Skip to main content
Log in

Image encryption with one-time password mechanism and pseudo-features

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

An image encryption algorithm based on chaotic sequence and permutation matrix is presented in this paper, with the ability to create pseudo-features and realize one-time password mechanism. Firstly, the original image and the matrix which containing incremental key information are operated with XOR by chaotic matrix constructed by Logistic model. Then it is embedded in a larger matrix with pseudo-features. Finally, the permutation matrix is used to shuffle the pixel position of the image to get the encrypted image. The simulation results and security analysis show that the encryption algorithm has the advantages of stable one-time password mechanism, strong capacity to resist various attacks and ability to create pseudo-features.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on dna encoding. Opt Laser Technol 95:94–99. https://doi.org/10.1016/j.optlastec.2017.04.022

    Article  Google Scholar 

  2. Akin E, Carlson JD (2012) Conceptions of topological transitivity. Topol Applic 159(12):2815–2830. https://doi.org/10.1016/j.topol.2012.04.016

    Article  MathSciNet  Google Scholar 

  3. Arroyo D, Diaz J, Rodriguez F (2013) Cryptanalysis of a one round chaosbased substitution permutation network. Signal Process 93 (5):1358–1364. https://doi.org/10.1016/j.sigpro.2012.11.019

    Article  Google Scholar 

  4. Artiles JA, Chaves DP, Pimentel C (2019) Image encryption using block cipher and chaotic sequences. Signal Process: Image Commun 79:24–31. https://doi.org/10.1016/j.image.2019.08.014

    Google Scholar 

  5. Bao L, Zhou Y (2015) Image encryption: generating visually meaningful encrypted images. Inform Sci 324:197–207. https://doi.org/10.1016/j.ins.2015.06.049

    Article  MathSciNet  Google Scholar 

  6. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 128:155–170. https://doi.org/10.1016/j.sigpro.2016.03.021

    Article  Google Scholar 

  7. Bianchi T, Piva A, Barni M (2009) On the implementation of the discrete fourier transform in the encrypted domain. IEEE Trans Inform Forens Secur 4 (1):86–97. https://ieeexplore.ieee.org/abstract/document/4768620

    Article  Google Scholar 

  8. Cao X, Du L, Wei X, Meng D, Guo X (2016) High capacity reversible data hiding in encrypted images by patch-level sparse representation. IEEE Trans Cybern 46(5):1132–1143. https://ieeexplore.ieee.org/abstract/document/7098386

    Article  Google Scholar 

  9. Curiac DI, Volosencu C (2014) A 2d chaotic path planning for mobile robots accomplishing boundary surveillance missions in adversarial conditions. Commun Nonlinear Sci Numer Simul 19(10):3617–3627. https://doi.org/10.1016/j.cnsns.2014.03.020

    Article  MathSciNet  Google Scholar 

  10. Dong C (2014) Color image encryption using one-time keys and coupled chaotic systems. Signal Process: Image Commun 29(5):628–640. https://doi.org/10.1016/j.image.2013.09.006

    Google Scholar 

  11. Elgendy F, Sarhan AM, Eltobely TE, El-Zoghdy SF, El-Sayed HS, Faragallah OS (2016) Chaos-based model for encryption and decryption of digital images. Multimed Tools Applic 75(18):11529–11553. https://link.springer.com/article/10.1007/s11042-015-2883-z

    Article  Google Scholar 

  12. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlin Dyn 83(3):1123–1136. https://link.springer.com/article/10.1007/s11071-015-2392-7

    Article  MathSciNet  Google Scholar 

  13. Hermassi H, Belazi A, Rhouma R, Belghith S (2014) Security analysis of an image encryption algorithm based on a dna addition combining with chaotic maps. Multimed Tools Applic 72(3):2211–2224. https://link.springer.com/article/10.1007/s11042-013-1533-6

    Article  Google Scholar 

  14. Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148–161. https://doi.org/10.1016/j.sigpro.2018.03.010

    Article  Google Scholar 

  15. Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and dna sequence. Multimed Tools Applic 72(1):57–70. shttps://link.springer.com/article/10.1007/s11042-012-1331-6

    Article  Google Scholar 

  16. Kalpana J, Murali PA (2015) An improved color image encryption based on multiple dna sequence operations with dna synthetic image and chaos. Optik 126(24):5703–5709. https://doi.org/10.1016/j.ijleo.2015.09.091

    Article  Google Scholar 

  17. Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation. Signal Process 118:203–210. https://doi.org/10.1016/j.sigpro.2015.07.008

    Article  Google Scholar 

  18. Li C, Li S, Chen G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a compound chaotic sequence. Image Vis Comput 27 (8):1035–1039. https://doi.org/10.1016/j.imavis.2008.09.004

    Article  Google Scholar 

  19. Liu Y, Tang J, Xie T (2014) Cryptanalyzing a rgb image encryption algorithm based on dna encoding and chaos map. Opt Laser Technol 60:111–115. https://doi.org/10.1016/j.optlastec.2014.01.015

    Article  Google Scholar 

  20. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Applic 59 (10):3320–3327. https://doi.org/10.1016/j.camwa.2010.03.017

