Abstract
Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been proposed, some of the algorithms are based on symmetric-key cryptography and others are based on asymmetric key cryptography. This work proposed a fast, secure, and lightweight symmetric image cryptographic algorithm based on the session key. In this work, for every image encryption, a new session key is generated. Here session keys are generated with the help of crossover and mutation operators of genetic algorithm. This proposed algorithm uses a 64-bit plain text and requires an 80-bit key, where 64-bits of a key is generated via symmetric hexadecimal key and the remaining 16-bits of a key are randomly added, to encrypt the image. Here crossover and mutation operators are used to generate random 64-bits of a key. The proposed algorithm will work for both color and grayscale images. The proposed algorithm is simulated on MATLAB 2017 platform and compared with similar types of the existing algorithm on various parameters.
Similar content being viewed by others
References
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66(10):806–816
Anderson R, Biham E, Knudsen L (1998) Serpent: a proposal for the advanced encryption standard. In: Proceedings of the First Advanced Encryption Standard (AES) Conference, Ventura, CA, USA, 20–22
Asassfeh MR, Qatawneh M, Alazzeh F (2018) Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1. Int J Comp Netw Commun 10(2):43–53
Barker E, Roginsky A (2011) Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A
Bhowmik S, Acharyya S (2011) Application of GA in key generation for image transposition cipher algorithm. Venugopal K.R., Patnaik L.M. (eds) Computer networks and intelligent computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg
Burwick C, Coppersmith D, D’Avignon E, Gennaro R, Halevi S, Jutla C, Matyas SM, O’Connor L, Peyravian M, Safford D et al. (1998) MARS—A candidate cipher for AES
Chakrabarti P, Bhuyan B, Chowdhuri A, Bhunia CT (2008) A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int J Comput Sci Netw Secur 8(5)
Chattopadhyay C, Sarkar B, Mukherjee D (2015) Encoding by DNA relations and randomization through chaotic sequences for image encryption. arXiv preprint arXiv:1505.01795
Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Dev 40:253–262
Dagadu JC, Li J, Aboagye E (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591–612. https://doi.org/10.1007/s11277-019-06420-z
De Dormale GM, Bass J, Quisquater J-J (2007) On solving RC5 challenges with FPGAs. In: Proceedings of the 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007), Napa, CA, USA, 23–25, pp. 281–282
Ebrahim M, Chong CW (2013) Secure force: a low-complexity cryptographic algorithm for wireless sensor network (wsn). (ICCSCE), IEEE International Conference on Control System, Computing and Engineering. IEEE, 2013, pp. 557–562
Elamrawy F, Sharkas M, Nasser AM (2018) An image encryption based on DNA coding and 2DLogistic chaotic map. Int J Signal Process 3:27–32
Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919–27953
Goswami, Subhra R, Chakraborty SK, Bhunia A, Bhunia CT (2013) New approach towards generation of automatic variable key to achieve perfect security. In: 2013 10th International Conference on information technology: new generations, pp. 489–491. IEEE
Guesmi R, Farah M, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769
Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42
Huang X, Sun T, Li Y, Liang J (2015) A color image encryption algorithm based on a fractional-order Hyperchaotic system. Entropy MDPI 17:28–38
Jin X, Yin Y, Liu N, Li X, Zhao G, Ge G (2018) Color image encryption in non-RGB color spaces. Multimed Tools Appl 77(12):15851–15873
Khan S, Ibrahim MS, Khan KA, Ebrahim M (2015) Security analysis of secure force algorithm for wireless sensor networks. arXiv preprint arXiv:1509.00981
Li R (2020) Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08802-z
Liu H, Zhao B, Huang L (2019) A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl 78:20465–20483. https://doi.org/10.1007/s11042-019-7186-3
Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79:17669–17705. https://doi.org/10.1007/s11042-020-08645-8
Milad AA, Muda HZ, Noh ZA, Algaet MA (2012) Comparative study of performance in cryptography algorithms (blowfish and Skipjack). J Comput Sci 8:1191–1197
Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78(8):9577–9593
Pujari S, Bhattacharjee G, Bhoi S (2017) A hybridized model for image encryption through genetic algorithm and DNA sequence. International conference on Smart Computing and Communications (ScienceDirect) , ICSCC 2017, Kurukshetra, India
Ren W, Miao Z (2010) A hybrid encryption algorithm based on DES and RSA in bluetooth communication. In Proceedings of the 2010 Second International Conference on Modeling, Simulation and Visualization Methods, Sanya, China, 15–16, pp. 221–225
Schneier B (1990) The IDEA encryption algorithm. Dr Dobb’s J 18:50–56
Sreelaja N, Pai G, Vijayalakshmi A (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 9:2879–2895
Stalin S, Maheshwary P, Shukla P, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst (Springer)
Sun S (2017) Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Opt Eng 56(11):1–10
Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc. https://doi.org/10.1007/s11554-020-00948-1
Tang J, Yu Z, Liu L (2019) A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. Multimed Tools Appl:1–24
Tong X, Yang L, Zhang M, Xu H, Zhu W (2015) An image encryption scheme based on Hyperchaotic Ra, binovich and exponential Chaos maps. Entropy MDPI 17:181–196
Usman M, Ahmed I, Aslam M, Khan S, Shah U (2017) SIT: a lightweight encryption algorithm for secure internet of things. (IJACSA) Int J Adv Comp Sci Appl 8(1)
Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn:1–28
Yao W, Wu F, Zhang X, Zheng Z, Wang Z, Wang W, Qiu W (2016) A fast color image encryption algorithm using 4-pixel feistel structure. PLoS One 11(11):e0165937. https://doi.org/10.1371/journal.pone.0165937
Ye G, Jiao K, Pan C, Huang X (2018) An effective framework for chaotic image encryption based on 3D logistic map. Hindawi Security and Communication Networks:1–11
Zhang X, Zhou H, Zhou Z, Wang L, Li C (2018) An image encryption algorithm based on hyper-chaotic system and genetic algorithm. In: Qiao J. et al. (eds) Bio-inspired computing: theories and applications. BIC-TA 2018. Communications in Computer and Information Science, Vol 952. Springer, Singapore
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gupta, M., Gupta, K.K. & Shukla, P.K. Session key based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80, 10391–10416 (2021). https://doi.org/10.1007/s11042-020-10116-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-10116-z