[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose a new color image encryption method using color scrambling based on the chaotic permutation multiple circular shrinking and expanding (CPMCS/ CPMCE). The plain color image with a size of m x n x 3 is arranged in two-dimensional array, where each row consists of the Red, Green, and Blue (RGB) component, forming two-dimensional array with a size of m x 3n. The arranged 2D array then permuted by CPMCS for the each row and column. To reconstruct the original image, the ciphered image is arranged in 2D array then is permuted by CPMCE for each column and row. The proposed method is characterized by very high key space that reaches 22,895,713 for an image size of 256x256, so that resistance to brute force attack and can anticipate the emergence of quantum computers. It also resistant to a differential attack due to change a single bit in the plain image causes a significant change in the ciphered image. The proposed encryption also yield completely difference ciphered image series from the same plain image just using arbitrary increment sequence key. It is also robust to JPEG compression so the ciphered image can be stored in smaller size, such as for the ciphered Lena image only needs 1/5.2 of the original one when compressed using JPEG 70 %. It also resistant to noise scheme (Gaussian, Poisson, Salt&Pepper, and spekle), data loss, and brightness-contrast adjustment, so the ciphered image can be transmitted in a non error free communication system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Frankl Inst 348:1797–1813

    Article  MathSciNet  Google Scholar 

  2. Awad A, Saadane A (2010) New chaotic permutation methods for image encryption. IAENG Int J Comput Sci 37.

  3. Bakhshandeh A, Eslami Z (2013) An authenticated image encryption scheme based on chaotic maps and memory cellular automata. Opt Lasers Eng 51:665–673

    Article  Google Scholar 

  4. Barker E, Barker W, Burr W, Polk W, Smid M (2015) Recommendation for key management part 1: general (Revision 3). NIST Special Publ, 800–57

  5. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35:408–419

    Article  MathSciNet  MATH  Google Scholar 

  6. Bigdeli N, Farid Y, Afshar K (2012) A novel image encryption/decryption scheme based on chaotic neural networks. Eng Appl Artif Intell 25:753–765

    Article  Google Scholar 

  7. Chong F, Guo-yu Z, Meng G, Hong-feng M (2013) A chaotic symmetric image cipher using a pixel-swapping based permutation. TENCON 2013–2013 I.E. Region 10 Conf (31194), 1–6

  8. Elgammal A (2008, 5/6/2015) CS443: digital imaging and multimedia histograms of digital images. Available: http://www.cs.rutgers.edu/~elgammal/classes/cs443/ImageHistograms.pdf

  9. Enayatifar R, Sadaei HJ, Abdullah AH, Lee M, Isnin IF (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng 71:33–41

    Article  Google Scholar 

  10. Etemadi Borujeni S, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommun Syst 52:525–537

    Google Scholar 

  11. Fouda JAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19:578–588

    Article  MathSciNet  Google Scholar 

  12. Gao T, Chen Z (2008) Image encryption based on a new total shuffling algorithm. Chaos, Solitons Fractals 38:213–220

    Article  MathSciNet  MATH  Google Scholar 

  13. Gopalakrishnan T, Ramakrishnan S, Balakumar M (2014) An image encryption using chaotic permutation and diffusion. Recent Trends Inform Technol (ICRTIT), 2014 Int Conf, 1–5

  14. Howard A (2010) Elementary linear algebra with applications

  15. Hsiao H-I, Lee J (2015) Color image encryption using chaotic nonlinear adaptive filter. Signal Process 117:281–309

    Article  Google Scholar 

  16. N. Instruments (2013, 5/8/2015) Peak signal-to-noise ratio as an image quality metric. Available: http://www.ni.com/white-paper/13306/en/

  17. Ismail IA, Amin M, Diab H (2010) A digital image encryption algorithm based a composition of two chaotic logistic maps. Int J Netw Sec 11:1–10

    Google Scholar 

  18. Jolfaei A, Mirghadri A (2010) A novel image encryption scheme using pixel shuffler and A5/1. Artif Intell Comput Intell (AICI), 2010 Int Conf, 369–373

  19. Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17:2943–2959

    Article  MathSciNet  MATH  Google Scholar 

  20. Lian S, Sun J, Wang Z (2005) A block cipher based on a suitable use of the chaotic standard map. Chaos, Solitons Fractals 26:117–129

    Article  MATH  Google Scholar 

  21. Munir R (2014) A block-based image encryption algorithm in frequency domain using chaotic permutation. Telecommun Syst Services Appl (TSSA), 2014 8th Int Conf, 1–5