    Article  MathSciNet  Google Scholar 

  21. Liu H, Wang X (2013) Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J Syst Softw 86(3):826–834. https://doi.org/10.1016/j.jss.2012.11.026

    Article  Google Scholar 

  22. Merah L, AliPacha A, Said NH, Mamat M (2013) A pseudo random number generator based on the chaotic system of Chua’s circuit, and its real time fpga implementation. Appl Math Sci 7(55):2719–2734. http://m-hikari.com/ams/ams-2013/ams-53-56-2013/mamatAMS53-56-2013.pdf

    MathSciNet  Google Scholar 

  23. Ozkaynak F, Ozer AB, Yavuz S (2012) Cryptanalysis of a novel image en- cryption scheme based on improved hyperchaotic sequences. Opt Commun 285(24):4946–4948. https://doi.org/10.1016/j.optcom.2012.07.106

    Article  Google Scholar 

  24. Quyen NX, Duong TQ, Vo NS, Xie Q, Shu L (2016) Chaotic directsequence spread-spectrum with variable symbol period: a technique for enhancing physical layer security. Comput Netw 109:4–12. https://doi.org/10.1016/j.comnet.2016.06.022. Special issue on Recent Advances in Physical-Layer Security

    Article  Google Scholar 

  25. Sarvabhatla M, Reddy MCM, Vorugunti CS (2015) A secure and light weight authentication service in hadoop using one time pad. Procedia Comput Sci 50:81–86. https://doi.org/10.1016/j.procs.2015.04.064

    Article  Google Scholar 

  26. Sokouti M, Sokouti B (2018) A prisma-compliant systematic review and analysis on color image encryption using dna properties. Comput Sci Rev 29:14–20. https://doi.org/10.1016/j.cosrev.2018.05.002

    Article  Google Scholar 

  27. Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232–236. https://doi.org/10.1016/j.optcom.2009.09.070Get

    Article  Google Scholar 

  28. Stöckmann H-J (2000) Quantum chaos: an introduction, https://doi.org/10.1119/1.19544

  29. Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202

    Article  MathSciNet  Google Scholar 

  30. Tuna M, Alçın M, Koyuncu İ, Fidan CB, Pehlivan İ (2019) High speed fpga-based chaotic oscillator design. Microprocess Microsyst 66:72–80. https://doi.org/10.1016/j.micpro.2019.02.012

    Article  Google Scholar 

  31. Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on sha-3 and multiple chaotic systems. Opt Lasers Eng 103:1–8. https://doi.org/10.1016/j.optlaseng.2017.11.009

    Article  Google Scholar 

  32. Wang X, Zhu X, Wu X, Zhang Y (2018) Image encryption algorithm based on multiple mixed hash functions and cyclic shift. Opt Lasers Eng 107:370–379. https://doi.org/10.1016/j.optlaseng.2017.06.015

    Article  Google Scholar 

  33. Wong KW (2002) A fast chaotic cryptographic scheme with dynamic look-up table. Phys Lett A 298(4):238–242. https://doi.org/10.1016/S0375-9601(02)00431-0

    Article  MathSciNet  Google Scholar 

  34. Wu Y (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals: Journal of Selected Areas in Telecommunications

  35. Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image dna encryption using nca map-based cml and one-time keys. Signal Process 148:272–287. https://doi.org/10.1016/j.sigpro.2018.02.028

    Article  Google Scholar 

  36. Wu L, Zhang J, Deng W, He D (2009) Arnold transformation algorithm and anti-arnold transformation algorithm. In: 2009 First international conference on information science and engineering. IEEE, pp 1164– 1167. https://doi.org/10.4304/jmm.6.2.107-114

  37. Zeng L, Liu R (2015) Cryptanalyzing a novel couple images encryption algorithm based on dna subsequence operation and chaotic system. Optik 126(24):5022–5025. https://doi.org/10.1016/j.ijleo.2015.09.219

    Article  Google Scholar 

  38. Zhang Y, Li Y, Wen W, Wu Y, Chen J x (2015) Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlin Dyn 82(4):1831–1837. https://link.springer.com/article/10.1007/s11071-015-2280-1

    Article  MathSciNet  Google Scholar 

  39. Zhang LY, Zhang Y, Liu Y, Yang A, Chen G (2017) Security analysis of some diffusion mechanisms used in chaotic ciphers. Int J Bifur Chaos 27 (10):1750155. https://doi.org/10.1142/S0218127417501553

    Article  MathSciNet  Google Scholar 

  40. Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Process 97:172–182. https://doi.org/10.1016/j.sigpro.2013.10.034

    Article  Google Scholar 

  41. Zhou N, Pan S, Cheng S, Zhou Z (2016) Image compression–encryption scheme based on hyper-chaotic system and 2d compressive sensing. Opt Laser Technol 82:121–133. https://doi.org/10.1016/j.optlastec.2016.02.018

    Article  Google Scholar 

Download references

Acknowledgements

Thanks are due to Liqiang Chen(Zhejiang Normal University) for valuable discussion.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuefeng Lu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lu, Y., Yu, K. & Lv, X. Image encryption with one-time password mechanism and pseudo-features. Multimed Tools Appl 80, 15041–15055 (2021). https://doi.org/10.1007/s11042-021-10522-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10522-x

Keywords

Navigation