Skip to main content
Log in

A unified image cryptography based on a perceptron-like network

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

Image encryption is the core technology of secure storage and transmission of image information. Based on a perceptron-like network of integer domain, a new unified image encryption algorithm is proposed. Its encryption algorithm and decryption algorithm are the same, both including an exclusive-or module, two types of perceptron-like networks and a sequence-flip module. The image data are diffused and encrypted by the forward propagation algorithm of neural network, and the historical data of the image are memorized and updated by the backward propagation algorithm of the network. The unified image cryptosystem uses a 512-bit key with the encryption speed up to 13.794Mbps on the computer equipped with an i7-9750H CPU. The maximum relative error of each system sensitivity index is less than 0.1%. The system requires the pseudorandom numbers by only half the size of the image. Simulated tests and comparative analyses show that the unified image cryptosystem possesses excellent characteristics of high speed and strong security strength. The proposed system can be used as a candidate safety method for network image information security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process. 143, 122–133 (2018)

    Article  Google Scholar 

  2. Chai, X., Gan, Z., Yuan, K., Chen, Y., Liu, X.: A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput. Appl. 31, 219–237 (2019)

    Article  Google Scholar 

  3. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  4. Chen, J., Han, F., Qian, W., Yao, Y., Zhu, Z.: Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn. 93, 2399–2413 (2018)

    Article  Google Scholar 

  5. Daoui, A., Karmouni, H., El Ogri, O., Sayyouri, M., Qjidaa, H.: Robust image encryption and zero-watermarking scheme using SCA and modified logistic map. Expert Sys. Appl. 190, 116193 (2022)

    Article  Google Scholar 

  6. Fang, P., Liu, H., Wu, C., Liu, M.: A survey of image encryption algorithms based on chaotic system. Vis. Comput. (2022). https://doi.org/10.1007/s00371-022-02459-5

    Article  Google Scholar 

  7. Feng, W., He, Y., Li, H., Li, C.: Cryptanalysis and improvement of the image encryption scheme based on 2D Logistic-adjusted-Sine map. IEEE Access 7, 12584–12597 (2019)

    Article  Google Scholar 

  8. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8, 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  9. Hu, G., Li, B.: A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn. 103, 2819–2840 (2021)

    Article  Google Scholar 

  10. Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  11. Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2019)

    Article  Google Scholar 

  12. Huang, X., Ye, G.: An image encryption algorithm based on irregular wave representation. Multimed Tools Appl. 77, 2611–2628 (2018)

    Article  Google Scholar 

  13. Jiang, N., Dong, X., Hu, H., Ji, Z., Zhang, W.: Quantum image encryption based on Henon mapping. Int. J. Theor. Phy. 58, 979–991 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  14. Li, M., Xu, M., Luo, J., Fan, H.: Cryptanalysis of an image encryption using 2D Henon-Sine map and DNA approach. IEEE Access 7, 63336–63345 (2019)

    Article  Google Scholar 

  15. Lorenz, E.N.: Nondeterministic theories of climatic change. Quatern. Res. 6, 495–506 (1976)

    Article  Google Scholar 

  16. Murali, P., Niranjana, G., Paul, A.J., Muthu, J.S.: Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis. Comput. (2022). https://doi.org/10.1007/s00371-021-02384-z

    Article  Google Scholar 

  17. Nkandeu, Y.P.K., Tiedeu, A.: An image encryption algorithm based on substitution technique and chaos mixing. Multimed. Tools Appl. 78, 10013–10034 (2019)

    Article  Google Scholar 

  18. Pak, C., Huang, L.: A new color image encryption using combination of the 1D chaotic map. Signal Process. 138, 129–137 (2017)

    Article  Google Scholar 

  19. Panwar, K., Purwar, R.K., Jain, A.: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps. Int. J. Bifurc. Chaos 29(8), 1950103 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  20. Rakheja, P., Vig, R., Singh, P.: Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition. Opt. Quant. Electr. 52, 103 (2020)

    Article  Google Scholar 

  21. Shannon, C.E.: Communication theory of secrecy systems. Bell Sys. Tech. J. 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  22. Talhaoui, M.Z., Wang, X., Midoun, M.A.: A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis. Comput. 37, 541–551 (2021)

    Article  Google Scholar 

  23. Wang, X., Chen, S., Zhang, Y.: A chaotic image encryption algorithm based on random dynamic mixing. Opt. Laser Tech. 138, 106837 (2021)

    Article  Google Scholar 

  24. Wu, J., Liao, X., Yang, B.: Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process. 153, 11–23 (2018)

    Article  Google Scholar 

  25. Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl. Soft Comput. 37, 24–39 (2015)

    Article  Google Scholar 

  26. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 1, 31–38 (2011)

    Google Scholar 

  27. Zhang, Y.: The unified image encryption algorithm based on chaos and cubic S-Box. Inf. Sci. 450, 361–377 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  28. Zhang, Y., Chen, A., Tang, Y., Dang, J., Wang, G.: Plaintext-related image encryption algorithm based on perceptron-like network. Inf. Sci. 526, 180–202 (2020)

    Article  MathSciNet  Google Scholar 

  29. Zhang, Y., Jia, X.: The fast image encryption algorithm based on substitution and diffusion. KSII Trans. Internet Inf. Syst. 12, 4487–4511 (2018)

    Google Scholar 

Download references

Acknowledgements

This work was fully supported by National Natural Science Foundation of China (No. 61762043), Natural Science Foundation of Jiangxi Province (No. 20192BAB207022), and Scientific Research Foundation of Jiangxi Provincial Education Department (No. GJJ190249, GJJ210507).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Zhang.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y. A unified image cryptography based on a perceptron-like network. Vis Comput 39, 4985–5000 (2023). https://doi.org/10.1007/s00371-022-02641-9

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-022-02641-9

Keywords

Navigation