Skip to main content
Log in

Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to increase encryption capacity and improve transmission efficiency, this paper investigates an encryption scheme for multiple-image based on cascaded gyrator transforms and high-dimensional chaos. Firstly, each plainimage is converted into a real matrix through modulation, quaternion gyrator transform and sharing. The real matrices are connected in turn by plural coding and gyrator transforms. During the process of cascade, phase truncation and preservation operations are performed. The phase of the preceding transformation is modulated by that of the latter complex matrix to enhance security. Followed by splicing and scrambling, a real-valued ciphertext can be obtained. At the receiver end, all the plaintext images can be restituted by the reverse operation of the encryption process using the authorized keys. The adoption of high-dimensioanl chaos and Kronecker product further guarantees the security of the cryptosystem. The numerical results performed on 300 color images have demonstrated that the average PSNR of correctly decrypted images is up to 303.9939 dB, the NMSE is as low as 2.8024 × 10−28 and SSIM is equal to 1.0000. The analysis of sensitivity, statistical characteristic and robustness proves the feasibility and relibility of the proposed encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Abdelfattah M, Hegazy SF, Areed NFF, Obayya SSA (2020) Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images. Opt Lasers Eng 129:106063

    Google Scholar 

  2. Abuturab MR (2020) Multiple-information security system using key image phase and chaotic random phase encoding in Fresnel transform domain. Opt Lasers Eng 124:105810

    Google Scholar 

  3. Arbeláez P, Maire M, Fowlkes C, Malik J (2011) Contour detection and hierarchical image segmentation. IEEE Trans Pattern Anal Mach Intell 33(5):898–916

    Google Scholar 

  4. Bhatnagar G, Wu QMJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci 223:297–316

    MathSciNet  MATH  Google Scholar 

  5. Chen H, Tanougast C, Liu Z, Blondel W, Hao B (2018) Optical hyperspectral image encryption based on improved Chirikov mapping and gyrator transform. Opt Lasers Eng 107:62–70

    Google Scholar 

  6. Chen BJ, Yu M, Tian YH, Li LD, Wang DC, Sun XM (2018) Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption. IET Image Process 12(12):2238–2249

    Google Scholar 

  7. Chidambaram N, Raj P, Thenmozhi K, Amirtharajan R (2020) Advanced framework for highly secure and cloud-based storage of colour images. IET Image Process 14:3143–3153. https://doi.org/10.1049/iet-ipr.2018.5654

  8. Czaplewski B, Dzwonkowski M, Rykaczewski R (2014) Digital fingerprinting for color images based on the quaternion encryption scheme. Pattern Recogn Lett 46:11–19

    Google Scholar 

  9. Dasgupta T, Paral P, Bhattacharya S, (2014) Grayscale image encryption based on high-dimensional fractional order Chua’s system. In: 2nd international conference on advanced computing networking and informatics.

  10. Dorgham O, Al-Rahamneh B, Almomani A et al (2018) Enhancing the security of exchanging and storing DICOM medical images on the cloud. Int J Cloud Appl Comput 8(1):154–172

    Google Scholar 

  11. Faragallah OS, Afifi A, El-Shafai W, El-Sayed HS, Alzain MA, Al-Amri JF, El-Samie FE (2020) Efficiently encrypting color images with few details based on RC6 and different operation modes for cybersecurity applications. IEEE Access 8:103200–103218

  12. Fei-Fei L, Fergus R, Perona P (2004) Learning generative visual models from few examples: an incremental bayesian approach tested on 101 object categories. In: CVPR Workshop of Generative Model Based Vision

  13. Firdous A, Aur R, Missen MMS (2019) A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Multimed Tools Appl 78:24809–24835

    Google Scholar 

  14. Ghadirli HM, Nodehi A, Enayatifar R (2019) An overview of encryption algorithms in color images. Signal Process 164:163–185

    Google Scholar 

  15. Goléa NEH, Melkemi KE (2019) ROI-based fragile watermarking for medical image tamper detection. Int J High Performance Comput Network 13(2):199–210

    Google Scholar 

  16. Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.

  17. Kang XJ, Ming AL, R. Tao (2019) Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans Circ Syst Vid 29(6): 1595–1607

  18. Kaur M, Kumar V (2020) A comprehensive review on image encryption techniques. Arch Comput Methods in Eng 27:15–43

    MathSciNet  Google Scholar 

  19. Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36

    Google Scholar 

  20. Li X, Meng X, Yang X, Wang Y, Yin Y, Peng X, He W, Dong G, Chen H (2018) Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme. Opt Lasers Eng 102:106–111

    Google Scholar 

  21. Li Z, Zhao M, Jiang H, Xu Q (2019) Keyword guessing on multi-user searchable encryption. Int J High Perform Comput Netw 14(1):60–68

  22. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    MathSciNet  MATH  Google Scholar 

