Skip to main content
Log in

Image encryption using permutation generated by modified Regula-Falsi method

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Transmission and sharing of multimedia data have drastically increased in the last few years due to the availability of low-cost image capturing devices, development of communication technology, and the popularity of social networks. However several security fissure of a public network such as the Internet has made the jobs of eavesdroppers easy to grab the contents without any impediment. Well-known cipher techniques like DES, AES, RSA can be used to encrypt an image. But, due to the huge volume and high correlation of image data, a lightweight image encryption method is important. Permutation-based encryption methods disrupt the correlation and can act well with huge volumes. Chaos theory is proved to generate pseudo-random sequences and is extensively used to define permutation. A wide range of image encryption proposals based on the permutation defined by the chaotic map is found in the literature. Several non-chaotic techniques are also gaining popularity for defining a permutation. An image encryption proposal based on a non-chaotic method is presented in this current communication. The permutation is defined by the modified Regula-Falsi method and image encryption is achieved by pixel value substitution and iterative addition with the cyclic shift. As the result of the proposed method, fully noisy images are obtained. Security analysis has proved immunity against different attacks. Comparison with state-of-the-art methods has established the applicability of the proposed technique in image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Chen J-x, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation 23(1–3):294–310

    Article  MathSciNet  MATH  Google Scholar 

  2. Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. The Journal of Supercomputing 75(10):6663–6682

    Article  Google Scholar 

  3. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image and Vision Computing 24(9):926–934

    Article  Google Scholar 

  4. Bourbakis N, Alexopoulos C (1992) Picture data encryption using scan patterns. Pattern Recognition 25(6):567–581

    Article  Google Scholar 

  5. Kuo CJ (1993) Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging 2(4):345–352

    Article  Google Scholar 

  6. Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures. Pattern Recognition Letters 18(11–13):1253–1259

    Article  Google Scholar 

  7. Chang HK-C, Liu J-L (1997) A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication 10(4):279–290

    Google Scholar 

  8. Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Optics Letters 20(7):767–769

    Article  Google Scholar 

  9. Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  10. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  11. Sathishkumar G, Srinivas R, Bagan KB (2012) Image encryption using random pixel permutation by chaotic mapping. In: 2012 IEEE symposium on computers & informatics (ISCI). IEEE, pp 247–251

  12. Zhang X, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics 75(1–2):319–330

    Article  Google Scholar 

  13. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Physics Letters A 372(4):394–400

    Article  MATH  Google Scholar 

  14. Li H, Wang Y, Yan H, Li L, Li Q, Zhao X (2013) Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Optics and Lasers in Engineering 51(12):1327–1331

    Article  Google Scholar 

  15. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering 90:238–246

    Article  Google Scholar 

  16. Solak E, Çokal C, Yildiz OT, Biyikoğlu T (2010) Cryptanalysis of fridrich’s chaotic image encryption. International Journal of Bifurcation and Chaos 20(05):1405–1413

    Article  MathSciNet  MATH  Google Scholar 

  17. Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dynamics 71(1–2):25–34

    Article  MathSciNet  Google Scholar 

  18. Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications 77(6):6883–6896

    Article  Google Scholar 

  19. Zhang W, Yu H, Zhao Y-l, Zhu Z-l (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Processing 118:36–50

    Article  Google Scholar 

  20. Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Information Sciences 355:314–327

    Article  Google Scholar 

  21. Sun S (2018) A novel hyperchaotic image encryption scheme based on dna encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics Journal 10(2):1–14

    Google Scholar 

  22. Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581–67593

    Article  Google Scholar 

  23. Shahna K, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162

    Article  Google Scholar 

  24. Idrees B, Zafar S, Rashid T, Gao W (2019) Image encryption algorithm using s-box and dynamic hénon bit level permutation. Multimed Tools Appl: 1–28

  25. Biswas P, Kandar S, Dhara BC (2017) A novel image encryption technique using one dimensional chaotic map and circular shift technique. In: Proceedings of the 6th international conference on software and computer applications. pp 112–116

  26. Zhu Z-l, Zhang W, Wong K-w, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences 181(6):1171–1186

    Article  Google Scholar 

  27. Zhou Y, Cao W, Chen CP (2014) Image encryption using binary bitplane. Signal Processing 100:197–207

    Article  Google Scholar 

  28. Wang P, Qiu J (2019) An adaptive image encryption scheme based on bit-level permutation. In: Proceedings of the international conference on artificial intelligence. Information Processing and Cloud Computing, pp 1–5

