Abstract
The main challenge for American Standard Code for Information Interchange (ASCII) based image encryption methods is to increase security with less computational cost. Earlier, well known image encryption techniques are not only deficient in performance but also lacked in embedding of confidential data in an image using ASCII based methods. Therefore, this study aims to contribute an ASCII based efficient and secure image encryption method having additional feature of embedding confidential data in an image. Moreover, the embedding process is not static but it is dynamic as compared to the existing work. The novelty of proposed method encompasses optimal security, effective encryption speed and randomized embedding of secret data in an image even of having multi-operations. The proposed method was evaluated experimentally with variety of tests such as Pixel correlation analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Histogram, Entropy, Peak Signal to Noise Ratio (PSNR), and Mean Square Error (MSE) including encryption decryption time. Thus the experimental results show that the proposed method is optimally secure and outperformed in image encryption as well as in randomized embedding of confidential data than the existing techniques.
Similar content being viewed by others
References
Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816
Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688
Aqeel-ur-Rehman XL, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117–134
Belazi A, Khan M, El-Latif AAA (2017) Belghith. Efficient cryptosystem approaches: S-boxes and permutation substitution-based encryption Nonlinear Dyn 88:337–362
Chai HL (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159–1175
Dhiman, R., & Singh, B.: Encryption of decomposed image by using ASCII code based carrier signal. (2017).
Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (wdica) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066–1077
Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93
Enayatifar R, Sadaei HJ, Abdullah AH, MalreyLee IFI (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng. 71:33–41
Eom S, Huh JH (2018) The opening capability for security against privacy infringements in the smart grid environment. Mathematics 6(10):202
Eom, S., & Huh, J. H. (2018). Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. Journal of Ambient Intelligence and Humanized Computing, 1-11.
Gayathri J, Subashini S (2018) A spatiotemporal chaotic image encryption scheme based on self-adaptive model and dynamic keystream fetching technique. Multimed Tools Appl 77(19):24751–24787
Gupta, B. B. (Ed.). (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press.
Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global.
Gurubaran BS, Devi NS, Subramanian ERS (2016) & Geophilus, D.:non-deterministic image encryption based on symmetric cryptosystem. Procedia Computer Science 93:791–798
Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 25(4–6):162–179
Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing (IJCAC) 7(2):27–40
Ismail SM, Said LA, Radwan AG, Madian AH (2018) Generalized double-humped logistic map-based medical image encryption. J Adv Res 10:85–98
Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) light weight chaotic image encryption algorithm for real-time embedded system: implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12
Kaur, M., & Kumar, V.: Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption. Arabian Journal for Science and Engineering, 1–18. (2018).
Khan JS, Khan MA, Ahmad J, Hwang SO, Ahmed W (2017) An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes. Informatica 28(4):629–664
Li Y, Wang C, Chen H (2017b) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246. https://doi.org/10.1016/j.optlaseng.2016.10.020
Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722
Luo, Y., Yu, J., Lai, W., & Liu, L. (2019). A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications, 1-21.
Muhammad K, Hamza R, Ahmad J, Lloret J, Wang H, Baik SW (2018) Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14(8):3679–3689
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769
Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978
Sneha, P. S., Sankar, S., & Kumar, A. S. (2019). A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–tent maps. Journal of Ambient Intelligence and Humanized Computing, 1-20.
Song C-Y, Qiao Y-L, Zhang X-Z (2013) An image encryption scheme based on new spatiotemporal chaos. Optik 124:3329–3334
Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895
Sun S, Guo Y, Wu R (2019) A novel plaintext-related image encryption algorithm based on stochastic signal insertion and block swapping. IEEE Access 7:123049–123060
Talarposhti KM, Jamie MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34
Tang J, Zhang F (2017) A new code-based encryption scheme and its applications. International Journal of High Performance Computing and Networking 10(6):515–523
Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dynamics 91(1):359–370
Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput.Math.Appl. 60(2):326–337
Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117
Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522
Wang X-Y, Sheng-Xian GU, Zhang Y-Q (2015) Novel image encryption algorithm based on cycle shift and chaotic systems. Opt Lasers Eng. 68:126–134
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Wang XY, Wang SW, Zhang YQ, Guo K (2017) A novel image encryption algorithm based on chaotic shuffling method. Inf Secur J Glob Perspect 26(1):7–16
Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dynamics 95(4):2797–2824
Wen W (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order cnn against chosen-plaintext attack. Multimedia Tools Appl 75(6):3553–3560
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38
Xu L, Lin Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25
Yavuz E, Yazıcı R, Kasapbası MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483
Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks 9(13):2015–2023
Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608
Zhang Y (2018) The uified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377
Zhang J, Gao H (2019) A compact construction for non-monotonic key-policy attribute-based encryption. International Journal of High Performance Computing and Networking 13(3):321–330
Zhang X, Wang C, Zheng Z (2017) An efficient chaotic image encryption algorithm based on self-adaptive model and feedback mechanism. KSII Transactions on Internet & Information Systems 11(3)
Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160
Zhu H, Zhao C, Zhang X, Yang L (2014) An image encryption scheme using generalized Arnold map and affine cipher. Optik 125:6672–6677
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A
Appendix B
Appendix C
Appendix D
Rights and permissions
About this article
Cite this article
Naz, F., Shoukat, I.A., Ashraf, R. et al. An ASCII based effective and multi-operation image encryption method. Multimed Tools Appl 79, 22107–22129 (2020). https://doi.org/10.1007/s11042-020-08897-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-020-08897-4