Skip to main content
Log in

An efficient image encryption technique based on two-level security for internet of things

  • 1215: Multimodal Interaction and IoT Applications
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes an efficient image encryption method based on a hybrid of watermarking and cryptographic techniques. It is based on two-level security for the secure and error-free transmission of images between the IoT enabled devices. A discrete wavelet transform (DWT) based watermarking scheme is used at the first level, while at another level, an efficient image encryption technique based on a hybrid of logistic chaotic map and crossover is applied. In the DWT scheme, an encrypted secret image is used as a watermark image, where the secret image is encrypted via the lightweight cryptographic scheme. Here the hybrid of logistic chaotic map and crossover is used to produce random session keys for encryption of digital images. The use of DWT and 1-D logistic map along with crossover operation enhances the encryption effect compared to ordinary, chaotic encryption algorithms. The significance of this scheme is to improve security by using the hybrid concept. The strength of the proposed image encryption method is estimated by checking the proposed technique on various types of cryptographic attacks such as differential attack (NPCR), statistical attack (information entropy, histogram analysis, and correlation coefficient), noise attack, and prone to the secret user key. The higher value of NPCR (99.63) and information entropy (7.9973) are achieved, reflecting the effectiveness of this work.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17

Similar content being viewed by others

References

  1. Alshanbari HS (2021) Medical image watermarking for ownership & tamper detection. Multimed Tools Appl 80:16549–16564. https://doi.org/10.1007/s11042-020-08814-9

  2. Arpacı B, Kurt E, Çelik K, Ciylan B (2020) Colored image encryption and decryption with a new algorithm and a Hyperchaotic electrical circuit. J Electr Eng Technol, 1-17 15:1413–1429

    Article  Google Scholar 

  3. Banu SA, Amirtharajan R (2020) A robust medical image encryption in dual domain: chaos-DNA-IWT combined approach. Med Biol Eng Comput, 1–14 58:1445–1458

    Article  Google Scholar 

  4. Cai Z, Yan H, Li P, Huang ZA, Gao C (2017) Towards secure and flexible EHR sharing in mobile health cloud under static assumptions. Clust Comput 20(3):2415–2422

    Article  Google Scholar 

  5. Dagadu JC, Li JP, Aboagye EO (2019) Medical image encryption based on hybrid chaotic DNA diffusion. Wirel Pers Commun 108(1):591–612

    Article  Google Scholar 

  6. Demir FB, Tuncer T, Kocamaz AF (2020) A chaotic optimization method based on logistic-sine map for numerical function optimization. Neural Comput Appl, 1-13 32:14227–14239

    Article  Google Scholar 

  7. Ding L, Ding Q (2020) A novel image encryption scheme based on 2D fractional chaotic map, DWT and 4D hyper-chaos. Electronics 9(8):1280

    Article  Google Scholar 

  8. Eisenbarth T, Kumar S, Paar C, Poschmann A, Uhsadel L (2007) A survey of lightweight-cryptography implementations. IEEE Des Test 24(6):522–533

    Article  Google Scholar 

  9. Eisenbarth T, Gong Z, Güneysu T, Heyse S, Indesteege S, Kerckhof S, tot Oldenzeel LVO (2012, July) Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: International conference on cryptology in Africa. Springer, Berlin, Heidelberg, 2012 (pp. 172-187)

  10. Gupta M, Gupta KK, Shukla PK (2021) Session key-based fast, secure and lightweight image encryption algorithm. Multimed Tools Appl 80:10391–10416. https://doi.org/10.1007/s11042-020-10116-z

  11. Hameed S, Khan FI, Hameed B (2019) Understanding security requirements and challenges in internet of things (IoT): a review. J Comput Netw Commun 2019:114

    Article  Google Scholar 

  12. Koo WK, Lee H, Kim YH, Lee DH (2008, April) Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks. In: 2008 international conference on information security and assurance (Isa 2008). IEEE pp. 73-76

  13. Kricha Z, Kricha A, Sakly A (2018) A robust watermarking scheme based on the mean modulation of DWT coefficients Security and Communication Networks, 2018

