Skip to main content
Log in

Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the current era, the majority of communication in IoT-enabled devices, such as smartphones, is now done through images. To shield the images from invaders, a reliable encryption algorithm is needed. Several encryption schemes have been developed, some based on private-key and others on public key cryptography. Using a combination of Chebyshev map and crossover function, this work presents a new lightweight encryption method for digital images based on session keys. A completely new session key is investigated in this work. Session keys are created using a hybrid of crossover and Chebyshev map. To maximize diffusion and confusion, the crossover operation is often used during the encryption phase. This presented scheme employs a 64-bit plain text and uses an 80-bit key, with 64 bits drawn from a given symmetric hexadecimal key and the remaining 16 bits added at random. The proposed algorithm’s security is improved by using a hybrid of Chebyshev map and crossover to increase the randomness of the produced session key. The presented scheme is also lightweight due to its small key size and small code size. The suggested method is evaluated on the MATLAB 2015 platform with various parameters and measured to similar types of existing methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU-International Journal of Electronics and Communications 66(10):806–816

    Article  Google Scholar 

  2. Bhowmik, S. and Acharyya, S. (2011) Application of GA in key generation for image transposition cipher algorithm. Venugopal K.R., Patnaik L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg.

  3. Chattopadhyay C, Sarkar B, Mukherjee D (2015) Encoding by DNA relations and randomization through chaotic sequences for image encryption. arXiv preprint arXiv:1505.01795

  4. Dagadu JC, Li J, Aboagye E (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06420-z

  5. Das S, Mandal SN, Ghoshal N (2015) Diffusion and encryption of digital image using genetic algorithm. Adv Intel Syst Comput 10(1017):729–736

    Google Scholar 

  6. Ebrahim M, Chong CW (2013) Secure force: a low-complexity cryptographic algorithm for wireless sensor network (wsn). (ICCSCE), IEEE International Conference on Control System, Computing and Engineering. IEEE, 2013, pp. 557–562

  7. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers 24(6):522–533

    Article  Google Scholar 

  8. Eisenbarth T , Gong Z, Uneysu TG, Heyse S, Indesteege S, Kerckhof S, Koeune F, Nad T, Plos T. et al. (2012) Compact implementation and performance evaluation of block ciphers in attiny devices. International Conference on Cryptology in Africa. Springer, pp. 172–187.

  9. Elamrawy F, Sharkas M, Nasser AM (2018) An image encryption based on DNA coding and 2DLogistic chaotic map. International Journal of Signal Processing 3:27–32

    Google Scholar 

  10. Fister I, Tepeh A (2016) Epistatic arithmetic crossover based on Cartesian graph product in ensemble differential evolution. Appl Math Comput 10(1016):181–194

    MathSciNet  MATH  Google Scholar 

  11. Gan Z, Chai X, Zhang M, Lu Y (November 2018) A double color image encryption scheme based on three-dimensional brownian motion. Multimed Tools Appl 77(21):27919–27953

    Article  Google Scholar 

  12. Guesmi R, Farah M, Kachouri A, Samet M (April 2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769

    Article  Google Scholar 

  13. Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42

    Article  Google Scholar 

  14. Gupta M, Gupta KK, Shukla PK (2020) Session key based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80:10391–10416. https://doi.org/10.1007/s11042-020-10116-z

    Article  Google Scholar 

  15. Huang X, Sun T, Li Y, Liang J (2015) A color image encryption algorithm based on a fractional-order Hyperchaotic system. Entropy, MDPI 17:28–38

    Article  Google Scholar 

  16. Jin X, Yin Y, Liu N, Li X, Zhao G, Ge G (June 2018) Color image encryption in non-RGB color spaces. Multimed Tools Appl 77(12):15851–15873

    Article  Google Scholar 

  17. Khan S, Ibrahim MS, Khan KA, Ebrahim M (2015) Security analysis of secure force algorithm for wireless sensor networks. arXiv preprint arXiv:1509.00981

  18. Kocarev L, Tasev Z (2003) Public-key encryption based on Chebyshev maps. Proceedings of the 2003 International Symposium on Circuits and Systems, 2003; ISCAS’03.; Vol. 3, IEEE; 2003. p. III–III

  19. Koo WK, Lee H, Kim YH, and Lee DH (2008) Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. Information Security and Assurance, 2008. ISA 2008. International Conference on. IEEE, 2008, pp. 73–76.

