Skip to main content
Log in

A novel image protection cryptosystem with only permutation stage: multi-shuffling process

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

In this paper, a novel cryptosystem with just a multi-shuffling process which is highly interactive to differentiate initial conditions is developed. The proposed system replaces the fundamental and well known in cryptography, confusion–diffusion scheme, which uses two levels with just one confusion block. This algorithm is designed for protecting all personal or commercial data in real-time applications such as monitoring and transmission of multimedia information. The unique confusion stage has three-level shuffling processes, consisting of the flipping procedure, block shuffling, and permutation in a bit level. All of them were designed to drastically change data from a plain image to a cipher image. This not only destroys the relationship of adjacent pixels but also destroys patterns in the encryption process. The flipping procedure tries to combine parts of the image's top with the bottom and the right with the left. The selected columns and rows will change completely after this procedure due to the complement of each pixel being written during the process. The last levels use an automatically sliding window combined with a logistic sine wave and logistic map to drive the iteration of the cryptosystem and shuffle the position of pixels of the plain image as well as giving new statistical features to the image at the same time. The proposed algorithm was designed to be easily implemented by practitioners. Additionally, the main goal of the image encryption is to achieve an uncertain image that cannot be cracked. The results show that this novel cryptosystem with only the shuffling process is well performed and feasible to encrypt images with a high security level. Furthermore, the experimental analysis demonstrates the effectiveness and feasibility of the proposed encryption algorithm after being tested using the benchmark “Lena” image, "The Wonder woman" image, and the “Bruce Lee” image, the latter of which is completely different to the first one, statistically speaking.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  • Arshad S, Khan M (2021) New extension of data encryption standard over 128-bit key for digital images. Neural Comput Appl. https://doi.org/10.1007/s00521-021-06023-5

    Article  Google Scholar 

  • Chai X, Yang K, Gan Z (2017) A new chaos-based image encryption algorithm with dynamic key selection mechanisms. Multimed Tools Appl 76(7):9907–9927

    Article  Google Scholar 

  • Chen TH, Li KC (2012) Multi-image encryption by circular random grids. Inf Sci 189:255–265

    Article  MathSciNet  Google Scholar 

  • Chen JX, Zhu ZL, Fu C, Yu H (2014) A fast image encryption scheme with a novel pixel swapping-based confusion approach. Nonlinear Dyn 77(4):1191–1207

    Article  Google Scholar 

  • Chen L, Li J, Zhang Y (2020) Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Comput 24:4589–4606

    Article  Google Scholar 

  • Dang PP, Chau PM (2000) Image encryption for secure internet multimedia applications. IEEE Trans Consum Electron 46(3):395–403

    Article  Google Scholar 

  • Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Article  Google Scholar 

  • Es-Sabry M, El Akkad N, Merras M (2020) A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput 24:3829–3848

    Article  Google Scholar 

  • Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  • Guanrong C, Yaobin M, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  • Hamdi M, Miri J, Moalla B (2021) Hybrid encryption algorithm (HEA) based on chaotic system. Soft Comput 25:1847–1858. https://doi.org/10.1007/s00500-020-05258-z

    Article  Google Scholar 

  • Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  • Huang H, Yang S, Ye R (2019) Image encryption scheme combining a modified Gerchberg-Saxton algorithm with hyper-chaotic system. Soft Comput 23:7045–7053

    Article  Google Scholar 

  • Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57–70

    Article  Google Scholar 

  • Hua Z, Zhou Y, Pun CM, Chen CLP (2014) In: 2014 IEEE international conference on systems, man, and cybernetics (SMC). pp. 3229–3234

  • Joshi M, Shakher C, Singh K (2008) Image encryption and decryption using fractional Fourier transform and radial Hilbert transform. Opt Lasers Eng 46(7):522–526

    Article  Google Scholar 

  • Kumar A, Raghava NS (2021) An efficient image encryption scheme using elementary cellular automata with novel permutation box. Multimed Tools Appl 80:21727–21750

    Article  Google Scholar 

  • Li J, Liu H (2013) Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf Secur 7(4):265–270

    Article  Google Scholar 

  • Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  • Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  • Liu Y, Zhang JA (2020) Multidimensional chaotic image encryption algorithm based on DNA Coding. Multimed Tools Appl 79:21579–21601

    Article  Google Scholar 

  • Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  • Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566