  14. Liu B, Li Y, Zeng B, Lei C (2016) An efficient trust negotiation strategy towards the resource-limited mobile commerce environment. Front Comput Sci 10(3):543–558

    Article  Google Scholar 

  15. Liu Y, Zhang J, Han D, Wu P, Sun Y, Moon YS (2020) A multidimensional chaotic image encryption algorithm based on the region of interest. Multimed Tools Appl, 1-37 79:17669–17705

    Article  Google Scholar 

  16. Mehta R, Gupta K, Yadav AK (2020) An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain. Multimed Tools Appl, 1-22 79:18657–18678

    Article  Google Scholar 

  17. Mohanarathinam A, Kamalraj S, Prasanna Venkatesan GKD, et al (2020) Digital watermarking techniques for image security: a review. J Ambient Intell Human Comput 11:3221–3229. https://doi.org/10.1007/s12652-019-01500-1

  18. Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimed Tools Appl, 1-24 79:17497–17520

    Article  Google Scholar 

  19. Niu Y, Zhou Z, Zhang X (2020) An image encryption approach based on chaotic maps and genetic operations. Multimed Tools Appl 79(35):25613–25633

    Article  Google Scholar 

  20. Peng S, Yang A, Cao L, Yu S, Xie D (2017) Social influence modeling using information theory in mobile social networks. Inf Sci 379:146–159

    Article  Google Scholar 

  21. Poettering B (2013) RijndaelFurious AES-128 implementation for AVR devices, 2007

  22. Rayachoti E, Tirumalasetty S, Prathipati SC (2020) SLT based watermarking system for secure telemedicine. Clust Comput, 1-10 23:3175–3184

    Article  Google Scholar 

  23. Salimi L, Haghighi A, Fathi A (2020) A novel watermarking method based on differential evolutionary algorithm and wavelet transform. Multimed Tools Appl:1–18

  24. Shen J, Wang C, Li T, Chen X, Huang X, Zhan ZH (2018) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197

    Article  Google Scholar 

  25. Singha A, Ullah MA (2020) An image watermarking technique using hybrid signals as watermarks. Multimedia Systems:1–21

  26. Talhaoui MZ, Wang X, Midoun MA (2020) Fast image encryption algorithm with high security level using the Bülban chaotic map. J Real-Time Image Proc:1–14

  27. Tankard C (2015) The security issues of the internet of things. Comput Fraud Secur 2015(9):11–14

    Article  Google Scholar 

  28. Usman M, Ahmed I, Aslam MI, Khan S, Shah UA (2017) SIT: a lightweight encryption algorithm for secure internet of things. arXiv preprint arXiv:1704.08688

  29. Vidhya R, Brindha M (2020) A novel dynamic chaotic image encryption using butterfly network topology based diffusion and decision based permutation. Multimed Tools Appl 79(41):30281–30310

    Article  Google Scholar 

  30. Wang H, Zheng Z, Wu L, Li P (2017) New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust Comput 20(3):2385–2392

    Article  Google Scholar 

  31. Wu D, Si S, Wu S, Wang R (2017) Dynamic trust relationships aware data privacy protection in mobile crowd-sensing. IEEE Internet Things J 5(4):2958–2970

    Article  Google Scholar 

  32. Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530–1540

    Article  Google Scholar 

  33. You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput, 1-15 24:12413–12427

    Article  Google Scholar 

  34. Zhang W, Zhu Z, Yu H (2019) A symmetric image encryption algorithm based on a coupled logistic–bernoulli map and cellular automata diffusion strategy. Entropy 21(5):504

    Article  Google Scholar 

  35. Zheng P, Zhang Y (2020) A robust image watermarking scheme in hybrid transform domains resisting to rotation attacks. Multimed Tools Appl 79:1–23

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vibhav Prakash Singh.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals by any authors

Conflict of interest/competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gupta, M., Singh, V.P., Gupta, K.K. et al. An efficient image encryption technique based on two-level security for internet of things. Multimed Tools Appl 82, 5091–5111 (2023). https://doi.org/10.1007/s11042-022-12169-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12169-8

Keywords

Navigation