Skip to main content
Log in

Image encryption using Queen

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A high performance scrambler (HPS) is presented to encrypt the color square images based on the sophisticated move of Queen on the large hypothetical chessboard. The input plain image is broken into the red, green and blue channels. The pixels of each channel are scrambled by the Queen one by one. Then diffusion effects have been thrown in the scrambled images to get the encrypted images. The final color cipher image has been obtained by merging the cipher images of these three channels. Plaintext sensitivity has been created by the SHA-256 hash function and by making starting address of the Queen dependent upon the randomly chosen pixels from the input plain image. This act also increased the key space. Intertwining logistic map has been employed to get the chaotic vectors. Both the experiments on the computer machine and the security analysis vividly certify efficiency, security and potential for some real world application of the proposed image cipher. The information entropy came out to be 7.9974. Besides, the floating frequency security parameter gave very promising results regarding the uniformly random pixels data in the output encrypted image. Moreover, time complexity of the proposed cipher is very competitive.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data Availability statement

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study

References

  1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. IJBC 16(08):2129–2151

    MathSciNet  Google Scholar 

  2. Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm for image encryption. Commun Nonlinear Sci 14(11):3743–374

    Google Scholar 

  3. Amani HR, Yaghoobi M (2019) A new approach in adaptive encryption algorithm for color images based on DNA sequence operation and hyper-chaotic system. Multimed Tools Appl 78(15):21537–21556

    Google Scholar 

  4. Bashir Z, Iqbal N, Hanif M (2021) A novel gray scale image encryption scheme based on pixels’ swapping operations. Multimed Tools Appl 80(1):1029–1054

    Google Scholar 

  5. Boriga R, Dăscălescu AC, Priescu I (2014) A new hyperchaotic map and its application in an image encryption scheme. Signal Process-Image 29(8):887–901

    Google Scholar 

  6. Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76(1):1159–1175

    Google Scholar 

  7. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Google Scholar 

  8. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Google Scholar 

  9. Chen JX, Zhu ZL, Fu C, Zhang LB, Zhang Y (2015) An efficient image encryption scheme using lookup table-based confusion and diffusion. Nonlinear Dyn 81(3):1151–66

    Google Scholar 

  10. Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and Line map. Nonlinear Dyn 87(3):1797–1807

    Google Scholar 

  11. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps Chaos Soliton Fract 21.3:749–761

    Google Scholar 

  12. Choi J, Seok S, Seo H, Kim H (2016) A fast ARX model-based image encryption scheme. Multimed Tools Appl 75(2):14685–14706

    Google Scholar 

  13. Cokal C, Solak E (2009) Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A 373(15):1357–1360

    MathSciNet  Google Scholar 

  14. Diaconu AV, Costea A, Costea MA (2014) Color image scrambling technique based on transposition of pixels between RGB channels using Knight’s moving rules and digital chaotic map. Math Probl Eng 2014

  15. ElKamchouchi DH, Mohamed HG, Moussa KH (2020) A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion, Entropy, vol. 22, no. 2, p. 180 Feb

  16. Floating-Point Working Group (1985) IEEE computer society: IEEE standard for binary floating-point arithmeti. Standard 754–1985

  17. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. IJBC 8(06):1259–1284

    MathSciNet  Google Scholar 

  18. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption. Chaos Soliton Fract 29(2):393–399

    Google Scholar 

  19. Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157

  20. Guesmi R, Farah MA, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769

    Google Scholar 

  21. Gupta BB, Li KC, Leung VC, Psannis KE, Yamaguchi S (2021) Blockchain-assisted secure fine-grained searchable encryption for a cloud-based healthcare cyber-physical system. IEEE/CAA J Autom Sinica 8(12):1877–1890

    Google Scholar 

  22. Han JW, Park CS, Ryu DH, Kim ES (1999) Optical image encryption based on XOR operations. Opt Eng 38

  23. Hanif M, Naqvi RA, Abbas S, Khan MA, Iqbal N (2020) A novel and efficient 3D multiple images encryption scheme based on chaotic systems and swapping operations. IEEE Access 8:123536–123555

