Skip to main content
Log in

An improved partial image encryption scheme based on lifting wavelet transform, wide range Beta chaotic map and Latin square

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, an improved image cryptography method based on lifting wavelet transform, Latin square and wide range Beta chaotic map, is proposed. This scheme tends to encrypt solely the requisite components of the sensitive data in Lifting-Wavelet which is the LL (Low-Low) decomposition. The introduced scheme is composed of different procedures. After the creation of the Latin square S-box, we used the wide range Beta map to generate the random key. The obtained key is applied in the encryption stage. Following the encryption steps, the ciphered images have been tested by a variety of tests including the histogram analysis, differential analysis, and information entropy analysis. Compared with previous schemes, The results are good and provide an efficient technique for partial image encryption and decryption in the theme of secure communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Asgari-Chenaghlu M, Balafar MA, Feizi-Derakhshi MR (2019) A novel image encryption algorithm based on polynomial combination of chaotic maps and dynamic function generation. Signal Process 157:1–13

    Article  Google Scholar 

  2. Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  3. Bhatnagar G, Wu QJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital signal processing 22(4):648–663

    Article  MathSciNet  Google Scholar 

  4. Cavusoglu U, Kacar S, Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dynamics 92 (4):1745–1759

    Article  MATH  Google Scholar 

  5. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  6. Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340– 353

    Article  Google Scholar 

  7. Chuman T, Sirichotedumrong W, Kiya H (2019) Encryption-then-compression systems using grayscale-based image encryption for jpeg images. IEEE Trans Inf Forensics Sec 14(6):1515–1525

    Article  Google Scholar 

  8. Daubechies I, Sweldens W (1998) Factoring wavelet transforms into lifting steps. J Fourier Anal Appl 4(3):247–269

    Article  MathSciNet  MATH  Google Scholar 

  9. Elkhalil N, Zahmoul R, Ejbali R, Zaied M (2019) A joint encryption-compression technique for images based on beta chaotic maps and SPIHT coding. ICSEA 2019:130

    Google Scholar 

  10. Enayatifar R, GuimarAEes FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using DNA sequence. Opt Lasers Eng 115:131–140

    Article  Google Scholar 

  11. Fan C, Ding Q (2018) A novel image encryption scheme based on self-synchronous chaotic stream cipher and wavelet transform. Entropy 20(6):445

    Article  Google Scholar 

  12. Feng W, He Y, Li H., Li C (2019) Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access

  13. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals 29(2):393–399

    Article  MATH  Google Scholar 

  14. Hsiao HI, Lee J (2015) Fingerprint image cryptography based on multiple chaotic systems. Signal Process 113:169–181

    Article  Google Scholar 

  15. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144

    Article  Google Scholar 

  16. Huang L, Cai S, Xiao M, Xiong X (2018) A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy 20(7):535

    Article  Google Scholar 

  17. Janakiraman S, Amirtharajan R, Thenmozhi K, Rayappan JB (2012) Firmware for data security: A review. Res J Inf Technol 4(3):61–72

    Google Scholar 

  18. Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12

    Article  Google Scholar 

  19. Jeong ES, Kim BH, Lee DH (2014) A generic partial encryption scheme for low-power mobile devices. Multimed Tools Appl 72(3):2087–106

    Article  Google Scholar 

  20. Jiao G, Peng X, Duan K (2019) Image encryption with the cross diffusion of two chaotic maps. KSII Transactions on Internet & Information Systems 13(2)

  21. Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Sec 11(2):235–246

    Article  Google Scholar 

  22. Kalsi S, Kaur H, Chang V (2018) DNA cryptography and deep learning using genetic algorithm with NW algorithm for key generation. J Med Sys 42 (1):17

    Article  Google Scholar 

  23. Khan MA, Ahmad J, Javaid Q, Saqib NA (2017) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. J Mod Opt 64(5):531–540

    Article  Google Scholar 

  24. Kumar R, Bhaduri B (2017) Optical image encryption using Kronecker product and hybrid phase masks. Optics & Laser Technology 95:51–55

    Article  Google Scholar 

  25. Li CL, Li HM, Li FD, Wei DQ, Yang XB, Zhang J (2018) Multiple-image encryption by using robust chaotic map in wavelet transform domain. Optik 171:277–286

    Article  Google Scholar 

  26. Li C, Lin D, Feng B, Lü J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842

    Article  Google Scholar 

  27. Liu Q, Wang Y, Wang J, Wang QH (2018) Optical image encryption using chaos-based compressed sensing and phase-shifting interference in fractional wavelet domain. Opt Rev 25(1):46–55

    Article  Google Scholar 

  28. Luo Y, Du M, Liu J (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20:447–460

    Article  Google Scholar 

  29. Machkour M, Saaidi A, Benmaati ML (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the Latin square image cipher. 3D Research 6(4):36

    Article  Google Scholar 

  30. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  31. Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos, Solitons & Fractals 42(3):1745–1754

