Skip to main content
Log in

A new RGB image encryption using generalized heat equation associated with generalized Vigen\(\grave {e}\)re-type table over symmetric group

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The primary aim of this paper is to provide an efficient encryption algorithm for RGB images. A new, fast and secure RGB image encryption using Generalized Heat Equation (GHE) associated with Generalized Vigen\(\grave {e}\)re-type Table over Symmetric Group Sn (GVTSG) is proposed. Encryption keys are obtained from Random Key Sequence (RKS). We have generated RKS and GVTSG with the help of GHE. By using this GHE, we are able to test the randomness over the generated key sequence by applying National Institute of Standards and Technology (NIST) statistical test suite. A formula for the keyspace has also been obtained and it is shown that this keyspace resists brute force attack. The proposed encryption algorithm provides high security and a larger key space. The keys for encryption or decryption consume less storage to store it on both sender and receiver ends. Robustness of the proposed algorithm has been analyzed and compared with other competing existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14:3743–3749

    Article  Google Scholar 

  2. Arroyo D, Rhouma R, Alvarez G, Li S, Fernandez V (2008) On the security of a new image encryption scheme based on chaotic map lattices. Chaos: An Interdisciplinary Journal of Nonlinear Science 18:1–7

    Article  Google Scholar 

  3. Assad SE, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157

    Article  Google Scholar 

  4. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. In: Proceedings of the 10th annual international cryptology conference on advances in cryptology. Springer, pp 2–21

  5. Biham E, Shamir A (1993) Differential cryptanalysis of the full 16-round DES. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, Springer

  6. Boriga R, Dăscălescu AC, Priescu I (2014) A new hyper chaotic map and its application in an image encryption scheme. Signal Process Image Commun 29:887–901

    Article  Google Scholar 

  7. Cannière CD, Lano J, Preneel B (2005) Cryptanalysis of the two dimensional circulation encryption algorithm. EURASIP Journal on Applied Signal Processing 2005:1923–1927

    MathSciNet  MATH  Google Scholar 

  8. Chang CC, Hwang MS, Chen TS (2001) A new encryption algorithm for image cryptosystems. J Syst Softw 52:83–91

    Article  Google Scholar 

  9. Chen A, Lu J, Lü J, Yu S (2006) Generating hyper-chaotic Lü attractor via state feedback control. Physica A 364:103–110

    Article  Google Scholar 

  10. Chen J, Zhou J, Wong KW (2011) A modified chaos-based joint compression and encryption scheme. IEEE Trans Circuits Syst II(58):110–114

    Article  Google Scholar 

  11. Diaconu AV, Costea A, Costea MA (2014) Color image scrambling technique based on transposition of pixels between RGB channels using Knight’s moving rules and digital chaotic map. Math Probl Eng 2014:1–15

    Article  Google Scholar 

  12. Gao T, Chen Z (2008) A new image encryption algorithm fbased on hyper-chaos. Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  13. Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282:2123–2127

    Article  Google Scholar 

  14. Kadir A, Hamdulla A, Guo W (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik 125:1671–1675

    Article  Google Scholar 

  15. Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie-Hellman cryptography. Signal Process 125:187–202

    Article  Google Scholar 

  16. Kumar M, Mohapatra RN, Agarwal Sajal, Sathish G, Raw SN (2019) A new RGB image encryption using generalized Vigenere-type table over symmetric group associated with virtual planet domain. Multimed Tools Appl 78:10227–10263

    Article  Google Scholar 

  17. Li S, Zheng X (2002) On the security of an image encryption method. Proceedings of the 2002 IEEE International Conference on Image Processing 2:925–928

    Google Scholar 

  18. Li S, Zheng X (2002) Cryptanalysis of a chaotic image encryption method. Proc IEEE Int Symp Circuits Syst 2:708–711

    Google Scholar 

  19. Li S, Li C, Chen G, Lo KT (2008) Cryptanalysis of the RCES/RSES image encryption scheme. J Syst Softw 81:1130–1143

    Article  Google Scholar 

  20. Li C, Li S, Chen G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27:1035–1039

    Article  Google Scholar 

  21. Li C, Arroyo D, Lo K (2010) Breaking a chaotic cryptographic scheme based on composition maps. Int J Bifurcation Chaos 20:2561–2568

