skip to main content
research-article

An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (qk)/𝔽2

Published: 27 September 2023 Publication History

Abstract

The volume of multimedia-based image data or video frames in Web 3.0 is constantly increasing, owing to the advancement of real-time data transmission. However, security vulnerabilities frequently impair the performance of real-time applications. Many researchers have recently proposed image encryption schemes based on a high-dimensional chaotic system due to properties such as ergodicity and initial state sensitivity. Nonetheless, most schemes have suffered from excessive computational complexity, low security, and the generation of cryptographically secure random numbers. To overcome these challenges, an efficient and highly secure cryptosystem is necessary for safe multimedia transmission in Web 3.0. This article proposes a novel work on the image cryptosystem based on the Escalation function with a one-time key-oriented Moore’s Automaton over a finite field 𝔽2. The Escalation function is a nonlinear scrambling technique for plaintext images that goes through the confusion phase and plays an essential role in row-column permutation. To make the algorithm more secure and robust in the diffusion phase, the proposed Moore’s Automaton produced ciphertext images through a highly random key stream generated by the combination of a logistic map and cyclic group. Specifically, the proposed Moore’s Automaton operates on δ (qk)/𝔽2 to render random binary bits into unpredictable sequences to construct ciphertext images. Our new finding quickens the speed and provides adequate key space, and pixel distributions are more uniform, have high entropy value, and are secure against differential and statistical attacks.

