Skip to main content
Log in

A new image encryption method using Bezier curve

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the present age of information, images contain sensitive and confidential information. It is essential to protect confidential images from unauthorized access and modification. Image encryption is a well-accepted solution to this problem. In this article, we have proposed a non-chaotic image encryption method. This work defines a new type of scan pattern using Bezier curves. The curves are defined over the image space to i) access the pixels, ii) define the permutations, and iii) define the S-Boxes. The present method is faster and is efficient for any grayscale image. The current method is robust against different attacks. The proposed method is as efficient as state-of-the-art methods, and this indicates that the proposed work can be used as a module in various applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Algorithm 2
Algorithm 3
Fig. 4
Fig. 5
Algorithm 4
Algorithm 5
Algorithm 6
Algorithm 7
Fig. 6
Algorithm 8
Algorithm 9
Algorithm 10
Algorithm 11
Algorithm 12
Algorithm 13
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abbasi AA, Mazinani M, Hosseini R (2021) Evolutionary-based image encryption using biomolecules and non-coupled map lattice. Opt Laser Technol 140:106974

    Google Scholar 

  2. Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951–13976

    Google Scholar 

  3. Al-Maadeed TA, Hussain I, Anees A, Mustafa MT (2021) A image encryption algorithm based on chaotic lorenz system and novel primitive polynomial s-boxes. Multimed Tools Appl 1–22

  4. Biswas M, Das SK, Dhara BC (2021) An image encryption method using chaos and dna encoding. In: International Conference on Computational Intelligence in Communications and Business Analytics, pp 42–56. Springer

  5. Biswas P, Kandar S, Dhara BC (2020) An image encryption scheme using sequence generated by interval bisection of polynomial function. Multimed Tools Appl 1–24

  6. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using dna sequence operations. Opt Lasers Eng 88:197–213

    Google Scholar 

  7. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on dna sequence operations and chaotic systems. Neural Comput & Applic 31(1):219–237

    Google Scholar 

  8. Chen W (2016) Optical multiple-image encryption using three-dimensional space. IEEE Photonics J 8(2):1–8

    Google Scholar 

  9. Chen W (2016) Single-shot imaging without reference wave using binary intensity pattern for optically-secured-based correlation. IEEE Photonics J 8(1):1–9

    MathSciNet  Google Scholar 

  10. Dagadu JC, Li J. -P., Aboagye EO (2019) Medical image encryption based on hybrid chaotic dna diffusion. Wirel Pers Commun 108(1):591–612

    Google Scholar 

  11. Dagadu JC, Li J. -P., Addo PC (2019) An image cryptosystem based on pseudorandomly enhanced chaotic dna and random permutation. Multimed Tools Appl 1–22

  12. Das SK, Dhara BC (2017) An image encryption technique using sine curve. In: Advances in Pattern Recognition (ICAPR), 2017 9th International Conference On, pp 1–6. IEEE

  13. Das SK, Dhara BC (2017) A new image encryption method using circle. In: Computing, communication and networking technologies (ICCCNT), 2017 8th international conference on. IEEE, pp 1–6

  14. Das SK, Dhara BC (2017) An image encryption technique using sine curve. In: 2017 ninth international conference on advances in pattern recognition (ICAPR). IEEE, pp 1–6

  15. Dongare AS, Alvi A, Tarbani N (2017) An efficient technique for image encryption and decryption for secured multimedia application. International Research Journal of Engineering and Technology (IRJET) 4(4):3186–3190

    Google Scholar 

  16. Dwivedi RK, Kumar R, Buyya R (2021) Secure healthcare monitoring sensor cloud with attribute-based elliptical curve cryptography. International Journal of Cloud Applications and Computing (IJCAC) 11(3):1–18

    Google Scholar 

  17. Essaid M, Akharraz I, Saaidi A, et al. (2019) Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps. J Inf Secur Appl 47:173–187

    Google Scholar 

  18. FIPS P (1999) 46-3. Data Encryption Standard (DES) 25

  19. Farin G, Hoschek J, Kim M. -S. (2002) Handbook of Computer Aided Geometric Design. Elsevier, Amsterdam

    MATH  Google Scholar 

  20. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(06):1259–1284

    MathSciNet  MATH  Google Scholar 

  21. Guesmi R, Farah M, Kachouri A, Samet M (2016) A novel chaos-based image encryption using dna sequence operation and secure hash algorithm sha-2. Nonlinear Dyn 83(3):1123–1136

    MathSciNet  MATH  Google Scholar 

  22. Hussain I, Gondal MA (2014) An extended image encryption using chaotic coupled map and s-box transformation. Nonlinear Dyn 76(2):1355–1363

    Google Scholar 

  23. Joshi B, Joshi B, Mishra A, Arya V, Gupta AK, Peraković D. (2022) A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing. Int J Cloud Appl Comput 12(1):1–11

    Google Scholar 

  24. Kandar S, Chaudhuri D, Bhattacharjee A, Dhara BC (2019) Image encryption using sequence generated by cyclic group. J Inf Secur Appl 44:117–129

    Google Scholar 

  25. Kumar M, Iqbal A, Kumar P (2016) A new rgb image encryption algorithm based on dna encoding and elliptic curve diffie–hellman cryptography. Signal Process 125:187–202

    Google Scholar 

  26. Lai X, Massey JL (1990) A proposal for a new block encryption standard. In: Eurocrypt. Springer, vol 90, pp 389–404

  27. Li Y, Yu H, Song B, Chen J (2021) Image encryption based on a single-round dictionary and chaotic sequences in cloud computing. Concurrency Comput Pract Experience 33(7):1–1

