Abstract
Transmission and sharing of multimedia data have drastically increased in the last few years due to the availability of low-cost image capturing devices, development of communication technology, and the popularity of social networks. However several security fissure of a public network such as the Internet has made the jobs of eavesdroppers easy to grab the contents without any impediment. Well-known cipher techniques like DES, AES, RSA can be used to encrypt an image. But, due to the huge volume and high correlation of image data, a lightweight image encryption method is important. Permutation-based encryption methods disrupt the correlation and can act well with huge volumes. Chaos theory is proved to generate pseudo-random sequences and is extensively used to define permutation. A wide range of image encryption proposals based on the permutation defined by the chaotic map is found in the literature. Several non-chaotic techniques are also gaining popularity for defining a permutation. An image encryption proposal based on a non-chaotic method is presented in this current communication. The permutation is defined by the modified Regula-Falsi method and image encryption is achieved by pixel value substitution and iterative addition with the cyclic shift. As the result of the proposed method, fully noisy images are obtained. Security analysis has proved immunity against different attacks. Comparison with state-of-the-art methods has established the applicability of the proposed technique in image encryption.
Similar content being viewed by others
References
Chen J-x, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Communications in Nonlinear Science and Numerical Simulation 23(1–3):294–310
Arab A, Rostami MJ, Ghavami B (2019) An image encryption method based on chaos system and aes algorithm. The Journal of Supercomputing 75(10):6663–6682
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image and Vision Computing 24(9):926–934
Bourbakis N, Alexopoulos C (1992) Picture data encryption using scan patterns. Pattern Recognition 25(6):567–581
Kuo CJ (1993) Novel image encryption technique and its application in progressive transmission. Journal of Electronic Imaging 2(4):345–352
Li X, Knipe J, Cheng H (1997) Image compression and encryption using tree structures. Pattern Recognition Letters 18(11–13):1253–1259
Chang HK-C, Liu J-L (1997) A linear quadtree compression scheme for image encryption. Signal Processing: Image Communication 10(4):279–290
Refregier P, Javidi B (1995) Optical image encryption based on input plane and fourier plane random encoding. Optics Letters 20(7):767–769
Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and chaos 8(06):1259–1284
Sathishkumar G, Srinivas R, Bagan KB (2012) Image encryption using random pixel permutation by chaotic mapping. In: 2012 IEEE symposium on computers & informatics (ISCI). IEEE, pp 247–251
Zhang X, Zhao Z (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dynamics 75(1–2):319–330
Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Physics Letters A 372(4):394–400
Li H, Wang Y, Yan H, Li L, Li Q, Zhao X (2013) Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transform. Optics and Lasers in Engineering 51(12):1327–1331
Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Optics and Lasers in Engineering 90:238–246
Solak E, Çokal C, Yildiz OT, Biyikoğlu T (2010) Cryptanalysis of fridrich’s chaotic image encryption. International Journal of Bifurcation and Chaos 20(05):1405–1413
Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dynamics 71(1–2):25–34
Teng L, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications 77(6):6883–6896
Zhang W, Yu H, Zhao Y-l, Zhu Z-l (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Processing 118:36–50
Diaconu A-V (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Information Sciences 355:314–327
Sun S (2018) A novel hyperchaotic image encryption scheme based on dna encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics Journal 10(2):1–14
Ping P, Fan J, Mao Y, Xu F, Gao J (2018) A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6:67581–67593
Shahna K, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162
Idrees B, Zafar S, Rashid T, Gao W (2019) Image encryption algorithm using s-box and dynamic hénon bit level permutation. Multimed Tools Appl: 1–28
Biswas P, Kandar S, Dhara BC (2017) A novel image encryption technique using one dimensional chaotic map and circular shift technique. In: Proceedings of the 6th international conference on software and computer applications. pp 112–116
Zhu Z-l, Zhang W, Wong K-w, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences 181(6):1171–1186
Zhou Y, Cao W, Chen CP (2014) Image encryption using binary bitplane. Signal Processing 100:197–207
Wang P, Qiu J (2019) An adaptive image encryption scheme based on bit-level permutation. In: Proceedings of the international conference on artificial intelligence. Information Processing and Cloud Computing, pp 1–5
