Skip to main content

Advertisement

Log in

Session key based fast, secure and lightweight image encryption algorithm

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, most of the communications in IoT enabled devices are done in the form of images. To protect the images from intruders, there is a need for a secure encryption algorithm. Many encryption algorithms have been proposed, some of the algorithms are based on symmetric-key cryptography and others are based on asymmetric key cryptography. This work proposed a fast, secure, and lightweight symmetric image cryptographic algorithm based on the session key. In this work, for every image encryption, a new session key is generated. Here session keys are generated with the help of crossover and mutation operators of genetic algorithm. This proposed algorithm uses a 64-bit plain text and requires an 80-bit key, where 64-bits of a key is generated via symmetric hexadecimal key and the remaining 16-bits of a key are randomly added, to encrypt the image. Here crossover and mutation operators are used to generate random 64-bits of a key. The proposed algorithm will work for both color and grayscale images. The proposed algorithm is simulated on MATLAB 2017 platform and compared with similar types of the existing algorithm on various parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-Int J Electron Commun 66(10):806–816

    Article  Google Scholar 

  2. Anderson R, Biham E, Knudsen L (1998) Serpent: a proposal for the advanced encryption standard. In: Proceedings of the First Advanced Encryption Standard (AES) Conference, Ventura, CA, USA, 20–22

  3. Asassfeh MR, Qatawneh M, Alazzeh F (2018) Performance Evaluation of Blowfish Algorithm on Supercomputer IMAN1. Int J Comp Netw Commun 10(2):43–53

    Google Scholar 

  4. Barker E, Roginsky A (2011) Transitions: recommendation for transitioning the use of cryptographic algorithms and key lengths. NIST Special Publication 800-131A

  5. Bhowmik S, Acharyya S (2011) Application of GA in key generation for image transposition cipher algorithm. Venugopal K.R., Patnaik L.M. (eds) Computer networks and intelligent computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg

  6. Burwick C, Coppersmith D, D’Avignon E, Gennaro R, Halevi S, Jutla C, Matyas SM, O’Connor L, Peyravian M, Safford D et al. (1998) MARS—A candidate cipher for AES

    Google Scholar 

  7. Chakrabarti P, Bhuyan B, Chowdhuri A, Bhunia CT (2008) A novel approach towards realizing optimum data transfer and automatic variable key (AVK). Int J Comput Sci Netw Secur 8(5)

  8. Chattopadhyay C, Sarkar B, Mukherjee D (2015) Encoding by DNA relations and randomization through chaotic sequences for image encryption. arXiv preprint arXiv:1505.01795

  9. Coppersmith D, Johnson DB, Matyas SM (1996) A proposed mode for triple-DES encryption. IBM J Res Dev 40:253–262

    Article  Google Scholar 

  10. Dagadu JC, Li J, Aboagye E (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108:591–612. https://doi.org/10.1007/s11277-019-06420-z

    Article  Google Scholar 

  11. De Dormale GM, Bass J, Quisquater J-J (2007) On solving RC5 challenges with FPGAs. In: Proceedings of the 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007), Napa, CA, USA, 23–25, pp. 281–282

  12. Ebrahim M, Chong CW (2013) Secure force: a low-complexity cryptographic algorithm for wireless sensor network (wsn). (ICCSCE), IEEE International Conference on Control System, Computing and Engineering. IEEE, 2013, pp. 557–562

  13. Elamrawy F, Sharkas M, Nasser AM (2018) An image encryption based on DNA coding and 2DLogistic chaotic map. Int J Signal Process 3:27–32

    Google Scholar 

  14. Gan Z, Chai X, Zhang M, Lu Y (2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919–27953

    Article  Google Scholar 

  15. Goswami, Subhra R, Chakraborty SK, Bhunia A, Bhunia CT (2013) New approach towards generation of automatic variable key to achieve perfect security. In: 2013 10th International Conference on information technology: new generations, pp. 489–491. IEEE

