Abstract
In this paper, a novel cryptosystem with just a multi-shuffling process which is highly interactive to differentiate initial conditions is developed. The proposed system replaces the fundamental and well known in cryptography, confusion–diffusion scheme, which uses two levels with just one confusion block. This algorithm is designed for protecting all personal or commercial data in real-time applications such as monitoring and transmission of multimedia information. The unique confusion stage has three-level shuffling processes, consisting of the flipping procedure, block shuffling, and permutation in a bit level. All of them were designed to drastically change data from a plain image to a cipher image. This not only destroys the relationship of adjacent pixels but also destroys patterns in the encryption process. The flipping procedure tries to combine parts of the image's top with the bottom and the right with the left. The selected columns and rows will change completely after this procedure due to the complement of each pixel being written during the process. The last levels use an automatically sliding window combined with a logistic sine wave and logistic map to drive the iteration of the cryptosystem and shuffle the position of pixels of the plain image as well as giving new statistical features to the image at the same time. The proposed algorithm was designed to be easily implemented by practitioners. Additionally, the main goal of the image encryption is to achieve an uncertain image that cannot be cracked. The results show that this novel cryptosystem with only the shuffling process is well performed and feasible to encrypt images with a high security level. Furthermore, the experimental analysis demonstrates the effectiveness and feasibility of the proposed encryption algorithm after being tested using the benchmark “Lena” image, "The Wonder woman" image, and the “Bruce Lee” image, the latter of which is completely different to the first one, statistically speaking.
Similar content being viewed by others
References
Arshad S, Khan M (2021) New extension of data encryption standard over 128-bit key for digital images. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06023-5
Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907–9927
Chen TH, Li KC (2012) Multi-image encryption by circular random grids. Inf Sci 189:255–265
Chen JX, Zhu ZL, Fu C, Yu H (2014) A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn 77(4):1191–1207
Chen L, Li J, Zhang Y (2020) Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Comput 24:4589–4606
Dang PP, Chau PM (2000) Image encryption for secure internet multimedia applications. IEEE Trans Consum Electron 46(3):395–403
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Es-Sabry M, El Akkad N, Merras M (2020) A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput 24:3829–3848
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284
Guanrong C, Yaobin M, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761
Hamdi M, Miri J, Moalla B (2021) Hybrid encryption algorithm (HEA) based on chaotic system. Soft Comput 25:1847–1858. https://doi.org/10.1007/s00500-020-05258-z
Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237–253
Huang H, Yang S, Ye R (2019) Image encryption scheme combining a modified Gerchberg-Saxton algorithm with hyper-chaotic system. Soft Comput 23:7045–7053
Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57–70
Hua Z, Zhou Y, Pun CM, Chen CLP (2014) In: 2014 IEEE international conference on systems, man, and cybernetics (SMC). pp. 3229–3234
Joshi M, Shakher C, Singh K (2008) Image encryption and decryption using fractional Fourier transform and radial Hilbert transform. Opt Lasers Eng 46(7):522–526
Kumar A, Raghava NS (2021) An efficient image encryption scheme using elementary cellular automata with novel permutation box. Multimed Tools Appl 80:21727–21750
Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf Secur 7(4):265–270
Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Liu Y, Zhang JA (2020) Multidimensional chaotic image encryption algorithm based on DNA Coding. Multimed Tools Appl 79:21579–21601
Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42
Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566
Noor R, Khan A, Sarfaraz A (2019) Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption. Soft Comput 23:9821–9829
Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion process. Multimed Syst 20(1):45–64
Roy S, Shrivastava M, Pandey CV (2020) IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09880-9
SH Kamali, R Shakerian, M Hedayati, M Rahmani (2010) In: 2010 international conference on electronics and information engineering. Vol 1, pp. 141-145
Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25:5299–5322. https://doi.org/10.1007/s00500-020-05528-w
Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529
Shtewi AA, Hasan BEM, Hegazy AEFA (2010) An efficient modified advanced encryption standard (MAES) adapted for image cryptosystems. IJCSNS Int J Comput Sci Netw Secur 10(2):226–232
Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031
Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42(7):1582–1596
Tang Y, Wang Z, Fang JA (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456–2468
Thilak KD, Amuthan A, Rajkamal S (2021) Mitigating DDoS attacks in VANETs using a Variant Artificial Bee Colony Algorithm based on cellular automata. Soft Comput. https://doi.org/10.1007/s00500-021-05887-y
Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217–227
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang XY, Su Y (2021) Image encryption based on compressed sensing and DNA encoding. Signal Process Image Commun 95:116246–116258
Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522
Wang X, Zhang M (2021) A new image encryption algorithm based on ladder transformation and DNA coding. Multimed Tools Appl 80:13339–13365. https://doi.org/10.1007/s11042-020-10318-5
Wang X, Zhao J, Liu H (2012) A new image encryption algorithm based on chaos. Opt Commun 285(5):562–566
Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299
Wen W, Hong Y, Fang Y, Li M, Li M (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173:107580–107593
Xing-Yuan W, Qian W (2014) A fast image encryption algorithm based on only blocks in cipher text. Chin Phys B 23(3):030503
Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25
You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413–12427
Zhang Q, Ding Q (2015) In: 2015 fifth international conference on instrumentation and measurement, computer, communication and control (IMCCC), pp. 1218–1221
Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20
Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182
Funding
This study was funded by the Ministry of Science and Technology MOST 107-2628-E-027-003-MY3 and MOST 110-2221-E-027-080.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors, Shih-Yu Li and Miguel Angel Benalcázar Hernández, declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Li, SY., Miguel Angel, B.H. A novel image protection cryptosystem with only permutation stage: multi-shuffling process. Soft Comput 27, 15319–15336 (2023). https://doi.org/10.1007/s00500-023-07970-y
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-023-07970-y