  29. Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems 52(2):525–537

    Google Scholar 

  30. Hua Z, Zhou Y, Pun C-M, Chen CP (2015) 2d sine logistic modulation map for image encryption. Information Sciences 297:80–94

    Article  Google Scholar 

  31. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Information Sciences 450:361–377

    Article  MathSciNet  MATH  Google Scholar 

  32. Çavuşoğlu Ü, Kaçar S, Pehlivan I (2017) Zengin A Secure image encryption algorithm design using a novel chaos based s-box. Chaos, Solitons & Fractals 95:92–101

    Article  MATH  Google Scholar 

  33. Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dynamics 76(2):1355–1363

    Article  Google Scholar 

  34. Liu Y, Tong X, Ma J (2016) Image encryption algorithm based on hyper-chaotic system and dynamic s-box. Multimedia Tools and Applications 75(13):7739–7759

    Article  Google Scholar 

  35. Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn: 1–24

  36. Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access

  37. Mousavi M, Sadeghiyan B (2021) A new image encryption scheme with feistel like structure using chaotic s-box and rubik cube based p-box. Multimedia Tools and Applications 80(9):13157–13177

    Article  Google Scholar 

  38. Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved elgamal encryption technique. Optik 147:88–102

    Article  Google Scholar 

  39. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Processing 144:134–144

    Article  Google Scholar 

  40. Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Processing 132:96–109

    Article  Google Scholar 

  41. Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Optics and Lasers in Engineering 110:24–32

    Article  Google Scholar 

  42. Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on latin square and memristive chaotic system. Multimedia Tools and Applications 78(24):35419–35453

    Article  Google Scholar 

  43. Thakur S, Singh A, Kumar B, Ghrera S (2020) Improved dwt-svd-based medical image watermarking through hamming code and chaotic encryption. In: Advances in VLSI, communication, and signal processing. Springer, pp 897–905

  44. Jeevitha S, Prabha NA (2021) Novel medical image encryption using dwt block-based scrambling and edge maps. Journal of Ambient Intelligence and Humanized Computing 12(3):3373–3388

    Article  Google Scholar 

  45. Ravichandran D, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid dna computing and chaos in transform domain. Medical & Biological Engineering & Computing 59(3):589–605

    Article  Google Scholar 

  46. Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik 203:164000

    Article  Google Scholar 

  47. Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using dna sequence. Optics and Lasers in Engineering 115:131–140

    Article  Google Scholar 

  48. Azimi Z, Ahadpour S (2019) Color image encryption based on dna encoding and pair coupled chaotic maps. Multimed Tools Appl: 1–18

  49. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dynamics 83(3):1123–1136

    Article  MathSciNet  MATH  Google Scholar 

  50. Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5d chaotic map. Futur Gener Comput Syste

  51. Chen J-x, Zhu Z-l, Fu C, Yu H, Zhang L-b (2015) An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering 67:191–204

    Article  Google Scholar 

  52. Sinha RK, Agrawal I, Jain K, Gupta A, Sahu S (2020) Image encryption using modified rubik’s cube algorithm. In: Advances in computational intelligence. Springer, pp 69–78

  53. Vidhya R, Brindha M (2020) A chaos based image encryption algorithm using rubik’s cube and prime factorization process (cierpf). J King Saud Univ-Comput Inf Sci

  54. Das SK, Dhara BC (2017) A new image encryption method using circle. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1–6

  55. Priya A, Sinha K, Darshani MP, Sahana SK (2019) A novel multimedia encryption and decryption technique using binary tree traversal. In: Proceeding of the second international conference on microelectronics, computing & communication systems (MCCS 2017). Springer, pp 163–178

  56. Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. Journal of Information Security and Applications 44:117–129

    Article  Google Scholar 

  57. Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimedia Tools and Applications 79(43):31715–31738

    Article  Google Scholar 

  58. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep, Booz-allen and hamilton inc mclean va

  59. Brown RG, Eddelbuettel D, Bauer D (2018) Dieharder Duke University Physics Department Durham, NC 27708–0305

  60. Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell: 1–30

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shyamalendu Kandar.

Additional information

CTAN.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Paul, A., Kandar, S. & Dhara, B.C. Image encryption using permutation generated by modified Regula-Falsi method. Appl Intell 52, 10979–10998 (2022). https://doi.org/10.1007/s10489-021-03063-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-021-03063-1

Keywords

Navigation