  22. NSA (2015, 2016) Cryptography today. Available: https://www.nsa.gov/ia/programs/suiteb_cryptography/

  23. Parvin Z, Seyedarabi H, Shamsi M (2014) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimed Tools Appl, 1–18

  24. Patidar V, Pareek NK, Purohit G, Sud KK (2011) A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284:4331–4339

    Article  Google Scholar 

  25. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. DTIC Doc

  26. Sathishkumar GA, Ramachandran S, Bagan KB (2012) Image encryption using random pixel permutation by chaotic mapping. Comput Inform (ISCI), 2012 I.E. Symp, 247–251

  27. Shujiang X, Yinglong W, Jizhi W, Min T (2008) Cryptanalysis of two chaotic image encryption schemes based on permutation and xor operations. Comput Intell Sec, 2008. CIS ’08. Int Conf, 433–437

  28. Soleymani A, Ali ZM, Nordin MJ (2012) A survey on principal aspects of secure image transmission. Proc World Acad Sci, Eng Technol

  29. Soleymani A, Nordin MJ, Sundararajan E (2014) A chaotic cryptosystem for images based on henon and arnold cat map. Sci World J 2014

  30. Sui L, Lu H, Wang Z, Sun Q (2014) Double-image encryption using discrete fractional random transform and logistic maps. Opt Lasers Eng 56:1–12

    Article  Google Scholar 

  31. Suryadi M, Nurpeti E (2014) Performance of chaos-based encryption algorithm for digital image. TELKOMNIKA (Telecommun Comput Electron Contrl) 12:675–682

    Article  Google Scholar 

  32. Suryanto Y, Ramli K (2015) Chaos properties of the chaotic permutation generated by multi circular shrinking and expanding movement. Qual Res (QiR), 2015 Int Conf, 65–68

  33. Suryanto Y, Suryadi, Ramli K (2016) A secure and robust image encryption based on chaotic permutation multiple circular shrinking and expanding. J Inform Hiding Multimed Sign Process 7:697–713

    Google Scholar 

  34. Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6:202–206

    Article  Google Scholar 

  35. Tian-gong P, Da-yong L (2013) A novel image encryption using Arnold cat. Int J Sec Appl 7

  36. Tong X-J (2013) Design of an image encryption scheme based on a multiple chaotic map. Commun Nonlinear Sci Numer Simul 18:1725–1733

    Article  MathSciNet  MATH  Google Scholar 

  37. Volos CK, Kyprianidis IM, Stouboulos IN (2013) Image encryption process based on chaotic synchronization phenomena. Signal Process 93:1328–1340

    Article  Google Scholar 

  38. Wang Y, Wong K-W, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11:514–522

    Article  Google Scholar 

  39. Wang X, Zhang H-l (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos. Opt Commun 342:51–60

    Article  Google Scholar 

  40. Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  41. Wu X, Li Y, Kurths J (2015) A new color image encryption scheme using CML and a fractional-order chaotic system. PloS one 10

  42. Wu Y, Noonan JP, Agaian S (2011) Shannon entropy based randomness measurement and test for image encryption. arXiv preprint arXiv:1103.5520

  43. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscipl J Sci Technol, J Select Areas Telecommun (JSAT), 31–38

  44. Wu Y, Yang G, Jin H, Noonan JP (2012) Image encryption using the two-dimensional logistic chaotic map. J Elect Imag 21:013014-1–013014-15

    Google Scholar 

  45. Yang H, Wong K-W, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15:3507–3517

    Article  MATH  Google Scholar 

  46. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31:347–354

    Article  Google Scholar 

  47. Ye G, Zhou J (2014) A block chaotic image encryption scheme based on self-adaptive modelling. Appl Soft Comput 22:351–357

    Article  Google Scholar 

  48. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52:2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  49. Zhang M, Tong X (2014) A new chaotic map based image encryption schemes for several image formats. J Syst Softw 98:140–154

    Article  Google Scholar 

  50. Zhang W, Wong K-w, Yu H, Zhu Z-l (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun Nonlinear Sci Numer Simul 18:2066–2080

    Article  MathSciNet  MATH  Google Scholar 

  51. Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

Download references

Acknowledgments

Prof. Akhmad Herman Yuwono, Associate Dean for Research and Community Services Faculty of Engineering-Universitas Indonesia in providing higly valuable advice during writing our research. Yohan also acknowledges to Rambinet Digital Network in providing research grant (RDN_RG/III/2015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yohan Suryanto.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Suryanto, Y., Suryadi & Ramli, K. A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding. Multimed Tools Appl 76, 16831–16854 (2017). https://doi.org/10.1007/s11042-016-3954-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3954-5

Keywords

Navigation