Advertisement

A multilevel distributed image based encryption for full integrity

  • R. SumathiEmail author
  • N. R. Raajan
Article
  • 36 Downloads

Abstract

Sending and receiving information in today’s world has become easy. Recent advancements in the technology have made the world shrink. The transfer of data hence has become effortless. At one touch of the ‘send’ button, the data is made available to the required receiver. This has put the sender and receiver at ease to communicate. Ensuring the safety of the data being transmitted and also that it is in the right hands are the prime aspects of the communication process. Anyone who is interested in knowing the information may mess about the data. Hence it is required to protect the information from the unauthorized user. The very intention of this work is to provide enough security to the confidential color images that are to reach only the legitimate receiver. This paper focuses on the essential quantum of work required to ensure that the confidential images are out of harm’s way. It also is a sincere effort to accomplish the same using not very complicated techniques and to make use of a combination of simple algorithms like tent map and logistic map. The goal of the work is achieved with exertion which employs the technique of splitting the image into required number of appropriate blocks followed by the implementation of the vital processes: confusion and diffusion to achieve the mission. Confusion involves shuffling of the blocks and diffusion is implemented using a random sequence. This technique applied has helped to reach the least amount of correlation between the pixels in the ciphered image. The lesser is the degree of association between the nearby pixels in the encrypted image, higher is the efficiency of the encryption. The method implemented in this work is a simple version of the combination of tent map and logistic map and is trouble free and at the same time gives the required security to the image so that no unauthenticated user can make out the data even if he manages to get the ciphered adaptation of it.

Keywords

Confusion Diffusion Random sequence Image division Legitimate user Combination of logistic and tent map 