    Article  MATH  Google Scholar 

  32. Mondal B, Mandal T, Khan DA, Choudhury T (2018) A secure image encryption scheme using chaos and wavelet transformations. Recent Patents on Engineering 12(1):5–14

    Article  Google Scholar 

  33. Panduranga H, Naveen Kumar S (2014) Kiran. Eur Phys J Spec Top 223:1663. https://doi.org/10.1140/epjst/e2014-02119-9

    Article  Google Scholar 

  34. Ponuma R, Amutha R (2019) Image encryption using sparse coding and compressive sensing. Multidim. Syst. Sign. Process. 1–15

  35. Prajwalasimha SN (2019) Pseudo-Hadamard transformation-based image encryption scheme. In: Integrated intelligent computing, communication and security. Springer, Singapore, pp 575–583

  36. Ramadan N, Ahmed HH, El-khamy SE, El-Samie FEA (2017) Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain. J Cent South Univ 24(9):2049–2057

    Article  Google Scholar 

  37. Ratnavelu K, Kalpana M, Balasubramaniam P, Wong K, Raveendran P (2017) Image encryption method based on chaotic fuzzy cellular neural networks. Signal Process 140:87–96

    Article  Google Scholar 

  38. Recipes N (2007) The art of scientific computing. Cambridge Uni

  39. Reham A, Liao X, Kulsoon A, Abbas SA (2014) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–77

    Google Scholar 

  40. Rim Z, Afef A, Ridha E, Mourad Z (2019) Beta chaotic map based image steganography. In: International Joint Conference: 12th international conference on computational intelligence in security for information systems (CISIS 2019) and 10th international conference on European transnational education (ICEUTE 2019). Cham, Springer, pp 97–104

  41. Satish TJ, Theja MNS, Kumar GG, Thanikaiselvan V (2018) Image encryption using integer wavelet transform, logistic map and XOR encryption. In: 2018 Second international conference on electronics, communication and aerospace technology (ICECA). IEEE, pp 704–709

  42. Stinson D (2006) Cryptography: Theory and practice. Chapman and Hall CRC, London

    MATH  Google Scholar 

  43. Vaish A, Gautam S, Kumar M (2017) A wavelet based approach for simultaneous compression and encryption of fused images. Journal of King Saud University-Computer and Information Sciences

  44. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:108

    Article  Google Scholar 

  45. Wu Y, Noonan JP, Agaian S (2011) UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel NPCR Areas Telecommun 2:31–38

    Google Scholar 

  46. Wu Y, Zhou Y, Noonan JP, Agaian S, Chen CL (2012) A novel latin square image cipher. arXiv:1204.2310

  47. Xiong L, Xu Z, Shi YQ (2018) An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidim Syst Sign Process 29 (3):1191–1202

    Article  MathSciNet  MATH  Google Scholar 

  48. Yang M, Bourbakis N, Li S (2004) Data-image-video encryption. IEEE Potentials 23:28–34

    Article  Google Scholar 

  49. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps. Opt Lasers Eng 96:39–49

    Article  Google Scholar 

  50. Zahmoul R, Zaied M (2016) Toward new family beta maps for chaotic image encryption. In: 2016 IEEE International conference on systems, man, and cybernetics (SMC), IEEE, pp 004052–004057

  51. Zaied M, Ben Amar C, Alimi MA (2003) Award a new wavelet based Beta function, International conference on signal, system and design, SSD03. Tunisia, Mars 1:185–91

    Google Scholar 

  52. Zhang LY, Hu X, Liu Y, Wong KW, Gan J (2014) A chaotic image encryption scheme owning temp-value feedback. Commun Nonlinear Sci Numer Simul 19(10):3653–3659

    Article  MathSciNet  MATH  Google Scholar 

  53. Zhang X, Wang X (2013) Chaos-based partial encryption of SPIHT coded color images. Signal Process 93(9):2422–31

    Article  Google Scholar 

  54. Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  55. Zhao JF, Wang SY, Zhang LT, Wang XY (2017) Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map. J Electr Comput Eng

  56. Zhou Y, Cao W, Chen CP (2014) Image encryption using binary bitplane. Signal Process 100:197–207

    Article  Google Scholar 

  57. avi RV, Subramaniam K (2017) Optimized wavelet filters and modified Huffman encoding-based compression and chaotic encryption for image data. Int J Appl Eng Res 12(13):3961–3977

    Google Scholar 

  58. ur Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–4677

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge the financial support of this work by grants from General Direction of Scientific Research (DGRST), Tunisia, under the ARUB program.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zahmoul Rim.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rim, Z., Ridha, E. & Mourad, Z. An improved partial image encryption scheme based on lifting wavelet transform, wide range Beta chaotic map and Latin square. Multimed Tools Appl 80, 15173–15191 (2021). https://doi.org/10.1007/s11042-020-10263-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-10263-3

Keywords

Navigation