References

[1]
Bassem Abd-El-Atty, Abdullah M. Iliyasu, Ahmad Alanezi, and Ahmed A. Abd El-latif. 2021. Optical image encryption based on quantum walks. Optics and Lasers in Engineering 138 (2021), 106403.
[2]
Moatsum Alawida, Je Sen Teh, Azman Samsudin, and Wafa’ Hamdan Alshoura. 2019. An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Processing 164 (2019), 249–266.
[3]
Wassim Alexan, Mohamed ElBeltagy, and Amr Aboshousha. 2021. Lightweight image encryption: Cellular automata and the Lorenz system. In 2021 International Conference on Microelectronics (ICM’21). 34–39.
[4]
Wassim Alexan, Mohamed ElBeltagy, and Amr Aboshousha. 2022. RGB image encryption through cellular automata, S-box and the Lorenz system. Symmetry 14, 3 (2022), 443.
[5]
H. Aparna, B. Bhumijaa, R. Santhiyadevi, K. Vaishanavi, M. Sathanarayanan, Amirtharajan Rengarajan, Padmapriya Praveenkumar, and Ahmed A. Abd El-Latif. 2021. Double layered Fridrich structure to conserve medical data privacy using quantum cryptosystem. Journal of Information Security and Applications 63 (2021), 102972.
[6]
Abdorreza Babaei, Homayun Motameni, and Rasul Enayatifar. 2020. A new permutation-diffusion-based image encryption technique using cellular automata and DNA sequence. Optik 203 (2020), 164000.
[7]
Elaine Barker and Allen Roginsky. 2018. Transitioning the Use of Cryptographic Algorithms and Key Lengths. Technical Report. National Institute of Standards and Technology.
[8]
Akram Belazi, Ahmed A. Abd El-Latif, and Safya Belghith. 2016. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing 128 (2016), 155–170.
[9]
Akram Belazi, Sofiane Kharbech, Md. Nazish Aslam, Muhammad Talha, Wei Xiang, Abdullah M. Iliyasu, and Ahmed A. Abd El-Latif. 2022. Improved sine-tangent chaotic map with application in medical images encryption. Journal of Information Security and Applications 66 (2022), 103131.
[10]
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, et al. 2012. PRINCE–A low-latency block cipher for pervasive computing applications. In Advances in Cryptology (ASIACRYPT’12): Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security. Springer, 208–225.
[11]
Xiuli Chai, Jiangyu Fu, Jitong Zhang, Daojun Han, and Zhihua Gan. 2021. Exploiting preprocessing-permutation–diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system. Neural Computing and Applications 33, 16 (2021), 10371–10402.
[12]
Xiuli Chai, Yinjing Wang, Xiuhui Chen, Zhihua Gan, and Yushu Zhang. 2022. TPE-GAN: Thumbnail preserving encryption based on GAN with key. IEEE Signal Processing Letters 29 (2022), 972–976.
[13]
Xiuli Chai, Yinjing Wang, Zhihua Gan, Xiuhui Chen, and Yushu Zhang. 2022. Preserving privacy while revealing thumbnail for content-based encrypted image retrieval in the cloud. Information Sciences 604 (2022), 115–141.
[14]
Lei Chen and Shihong Wang. 2015. Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Computers in Biology and Medicine 65 (2015), 69–75.
[15]
Abhrajyoti Das, Abhilash Das, and Nirmalya Kar. 2022. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture. Journal of Ambient Intelligence and Humanized Computing 13, 2 (2022), 1021–1036.
[16]
Subhrajyoti Deb and Pratap Kumar Behera. 2022. Design of key-dependent bijective S-boxes for color image cryptosystem. Optik (2022), 168548.
[17]
Subhrajyoti Deb and Bubu Bhuyan. 2021. Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimedia Tools and Applications 80, 13 (2021), 19803–19826.
[18]
Subhrajyoti Deb, Bubu Bhuyan, Nirmalya Kar, and K. Sudheer Reddy. 2022. Colour image encryption using an improved version of stream cipher and chaos. International Journal of Ad Hoc and Ubiquitous Computing 41, 2 (2022), 118–133.
[19]
Subhrajyoti Deb, Bhaskar Biswas, and Bubu Bhuyan. 2019. Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimedia Tools and Applications 78, 24 (2019), 34901–34925.
[20]
A. Martín Del Rey and G. Rodríguez Sánchez. 2015. An image encryption algorithm based on 3D cellular automata and chaotic maps. International Journal of Modern Physics C 26, 1 (2015), 1450069.
[21]
Youheng Dong, Geng Zhao, Yingjie Ma, Zhou Pan, and Rui Wu. 2022. A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata. Information Sciences 593 (2022), 121–154.
[22]
Ahmed A. Abd El-Latif, Bassem Abd-El-Atty, Akram Belazi, and Abdullah M. Iliyasu. 2021. Efficient chaos-based substitution-box and its application to image encryption. Electronics 10, 12 (2021), 1392.
[23]
B. Krishna Gandhi, A. Chandra Sekhar, and S. Srilakshmi. 2011. Cryptographic scheme for digital signals using finite state machines. International Journal of Computer Applications 6, 29 (2011), 61–63.
[24]
Khalid M. Hosny, Sara T. Kamal, and Mohamed M. Darwish. 2022. A color image encryption technique using block scrambling and chaos. Multimedia Tools and Applications 81, 1 (2022), 505–525.
[25]
Zhongyun Hua and Yicong Zhou. 2017. Design of image cipher using block-based scrambling and image filtering. Information Sciences 396 (2017), 97–113.
[26]
Jun Jin. 2012. An image encryption based on elementary cellular automata. Optics and Lasers in Engineering 50, 12 (2012), 1836–1843.
[27]
Sung Won Kang, Un Sook Choi, and Sung Jin Cho. 2022. Fast image encryption algorithm based on (n, m, k)-PCMLCA. Multimedia Tools and Applications 81, 1 (2022), 1209–1235.
[28]
Nirmalya Kar, Kaushik Mandal, and Baby Bhattacharya. 2018. Improved chaos-based video steganography using DNA alphabets. ICT Express 4, 1 (2018), 6–13.
[29]
Qiang Lai, Zhiqiang Wan, Hui Zhang, and Guanrong Chen. 2022. Design and analysis of multiscroll memristive hopfield neural network with adjustable memductance and application to image encryption. Transactions on Neural Networks and Learning Systems (2022), 1–14. https://ieeexplore.ieee.org/document/9709550