  16. Guesmi R, Farah M, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769

    Article  Google Scholar 

  17. Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42

    Article  Google Scholar 

  18. Huang X, Sun T, Li Y, Liang J (2015) A color image encryption algorithm based on a fractional-order Hyperchaotic system. Entropy MDPI 17:28–38

    Article  Google Scholar 

  19. Jin X, Yin Y, Liu N, Li X, Zhao G, Ge G (2018) Color image encryption in non-RGB color spaces. Multimed Tools Appl 77(12):15851–15873

    Article  Google Scholar 

  20. Khan S, Ibrahim MS, Khan KA, Ebrahim M (2015) Security analysis of secure force algorithm for wireless sensor networks. arXiv preprint arXiv:1509.00981

  21. Li R (2020) Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08802-z

  22. Liu H, Zhao B, Huang L (2019) A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl 78:20465–20483. https://doi.org/10.1007/s11042-019-7186-3

    Article  Google Scholar 

  23. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79:17669–17705. https://doi.org/10.1007/s11042-020-08645-8

    Article  Google Scholar 

  24. Milad AA, Muda HZ, Noh ZA, Algaet MA (2012) Comparative study of performance in cryptography algorithms (blowfish and Skipjack). J Comput Sci 8:1191–1197

    Article  Google Scholar 

  25. Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78(8):9577–9593

    Article  Google Scholar 

  26. Pujari S, Bhattacharjee G, Bhoi S (2017) A hybridized model for image encryption through genetic algorithm and DNA sequence. International conference on Smart Computing and Communications (ScienceDirect) , ICSCC 2017, Kurukshetra, India

  27. Ren W, Miao Z (2010) A hybrid encryption algorithm based on DES and RSA in bluetooth communication. In Proceedings of the 2010 Second International Conference on Modeling, Simulation and Visualization Methods, Sanya, China, 15–16, pp. 221–225

  28. Schneier B (1990) The IDEA encryption algorithm. Dr Dobb’s J 18:50–56

    Google Scholar 

  29. Sreelaja N, Pai G, Vijayalakshmi A (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 9:2879–2895

    Article  Google Scholar 

  30. Stalin S, Maheshwary P, Shukla P, Maheshwari M, Gour B, Khare A (2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst (Springer)

  31. Sun S (2017) Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Opt Eng 56(11):1–10

    Google Scholar 

  32. Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc. https://doi.org/10.1007/s11554-020-00948-1

  33. Tang J, Yu Z, Liu L (2019) A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. Multimed Tools Appl:1–24

  34. Tong X, Yang L, Zhang M, Xu H, Zhu W (2015) An image encryption scheme based on Hyperchaotic Ra, binovich and exponential Chaos maps. Entropy MDPI 17:181–196

    Article  Google Scholar 

  35. Usman M, Ahmed I, Aslam M, Khan S, Shah U (2017) SIT: a lightweight encryption algorithm for secure internet of things. (IJACSA) Int J Adv Comp Sci Appl 8(1)

  36. Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn:1–28

  37. Yao W, Wu F, Zhang X, Zheng Z, Wang Z, Wang W, Qiu W (2016) A fast color image encryption algorithm using 4-pixel feistel structure. PLoS One 11(11):e0165937. https://doi.org/10.1371/journal.pone.0165937

    Article  Google Scholar 

  38. Ye G, Jiao K, Pan C, Huang X (2018) An effective framework for chaotic image encryption based on 3D logistic map. Hindawi Security and Communication Networks:1–11

  39. Zhang X, Zhou H, Zhou Z, Wang L, Li C (2018) An image encryption algorithm based on hyper-chaotic system and genetic algorithm. In: Qiao J. et al. (eds) Bio-inspired computing: theories and applications. BIC-TA 2018. Communications in Computer and Information Science, Vol 952. Springer, Singapore

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Gupta.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, M., Gupta, K.K. & Shukla, P.K. Session key based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80, 10391–10416 (2021). https://doi.org/10.1007/s11042-020-10116-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10116-z

Keywords

Navigation