Mathematics subject classification

68P25 

Notes

References

  1. 1.
    Abuturab MR An Asymmetric Color Image Cryptosystem Based on Schur Decomposition in Gyrator Transform Domain. Opt Lasers Eng 582014:39–47.  https://doi.org/10.1016/j.optlaseng.2014.01.025 CrossRefGoogle Scholar
  2. 2.
    Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel Tolerant Image Encryption Scheme. Wirel Pers Commun 77:2771–2791.  https://doi.org/10.1007/s11277-014-1667-5 CrossRefGoogle Scholar
  3. 3.
    Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547.  https://doi.org/10.1007/s11042-016-4206-4 CrossRefGoogle Scholar
  4. 4.
    Beloucif A, Noui O, Noui L (2016) Design of a Tweakable Image Encryption Algorithm Using Chaos-Based Schema. Int J Inf Comput Secur 8(3):205–220.  https://doi.org/10.1504/IJICS.2016.079183 CrossRefGoogle Scholar
  5. 5.
    Brindha M, Ammasai Gounden NG, Sriram M (2015) A Hybrid Image Encryption Algorithm using Ahao and Conway's Game-of-Life Cellular Automata. Security and Communication Networks, HobokenGoogle Scholar
  6. 6.
    Chai X et al A Fast Chaos-Based Image Encryption Scheme with a Novel Plain Image-Related Swapping Block Permutation and Block Diffusion. Multimed Tools Appl 76(142017):15561–15585.  https://doi.org/10.1007/s11042-016-3858-4 CrossRefGoogle Scholar
  7. 7.
    Chen R-J, Chen Y-H, Chen C-S, Lai J-L Image encryption/decryption system using 2-D cellular automataİ. IEEE 10th International Symposium on Consumer Electronics 2006:1–6Google Scholar
  8. 8.
    Chen R-J, Wen-Kai L, Lai J-L (2005) Image encryption using progressive cellular Automata substitution and SCAN. IEEE International Symposium on Circuits and Systems 2:1690–1693Google Scholar
  9. 9.
    Chong F, Chen J-J, Zou H, Meng W-H, Zhan Y-F, Ya-Wen Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378.  https://doi.org/10.1364/OE.20.002363 CrossRefGoogle Scholar
  10. 10.
    Jin J (2012) An image encryption based on elementary cellular automataİ. Optics and Lasers in Engineering, Elsevier Publication 50(12):1836–1843CrossRefGoogle Scholar
  11. 11.
    Kumar S et al. (2015) Comparative Analysis of Color Image Encryption Using 2D Chaotic Maps, pp. 379–87, 10.1007/978-81-322-2247-7_39Google Scholar
  12. 12.
    Mollaeefar M et al (2017) A Novel Encryption Scheme for Colored Image Based on High Level Chaotic Maps. Multimed Tools Appl 76(1):607–629.  https://doi.org/10.1007/s11042-015-3064-9 CrossRefGoogle Scholar
  13. 13.
    Pak C, Huang L (2017) A New Color Image Encryption Using Combination of the 1D Chaotic Map. Signal Process 138, Elsevier B.V.:129–137.  https://doi.org/10.1016/j.sigpro.2017.03.011 CrossRefGoogle Scholar
  14. 14.
    Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing 2018:142.  https://doi.org/10.1186/s13640-018-0386-3 CrossRefGoogle Scholar
  15. 15.
    Pareek NK, Patidar V (2006) Image encryption using chaotic logistic map, image and vision computing. Elsevier Publication 24(9):926–934Google Scholar
  16. 16.
    Qiang Z, Wei X (2013) RGB Color Image Encryption Method Based on Lorenz Chaotic System and DNA Computation. IETE Tech Rev 30(5):404–409.  https://doi.org/10.4103/0256-4602.123123 CrossRefGoogle Scholar
  17. 17.
    Sharma M (2016) Chaos Based Image Encryption Using Two Step Iterated Logistic Map. pp. 1–5Google Scholar
  18. 18.
    Sharma V, Agnihotri HC, Chetan HP An Image Encryption and Decryption Techniques Using Two Chaotic Schemes. International Journal of Research in Advent Technology 2(2) E-ISSN: 2321-9637Google Scholar
  19. 19.
    Swathi Suresh M, Varghese DA (2015) An Efficient and optimized RC5 Image Encryption Algorithm for Secured Image Transmission. International Journal of Imaging and Robotics 15(3):117–125Google Scholar
  20. 20.
    Toughi S et al (2017) An Image Encryption Scheme Based on Elliptic Curve Pseudo Random and Advanced Encryption System. Signal Process 141, Elsevier B.V.:217–227.  https://doi.org/10.1016/j.sigpro.2017.06.010 CrossRefGoogle Scholar
  21. 21.
    Xuelong Z, Li Q, Manwu X, Fengyu L (2005) A symmetric cryptography based on Extended cellular automataİ. IEEE International Conference on Systems Man and Cybernetics 1:499–503Google Scholar
  22. 22.
    Yang Y-G, Xia J, Jia X, Zhang H (2013) Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf Process 12:3477–3493.  https://doi.org/10.1007/s11128-013-0612-y MathSciNetCrossRefzbMATHGoogle Scholar
  23. 23.
    Ye R (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Opt Commun 284(22, Elsevier B.V.):5290–5298.  https://doi.org/10.1016/j.optcom.2011.07.070 CrossRefGoogle Scholar
  24. 24.
    Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks, HobokenCrossRefGoogle Scholar
  25. 25.
    Ye G, Pan C, Huang X, Zhao Z, He J (2018) A Chaotic Image Encryption Algorithm Based on Information Entropy. International Journal of Bifurcation and Chaos 28(1).  https://doi.org/10.1142/S0218127418500104 MathSciNetCrossRefGoogle Scholar
  26. 26.
    Ye G, Zhao H (2016) Huajin ChaiChaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067–2077.  https://doi.org/10.1007/s11071-015-2465-7 CrossRefGoogle Scholar
  27. 27.
    Yun-Peng Z, Wei L, Shui-Ping C, Zhengjun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems Man and Cybernetics, pp. 474–479Google Scholar
  28. 28.
    Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647–6669.  https://doi.org/10.1007/s11042-017-4577-1 CrossRefGoogle Scholar
  29. 29.
    Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Optics Communications, Elsevier Publication 285(5):594–608Google Scholar
  30. 30.
    Ziba Eslami N, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Electrical & Electronics EngineeringSASTRA Deemed UniversityThanjavurIndia

Personalised recommendations