    Article  MathSciNet  Google Scholar 

  • Noor R, Khan A, Sarfaraz A (2019) Highly robust hybrid image watermarking approach using Tchebichef transform with secured PCA and CAT encryption. Soft Comput 23:9821–9829

    Article  Google Scholar 

  • Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2014) A novel image encryption based on hash function with only two-round diffusion process. Multimed Syst 20(1):45–64

    Article  MATH  Google Scholar 

  • Roy S, Shrivastava M, Pandey CV (2020) IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata. Multimed Tools Appl. https://doi.org/10.1007/s11042-020-09880-9

    Article  Google Scholar 

  • SH Kamali, R Shakerian, M Hedayati, M Rahmani (2010) In: 2010 international conference on electronics and information engineering. Vol 1, pp. 141-145

  • Saravanan S, Sivabalakrishnan M (2021) A hybrid chaotic map with coefficient improved whale optimization-based parameter tuning for enhanced image encryption. Soft Comput 25:5299–5322. https://doi.org/10.1007/s00500-020-05528-w

    Article  Google Scholar 

  • Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529

    Article  MathSciNet  MATH  Google Scholar 

  • Shtewi AA, Hasan BEM, Hegazy AEFA (2010) An efficient modified advanced encryption standard (MAES) adapted for image cryptosystems. IJCSNS Int J Comput Sci Netw Secur 10(2):226–232

    Google Scholar 

  • Shyu SJ (2007) Image encryption by random grids. Pattern Recogn 40(3):1014–1031

    Article  MATH  Google Scholar 

  • Shyu SJ (2009) Image encryption by multiple random grids. Pattern Recogn 42(7):1582–1596

    Article  MATH  Google Scholar 

  • Tang Y, Wang Z, Fang JA (2010) Image encryption using chaotic coupled map lattices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456–2468

    Article  MathSciNet  MATH  Google Scholar 

  • Thilak KD, Amuthan A, Rajkamal S (2021) Mitigating DDoS attacks in VANETs using a Variant Artificial Bee Colony Algorithm based on cellular automata. Soft Comput. https://doi.org/10.1007/s00500-021-05887-y

    Article  Google Scholar 

  • Toughi S, Fathi MH, Sekhavat YA (2017) An image encryption scheme based on elliptic curve pseudo random and advanced encryption system. Signal Process 141:217–227

    Article  Google Scholar 

  • Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Article  Google Scholar 

  • Wang XY, Su Y (2021) Image encryption based on compressed sensing and DNA encoding. Signal Process Image Commun 95:116246–116258

    Article  Google Scholar 

  • Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  • Wang X, Zhang M (2021) A new image encryption algorithm based on ladder transformation and DNA coding. Multimed Tools Appl 80:13339–13365. https://doi.org/10.1007/s11042-020-10318-5

    Article  Google Scholar 

  • Wang X, Zhao J, Liu H (2012) A new image encryption algorithm based on chaos. Opt Commun 285(5):562–566

    Article  Google Scholar 

  • Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  • Wen W, Hong Y, Fang Y, Li M, Li M (2020) A visually secure image encryption scheme based on semi-tensor product compressed sensing. Signal Process 173:107580–107593

    Article  Google Scholar 

  • Xing-Yuan W, Qian W (2014) A fast image encryption algorithm based on only blocks in cipher text. Chin Phys B 23(3):030503

    Article  Google Scholar 

  • Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  • You L, Yang E, Wang G (2020) A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation. Soft Comput 24:12413–12427

    Article  Google Scholar 

  • Zhang Q, Ding Q (2015) In: 2015 fifth international conference on instrumentation and measurement, computer, communication and control (IMCCC), pp. 1218–1221

  • Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  • Zhou Y, Bao L, Chen CP (2014) A new 1D chaotic system for image encryption. Signal Process 97:172–182

    Article  Google Scholar 

Download references

Funding

This study was funded by the Ministry of Science and Technology MOST 107-2628-E-027-003-MY3 and MOST 110-2221-E-027-080.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shih-Yu Li.

Ethics declarations

Conflict of interest

Authors, Shih-Yu Li and Miguel Angel Benalcázar Hernández, declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, SY., Miguel Angel, B.H. A novel image protection cryptosystem with only permutation stage: multi-shuffling process. Soft Comput 27, 15319–15336 (2023). https://doi.org/10.1007/s00500-023-07970-y

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-07970-y

Keywords

Navigation