    Google Scholar 

  24. Hua Z, Zhou Y (2016) Image encryption using 2D Logistic-adjusted-Sine map. Inform Sciences 339:237–253

  25. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67(4):2411–2417

    MathSciNet  Google Scholar 

  26. Hua Z, Zhou Y, Pun CM, Chen CP (2015) 2D Sine Logistic modulation map for image encryption. Inform Sci 297:80–94

    Google Scholar 

  27. Iqbal N, Hanif M (2021) An efficient grayscale image encryption scheme based on variable length row-column swapping operations. Multimed Tools Appl 80(30):36305–36339

    Google Scholar 

  28. Iqbal N, Abbas S, Khan MA, Fatima A, Ahmed A, Anwer N (2020) Efficient image cipher based on the movement of king on the chessboard and chaotic system. J Electron Imaging 29:023025

    Google Scholar 

  29. Iqbal N, Hanif M, Abbas S, Khan MA, Rehman ZU (2021) Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encoding. JISA 58:102809

    Google Scholar 

  30. Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, Hussain D (2021) On the image encryption algorithm based on the chaotic system. DNA encoding and Castle, IEEE Access

    Google Scholar 

  31. Iqbal N, Naqvi RA, Atif M, Khan MA, Hanif M, Abbas S, Hussain D (2021) On the image encryption algorithm based on the chaotic system, dna encoding, and castle. IEEE Access 9:118253–118270

    Google Scholar 

  32. Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75(1):1–23

    Google Scholar 

  33. Li C, Zhang LY, Ou R, Wong KW, Shu S (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlinear dynam 70(4):2383–2388

    MathSciNet  Google Scholar 

  34. Liao X, Hahsmi MA, Haider R (2014) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos. Optik 153:117–134

    Google Scholar 

  35. Liao X, Kulsoom A, Ullah S (2016) A modified (Dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241–11266

    Google Scholar 

  36. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16–17):3895–3903

    Google Scholar 

  37. Liu L, Zhang Q, Wei X (2012) A RGB image encryption algorithm based on DNA encoding and chaos map. Comput Electr Eng 38(5):1240–1248

    Google Scholar 

  38. Liu H, Zhang Y, Kadir A, Xu Y (2019) Image encryption using complex hyper chaotic system by injecting impulse into parameters. Appl Math Comput 360:83–93

    MathSciNet  Google Scholar 

  39. Liu H, Wen F, Kadir A (2019) Construction of a new 2D Chebyshev-Sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010

    Google Scholar 

  40. Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30(12):2050173

    MathSciNet  Google Scholar 

  41. Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing S-box based on chaotic map and backtracking. Appl Math Comput 376:125153

    MathSciNet  Google Scholar 

  42. Liu H, Wang X, Kadir A (2021) Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput 25(16):11077–11086

    Google Scholar 

  43. Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67(1):557–566

    MathSciNet  Google Scholar 

  44. Murillo-Escobar MA, Meranza-Castillón MO, López-Gutiérrez RM, Cruz-Hernández C (2019) Suggested integral analysis for chaos-based image cryptosystems. Entropy 21(8):815

    MathSciNet  Google Scholar 

  45. Özkaynak F, Özer AB, Yavuz S (2013) Security analysis of an image encryption algorithm based on chaos and DNA encoding, In 2013 21st Signal Processing and Communications Applications Conference (SIU), pp 1–4. IEEE

  46. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Google Scholar 

  47. Parvin Z, Seyedarabi H, Shamsi M (2016) A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools Appl 75:10631–10648

    Google Scholar 

  48. Ponnain D, Chandranbabu K (2016) Security analysis of an image encryption algorithm based on paired interpermuting planes and a modified scheme. Optik 127(19):8111–8123

    Google Scholar 

  49. Ramesh VP, Gowtham R (2017) Asymptotic notations and its applications. Ramanujan Math Soc Math Newsl 28(4):10–16

    Google Scholar 

  50. Sam IS, Devaraj P, Bhuvaneswaran RS (2012) An intertwining chaotic maps based image encryption scheme. Nonlinear Dyn 69(4):1995–2007

    MathSciNet  Google Scholar 

  51. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst tech J 18:656–715

    MathSciNet  Google Scholar 

  52. Si Y, Liu H, Chen Y (2021) Constructing keyed strong S-Box using an enhanced quadratic map. Int J Bifurcation Chaos 31(10):2150146