    Google Scholar 

  28. Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722

    MATH  Google Scholar 

  29. Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing s-box based on chaotic map and backtracking. Appl Math Comput 125153:376

    MathSciNet  MATH  Google Scholar 

  30. Liu H, Wang X, Zhao M, Niu Y (2022) Constructing strong s-box by 2d chaotic map with application to irreversible parallel key expansion. Int J Bifurcation Chaos 32(11):2250163

    MathSciNet  MATH  Google Scholar 

  31. Mahmood AS, Rahim MSM (2018) Novel method for image security system based on improved scan method and pixel rotation technique. J Inf Secur Appl 42:57–70

    Google Scholar 

  32. Maiti C, Dhara BC (2018) Image encryption with a new fibonacci transform. In: 2018 Fifth international conference on emerging applications of information technology (EAIT). IEEE, pp 1–4

  33. Maniccam SS, Bourbakis NG (2004) Image and video encryption using scan patterns. Pattern Recogn 37(4):725–737

    Google Scholar 

  34. Mondal B, Singh S, Kumar P (2019) A secure image encryption scheme based on cellular automata and chaotic skew tent map. J Inf Secur Appl 45:117–130

    Google Scholar 

  35. Nematzadeh H, Enayatifar R, Yadollahi M, Lee M, Jeong G (2020) Binary search tree image encryption with dna. Optik 163505:202

    Google Scholar 

  36. Nithya R, Dhanasekaran D (2022) Novel dominant color subband image encryption in visual sensor network for smart military surveillance system, vol 39

  37. Pub NF (2001) 197: Advanced encryption standard (aes). Federal Information Processing Standards Publication 197(441):0311

    Google Scholar 

  38. Rajagopalan S, Sharma S, Arumugham S, Upadhyay HN, Rayappan JBB, Amirtharajan R (2019) Yrbs coding with logistic map–a novel sanskrit aphorism and chaos for image encryption. Multimed Tools Appl 78(8):10513–10541

    Google Scholar 

  39. Salomon D (2007) Curves and Surfaces for Computer Graphics. Springer, New York

    MATH  Google Scholar 

  40. Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28(4):656–715

    MathSciNet  MATH  Google Scholar 

  41. Si Y, Liu H, Chen Y (2021) Constructing keyed strong s-box using an enhanced quadratic map. Int J Bifurcation Chaos 31(10):2150146

    MathSciNet  MATH  Google Scholar 

  42. Sivakumar T, Li P (2019) A secure image encryption method using scan pattern and random key stream derived from laser chaos. Optics & Laser Technology 111:196–204

    Google Scholar 

  43. Sivakumar T, Pandi M, Madasamy NS, Bharathi R (2021) An image encryption algorithm with hermite chaotic polynomials and scan pattern. In: Journal of Physics: Conference Series, vol. 1767, p. 012044. IOP Publishing

  44. Sivakumar T, Venkatesan R (2014) A novel approach for image encryption using dynamic scan pattern. IAENG Int J Comput Sci 41(2):91–101

    Google Scholar 

  45. Sokouti M, Zakerolhosseini A, Sokouti B (2016) Medical image encryption: an application for improved padding based ggh encryption algorithm. The open medical informatics journal 10:11

    Google Scholar 

  46. Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image encryption with double spiral scans and chaotic maps. Security and Communication Networks 2019:1–15

    Google Scholar 

  47. USC-SIPI Image Database Website https://sipi.usc.edu/database/database.php?volume=misc

  48. Vidhya R, Brindha M, Gounden NA (2020) Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption. Appl Intell 50(10):3101–3124

    Google Scholar 

  49. Wang R, Deng G. -Q., Duan X. -F. (2021) An image encryption scheme based on double chaotic cyclic shift and josephus problem. J Inf Secur Appl 102699:58

    Google Scholar 

  50. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and dna encoding. Multimed Tools Appl 76(5):6229–6245

    Google Scholar 

  51. Wang Y, Quan C, Tay C (2016) Asymmetric optical image encryption based on an improved amplitude–phase retrieval algorithm. Opt Lasers Eng 78:8–16

    Google Scholar 

  52. Wu J, Liao X, Yang B (2018) Image encryption using 2d hénon-sine map and dna approach. Signal Process 153:11–23

    Google Scholar 

  53. Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264: 317–339

    MathSciNet  MATH  Google Scholar 

  54. Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi J. -Y. (2020) A novel image security technique based on nucleic acid concepts. J Inf Secur Appl 102505:53

    Google Scholar 

  55. Ye G (2014) A block image encryption algorithm based on wave transmission and chaotic systems. Nonlinear Dyn 75(3):417–427

    Google Scholar 

  56. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361–377

    MathSciNet  MATH  Google Scholar 

  57. Zhang Y (2020) The fast image encryption algorithm based on lifting scheme and chaos. Inf Sci 520:177–194

    MathSciNet  MATH  Google Scholar 

  58. Zhang X, Wang L, Zhou Z, Niu Y (2019) A chaos-based image encryption technique utilizing hilbert curves and h-fractals. IEEE Access 7:74734–74746

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sujit Kumar Das.

Ethics declarations

Conflict of Interests

The authors declare that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Das, S.K., Dhara, B.C. A new image encryption method using Bezier curve. Multimed Tools Appl 82, 46961–47002 (2023). https://doi.org/10.1007/s11042-023-14919-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14919-8

Keywords

Navigation