Skip to main content
Log in

An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high redundancy inherent in multimedia data. In this paper, a new image encryption algorithm based on nonlinear-feedback shift registers is proposed. The proposed algorithm is based on the Trivium cipher and has multiple encryption rounds. A key schedule produces the round keys from the initial secret key, and the Trivium cipher generates the key-streams for the bit-level substitution for each round utilizing the round key and an initialization vector (IV). Each round of the proposed algorithm consists of three steps, pixel-based row permutation, pixel-based column permutation, and bit-level substitution. Experimental results show that the proposed algorithm is reliably secure and outperforms the contemporary image encryption algorithms in terms of quality, efficiency, and security on most of the image encryption metrics. Furthermore, the low complexity of the proposed Trivium-based image encryption algorithm demonstrates high potential for deployment in real-time applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availibility

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

References

  1. Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J. Advanced Encryption Standard (AES). Federal Information Processing Standards (NIST FIPS). Gaithersburg: National Institute of Standards and Technology; 2001. https://doi.org/10.6028/NIST.FIPS.197.

    Book  Google Scholar 

  2. Pub F. Data encryption standard (des). FIPS PUB. 1999, pp. 46–3.

  3. Talhaoui MZ, Wang X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci. 2021;550:13–26.

    Article  MathSciNet  MATH  Google Scholar 

  4. Gao X. Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol. 2021;142: 107252.

    Article  Google Scholar 

  5. Alghamdi Y, Munir A, Ahmad J. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy. 2022;24(10):1344. https://doi.org/10.3390/e24101344.

    Article  MathSciNet  Google Scholar 

  6. Hua Z, Zhou Y, Pun C-M, Chen CP. 2D sine logistic modulation map for image encryption. Inf Sci. 2015;297:80–94.

    Article  Google Scholar 

  7. Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai A. A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022;10:12966–82.

    Article  Google Scholar 

  8. Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the LSS chaotic map and single s-box. IEEE Access. 2020;8:25664–78.

    Article  Google Scholar 

  9. Wu T-Y, Fan X, Wang K-H, Lai C-F, Xiong N, Wu JM-T. A DNA computation-based image encryption scheme for cloud CCTV systems. IEEE Access. 2019;7:181434–43.

    Article  Google Scholar 

  10. Zhang Y, Zhang L, Zhong Z, Yu L, Shan M, Zhao Y. Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt Lasers Eng. 2021;143: 106626.

    Article  Google Scholar 

  11. Uddin M, Jahan F, Islam MK, Rakib Hassan M. A novel DNA-based key scrambling technique for image encryption. Complex Intell Syst. 2021;7(6):3241–58.

    Article  Google Scholar 

  12. Xiao D, Kulsoom A, Hashmi MA, Abbas SA, et al. Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl. 2019;78(7):9355–82.

    Article  Google Scholar 

  13. Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H. An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access. 2020;8:25650–63.

    Article  Google Scholar 

  14. Wang X-Y, Li Z-M. A color image encryption algorithm based on hopfield chaotic neural network. Opt Lasers Eng. 2019;115:107–18.

    Article  Google Scholar 

  15. Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals. 2021;152: 111318.

    Article  MathSciNet  MATH  Google Scholar 

  16. Dou Y, Li M. An image encryption algorithm based on compressive sensing and m sequence. IEEE Access. 2020;8:220646–57.

    Article  Google Scholar 

  17. Zhang M, Tong X-J, Liu J, Wang Z, Liu J, Liu B, Ma J. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access. 2020;8:40838–49.

    Article  Google Scholar 

  18. Ping P, Fu J, Mao Y, Xu F, Gao J. Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access. 2019;7:170168–84.

    Article  Google Scholar 

  19. Canniere CD, Preneel B. Trivium specifications. eSTREAM, ECRYPT Stream Cipher Project. 2006. Accessed 10 Oct 2022.

  20. Qureshi MA, Munir A. PUF-RAKE: a PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans Depend Secure Comput (TDSC). 2022;19(4):2457–75.

    Article  Google Scholar 

  21. USC-SIPI Image Database. Volume 3: Miscellaneous. 2022. Accessed 10 Oct.

  22. Etemadi Borujeni S, Eshghi M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst. 2013;52(2):525–37.

    Google Scholar 

  23. Moafimadani SS, Chen Y, Tang C. A new algorithm for medical color images encryption using chaotic systems. Entropy. 2019. https://doi.org/10.3390/e21060577.

    Article  MathSciNet  Google Scholar 

  24. Faragallah OS. Digital image encryption based on the rc5 block cipher algorithm. Sens Imaging. 2011;12(3):73–94.

    Article  Google Scholar 

  25. Belazi A, Abd El-Latif AA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016;128:155–70.

    Article  Google Scholar 

  26. Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379–423.

    Article  MathSciNet  MATH  Google Scholar 

  27. Jawad LM. A novel region of interest for selective color image encryption technique based on new combination between GLCM texture features. In: 2021 National Computing Colleges Conference (NCCC), IEEE, 2021, pp. 1–6.

  28. Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA. A novel image encryption based on Lorenz equation, ginger breadman chaotic map and s 8 permutation. J Intell Fuzzy Syst. 2017;33(6):3753–65.

    Article  Google Scholar 

  29. Anees A, Siddiqui AM, Ahmed F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul. 2014;19(9):3106–18.

    Article  MathSciNet  MATH  Google Scholar 

  30. Ahmad J, Ahmed F. Efficiency analysis and security evaluation of image encryption schemes. Computing. 2010;23:25.

    Google Scholar 

  31. Khan J, Ahmad J, Hwang SO. An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In: 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), IEEE, 2015, pp. 1–6.

  32. Alexan W, ElBeltagy M, Aboshousha A. Rgb image encryption through cellular automata, s-box and the Lorenz system. Symmetry. 2022;14(3):443.

    Article  Google Scholar 

  33. Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I. Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl. 2022;81(12):16353–70.

    Article  Google Scholar 

  34. Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ, et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access. 2020;8:140876–95.

    Article  Google Scholar 

  35. Wu Y, Noonan JP, Agaian S, et al. NPCR and UACI randomness tests for image encryption. Cyber J. 2011;1(2):31–8.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arslan Munir.

Ethics declarations

Conflict of Interest

The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

Ethical Standards

The authors declare that they have no conflicts of interest. This article does not contain any studies involving human participants and/or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alghamdi, Y., Munir, A. An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution. SN COMPUT. SCI. 4, 713 (2023). https://doi.org/10.1007/s42979-023-02172-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-023-02172-7

Keywords