[30]
Ankita Lathey and Pradeep K. Atrey. 2015. Image enhancement in encrypted domain over cloud. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 11, 3 (2015), 1–24.
[31]
Chengqing Li, Yuansheng Liu, Leo Yu Zhang, and Michael Z. Q. Chen. 2013. Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. International Journal of Bifurcation and Chaos 23, 4 (2013), 1350075.
[32]
Yinghua Li, Bin Song, Rong Cao, Yue Zhang, and Hao Qin. 2016. Image encryption based on compressive sensing and scrambled index for secure multimedia transmission. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 12, 4s (2016), 1–22.
[33]
Wenhao Liu, Kehui Sun, and Congxu Zhu. 2016. A fast image encryption algorithm based on chaotic map. Optics and Lasers in Engineering 84 (2016), 26–36.
[34]
Yunling Ma, Chengqing Li, and Bo Ou. 2020. Cryptanalysis of an image block encryption algorithm based on chaotic maps. Journal of Information Security and Applications 54 (2020), 102566.
[35]
Edward F. Moore et al. 1956. Gedanken-experiments on sequential machines. Automata Studies 34 (1956), 129–153.
[36]
Tsafack Nestor, Akram Belazi, Bassem Abd-El-Atty, Md. Nazish Aslam, Christos Volos, Nkapkop Jean De Dieu, and Ahmed A. Abd El-Latif. 2022. A new 4d hyperchaotic system with dynamics analysis, synchronization, and application to image encryption. Symmetry 14, 2 (2022), 424.
[37]
Abolfazl Yaghouti Niyat, Mohammad Hossein Moattar, and Masood Niazi Torshiz. 2017. Color image encryption based on hybrid hyper-chaotic system and cellular automata. Optics and Lasers in Engineering 90 (2017), 225–237.
[38]
Kirtee Panwar, Ravindra Kumar Purwar, and Anchal Jain. 2018. Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps. Journal of Electronic Imaging 27, 5 (2018), 053037.
[39]
Aakash Paul, Shyamalendu Kandar, and Bibhas Chandra Dhara. 2022. Image encryption using permutation generated by modified Regula-Falsi method. Applied Intelligence 52, 10 (2022), 10979–10998.
[40]
Pramod Pavithran, Sheena Mathew, Suyel Namasudra, and Pascal Lorenz. 2021. A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. Computers & Security 104 (2021), 102160.
[41]
Ping Ping, Xiaojuan Zhang, Xiaohui Yang, and Yara Abdelsattar Abdelmageed Hashems. 2022. A novel medical image encryption based on cellular automata with ROI position embedded. Multimedia Tools and Applications 81, 5 (2022), 7323–7343.
[42]
Padmapriya Praveenkumar, N. Kerthana Devi, Dhivya Ravichandran, Jayapalan Avila, Karuppusamy Thenmozhi, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan. 2018. Transreceiving of encrypted medical image–A cognitive approach. Multimedia Tools and Applications 77 (2018), 8393–8418.
[43]
Satyabrata Roy, Manu Shrivastava, Umashankar Rawat, Chirag Vinodkumar Pandey, and Sanjeet Kumar Nayak. 2021. IESCA: An efficient image encryption scheme using 2-D cellular automata. Journal of Information Security and Applications 61 (2021), 102919.
[44]
Priya R. Sankpal and P. A. Vijaya. 2014. Image encryption using chaotic maps: A survey. In 2014 5th International Conference on Signal and Image Processing. IEEE, 102–107.
[45]
K. U. Shahna and Anuj Mohamed. 2020. A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Applied Soft Computing 90 (2020), 106162.
[46]
Shivendra Shivani and Suneeta Agarwal. 2016. Progressive visual cryptography with unexpanded meaningful shares. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 12, 4 (2016), 1–24.
[47]
Kedar Nath Singh and Amit Kumar Singh. 2022. Towards integrating image encryption with compression: A survey. ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) 18, 3 (2022), 1–21.
[48]
Aswini Vinay Soreng and Shyamalendu Kandar. 2022. Verifiable varying sized (m, n, n) multi-image secret sharing with combiner verification and cheater identification. Journal of Visual Communication and Image Representation 84 (2022), 103466.
[49]
Je Sen Teh, Moatsum Alawida, and You Cheng Sii. 2020. Implementation and practical problems of chaos-based cryptography revisited. Journal of Information Security and Applications 50 (2020), 102421.
[50]
Dijana Tralic and Sonja Grgic. 2016. Robust image encryption based on balanced cellular automaton and pixel separation. Radioengineering 25 (2016), 548–555.
[51]
Guangyou Tu, Xiaofeng Liao, and Tao Xiang. 2013. Cryptanalysis of a color image encryption algorithm based on chaos. Optik 124, 22 (2013), 5411–5415.
[52]
Chuanfu Wang, Chunlei Fan, Kai Feng, Xin Huang, and Qun Ding. 2018. Analysis of the time series generated by a new high-dimensional discrete chaotic system. Complexity 2018 (2018), 1–11.
[53]
Yong Wang, Yi Zhao, Qing Zhou, and Zehui Lin. 2018. Image encryption using partitioned cellular automata. Neurocomputing 275 (2018), 1318–1332.
[54]
Zhou Wang, Alan C. Bovik, Hamid R. Sheikh, and Eero P. Simoncelli. 2004. Image quality assessment: From error visibility to structural similarity. IEEE Transactions on Image Processing 13, 4 (2004), 600–612.
[55]
Yue Wu, Joseph P. Noonan, Sos Agaian, et al. 2011. NPCR and UACI randomness tests for image encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT) 1, 2 (2011), 31–38.
[56]
Feng Yu, Xinhui Gong, Hanpeng Li, and Shihong Wang. 2021. Differential cryptanalysis of image cipher using block-based scrambling and image filtering. Information Sciences 554 (2021), 145–156.
[57]
Xuanping Zhang and Zhongmeng Zhao. 2014. Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics 75, 1 (2014), 319–330.
[58]
Unsub Zia, Mark McCartney, Bryan Scotney, Jorge Martinez, Mamun AbuTair, Jamshed Memon, and Ali Sajjad. 2022. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. International Journal of Information Security 21, 4 (2022), 917–935.