  23. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903

    Google Scholar 

  24. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466

    Google Scholar 

  25. Luan GY, Li AC, Zhang DM, Wang DX (2019) Asymmetric image encryption and authentication based on equal modulus decomposition in the Fresnel transform domain. IEEE Photonics J 11(1):6900207

    Google Scholar 

  26. Mamta, Gupta B B (2019) An efficient KP design framework of attribute-based searchable encryption for user level revocation in cloud. Concurrency and Computation: Practice and Experience

  27. Mu Y, Zhou Z (2019) Visual vocabulary tree-based partial-duplicate image retrieval for coverless image steganography. Int J High Performance Comput Network 14(3):333–341

    Google Scholar 

  28. Premkamal PK, Pasupuleti SK, Alphonse PJA (2020) Efficient escrow-free CP-ABE with constant size ciphertext and secret key for big data storage in cloud. Int J Cloud Appl Comput 10(1):28–45

    Google Scholar 

  29. Qin C, Zhang X (2015) Effective reversible data hiding in encrypted image with privacy protection for image content. J Vis Commun Image Represent 31:154–164

    Google Scholar 

  30. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769

    Google Scholar 

  31. Shao Z, Shu H, Wu J, Dong Z, Coatrieux G, Coatrieux JL (2014) Double color image encryption using iterative phase retrieval algorithm in quaternion gyrator domain. Opt Express 22(5):4932–4943

    Google Scholar 

  32. Shao Z, Shang Y, Fu X, Yuan H, Shu H (2018) Double-image cryptosystem using chaotic map and mixture amplitude-phase retrieval in gyrator domain. Multimed Tools Appl 77:1285–1298

    Google Scholar 

  33. Shao Z, Shang Y, Tong Q, Ding H, Zhao X, Fu X (2018) Multiple color image encryption and authentication based on phase retrieval and partial decryption in quaternion gyrator domain. Multimed Tools Appl 77:25821–25840

    Google Scholar 

  34. Shao Z, Liu X, Yao Q, Qi N, Shang Y, Zhang J (2020) Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain. Signal Process Image Commun 80:115662

    Google Scholar 

  35. Sivaraman R, Rajagopalan S, Rayappan JBB, Amirtharajan R (2020) Ring oscillator as confusion–diffusion agent: a complete TRNG drove image security. IET Image Process 14:2987–2997. https://doi.org/10.1049/iet-ipr.2019.0168

    Article  Google Scholar 

  36. Sui L, Xu M, Huang C, Adhikari A, Tian A, Asundi A (2018) Multiple-image encryption by space multiplexing based on vector quantization and interference. OSA Continuum 1(4):1370–1384

    Google Scholar 

  37. Sui L, Zhang X, Huang C, Tian A, Asundi AK (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional Fourier transforms. Opt Lasers Eng 113:29–37

    Google Scholar 

  38. Wang X, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214

    MathSciNet  Google Scholar 

  39. Wang X, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    MathSciNet  MATH  Google Scholar 

  40. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621

    MathSciNet  MATH  Google Scholar 

  41. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  42. Wang Q, Guo Q, Lei L (2014) Multiple-image encryption system using cascaded phase mask encoding and a modified Gerchberg–Saxton algorithm in gyrator domain. Opt Commun 320:12–21

    Google Scholar 

  43. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Google Scholar 

  44. Wang X, Zhang Y, Bao X (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Google Scholar 

  45. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    MATH  Google Scholar 

  46. Yao Q, Shao Z, Shang Y, Ding H, Liu X, Zeng R, Tong Q (2020) Color image encryption based on discrete trinion Fourier transform and random-multiresolution singular value decomposition. Multimed Tools Appl 79:27555–27581

    Google Scholar 

  47. Ye H, Zhou N, Gong L (2020) Multi-image compression-encryption scheme based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. Signal Process 175:107652

    Google Scholar 

  48. Yu Z, Gao C, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923

    Google Scholar 

  49. Yu C, Li J, Li X, Ren X, GuptaBB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585–4608

    Google Scholar 

  50. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Google Scholar 

  51. Zhang Y, Wang X (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Google Scholar 

  52. Zhang L, Zhou Y, Huo D, Li J, Zhou X (2018) Multiple-image encryption based on double random phase encoding and compressive sensing by using a measurement array preprocessed with orthogonal-basis matrices. Opt Laser Technol 105:162–170

    Google Scholar 

  53. Zheng Q, Wang X, Khan M, Zhang W, Gupta B, Guo W (2017) A lightweight authentication encryption based on chaotic SCML for railway cloud service. IEEE Access 6:711–722

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (61876112, 61601311), Project of Beijing Excellent Talents (2016000020124G088) and Beijing Municipal Education Research Plan Project (SQKM201810028018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhuhong Shao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, X., Shao, Z., Shang, Y. et al. Multiple-image encryption based on cascaded gyrator transforms and high-dimensional chaotic system. Multimed Tools Appl 80, 15825–15848 (2021). https://doi.org/10.1007/s11042-021-10550-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10550-7

Keywords

Navigation