Skip to main content
Log in

An ASCII based effective and multi-operation image encryption method

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The main challenge for American Standard Code for Information Interchange (ASCII) based image encryption methods is to increase security with less computational cost. Earlier, well known image encryption techniques are not only deficient in performance but also lacked in embedding of confidential data in an image using ASCII based methods. Therefore, this study aims to contribute an ASCII based efficient and secure image encryption method having additional feature of embedding confidential data in an image. Moreover, the embedding process is not static but it is dynamic as compared to the existing work. The novelty of proposed method encompasses optimal security, effective encryption speed and randomized embedding of secret data in an image even of having multi-operations. The proposed method was evaluated experimentally with variety of tests such as Pixel correlation analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Histogram, Entropy, Peak Signal to Noise Ratio (PSNR), and Mean Square Error (MSE) including encryption decryption time. Thus the experimental results show that the proposed method is optimally secure and outperformed in image encryption as well as in randomized embedding of confidential data than the existing techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Abdullah AH, Enayatifar R, Lee M (2012) A hybrid genetic algorithm and chaotic function model for image encryption. AEU Int J Electron Commun 66(10):806–816

    Google Scholar 

  2. Alsmirat MA, Al-Alem F, Al-Ayyoub M, Jararweh Y, Gupta B (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78(3):3649–3688

    Google Scholar 

  3. Aqeel-ur-Rehman XL, Hahsmi MA, Haider R (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117–134

    Google Scholar 

  4. Belazi A, Khan M, El-Latif AAA (2017) Belghith. Efficient cryptosystem approaches: S-boxes and permutation substitution-based encryption Nonlinear Dyn 88:337–362

    Google Scholar 

  5. Chai HL (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76:1159–1175

    Google Scholar 

  6. Dhiman, R., & Singh, B.: Encryption of decomposed image by using ASCII code based carrier signal. (2017).

  7. Enayatifar R, Abdullah AH, Lee M (2013) A weighted discrete imperialist competitive algorithm (wdica) combined with chaotic map for image encryption. Opt Lasers Eng 51(9):1066–1077

    Google Scholar 

  8. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    Google Scholar 

  9. Enayatifar R, Sadaei HJ, Abdullah AH, MalreyLee IFI (2015) A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata. Opt Lasers Eng. 71:33–41

    Google Scholar 

  10. Eom S, Huh JH (2018) The opening capability for security against privacy infringements in the smart grid environment. Mathematics 6(10):202

    Google Scholar 

  11. Eom, S., & Huh, J. H. (2018). Group signature with restrictive linkability: minimizing privacy exposure in ubiquitous environment. Journal of Ambient Intelligence and Humanized Computing, 1-11.

  12. Gayathri J, Subashini S (2018) A spatiotemporal chaotic image encryption scheme based on self-adaptive model and dynamic keystream fetching technique. Multimed Tools Appl 77(19):24751–24787

    Google Scholar 

  13. Gupta, B. B. (Ed.). (2018). Computer and cyber security: principles, algorithm, applications, and perspectives. CRC Press.

  14. Gupta, B., Agrawal, D. P., & Yamaguchi, S. (Eds.). (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global.

  15. Gurubaran BS, Devi NS, Subramanian ERS (2016) & Geophilus, D.:non-deterministic image encryption based on symmetric cryptosystem. Procedia Computer Science 93:791–798

    Google Scholar 

  16. Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective 25(4–6):162–179

    Google Scholar 

  17. https://www.mathworks.com/help/vision/ref/psnr.html

  18. Ibtihal M, Hassan N (2017) Homomorphic encryption as a service for outsourced images in mobile cloud computing environment. International Journal of Cloud Applications and Computing (IJCAC) 7(2):27–40

    Google Scholar 

  19. Ismail SM, Said LA, Radwan AG, Madian AH (2018) Generalized double-humped logistic map-based medical image encryption. J Adv Res 10:85–98

    Google Scholar 

  20. Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) light weight chaotic image encryption algorithm for real-time embedded system: implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12

    Google Scholar 

  21. Kaur, M., & Kumar, V.: Adaptive Differential Evolution-Based Lorenz Chaotic System for Image Encryption. Arabian Journal for Science and Engineering, 1–18. (2018).

  22. Khan JS, Khan MA, Ahmad J, Hwang SO, Ahmed W (2017) An improved image encryption scheme based on a non-linear chaotic algorithm and substitution boxes. Informatica 28(4):629–664

    Google Scholar 

  23. Li Y, Wang C, Chen H (2017b) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246. https://doi.org/10.1016/j.optlaseng.2016.10.020

  24. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90:2714–2722

    MATH  Google Scholar 

  25. Luo, Y., Yu, J., Lai, W., & Liu, L. (2019). A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimedia Tools and Applications, 1-21.

