A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation

  • Jawad Ahmad
  • Muazzam Ali Khan
  • Fawad Ahmed
  • Jan Sher Khan
Original Article

Abstract

Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.’s scheme to fulfill essential needs of a secure image encryption algorithm. The proposed cryptosystem is resistant against many attacks like brute force, differential and statistical. To quantify the quality of the proposed scheme, instead of visual inspection, the proposed scheme is analyzed through various tests, such as correlation coefficient, information entropy, Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI). Simulation results of the presented scheme shows good diffusion characteristics when compared to other traditional schemes.

Keywords

Image encryption Security efficiency Entropy DCT NPCR UACI 

References

  1. 1.
    Jakimoski G, Subbalakshmi K (2008) Cryptanalysis of some multimedia encryption schemes. IEEE Trans Multimed 10(3):330–338CrossRefGoogle Scholar
  2. 2.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351CrossRefGoogle Scholar
  3. 3.
    Elashry IE (2010) Digital image encryption. MS thesis, Department of computer science and engineering, Faculty of electronic engineering, Menofia UniversityGoogle Scholar
  4. 4.
    Ahmed J, Hwang SO A fast encryption/decryption scheme for biometric images using multiple chaotic maps. In: IMTIC’15–international multi-topic conference. p 104Google Scholar
  5. 5.
    Zhang YQ, Wang XY (2014) Spatiotemporal chaos in mixed linear–nonlinear coupled logistic map lattice. Physica A: Statistical Mechanics and Its Applications 402:104–118MathSciNetCrossRefGoogle Scholar
  6. 6.
    Zeng W, Yu H, Lin C (2006) Multimedia security technologies for digital rights management. Academic PressGoogle Scholar
  7. 7.
    Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698CrossRefGoogle Scholar
  8. 8.
    Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn 62(3):615–621MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20CrossRefGoogle Scholar
  10. 10.
    Zhang YQ, Wang XY, Liu J, Chi ZL (2016) An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 82:95–103CrossRefGoogle Scholar
  11. 11.
    Schneier B (1996) Applied Cryptography. Wiley, USAMATHGoogle Scholar
  12. 12.
    Ahmad J (2010) Efficiency analysis and security evaluation of image encryption schemes. computing 23:25Google Scholar
  13. 13.
    Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research 7(1):1–8CrossRefGoogle Scholar
  14. 14.
    Chen Y, Chang L (2001) A secure and robust digital watermarking technique by the block cipher rc6 and secure hash algorithm. In: Proceedings of the 2001 international conference on image processing, 2001. IEEE, vol 2, pp 518–521Google Scholar
  15. 15.
    Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Computers & Mathematics with Applications 59(10):3320–3327MathSciNetCrossRefMATHGoogle Scholar
  16. 16.
    Liu H, Wang X, et al. (2012) Image encryption using dna complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466CrossRefGoogle Scholar
  17. 17.
    Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16):3895–3903CrossRefGoogle Scholar
  18. 18.
    Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18CrossRefGoogle Scholar
  19. 19.
    Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108MathSciNetCrossRefGoogle Scholar
  20. 20.
    Wang XY, Yu Q (2009) A block encryption algorithm based on dynamic sequences of multiple chaotic systems. Commun Nonlinear Sci Numer Simul 14(2):574–581MathSciNetCrossRefMATHGoogle Scholar
  21. 21.
    Wang X, Luan D (2013) A novel image encryption algorithm using chaos and reversible cellular automata. Commun Nonlinear Sci Numer Simul 18(11):3075–3085MathSciNetCrossRefMATHGoogle Scholar
  22. 22.
    Wang XY, Chen F, Wang T (2010) A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun Nonlinear Sci Numer Simul 15(9):2479–2485MathSciNetCrossRefMATHGoogle Scholar
  23. 23.
    Spanos G, Maples T (1995) Performance study of a selective encryption scheme for the security of networked, real-time video. In: icccn, p. 0002, Published by the IEEE computer society.Google Scholar
  24. 24.
    Shannon C (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MathSciNetCrossRefMATHGoogle Scholar
  25. 25.
    Lookabaugh T, Sicker D (2004) Selective encryption for consumer applications. IEEE Commun Mag 42 (5):124–129CrossRefGoogle Scholar
  26. 26.
