Abstract
Traditional encryption algorithms are not suitable and computationally efficient for encrypting multimedia data due to the large size and high redundancy inherent in multimedia data. In this paper, a new image encryption algorithm based on nonlinear-feedback shift registers is proposed. The proposed algorithm is based on the Trivium cipher and has multiple encryption rounds. A key schedule produces the round keys from the initial secret key, and the Trivium cipher generates the key-streams for the bit-level substitution for each round utilizing the round key and an initialization vector (IV). Each round of the proposed algorithm consists of three steps, pixel-based row permutation, pixel-based column permutation, and bit-level substitution. Experimental results show that the proposed algorithm is reliably secure and outperforms the contemporary image encryption algorithms in terms of quality, efficiency, and security on most of the image encryption metrics. Furthermore, the low complexity of the proposed Trivium-based image encryption algorithm demonstrates high potential for deployment in real-time applications.









Similar content being viewed by others
Data Availibility
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
References
Dworkin M, Barker E, Nechvatal J, Foti J, Bassham L, Roback E, Dray J. Advanced Encryption Standard (AES). Federal Information Processing Standards (NIST FIPS). Gaithersburg: National Institute of Standards and Technology; 2001. https://doi.org/10.6028/NIST.FIPS.197.
Pub F. Data encryption standard (des). FIPS PUB. 1999, pp. 46–3.
Talhaoui MZ, Wang X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci. 2021;550:13–26.
Gao X. Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol. 2021;142: 107252.
Alghamdi Y, Munir A, Ahmad J. A lightweight image encryption algorithm based on chaotic map and random substitution. Entropy. 2022;24(10):1344. https://doi.org/10.3390/e24101344.
Hua Z, Zhou Y, Pun C-M, Chen CP. 2D sine logistic modulation map for image encryption. Inf Sci. 2015;297:80–94.
Arif J, Khan MA, Ghaleb B, Ahmad J, Munir A, Rashid U, Al-Dubai A. A novel chaotic permutation-substitution image encryption scheme based on logistic map and random substitution. IEEE Access. 2022;10:12966–82.
Lu Q, Zhu C, Deng X. An efficient image encryption scheme based on the LSS chaotic map and single s-box. IEEE Access. 2020;8:25664–78.
Wu T-Y, Fan X, Wang K-H, Lai C-F, Xiong N, Wu JM-T. A DNA computation-based image encryption scheme for cloud CCTV systems. IEEE Access. 2019;7:181434–43.
Zhang Y, Zhang L, Zhong Z, Yu L, Shan M, Zhao Y. Hyperchaotic image encryption using phase-truncated fractional Fourier transform and DNA-level operation. Opt Lasers Eng. 2021;143: 106626.
Uddin M, Jahan F, Islam MK, Rakib Hassan M. A novel DNA-based key scrambling technique for image encryption. Complex Intell Syst. 2021;7(6):3241–58.
Xiao D, Kulsoom A, Hashmi MA, Abbas SA, et al. Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl. 2019;78(7):9355–82.
Samiullah M, Aslam W, Nazir H, Lali MI, Shahzad B, Mufti MR, Afzal H. An image encryption scheme based on DNA computing and multiple chaotic systems. IEEE Access. 2020;8:25650–63.
Wang X-Y, Li Z-M. A color image encryption algorithm based on hopfield chaotic neural network. Opt Lasers Eng. 2019;115:107–18.
Man Z, Li J, Di X, Sheng Y, Liu Z. Double image encryption algorithm based on neural network and chaos. Chaos Solitons Fractals. 2021;152: 111318.
Dou Y, Li M. An image encryption algorithm based on compressive sensing and m sequence. IEEE Access. 2020;8:220646–57.
Zhang M, Tong X-J, Liu J, Wang Z, Liu J, Liu B, Ma J. Image compression and encryption scheme based on compressive sensing and Fourier transform. IEEE Access. 2020;8:40838–49.
Ping P, Fu J, Mao Y, Xu F, Gao J. Meaningful encryption: generating visually meaningful encrypted images by compressive sensing and reversible color transformation. IEEE Access. 2019;7:170168–84.
Canniere CD, Preneel B. Trivium specifications. eSTREAM, ECRYPT Stream Cipher Project. 2006. Accessed 10 Oct 2022.
Qureshi MA, Munir A. PUF-RAKE: a PUF-based robust and lightweight authentication and key establishment protocol. IEEE Trans Depend Secure Comput (TDSC). 2022;19(4):2457–75.
USC-SIPI Image Database. Volume 3: Miscellaneous. 2022. Accessed 10 Oct.
Etemadi Borujeni S, Eshghi M. Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst. 2013;52(2):525–37.
Moafimadani SS, Chen Y, Tang C. A new algorithm for medical color images encryption using chaotic systems. Entropy. 2019. https://doi.org/10.3390/e21060577.
Faragallah OS. Digital image encryption based on the rc5 block cipher algorithm. Sens Imaging. 2011;12(3):73–94.
Belazi A, Abd El-Latif AA, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 2016;128:155–70.
Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379–423.
Jawad LM. A novel region of interest for selective color image encryption technique based on new combination between GLCM texture features. In: 2021 National Computing Colleges Conference (NCCC), IEEE, 2021, pp. 1–6.
Khan FA, Ahmed J, Khan JS, Ahmad J, Khan MA. A novel image encryption based on Lorenz equation, ginger breadman chaotic map and s 8 permutation. J Intell Fuzzy Syst. 2017;33(6):3753–65.
Anees A, Siddiqui AM, Ahmed F. Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul. 2014;19(9):3106–18.
Ahmad J, Ahmed F. Efficiency analysis and security evaluation of image encryption schemes. Computing. 2010;23:25.
Khan J, Ahmad J, Hwang SO. An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In: 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), IEEE, 2015, pp. 1–6.
Alexan W, ElBeltagy M, Aboshousha A. Rgb image encryption through cellular automata, s-box and the Lorenz system. Symmetry. 2022;14(3):443.
Khan M, Khan L, Hazzazi MM, Jamal SS, Hussain I. Image encryption scheme for multi-focus images for visual sensors network. Multimed Tools Appl. 2022;81(12):16353–70.
Qayyum A, Ahmad J, Boulila W, Rubaiee S, Masood F, Khan F, Buchanan WJ, et al. Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access. 2020;8:140876–95.
Wu Y, Noonan JP, Agaian S, et al. NPCR and UACI randomness tests for image encryption. Cyber J. 2011;1(2):31–8.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.
Ethical Standards
The authors declare that they have no conflicts of interest. This article does not contain any studies involving human participants and/or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Alghamdi, Y., Munir, A. An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution. SN COMPUT. SCI. 4, 713 (2023). https://doi.org/10.1007/s42979-023-02172-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-023-02172-7