Cited By

View all
  • (2024)Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual ProtectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854621:3(1-23)Online publication date: 14-Dec-2024
  • (2024)Augmented Image Encryption via Moore’s Automaton and Jigsaw Transform2024 Panhellenic Conference on Electronics & Telecommunications (PACET)10.1109/PACET60398.2024.10497045(1-6)Online publication date: 28-Mar-2024
  • (2024)A Systematic Survey on TPE Schemes for the Cloud: Classification, Challenges, and Future ScopesIEEE Access10.1109/ACCESS.2024.347922812(160669-160689)Online publication date: 2024
  • Show More Cited By

Index Terms

  1. An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (qk)/𝔽2

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Multimedia Computing, Communications, and Applications
    ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 20, Issue 2
    February 2024
    548 pages
    EISSN:1551-6865
    DOI:10.1145/3613570
    • Editor:
    • Abdulmotaleb El Saddik
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 27 September 2023
    Online AM: 09 August 2023
    Accepted: 06 August 2023
    Revised: 02 August 2023
    Received: 03 July 2022
    Published in TOMM Volume 20, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Image encryption
    2. Moore’s Automaton
    3. escalation
    4. diffusion
    5. security
    6. cyclic group
    7. encryption
    8. decryption

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)87
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Vulnerability Detection and Improvements of an Image Cryptosystem for Real-Time Visual ProtectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/370854621:3(1-23)Online publication date: 14-Dec-2024
    • (2024)Augmented Image Encryption via Moore’s Automaton and Jigsaw Transform2024 Panhellenic Conference on Electronics & Telecommunications (PACET)10.1109/PACET60398.2024.10497045(1-6)Online publication date: 28-Mar-2024
    • (2024)A Systematic Survey on TPE Schemes for the Cloud: Classification, Challenges, and Future ScopesIEEE Access10.1109/ACCESS.2024.347922812(160669-160689)Online publication date: 2024
    • (2024)Robust medical and color image cryptosystem using array index and chaotic S-boxCluster Computing10.1007/s10586-024-04584-327:4(4321-4346)Online publication date: 12-Jun-2024

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media