    Article  MathSciNet  MATH  Google Scholar 

  22. Li C, Lin D, Lü J (2017) Cryptanalyzing an Image-Scrambling encryption algorithm of pixel bits. IEEE MultiMedia 24:64–71

    Article  Google Scholar 

  23. Liu H, Wang X (2011) Color image encryption using spatial bit level permutation and high-dimension chaotic system. Opt Commun 284:3895–3903

    Article  Google Scholar 

  24. Liu Y, Tong X, Hu S (2013) A family of new complex number chaotic maps based image encryption. Signal Process Image Commun 28:1548–1559

    Article  Google Scholar 

  25. Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Optik 124:3527–3533

    Article  Google Scholar 

  26. Pathak RS, Prasad A, Kumar M (2012) Fractional Fourier transform of tempered distributions and generalized pseudo-differential operator. Journal of Pseudo-Differential Operator and its Applications 3:239–254

    Article  MathSciNet  MATH  Google Scholar 

  27. Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys Lett A 372:5790–5794

    Article  MATH  Google Scholar 

  28. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372:5973–5978

    Article  MATH  Google Scholar 

  29. Rhouma R, Meherzi S, Belghith S (2009) OCML-Based colour image encryption. Chaos Solitons Fractals 40:309–318

    Article  MATH  Google Scholar 

  30. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15:1887–1892

    Article  MathSciNet  MATH  Google Scholar 

  31. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800–22 Rev1a 2014 2010, available online at http://csrc.nist.gov/groups/ST/toolkit/rng/documentation_software.html

  32. Solak E, Cokal C, Yildiz OT, Biyikogglu T (2010) Cryptanalysis of Fridrich’s chaotic image encryption. Int J Bifurcation Chaos 20:1405–1413

    Article  MathSciNet  MATH  Google Scholar 

  33. Som S, Mitra A, Palit S, Chaudhuri BB (2019) A selective bitplane image encryption scheme using chaotic maps. Multimed Tools Appl 78:10373–10400

    Article  Google Scholar 

  34. Tong XJ, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493–1508

    Article  MathSciNet  MATH  Google Scholar 

  35. Wang K, Pei W, Zou L, Song A, He Z (2005) On the security of 3D cat map based symmetric image encryption scheme. Phys Lett A 343:432–439

    Article  MATH  Google Scholar 

  36. Wang X, Qin X, Liu C (2019) Color image encryption algorithm based on customized globally coupled map lattices. Multimed Tools Appl 78:6191–6209

    Article  Google Scholar 

  37. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85:290–299

    Article  Google Scholar 

  38. Wu Y, Noonan JP, Agaian S (2011) NPCR And UACI randomness tests for image encryption. Journal of Selected Areas in Telecommunications 4:31–38

    Google Scholar 

  39. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  40. Xie EY, Li C, Yu S, Lü J (2017) On the security of a class of image encryption schemes. Signal Process 132:150–154

    Article  Google Scholar 

  41. Xiong Z, Wu Y, Ye C, Zhang X, Xu F (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimedia Tools and Applications, pp 1–21

  42. Ye R (2011) A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt Commun 284:5290–5298

    Article  Google Scholar 

  43. Ye G, Wong KW (2013) An image encryption scheme based on time-delay and hyper-chaotic system. Nonlinear Dyn 71:259–267

    Article  Google Scholar 

  44. Yuan Hong-Mei, Liu Y, Lin T, Hu T, Gong Li-Hua (2017) A new parallel image cryptosystem based on 5D hyper-chaotic system. Signal Process Image Commun 52:87–96

    Article  Google Scholar 

  45. Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image Commun 28:292–300

    Article  Google Scholar 

  46. Zhang W, Yu H, Zhao Yu-li, Zhu Zhi-liang (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Article  Google Scholar 

Download references

Acknowledgments

We thank the two anonymous referees for their valuable and insightful comments. The first author is grateful to the Science & Engineering Research Board, Government of India for providing financial support through project file no. YSS/2015/000930.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Kumar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, M., Sathish, G., Alphonse, M. et al. A new RGB image encryption using generalized heat equation associated with generalized Vigen\(\grave {e}\)re-type table over symmetric group. Multimed Tools Appl 78, 28025–28061 (2019). https://doi.org/10.1007/s11042-019-07893-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07893-7

Keywords

Navigation