Skip to main content
Log in

Fast image encryption algorithm based on parallel permutation-and-diffusion strategy

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the image encryption algorithms, expansion of size and increase of data lead to a large amount of time consumption. To improve the efficiency, the current efforts are mainly limited to the design of streaming encryption algorithms, which do not greatly reduce encryption time and may cause security issues. Therefore, we propose a new image encryption algorithm, which based on the parallel permutation-and-diffusion (PPAD) strategy, and adopt the sub-key cross-fusion method to form the different secret keys in different rounds. The proposed algorithm significantly improves the parallelism of encryption while ensuring security, and achieves an excellent enhancement in efficiency over conventional streaming encryption algorithms. The performance evaluations prove that the proposed strategy has high security to resist common attacks and is suitable for image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Ahmad J, Khan MA, Ahmed F, Khan JS (2018) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation. Neural Comput Appl 30(12):3847–3857

    Google Scholar 

  2. Bai YR, Baleanu D, Wu GC (2018) A novel shuffling technique based on fractional chaotic maps. Optik 168:553–562

    Google Scholar 

  3. Bansal A, Bhadauria SS, Gupta R (2009) Digital image security in network transmission with high level of Fidelity, in: IEEE international advance computing conference, IEEE, Patiala, INDIA, pp. 928

  4. Belazi A, ElLatif A, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170

    Google Scholar 

  5. Bouslehi H, Seddik H (2018) Innovative image encryption scheme based on a new rapid hyperchaotic system and random iterative permutation. Multimed Tools Appl 77(23):30841–30863

    Google Scholar 

  6. Busch C, Nahrstedt K, Pitas I (2002) Image security. IEEE Comput Graph Appl 19(1):16–17

    Google Scholar 

  7. Chen X, Hu CJ (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24(8):1821–1827

    Google Scholar 

  8. Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    MathSciNet  MATH  Google Scholar 

  9. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcat Chaos 8(6):1259–1284

    MathSciNet  MATH  Google Scholar 

  10. George RT, Gopakumar K (2014) Spatiotemporal chaos in globally coupled NCA map lattices using 3-D Arnold cat map for digital image encryption, in: first international conference on computational systems and communications, ICCSC, IEEE, Trivandrum, INDIA, pp. 203–208

  11. Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Google Scholar 

  12. Kaneko K (1989) Pattern dynamics in spatiotemporal chaos: pattern selection, diffusion of defect and pattern competition intermettency. Physica D 34(1):1–41

    MathSciNet  MATH  Google Scholar 

  13. Kim J, Lee Y, Lee S (2010) DES with any reduced masked rounds is not secure against side-channel attacks. Comput Math Appl 60(2):347–354

    MathSciNet  MATH  Google Scholar 

  14. Kulsoom A, Xiao D, Rehman AU, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75:1–23

    Google Scholar 

  15. Liu Y, Wang J, Fan JH, Gong LH (2016) Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimed Tools Appl 75(8):4363–4382

    Google Scholar 

  16. Liu WH, Sun KH, Zhu CX (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Google Scholar 

  17. Masters BR, Gonzalez RC, Woods R (2009) Digital Image Processing, Third Edition, J Biomed Opt 14

  18. May BR (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    MATH  Google Scholar 

  19. Memon N, Wong PW (1998) Protecting digital media content. Commun ACM 41(7):34–43

    Google Scholar 

  20. Patil P, Narayankar P, Narayan DG, Meena SM 2016) A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and blowfish, in: 1st international conference on information security and privacy, G H Raisoni Coll Engn, Dept Comp Sci & Engn & Informat Technol, Nagpur, INDIA, pp. 617–624.

  21. Prakash SJ, Krishna RB (2018) Five new 4-D autonomous conservative chaotic systems with various type of non-hyperbolic and lines of equilibria. Chaos, Solitons Fractals 114:81–91

    MathSciNet  MATH  Google Scholar 

  22. Rehman AU, Liao XF, Kulsoom A, Ullah S (2016) A modified (dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):1–26

    Google Scholar 

  23. Samuelson P (1991) Digital media and the law. Commun ACM 34(34):23–28

    Google Scholar 

  24. Song CY, Qiao YL, Zhang XZ (2013) An image encryption scheme based on new spatiotemporal chaos. Optik 124(18):3329–3334

    Google Scholar 

  25. Sui LS, Liu BQ, Wang Q, Li Y, Liang JL (2015) Color image encryption by using Yang-Gu mixture amplitude-phase retrieval algorithm in gyrator transform domain and two-dimensional sine logistic modulation map. Opt Lasers Eng 75:17–26

    Google Scholar 

  26. Tang GN, Wang SH, Lü HP, Hu G (2003) Chaos-based cryptograph incorporated with S-box algebraic operation. Phys Lett A 318(4–5):388–398

    MathSciNet  MATH  Google Scholar 

  27. Tang ZJ, Wang F, Zhang XQ (2016) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl 76(6):1–27

    Google Scholar 

  28. Tang ZJ, Song J, Zhang XQ, Sun RH (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11

    Google Scholar 

  29. Tang ZJ, Yang Y, Xu SJ, Yu CQ, Zhang XQ (2019) Image encryption with double spiral scans and chaotic maps. Secur Commun Netw 8694678:1–15

    Google Scholar 

  30. Tromer E, Osvik DA, Shamir A (2010) Efficient cache attacks on AES, and countermeasures. J Cryptol 23(1):37–71

    MathSciNet  MATH  Google Scholar 

  31. Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    MathSciNet  Google Scholar 

  32. Wang XY, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    Google Scholar 

  33. Wang XY, Zhao HY, Wang MX (2019) A new image encryption algorithm with nonlinear-diffusion based on multiple coupled map lattices. Opt Laser Technol 115:42–57

    Google Scholar 

  34. Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Google Scholar 

  35. Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining Lyapunov exponents from a time series. Physica D 16(3):285–317

    MathSciNet  MATH  Google Scholar 

  36. Wu Y, Zhou YC, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342

    MathSciNet  MATH  Google Scholar 

  37. Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Google Scholar 

  38. Wu JH, Liao XF, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124

    Google Scholar 

  39. Zhang M, Tong XJ (2014) A new chaotic map based image encryption schemes for several image formats. J Syst Softw 98:140–154

    Google Scholar 

  40. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inf Sci 273:329–351

    Google Scholar 

  41. Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear-nonlinear coupled logistic map lattice. Physica A 402:104–118

    MathSciNet  MATH  Google Scholar 

  42. Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Google Scholar 

  43. Zhou NR, Hu YQ, Gong LH, Li GY (2017) Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operation. Quantum Inf Process 16(6):164

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Hongyu Zhao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Zhao, H. Fast image encryption algorithm based on parallel permutation-and-diffusion strategy. Multimed Tools Appl 79, 19005–19024 (2020). https://doi.org/10.1007/s11042-020-08810-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08810-z

Keywords

Navigation