Skip to main content
Log in

A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An innovative and highly efficient color image encryption technique based on the concept of linear transformation is presented in this paper. A 24-bit color image is split into the channels called Red, Green, Blue and afterwards each channel is permuted via cyclic shift on rows and columns using chaotic sequences. For substitution, pseudo-random numbers are generated using chaotic maps, which are then build into pseudo-random matrices through Linear Transformations. These random matrices are bonded with permuted colored channel under Exclusive-OR (XOR) operation. The control parameters and initial conditions for chaotic maps are obtained from 256-bits hash value of the original image to avoid the chosen-plaintext attacks. The comparison of simulated results with existing algorithms has shown the proposed algorithm is better in encryption robustness and better in noise repulsion during transmission. The proposed technique is most suitable for real time applications due to better efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Ahmad M, Alam MS (2009) A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping. Int J Comput Sci Eng 2(1):46–50

    Google Scholar 

  2. Ameta R, Ameta SC (2016) Chemical applications of symmetry and group theory, Illustrate. Apple Academic Press, Incorporated, 2016

  3. Aqeel-ur-Rehman X, Liao AK, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241–11266

    Article  Google Scholar 

  4. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2008) A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons Fractals 35(2):408–419

    Article  MathSciNet  MATH  Google Scholar 

  5. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  MATH  Google Scholar 

  6. Biham E, Shamir A (1993) Differential Cryptanalysis of the Full 16-round DES BT - Advances in Cryptology — CRYPTO’ 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings. Brickell EF (Ed.), Springer Berlin Heidelberg, Berlin, pp. 487–496

  7. Bruß D, Cinchetti M, Mauro D’Ariano G, Macchiavello C (2000) Phase-covariant quantum cloning. Phys Rev A 62(1):12302

    Article  Google Scholar 

  8. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  9. Daemen J, Rijmen V (2012) The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Berlin Heidelberg

    MATH  Google Scholar 

  10. Gan Z, Chai X, Han D, Chen Y (2018) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic

  11. Glotzer SC, Vice SK, Cummings PT, Head-Gordon M (2009) International assessment of research and development in simulation -based engineering and science. Baltimore

  12. Golan JS. Linear transformations. In: The Linear Algebra a Beginning Graduate Student Ought to Know. Springer Netherlands, Dordrecht, pp. 79–98

  13. Gotz M, Kelber K, Schwarz W (1997) Discrete-time chaotic encryption systems. I. Statistical design approach. IEEE Trans Circuits Syst I Fundam Theory Appl 44(10):963–970

    Article  MathSciNet  Google Scholar 

  14. Guesmi R, Ben Farah MA, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769

    Article  MATH  Google Scholar 

  15. Hua Z, Zhou Y, Pun CM, Chen CLP (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci (Ny) 297:80–94

    Article  Google Scholar 

  16. Kalpana J, Murali P (2015) An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Opt - Int J Light Electron Opt 126(24):5703–5709

    Article  Google Scholar 

  17. Khan M, Shah T (2014) A Literature Review on Image Encryption Techniques. 3D Res 5(4):1–29

    MathSciNet  Google Scholar 

  18. Kim H-I, Hong S, Chang J-W (2016) Hilbert curve-based cryptographic transformation scheme for spatial query processing on outsourced private data. Data Knowl Eng 104:32–44

    Article  Google Scholar 

  19. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84(Supplement C):26–36

    Article  Google Scholar 

  20. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput J 12(5):1457–1466

    Article  Google Scholar 

  21. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:9

    Article  Google Scholar 

  22. Schneier B (1996) Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition. Network.:631

  23. Stojanovski T, Kocarev L (2001) Chaos-based random number generators - Part I: Analysis. IEEE Trans Circuits Syst I Fundam Theory Appl 48(3):281–288

    Article  MATH  Google Scholar 

  24. Tang Z, Wang F, Zhang X (2017) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl 76(6):8257–8283

    Article  Google Scholar 

  25. Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202–206

    Article  Google Scholar 

  26. Tang Z, Zhang X, Lan W (2015) Efficient image encryption with block shuffling and chaotic map. Multimed Tools Appl 74(15):5429–5448

    Article  Google Scholar 

  27. ur Rehman A, Liao X (2019) A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed Tools Appl 78(2):2105–2133

    Article  Google Scholar 

  28. ur Rehman A, Liao X, Ashraf R, Ullah S, Wang H (2018) A Color Image Encryption Technique using Exclusive-OR with DNA Complementary Rules based on Chaos Theory and SHA-2. Int J Light Electron Opt 159:348–367

    Article  Google Scholar 

  29. ur Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–4677

    Article  Google Scholar 

  30. Wang W, Tan H, Sun P, Pang Y, Ren B (2016) A novel digital image encryption algorithm based on wavelet transform and multi-chaos. Wireless Communication and Sensor Network, World Scientific:711–719

  31. Wang H, Xiao D, Chen X, Huang H (2017) Cryptanalysis and Enhancements of Image Encryption Using Combination of the 1D Chaotic Map. Signal Process 144:444–452

    Article  Google Scholar 

  32. Wang W et al (2018) An encryption algorithm based on combined chaos in body area networks. Comput Electr Eng 65:282–291

    Article  Google Scholar 

  33. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  34. Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342

    Article  MathSciNet  MATH  Google Scholar 

  35. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aqeel ur Rehman.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Firdous, A., ur Rehman, A. & Saad Missen, M.M. A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Multimed Tools Appl 78, 24809–24835 (2019). https://doi.org/10.1007/s11042-019-7623-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-7623-3

Keywords

Navigation