2012)
Parah, S., Sheikh, J., Bhat, G.M.: High capacity data embedding using joint intermediate significant bit and least significant technique. Int. J. Inf. Eng. Appl. 2(11), 1–11 (2013)
Sheikh, J.A., Parah, S.A., Bhat, G.M.: Data hiding in color images: a high capacity data hiding technique for covert communication. Comput. Eng. Intell. Syst. 4(13), 113–118 (2013)
Bhat, G.M., Sheikh, J.A, Parah, S.A.: On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and post embedding pixel adjustment (PEPA). Proceedings of IEEE international conference on multimedia signal processing and communication technologies-IMPACT 2013, (AMU, Aligarh 23–25 November) pp. 51–55 (2013)
Parah, S.A., Sheikh, J.A., Bhat, G.M.: Data hiding in scrambled images: a new double-layer security data hiding technique. Comput. Electr. Eng. 40(1), 70–82 (2014)
Parah, S.A., Sheikh, J.A., Bhat, G.M.: ‘A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am. J. Eng. Technol. Res. 14(2), 38–44 (2014)
Sheikh, J.A., Parah, S.A., Bhat, G.M.: A secure and robust information hiding technique for covert communication. Int. J. Electron. 102(8), 1253–1266 (2015)
Farhana, A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: On the realization of robust watermarking system for medical images. 12th IEEE India International Conference (INDICON) on electronics, energy, environment, communication, computers, control (E3-C3), 17–20 December, Jamia Millia Islamia, New Delhi, pp. 1–6 (2015)
Nazir, A., Parah, S.A., Sheikh, J.A., Farhana, A., Bhat, G.M.: Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimedia Tools Appl. 76(8), 10599–10633 (2015)
Parah, S.A., Sheikh, J.A., Bhat, G.M.: Hiding in encrypted images: a three-tier security data hiding system. Multidimens. Syst. Signal Process. 28, 549–572 (2015). https://doi.org/10.1007/s11045-015-0358-z
Akhoon, J.A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools Appl. 77, 185–207 (2016). https://doi.org/10.1007/s11042-016-4253-x
Loan, N., Parah, S.A., Sheikh, J.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process. 53, 11–24 (2016). https://doi.org/10.1016/j.dsp.2016.02.005
Ahad, F., Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Reversible and high capacity data hiding technique for e-healthcare applications. Multimedia Tools Appl. 76, 3943–3975 (2016). https://doi.org/10.1007/s11042-016-4196-2
Sheikh, J.A., Parah, S.A., Bhat, G.M.: StegNmark: a joint Stego-watermark approach for early tamper detection. Intell. Techn. Signal Process. Multimedia Secur. 660, 427–452 (2016). https://doi.org/10.1007/978-3-319-44790-2_19
Sheikh, J.A., Sheikh, J.A., Assad, U.I., Bhat, G.M.: Realization and robustness evaluation of a blind spatial domain watermarking technique. Int. J. Electron. 104(4), 659–672 (2016). https://doi.org/10.1080/00207217.2016.1242162
Bhat, G.M., Parah, S.A., Sheikh, J.A., Loan, N.: Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidimension. Syst. Signal Process. 29(3), 1095–1117 (2017). https://doi.org/10.1007/s11045-017-0490-z
Xu, Q., Sun, K., Cao, C., Zhu, C.: A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt. Lasers Eng. 121, 203–214 (2019)
Goubin, L., Patarin, J., Yang, B.Y.: Multivariate cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of cryptography and security. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_421
Nilsson, A., Johansson, T., Wagner, P.S.: Error amplification in code-based cryptography. IACR Trans. Cryptogr. Hardw. Embed Syst. 2019(1), 238–258 (2019)
Blaz, B.: Breaking RSA with quantum computing, https://mafija.fmf.unilj.si/seminar/files/2007_2008/BreakingRSA.pdf
Tornea, O., Borda, M. E.: DNA cryptographic algorithms. International conference on advancements of medicine and health care through technology, Springer, Berlin, vol. 26, pp. 223–226 (2009)
Hilborn, R.C.: Chaos and nonlinear dynamics: an introduction for scientists and engineers. Oxford University Press, Oxford (2000)
Parvin, Z., Seyedarabi, H., Shamsi, M.: A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools Appl. 75, 10631–10648 (2016). https://doi.org/10.1007/s11042-014-2115-y
Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis. Comput. 26(6), 843–850 (2008)
Afolabi, A.O., Adagunodo, R.: Implementation of an improved data encryption algorithm in a web-based learning system. Phys. Int. 2(1), 31–35 (2011)
Gaurav, S.: Secure file transmission scheme based on hybrid encryption technique. Int. J. Manag. IT Eng. 2(1), 229–238 (2012)
Goldreich, O.: Introduction to complexity theory lecture notes. Weizmann Institute of Science, Israel, 24. https://www.wisdom.weizmann.ac.il/~oded/PS/CC/all.pdf (1999)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Pub, N. F.: Advanced encryption standard (AES). Federal information processing standards publication, vol. 197. https://www.federalregister.gov/documents/2001/12/06/01-30232/announcing-approval-of-federal-information-processing-standard-fips-197-advanced-encryption-standard (2001)
Farheen, S., Bikiran, C., Shobha, M.S., Jitendranath, M.: A study on data encryption using AES and RSA. Int. J. Innov. Res. Comput. Commun. Eng. 5(4), 8807–8811 (2017)
Sinha, A., Singh, K.: A technique for image encryption using a digital signature. Opt. Commun. 218(4–6), 229–234 (2003)
Blackedge, J.M., Ahmed, M., Farooq, O.: Chaotic image encryption algorithm based on frequency domain scrambling. Dublin Institute of Technology, Dublin (2010)
Li, C., Chen, G.: On the security of a class of image encryption schemes. IEEE international symposium on circuits and systems ISCAS 2008, Washington USA, pp. 3290–3293 (2008)
Xiao, G., Lu, M., Qin, L., Lai, X.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51(12), 1413–1420 (2006)
Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands. Biosystems 57(1), 13–22 (2000)
Maniyath, S.R., Supriya, M.: An uncompressed image encryption algorithm based on DNA sequences. Comput. Sci. Inf. Technol. 2, 258–270 (2011)
Kumar, D., Singh, S.: Secret data writing using DNA sequences. International conference on emerging trends in networks and computer communications (ETNCC), pp. 402–405 (2011)
Debbarma, N., Kumari, L., Raheja, J.L.: 2D Chaos based color image encryption using pseudorandom key generation. Chaos 2(4), 387–392 (2013)
Sakthidasan, K., Krishna, B.S.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2), 137–141 (2011)
Al-Najjar, H.M., Al-Najjar, A.M.: Image encryption algorithm based on the logistic map and pixel mapping table. Proceedings of international Arab conference on information technology, pp. 56–60 (2011)
Waghmare, A., Bhagat, A., Surve, A., Kalgutkar, S.: Chaos based image encryption and decryption. Int. J. Adv. Res. Comput. Commun. Eng. 5(4), 64–68 (2016)
Shah, A.A., Parah, S.A.: Chaos-based novel cryptographic technique based on a new logistic map. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1), 73–94 (2017)
Murillo-Escobar, M.A., Abundiz-Pérez, F., Cruz-Hernández, C., López-Gutiérrez, R.M.: A novel symmetric text encryption algorithm based on logistic map. Proceedings of the international conference on communications, signal processing and computers, pp. 49–53 (2014).
Joshi, A., Kumari, M.: Encryption of RGB image using Arnold transform and involuntary matrices. IJARCCE 4(9), 489–494 (2015)
Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. 3(1), 8–13 (2015)
Pareek, N.K., Patidar, V., Sud, K.K.: Diffusion-substitution based gray image encryption algorithm. Digital Signal Process. 23(8), 894–901 (2013)
Yang, H., Wong, K.W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)
El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU Int. J. Electron. Commun. 67(2), 136–143 (2013)
Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on a hash function with only a two-round diffusion process. Multimedia Syst. 20(1), 45–64 (2014)
Patro, K.A.K., Acharya, B.: An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 46, 23–41 (2019)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shah, A.A., Parah, S.A., Rashid, M. et al. Efficient image encryption scheme based on generalized logistic map for real time image processing. J Real-Time Image Proc 17, 2139–2151 (2020). https://doi.org/10.1007/s11554-020-01008-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-020-01008-4