    Ahmad J, Hwang SO, Ali A (2015) An experimental comparison of chaotic and non-chaotic image encryption schemes. Wirel Pers Commun 84(2):901–918CrossRefGoogle Scholar
  27. 27.
    Ahmad J, Hwang SO (2015) Chaos-based diffusion for highly autocorrelated data in encryption algorithms. Nonlinear Dyn 82(4):1839–1850MathSciNetCrossRefGoogle Scholar
  28. 28.
    Ahmad J, Hwang SO (2015) A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications:1–26Google Scholar
  29. 29.
    Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box 2015 6th international conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6Google Scholar
  30. 30.
    Bin Younas M, Ahmad J (2014) Comparative analysis of chaotic and non-chaotic image encryption schemes 2014 international conference on emerging technologies (ICET). IEEE, pp 81–86Google Scholar
  31. 31.
    Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26 (5):1137–1148CrossRefGoogle Scholar
  32. 32.
    Elashry I, Allah O, Abbas A, El-Rabaie S, El-Samie F (2009) Homomorphic image encryption. J Electron Imaging 18:033002CrossRefGoogle Scholar
  33. 33.
    Hussain I, Shah T, Gondal MA (2012) Image encryption algorithm based on pgl (2, gf (28)) s-boxes and td-ercs chaotic sequence. Nonlinear Dyn 70(1):181–187CrossRefGoogle Scholar
  34. 34.
    Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers NRSC 2005 Proceedings of the 22nd national radio science conference, 2005. IEEE, pp 277–284Google Scholar
  35. 35.
    Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566MathSciNetCrossRefGoogle Scholar
  36. 36.
    Wang X, Teng L (2012) An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn 67(1):365–371MathSciNetCrossRefGoogle Scholar
  37. 37.
    Gray R (2010) Entropy and information theory, Springer VerlagGoogle Scholar
  38. 38.
    Ahmed H, Kalash H, Allah O (2017) Implementation of RC5 block cipher algorithm for image cryptosystems. Int J Inf Technol 3(4):245–250Google Scholar
  39. 39.
    Ahmed F, Siyal M, Abbas V (2010) A perceptually scalable and jpeg compression tolerant image encryption scheme 2010 4th pacific-rim symposium on image and video technology (PSIVT). IEEE, pp 232–238Google Scholar
  40. 40.
    Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Pers Commun 77(4):2771–2791CrossRefGoogle Scholar
  41. 41.
    Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19(9):3106–3118MathSciNetCrossRefGoogle Scholar
  42. 42.
    Ahmad J, Khan MA, Hwang SO, Khan JS (2016) A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Comput & Applic:1–15Google Scholar
  43. 43.
    Khan JS, ur Rehman A, Ahmad J, Habib Z (2015) A new chaos-based secure image encryption scheme using multiple substitution boxes 2015 conference on information assurance and cyber security (CIACS). IEEE, pp 16–21Google Scholar
  44. 44.
    Jolfaei A, Mirghadri A (2010) Survey: image encryption using salsa20. Int J Comput Sci Issues 7(5)Google Scholar
  45. 45.
    Khan MA, Ahmad J, Javaid Q, Saqib NA (2016) An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. J Mod Opt:1–10Google Scholar
  46. 46.
    Khan JS, Ahmad J, Khan MA (2017) Td-ercs map-based confusion and diffusion of autocorrelated data. Nonlinear Dyn 87(1):93–107CrossRefGoogle Scholar
  47. 47.
    Mohamed A, Zaibi G, Kachouri A (2011) Implementation of rc5 and rc6 block ciphers on digital images 2011 8th international multi-conference on systems, signals and devices (SSD). IEEE, pp 1–6Google Scholar
  48. 48.
    Liehuang Z, Wenzhuo L, Lejian L, Hong L (2006) A novel image scrambling algorithm for digital watermarking based on chaotic sequences. Int J Comput Sci Netw Secur 6(8B):125– 130Google Scholar
  49. 49.
    Wang X, Wang Q (2014) A novel image encryption algorithm based on dynamic s-boxes constructed by chaos. Nonlinear Dyn 75(3):567–576CrossRefGoogle Scholar
  50. 50.
    Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear dyn 69(4):2079–2087MathSciNetCrossRefGoogle Scholar
  51. 51.
    Mao Y, Chen G (2005) Chaos-based image encryption. Handbook of Geometric Computing:231–265Google Scholar

Copyright information

© The Natural Computing Applications Forum 2017

Authors and Affiliations

  • Jawad Ahmad
    • 1
  • Muazzam Ali Khan
    • 2
  • Fawad Ahmed
    • 1
  • Jan Sher Khan
    • 3
  1. 1.Department of Electrical EngineeringHITEC University TaxilaTaxilaPakistan
  2. 2.Department of Computer EngineeringNational University of Sciences, TechnologyIslamabadPakistan
  3. 3.Department of Electrical EngineeringUniversity of GaziantepGaziantepTurkey

Personalised recommendations