Abstract
Image encryption is the core technology of secure storage and transmission of image information. Based on a perceptron-like network of integer domain, a new unified image encryption algorithm is proposed. Its encryption algorithm and decryption algorithm are the same, both including an exclusive-or module, two types of perceptron-like networks and a sequence-flip module. The image data are diffused and encrypted by the forward propagation algorithm of neural network, and the historical data of the image are memorized and updated by the backward propagation algorithm of the network. The unified image cryptosystem uses a 512-bit key with the encryption speed up to 13.794Mbps on the computer equipped with an i7-9750H CPU. The maximum relative error of each system sensitivity index is less than 0.1%. The system requires the pseudorandom numbers by only half the size of the image. Simulated tests and comparative analyses show that the unified image cryptosystem possesses excellent characteristics of high speed and strong security strength. The proposed system can be used as a candidate safety method for network image information security.
Similar content being viewed by others
References
Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122–133 (2018)
Chai, X., Gan, Z., Yuan, K., Chen, Y., Liu, X.: A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 31, 219–237 (2019)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)
Chen, J., Han, F., Qian, W., Yao, Y., Zhu, Z.: Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn. 93, 2399–2413 (2018)
Daoui, A., Karmouni, H., El Ogri, O., Sayyouri, M., Qjidaa, H.: Robust image encryption and zero-watermarking scheme using SCA and modified logistic map. Expert Sys. Appl. 190, 116193 (2022)
Fang, P., Liu, H., Wu, C., Liu, M.: A survey of image encryption algorithms based on chaotic system. Vis. Comput. (2022). https://doi.org/10.1007/s00371-022-02459-5
Feng, W., He, Y., Li, H., Li, C.: Cryptanalysis and improvement of the image encryption scheme based on 2D Logistic-adjusted-Sine map. IEEE Access 7, 12584–12597 (2019)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8, 1259–1284 (1998)
Hu, G., Li, B.: A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn. 103, 2819–2840 (2021)
Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)
Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2019)
Huang, X., Ye, G.: An image encryption algorithm based on irregular wave representation. Multimed Tools Appl. 77, 2611–2628 (2018)
Jiang, N., Dong, X., Hu, H., Ji, Z., Zhang, W.: Quantum image encryption based on Henon mapping. Int. J. Theor. Phy. 58, 979–991 (2019)
Li, M., Xu, M., Luo, J., Fan, H.: Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach. IEEE Access 7, 63336–63345 (2019)
Lorenz, E.N.: Nondeterministic theories of climatic change. Quatern. Res. 6, 495–506 (1976)
Murali, P., Niranjana, G., Paul, A.J., Muthu, J.S.: Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis. Comput. (2022). https://doi.org/10.1007/s00371-021-02384-z
Nkandeu, Y.P.K., Tiedeu, A.: An image encryption algorithm based on substitution technique and chaos mixing. Multimed. Tools Appl. 78, 10013–10034 (2019)
Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129–137 (2017)
Panwar, K., Purwar, R.K., Jain, A.: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps. Int. J. Bifurc. Chaos 29(8), 1950103 (2019)
Rakheja, P., Vig, R., Singh, P.: Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition. Opt. Quant. Electr. 52, 103 (2020)
Shannon, C.E.: Communication theory of secrecy systems. Bell Sys. Tech. J. 28, 656–715 (1949)
Talhaoui, M.Z., Wang, X., Midoun, M.A.: A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. 37, 541–551 (2021)
Wang, X., Chen, S., Zhang, Y.: A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Tech. 138, 106837 (2021)
Wu, J., Liao, X., Yang, B.: Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process. 153, 11–23 (2018)
Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 37, 24–39 (2015)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 1, 31–38 (2011)
Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 450, 361–377 (2018)
Zhang, Y., Chen, A., Tang, Y., Dang, J., Wang, G.: Plaintext-related image encryption algorithm based on perceptron-like network. Inf. Sci. 526, 180–202 (2020)
Zhang, Y., Jia, X.: The fast image encryption algorithm based on substitution and diffusion. KSII Trans. Internet Inf. Syst. 12, 4487–4511 (2018)
Acknowledgements
This work was fully supported by National Natural Science Foundation of China (No. 61762043), Natural Science Foundation of Jiangxi Province (No. 20192BAB207022), and Scientific Research Foundation of Jiangxi Provincial Education Department (No. GJJ190249, GJJ210507).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, Y. A unified image cryptography based on a perceptron-like network. Vis Comput 39, 4985–5000 (2023). https://doi.org/10.1007/s00371-022-02641-9
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00371-022-02641-9