  20. Li R (2020) Fingerprint-related chaotic image encryption scheme based on blockchain framework. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-08802-z

  21. Liu H, Zhao B, Huang L (2019) A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multimed Tools Appl. https://doi.org/10.1007/s11042-019-7186-3

  22. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl 79:17669–17705. https://doi.org/10.1007/s11042-020-08645-8

    Article  Google Scholar 

  23. Mandal MK, Kar M, Singh SK, Barnwal VK (2014) Symmetric key image encryption using chaotic rossler system. Secur Commun Net 7(11):2145–2152

    Article  Google Scholar 

  24. Pareek NK, Patidar V (2016) Medical image protection using genetic algorithm operations. Soft Comput 20(2):763–772

    Article  Google Scholar 

  25. Poettering B (2013) Rijndaelfurious aes-128 implementation for avr devices (2007)

    Google Scholar 

  26. Roy S, Rawat U, Sareen HA, Nayak SK (2020) IECA: an efficient IoT friendly image encryption technique using programmable cellular automata. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01813-6

  27. Stalin S, Maheshwary P, Shukla P, Maheshwari M, Gour B, Khare A (July 2019) Fast and secure medical image encryption based on non linear 4D logistic map and DNA sequences (NL4DLM_DNA). J Med Syst (Springer)

  28. Sun S (2017) Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules. Opt Eng 56(11):1–10

    Google Scholar 

  29. Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc 18:85–98. https://doi.org/10.1007/s11554-020-00948-1

    Article  Google Scholar 

  30. Tang J, Yu Z, Liu L (2019) A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. Multimed Tools Appl. 1–24

  31. Tong X, Yang L, Zhang M, Xu H, Zhu W (2015) An image encryption scheme based on hyperchaotic Ra, binovich and exponential Chaos maps. Entropy, MDPI 17:181–196

    Article  Google Scholar 

  32. Usman M, Ahmed I, Aslam M, Khan S, Shah U (2017) SIT: a lightweight encryption algorithm for secure internet of things. (IJACSA) International Journal of Advanced Computer Science and Applications 8(1)

  33. Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 1–28

  34. Yao W, Wu F, Zhang X, Zheng Z, Wang Z, Wang W, Qiu W A fast color image encryption algorithm using 4-pixel feistel structure. PLoS One 11(11):e0165937. https://doi.org/10.1371/journal.pone.0165937

  35. Ye G, Jiao K, Pan C, Huang X (2018) An effective framework for chaotic image encryption based on 3D logistic map. Hindawi Security and Communication Networks :1–11

  36. Pujari S, Bhattacharjee G, Bhoi S (2017) A hybridized model for image encryption through genetic algorithm and DNA sequence. International conference on Smart Computing and Communications (ScienceDirect) , ICSCC 2017, Dec. 2017, Kurukshetra, India.

  37. Ye, G., Jiao, K., Pan, C., and Huang, X. (2018) An effective framework for chaotic image encryption based on 3D logistic map. Hindawi Security and Communication Networks: 1–11

  38. You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput. https://doi.org/10.1007/s00500-020-04683-4

  39. Zhang L (2008) Cryptanalysis of the public key encryption based on multiple chaotic systems. Chaos, Solitons Fractals 37(3):669–674

    Article  MathSciNet  Google Scholar 

  40. Zhang, X., Zhou, H., Zhou, Z., Wang, L. and Li, C. (2018) An image encryption algorithm based on hyper-chaotic system and genetic algorithm. Qiao J. et al. (eds) Bio-inspired Computing: Theories and Applications. BIC-TA 2018. Communications in Computer and Information Science, Vol 952. Springer, Singapore.

Download references

Funding

Funded by TEQIP-III RGPV, Bhopal.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Gupta.

Ethics declarations

Ethical approval

This article does not contain any studies with animals performed by any of the authors.

Conflict of interest

First author, second author and third author declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, M., Gupta, K.K. & Shukla, P.K. Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover. Multimed Tools Appl 80, 33843–33863 (2021). https://doi.org/10.1007/s11042-021-11160-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-11160-z

Keywords

Navigation