Borujeni SE, Eshghi M (2013) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. Telecommunication Systems 52(2):525–537
Hua Z, Zhou Y, Pun C-M, Chen CP (2015) 2d sine logistic modulation map for image encryption. Information Sciences 297:80–94
Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Information Sciences 450:361–377
Çavuşoğlu Ü, Kaçar S, Pehlivan I (2017) Zengin A Secure image encryption algorithm design using a novel chaos based s-box. Chaos, Solitons & Fractals 95:92–101
Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dynamics 76(2):1355–1363
Liu Y, Tong X, Ma J (2016) Image encryption algorithm based on hyper-chaotic system and dynamic s-box. Multimedia Tools and Applications 75(13):7739–7759
Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dyn: 1–24
Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access
Mousavi M, Sadeghiyan B (2021) A new image encryption scheme with feistel like structure using chaotic s-box and rubik cube based p-box. Multimedia Tools and Applications 80(9):13157–13177
Laiphrakpam DS, Khumanthem MS (2017) Medical image encryption based on improved elgamal encryption technique. Optik 147:88–102
Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Processing 144:134–144
Cao W, Zhou Y, Chen CP, Xia L (2017) Medical image encryption using edge maps. Signal Processing 132:96–109
Nematzadeh H, Enayatifar R, Motameni H, Guimarães FG, Coelho VN (2018) Medical image encryption using a hybrid model of modified genetic algorithm and coupled map lattices. Optics and Lasers in Engineering 110:24–32
Chai X, Zhang J, Gan Z, Zhang Y (2019) Medical image encryption algorithm based on latin square and memristive chaotic system. Multimedia Tools and Applications 78(24):35419–35453
Thakur S, Singh A, Kumar B, Ghrera S (2020) Improved dwt-svd-based medical image watermarking through hamming code and chaotic encryption. In: Advances in VLSI, communication, and signal processing. Springer, pp 897–905
Jeevitha S, Prabha NA (2021) Novel medical image encryption using dwt block-based scrambling and edge maps. Journal of Ambient Intelligence and Humanized Computing 12(3):3373–3388
Ravichandran D, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid dna computing and chaos in transform domain. Medical & Biological Engineering & Computing 59(3):589–605
Babaei A, Motameni H, Enayatifar R (2020) A new permutation-diffusion-based image encryption technique using cellular automata and dna sequence. Optik 203:164000
Enayatifar R, Guimarães FG, Siarry P (2019) Index-based permutation-diffusion in multiple-image encryption using dna sequence. Optics and Lasers in Engineering 115:131–140
Azimi Z, Ahadpour S (2019) Color image encryption based on dna encoding and pair coupled chaotic maps. Multimed Tools Appl: 1–18
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dynamics 83(3):1123–1136
Kaur M, Singh D, Sun K, Rawat U (2020) Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5d chaotic map. Futur Gener Comput Syste
Chen J-x, Zhu Z-l, Fu C, Yu H, Zhang L-b (2015) An efficient image encryption scheme using gray code based permutation approach. Optics and Lasers in Engineering 67:191–204
Sinha RK, Agrawal I, Jain K, Gupta A, Sahu S (2020) Image encryption using modified rubik’s cube algorithm. In: Advances in computational intelligence. Springer, pp 69–78
Vidhya R, Brindha M (2020) A chaos based image encryption algorithm using rubik’s cube and prime factorization process (cierpf). J King Saud Univ-Comput Inf Sci
Das SK, Dhara BC (2017) A new image encryption method using circle. In: 2017 8th International conference on computing, communication and networking technologies (ICCCNT). IEEE, pp 1–6
Priya A, Sinha K, Darshani MP, Sahana SK (2019) A novel multimedia encryption and decryption technique using binary tree traversal. In: Proceeding of the second international conference on microelectronics, computing & communication systems (MCCS 2017). Springer, pp 163–178
Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. Journal of Information Security and Applications 44:117–129
Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimedia Tools and Applications 79(43):31715–31738
Rukhin A, Soto J, Nechvatal J, Smid M, Barker E (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep, Booz-allen and hamilton inc mclean va
Brown RG, Eddelbuettel D, Bauer D (2018) Dieharder Duke University Physics Department Durham, NC 27708–0305
Kumar CM, Vidhya R, Brindha M (2021) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell: 1–30
Author information
Authors and Affiliations
Corresponding author
Additional information
CTAN.
Rights and permissions
About this article
Cite this article
Paul, A., Kandar, S. & Dhara, B.C. Image encryption using permutation generated by modified Regula-Falsi method. Appl Intell 52, 10979–10998 (2022). https://doi.org/10.1007/s10489-021-03063-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10489-021-03063-1