    MathSciNet  Google Scholar 

  53. Solak E, Çokal C, Yildiz OT, Biyikoğli T (2010) Cryptanalysis of Fridrich’s chaotic image encryption. Int J Bifurcat Chaos 20(05):1405–1413

    MathSciNet  Google Scholar 

  54. Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Humaniz Comput 10(6):2277–229

    Google Scholar 

  55. Wang K, Zou L, Song A, He Z (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343(6):432–439

    Google Scholar 

  56. Wang Y, Liao X, Xiang T, Wong KW, Yang D (2007) Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map. Phys Lett A 363(4):277–281

    Google Scholar 

  57. Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear dynam 62(3):615–621

    MathSciNet  Google Scholar 

  58. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  59. Wang X, Luan D, Bao X (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digit Signal Process 25:244–247

    Google Scholar 

  60. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452

    Google Scholar 

  61. Wang X, Wang Y, Zhu X, Luo C (2020), A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level, Opt. Lasers Eng., vol. 125, Feb.2020 Art. no. 10585

  62. Wu J, Liao X, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300

    Google Scholar 

  63. Wu X, Wang K, Wang X, Kan H, Kurths J (2018) Color image DNA encryption using NCA map-based CML and one-time keys. Signal Process 148:272–287

    Google Scholar 

  64. Xiang T, Liao X, Tang G, Chen Y, Wong K (2006) A novel block cryptosystem based on iterating a chaotic map. Phys Lett A 349(1–4):109–115

    Google Scholar 

  65. Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Soliton Fract 40(5):2191–2199

    MathSciNet  Google Scholar 

  66. Xiaoyong J, Sen B, Guibin Z, Bing Y (2017) Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimed Tools Appl 76(10):12965–12979

    Google Scholar 

  67. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput electr eng 54:471–48

    Google Scholar 

  68. Yu C, Li J, Li X, Ren X, Gupta BB (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77(4):4585–4608

    Google Scholar 

  69. Yu Z, Gao CZ, Jing Z, Gupta BB, Cai Q (2018) A practical public key encryption scheme based on learning parity with noise. IEEE Access 6:31918–31923

    Google Scholar 

  70. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Google Scholar 

  71. Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77(3):687–698

    Google Scholar 

  72. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear-nonlinear coupled map lattice. Inform Sci 273:329–351

    Google Scholar 

  73. Zhang YQ, Wang XY (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Google Scholar 

  74. Zhang Y, Li C, Li Q, Zhang D, Shu S (2012) Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dynam 69(3):1091–1096

    MathSciNet  Google Scholar 

  75. Zhang Q, Guo L, Wei X (2013) A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Optik 124(18):3596–3600

    Google Scholar 

  76. Zhang W, Yu H, Zhu ZL (2015) Color image encryption based on paired interpermuting planes. Opt Commun 338:199–208

    Google Scholar 

  77. Zhang W, Yu H, Zhao YL, Zhu ZL (2016) Image encryption based on three-dimensional bit matrix permutation. Signal Process 118:36–50

    Google Scholar 

  78. Zhao M, Liu H (2022) Construction of a Nondegenerate 2D Chaotic Map with Application to Irreversible Parallel Key Expansion Algorithm. Int J Bifurcation Chaos 32(06):2250081

    MathSciNet  Google Scholar 

  79. Zheng Q, Wang X, Khan MK, Zhang W, Gupta BB, Guo W (2017) A lightweight authenticated encryption scheme based on chaotic scml for railway cloud service. IEEE Access 6:711–722

    Google Scholar 

  80. Zhou G, Zhang D, Liu Y, Yuan Y, Liu Q (2015) A novel image encryption algorithm based on chaos and Line map. Neurocomputing 169:150–157

  81. Zhu Z, Zhang W, Wong K, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Google Scholar 

  82. Zhu C, Liao C, Deng X (2013) Breaking and improving an image encryption scheme based on total shuffling scheme. Nonlinear Dynam 71(1–2):25–34

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadeem Iqbal.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflict of interest

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Iqbal, N. Image encryption using Queen. Multimed Tools Appl 83, 10551–10585 (2024). https://doi.org/10.1007/s11042-023-15674-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15674-6

Keywords

Navigation