  26. Muhammad K, Hamza R, Ahmad J, Lloret J, Wang H, Baik SW (2018) Secure surveillance framework for IoT systems using probabilistic image encryption. IEEE Transactions on Industrial Informatics 14(8):3679–3689

    Google Scholar 

  27. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Google Scholar 

  28. Refregier P, Javidi B (1995) Optical image encryption based on input plane and Fourier plane random encoding. Opt Lett 20(7):767–769

    Google Scholar 

  29. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372(38):5973–5978

    MATH  Google Scholar 

  30. Sneha, P. S., Sankar, S., & Kumar, A. S. (2019). A chaotic colour image encryption scheme combining Walsh–Hadamard transform and Arnold–tent maps. Journal of Ambient Intelligence and Humanized Computing, 1-20.

  31. Song C-Y, Qiao Y-L, Zhang X-Z (2013) An image encryption scheme based on new spatiotemporal chaos. Optik 124:3329–3334

    Google Scholar 

  32. Sreelaja N, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895

    Google Scholar 

  33. Sun S, Guo Y, Wu R (2019) A novel plaintext-related image encryption algorithm based on stochastic signal insertion and block swapping. IEEE Access 7:123049–123060

    Google Scholar 

  34. Talarposhti KM, Jamie MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34

    Google Scholar 

  35. Tang J, Zhang F (2017) A new code-based encryption scheme and its applications. International Journal of High Performance Computing and Networking 10(6):515–523

    Google Scholar 

  36. Ullah A, Jamal SS, Shah T (2018) A novel scheme for image encryption using substitution box and chaotic system. Nonlinear Dynamics 91(1):359–370

    MathSciNet  Google Scholar 

  37. Usama M, Khan MK, Alghathbar K, Lee C (2010) Chaos-based secure satellite imagery cryptosystem. Comput.Math.Appl. 60(2):326–337

    MathSciNet  MATH  Google Scholar 

  38. Wang J, Wang C (2018) Full secure identity-based encryption scheme over lattices for wireless sensor networks in the standard model. International Journal of High Performance Computing and Networking 12(2):111–117

    Google Scholar 

  39. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Google Scholar 

  40. Wang X-Y, Sheng-Xian GU, Zhang Y-Q (2015) Novel image encryption algorithm based on cycle shift and chaotic systems. Opt Lasers Eng. 68:126–134

    Google Scholar 

  41. Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18

    Google Scholar 

  42. Wang XY, Wang SW, Zhang YQ, Guo K (2017) A novel image encryption algorithm based on chaotic shuffling method. Inf Secur J Glob Perspect 26(1):7–16

    Google Scholar 

  43. Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dynamics 95(4):2797–2824

    MATH  Google Scholar 

  44. Wen W (2016) Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order cnn against chosen-plaintext attack. Multimedia Tools Appl 75(6):3553–3560

    Google Scholar 

  45. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–38

    Google Scholar 

  46. Xu L, Lin Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Google Scholar 

  47. Yavuz E, Yazıcı R, Kasapbası MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Google Scholar 

  48. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks 9(13):2015–2023

    Google Scholar 

  49. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Google Scholar 

  50. Zhang Y (2018) The uified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377

    Google Scholar 

  51. Zhang J, Gao H (2019) A compact construction for non-monotonic key-policy attribute-based encryption. International Journal of High Performance Computing and Networking 13(3):321–330

    Google Scholar 

  52. Zhang X, Wang C, Zheng Z (2017) An efficient chaotic image encryption algorithm based on self-adaptive model and feedback mechanism. KSII Transactions on Internet & Information Systems 11(3)

  53. Zhou N, Zhang A, Zheng F, Gong L (2014) Novel image compression-encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Opt Laser Technol 62:152–160

    Google Scholar 

  54. Zhu H, Zhao C, Zhang X, Yang L (2014) An image encryption scheme using generalized Arnold map and affine cipher. Optik 125:6672–6677

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Umer Iqbal.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A

figure a

Appendix B

figure b

Appendix C

figure c

Appendix D

figure d

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Naz, F., Shoukat, I.A., Ashraf, R. et al. An ASCII based effective and multi-operation image encryption method. Multimed Tools Appl 79, 22107–22129 (2020). https://doi.org/10.1007/s11042-020-08897-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08897-4

Keywords

Navigation