Three stage hybrid encryption of cloud data with penta-layer security for online business users

  • S. Subashanthini
  • M. PounambalEmail author
Original Article


Interactive media applications in smart electronic business (e-business), for example, web based exchanging and Internet advertising, dependably face security issues in storing and retrieval of text, images, audio and video. The proposed work addresses the problem of security in e-commerce and proposes a unified framework to secure the image data that are stored in the third party cloud. A three-stage image encryption procedure is proposed in this paper, which combines integer wavelet transform (IWT), chaotic maps and deoxyribose nucleic acid (DNA) encoding rule. The proposed technique uses five levels of security by generating five key sequences through five different chaotic maps. A grayscale image is partitioned as 8 × 8 blocks. Key 1 is generated using logistic map to select an 8 × 8 block randomly. Line map is utilized to create Key 2, in order to scramble the selected 8 × 8 block. Tent map derives Key 3 to randomize the choice of IWTs between Haar or 5/3. Approximation coefficients are scrambled using Key 4 derived from Henon map. The resultant scrambled block is encrypted by selecting a DNA rule using Key 5 that is generated using sine map. The proposed methodology is validated through several performance analysis metrics, and the algorithm achieves an entropy of 7.99, PSNR of 9 dB and near-zero correlation. The algorithm is also resistant to differential attacks and brute force with the key space greater than 2128.


E-commerce Cloud storage Chaotic maps DNA encoding Integer wavelet transform Image encryption 



  1. Belazi A, Abd El-Latif AA, Diaconu A, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50. CrossRefGoogle Scholar
  2. Cai S, Huang L, Chen X, Xiong X (2018) A symmetric plaintext-related color image encryption system based on bit permutation. Entropy 20(4):282. CrossRefGoogle Scholar
  3. Goldstein A, Frank U (2016) Components of a multi-perspective modeling method for designing and managing IT security systems. Inf Syst E-Bus Manag 14:101. CrossRefGoogle Scholar
  4. Huang X, Ye G (2014) An efficient self-adaptive model for chaotic image encryption algorithm. Commun Nonlinear Sci Numer Simul 19(12):4094–4104. CrossRefGoogle Scholar
  5. Khajouei H, Kazemi M, Moosavirad SH (2017) Ranking information security controls by using fuzzy analytic hierarchy process. Inf Syst E-Bus Manag 15:1. CrossRefGoogle Scholar
  6. Khanzadi H, Eshghi M, Borujeni SE (2014) Image encryption using random bit sequence based on chaotic maps. Arab J Sci Eng 39(2):1039–1047. CrossRefGoogle Scholar
  7. Li S, Yin B, Ding W, Zhang T, Ma Y (2018) A nonlinearly modulated logistic map with delay for image encryption. Electronics (Switzerland) 7(11):326. Google Scholar
  8. Liu L, Zhang Q, Wei X (2012a) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248. CrossRefGoogle Scholar
  9. Liu H, Wang X, Kadir A (2012b) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput J 12(5):1457–1466. CrossRefGoogle Scholar
  10. Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens: a tri-layer cryptic solution. Comput Biol Med 62:264–276. CrossRefGoogle Scholar
  11. Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2017) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst 65(1):65–78. CrossRefGoogle Scholar
  12. Ramalingam B, Rengarajan A, Rayappan JBB (2017) Hybrid image crypto system for secure image communication: a VLSI approach. Microprocess Microsyst 50:1–13. CrossRefGoogle Scholar
  13. Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184. CrossRefGoogle Scholar
  14. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R (2017) DNA chaos blend to secure medical privacy. IEEE Trans Nanobiosci 16(8):850–858. CrossRefGoogle Scholar
  15. Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529. CrossRefGoogle Scholar
  16. Tedmori S, Al-Najdawi N (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34. CrossRefGoogle Scholar
  17. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245. CrossRefGoogle Scholar
  18. Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput J 11(1):514–522. CrossRefGoogle Scholar
  19. Wang X, Gu S, Zhang Y (2015) Novel image encryption algorithm based on cycle shift and chaotic system. Opt Lasers Eng 68:126–134. CrossRefGoogle Scholar
  20. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349–350:137–153. CrossRefGoogle Scholar
  21. Xiao G, Lu M, Qin L, Lai X (2006) New field of cryptography: DNA cryptography. Chin Sci Bull 51(12):1413–1420. Google Scholar
  22. Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt Lasers Eng 91:41–52. CrossRefGoogle Scholar
  23. Ye G, Huang X (2016) A feedback chaotic image encryption scheme based on both bit-level and pixel-level. JVC J Vib Control 22(5):1171–1180. CrossRefGoogle Scholar
  24. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913. CrossRefGoogle Scholar
  25. Zhang Q, Guo L, Wei X (2010) Image encryption using DNA addition combining with chaotic maps. Math Comput Model 52(11–12):2028–2035. CrossRefGoogle Scholar
  26. Zhang Q, Liu L, Wei X (2014) Improved algorithm for image encryption based on DNA encoding and multi-chaotic maps. AEU Int J Electron Commun 68(3):186–192. CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Information TechnologyVellore Institute of TechnologyVelloreIndia

Personalised recommendations