Skip to main content
Log in

Secure color image cryptosystem based on chaotic logistic in the FrFT domain

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, the digital multimedia security technology has been an interesting research theme due to fast advancement in employing real time multimedia through Internet and wireless networks. The market of multimedia streaming, such as exclusive video on demand (VoD) is a huge multi- billion-dollar market. This market is threatened by hackers. The multimedia streaming industry needs a cryptosystem that is both fast and secure. Chaotic cryptosystems have been proposed by many researchers in order to promote communication security. However, these chaotic schemes have some major problems, such as unacceptable expansion of data, slow performance speed, and shortcomings against differential attack. Therefore, this paper provides an efficient Fractional Fourier Transform (FrFT)-based logistic map (LM) color image encryption scheme by applying a 2D LM on FrFT. In the proposed FrFT-based LM color image encryption scheme, the 2D LM is employed as a confusion step to scramble the color image pixel positions in the FrFT and confuse the relationship between the cipherimage and the plainimage. For enhancing the encryption performance characteristics of the 2D LM under the FrFT, the angle of the FrFT is taken as an extra additional key in encryption. The proposed FrFT-based LM color image encryption scheme is examined and investigated using visual inspection, entropy, histograms, encryption quality, noise tests, and differential analysis. The obtained simulation tests demonstrate and verify the effectiveness of the FrFT-based LM color image encryption scheme. Moreover, our results also show a significant improvement in the performance of the confusion property with our proposed 2D LM encryption scheme using the FrFT. Also, we compared the proposed cryptosystem with recent state-of-the-art cryptosystems. Experimental results show that our proposed image cryptosystem is highly secure from the cryptographic point of view. Furthermore, the obtained test results ensured the superiority of our proposed cryptosystem for digital image transmission compared to the recent state-of-theart cryptosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator. International Journal of Signal & Image Processing 1(3)

  2. Alanazi, N, Alanizy, A, Baghoza, N, Al Ghamdi, M, Gutub, A (2018). 3-Layer PC Text Security via Combining Compression, AES Cryptography 2LSB Image Steganography

  3. Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in IoT systems. Arabia

  4. Alassaf N, Gutub A, Parah S, Ghamdi A, Manal (2018) Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z

    Article  Google Scholar 

  5. Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl:1–28

  6. Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77

    Article  Google Scholar 

  7. Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724

    Article  Google Scholar 

  8. Aljawarneh S, Yassein MB (2018) A multithreaded programming approach for multimedia big data: encryption system. Multimed Tools Appl 77(9):10997–11016

    Article  Google Scholar 

  9. Aljuaid N, Gutub A, Khan E (2018) Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography. Journal of Information Security and Cybercrimes Research (JISCR) 1. https://doi.org/10.26735/16587790.2018.006

  10. Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157

    Google Scholar 

  11. Alsaidi A, Al-lehaibi K, Alzahrani H, AlGhamdi M, Gutub A (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. Journal of Computer Science & Computational Mathematics (JCSCM) 8(3):33–42

    Article  Google Scholar 

  12. Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of Digital Fingerprint Image Quality on the Fingerprint Recognition Accuracy. Multimed Tools Appl 78:3649. https://doi.org/10.1007/s11042-017-5537-5

    Article  Google Scholar 

  13. Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497

    Article  MathSciNet  Google Scholar 

  14. Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472

    Article  Google Scholar 

  15. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  16. Chen JX, Zhu ZL, Fu C, Yu H (2015) Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Optics Comm 341:263–270

    Article  Google Scholar 

  17. Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353

    Article  Google Scholar 

  18. Elhosany HM, Hossin HE, Kazemian HB, Faragallah OS (2012) C9. Chaotic encryption of images in the Fractional Fourier Transform domain using different modes of operation. In Radio Science Conference (NRSC), 2012 29th National (pp. 223-235). IEEE

  19. El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083

    Article  Google Scholar 

  20. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769

    Article  Google Scholar 

  21. Gupta BB (2018) Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press, Taylor & Francis 666

  22. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (1st ed.). IGI Global, Hershey

    Book  Google Scholar 

  23. Gutub AAA (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2(1):56–64

    Google Scholar 

  24. Gutub A, Al-Ghamdi M (2019) Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing. 3D Res 10(1):6

    Article  Google Scholar 

  25. Gutub A, Aljuaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. https://doi.org/10.63019/jche.v1i2.513

  26. Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619

    Article  Google Scholar 

  27. Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) (pp. 116-121). IEEE

  28. Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy-preserving cryptosystem for IoT E-healthcare. Inf Sci

  29. Jiang X, Sun J, Li C, Ding H (2018) Video Image Defogging Recognition Based on Recurrent Neural Network. IEEE Transactions on Industrial Informatics 14(7):3281–3288

    Article  Google Scholar 

  30. Kong D, Shen X (2014) Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform. Opt Laser Technol 57:343–349

    Article  Google Scholar 

  31. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  32. Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561

    Article  Google Scholar 

  33. Mary SJ, Christopher CS, Joe SSA (2016) Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits and Systems 7(08):1722

    Article  Google Scholar 

  34. Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik-International Journal for Light and Electron Optics 127(13):5190–5192

    Article  Google Scholar 

  35. Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering 38:127–142

    Google Scholar 

  36. Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075

    Article  Google Scholar 

  37. Ran Q, Zhao T, Yuan L, Wang J, Xu L (2014) Vector power multiple-parameter fractional Fourier transform of image encryption algorithm. Opt Lasers Eng 62:80–86

    Article  Google Scholar 

  38. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215

    Article  Google Scholar 

  39. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615–621

    Article  MathSciNet  Google Scholar 

  40. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  41. Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Opt Lasers Eng 91:41–52

    Article  Google Scholar 

  42. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Article  Google Scholar 

  43. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks 9(13):2015–2023

    Google Scholar 

  44. Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer-generated hologram. Multimed Tools Appl 77:4585. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

  45. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  46. Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965–7980

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid El-Shafai.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Faragallah, O.S., AlZain, M.A., El-Sayed, H.S. et al. Secure color image cryptosystem based on chaotic logistic in the FrFT domain. Multimed Tools Appl 79, 2495–2519 (2020). https://doi.org/10.1007/s11042-019-08190-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08190-z

Keywords

Navigation