Skip to main content
Log in

Efficient chaotic-based image cryptosystem with different modes of operation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a design of 2-D chaotic Baker map for image encryption which utilizes three modes of operations: 1) the cipher block chaining (CBC) mode, 2) the cipher feedback (CFB) mode, and 3) the output feedback (OFB) mode. The proposed image cryptosystem is characterized by a short encryption time of scalevariant images and a high level of confusion and diffusion due to its shuffling and substitution processes. This is useful in applications such as online streaming of paid videos, in which both the speed of encryption\decryption and a good encryption quality is required. A comparison between the proposed image cryptosystem, the traditional 2-D chaotic Baker map permutation cryptosystem, and the RC6 substitution cryptosystem is presented in the paper. A comparison is held with relevant techniques and the results reveal that the proposed image cryptosystem achieves a high degree of security. It is also more immune to noise than the RC6 cryptosystem and takes less processing time for images with large dimensions than both the chaotic cryptosystem and the RC6 cryptosystem. The superiority of the proposed cryptosystem has been proved for image encryption against the recent techniques from the cryptographic viewpoint.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075

    Article  Google Scholar 

  2. Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497

    Article  MathSciNet  MATH  Google Scholar 

  3. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynam 62(3):615–621

    Article  MathSciNet  MATH  Google Scholar 

  4. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

  5. Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  6. Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215

    Article  Google Scholar 

  7. Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process 132:150–154

    Article  Google Scholar 

  8. Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Opt Lasers Eng 91:41–52

    Article  Google Scholar 

  9. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  10. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  11. Kwok HS, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529

    Article  MathSciNet  MATH  Google Scholar 

  12. Kadir R, Shahril R, Maarof MA (2010) A modified image encryption scheme based on 2D chaotic map. In: Computer and communication engineering (ICCCE), 2010 international conference on IEEE, May, pp 1–5

  13. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959

    Article  MathSciNet  MATH  Google Scholar 

  14. Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image Commun 28(3):292–300

    Article  Google Scholar 

  15. Tewari A, Gupta BB (2017) J cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Supercomput 73:1085. https://doi.org/10.1007/s11227-016-1849-x

    Article  Google Scholar 

  16. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey

    Book  Google Scholar 

  17. Stergiou C, Psannis KE, Kim B-G, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78(Part 3):964–975

    Article  Google Scholar 

  18. Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10(1, 36 pages):1–36. https://doi.org/10.1007/s13319-019-0216-0

    Article  Google Scholar 

  19. Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142

    Google Scholar 

  20. Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci 2:50–58

    Google Scholar 

  21. Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Uni Comput Inf Sci

  22. Alanazi N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci 3(4). https://doi.org/10.1016/j.jksuci.2018.02.006

  23. Gutub A, Aljuaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng 1(2):118–124. https://doi.org/10.63019/jche.v1i2.513

  24. Alassaf N, Gutub A, Parah S, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z

  25. Aljuaid N, Gutub A, Khan E (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inf Secur Cybercrimes Res 1. https://doi.org/10.26735/16587790.2018.006

  26. Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619

    Article  Google Scholar 

  27. Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78:1–28

    Google Scholar 

  28. Elhosany HM, Hossin HE, Kazemian HB, Faragallah OS (2012) C9. Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. In: Radio science conference (NRSC), 2012 29th national, IEEE, April, pp 223–235

  29. Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585. https://doi.org/10.1007/s11042-017-4637-6

    Article  Google Scholar 

  30. Mary SJ, Christopher CS, Joe SSA (2016) Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst 7(08):1722

    Article  Google Scholar 

  31. Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78:3649. https://doi.org/10.1007/s11042-017-5537-5

    Article  Google Scholar 

  32. Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik Int J Light Electron Optics 127(13):5190–5192

    Article  Google Scholar 

  33. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Article  Google Scholar 

  34. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9(13):2015–2023

    Google Scholar 

  35. Chen JX, Zhu ZL, Fu C, Yu H (2015) Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Optics Commun 341:263–270

    Article  Google Scholar 

  36. Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353

    Article  Google Scholar 

  37. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769

    Article  MATH  Google Scholar 

  38. Anand MV, Targhi EE, Tabia GN, Unruh D (2016) Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. In: International workshop on post-quantum cryptography. Springer, Cham, pp 44–63

    Chapter  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid El-Shafai.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Elashry, I.F., El-Shafai, W., Hasan, E.S. et al. Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79, 20665–20687 (2020). https://doi.org/10.1007/s11042-019-08322-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08322-5

Keywords

Navigation