Advertisement

Journal of Real-Time Image Processing

, Volume 16, Issue 3, pp 775–790 | Cite as

Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift

  • Fengyong LiEmail author
  • Haibin Wu
  • Gang Zhou
  • Weimin Wei
Special Issue Paper
  • 179 Downloads

Abstract

This work tackles a recent challenge in real-time image encryption: how to ensure the correctness of the image content if an encrypted image is performed by active attack? We tackle this problem by designing a robust encryption scheme with aperiodic chaotic map and random-cycling bit shift. The original image is first scrambled using aperiodic generalized Arnold transform. Then, for the scrambled image, cycling bit shift is randomly performed on each pixel by changing the pixel values at bit-level. Finally, the encryption procedure can be achieved by conducting XOR operation between the scrambled image and a secret matrix generated by chaotic map. Our scheme is robust in the sense that the recipient can decrypt the original image successfully even if they are performed with diverse attacks during delivery. Since the initial value of the chaotic map is controlled by the image pixel values in the encryption process, the proposed scheme has a sensitive key space and satisfy the Permutation–diffusion architectures. Comprehensive experimental results show that our proposed method outperforms the state of the arts in terms of low computation complexity and robustness.

Keywords

Image encryption Aperiodic chaotic map Random-cycling bit shift Real-time Robustness 

Notes

Acknowledgements

This work was supported by the Natural Science Foundation of China under Grants (61602295, 61503235) and the Natural Science Foundation of Shanghai (16ZR1413100).

References

  1. 1.
    Amalarethinam, D., Geetha, J.: Image encryption and decryption in public key cryptography based on MR. In: Proceedings of the IEEE (2015)Google Scholar
  2. 2.
    Liu, W., Sun, K., Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016)CrossRefGoogle Scholar
  3. 3.
    Zhu, Z., Zhang, W., Wong, K., Yu, H.A.: Chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181, 1171–1186 (2011)CrossRefGoogle Scholar
  4. 4.
    Liu, H., Wang, X.: Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt. Commun. 284, 3895–3903 (2011)CrossRefGoogle Scholar
  5. 5.
    Wang, L., Song, H., Liu, P.: A novel hybrid color image encryption algorithm using two complex chaotic systems. Opt. Lasers Eng. 77, 118–125 (2016)CrossRefGoogle Scholar
  6. 6.
    Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92, 1101–1108 (2012)CrossRefGoogle Scholar
  7. 7.
    Li, Y., Wang, C., Chen, H.: A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt. Lasers Eng. 90, 238–246 (2017)CrossRefGoogle Scholar
  8. 8.
    Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017)CrossRefGoogle Scholar
  9. 9.
    Liu, H., Wang, X., Kadir, A.: Image encryption using DNA complementary rule and chaotic maps. Appl. Soft Comput. 12, 1457–1466 (2012)CrossRefGoogle Scholar
  10. 10.
    Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Zhang, L., Hu, X., Liu, Y., Wong, K.W., Gan, J.: A chaotic image encryption scheme owning temp-value feedback. Commun. Nonlinear Sci. Numer. Simul. 19, 3653–3659 (2014)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Zhang, W., Yu, H., Zhao, Y., Zhu, Z.: Image encryption based on three-dimensional bit matrix permutation. Signal Process. 118, 36–50 (2016)CrossRefGoogle Scholar
  13. 13.
    Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)CrossRefGoogle Scholar
  14. 14.
    Tang, Z., Song, J., Zhang, X., Sun, R.: Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt. Lasers Eng. 80, 1–11 (2016)CrossRefGoogle Scholar
  15. 15.
    Wang, X., Gu, S., Zhang, Y.: Novel image encryption algorithm based on cycle shift and chaotic system. Opt. Lasers Eng. 68, 126–134 (2015)CrossRefGoogle Scholar
  16. 16.
    Tang, Z., Zhang, X., Lan, W.: Efficient image encryption with block shuffling and chaotic map. Multimed. Tools Appl. 74, 5429–5448 (2015)CrossRefGoogle Scholar
  17. 17.
    Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Wang, X., Liu, L., Zhang, Y.: A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt. Lasers Eng. 66, 10–18 (2015)CrossRefGoogle Scholar
  19. 19.
    Wang, X., Zhang, Y., Bao, X.: A novel chaotic image encryption scheme using DNA sequence operations. Opt. Lasers Eng. 73, 53–61 (2015)CrossRefGoogle Scholar
  20. 20.
    Qin, C., Ji, P., Chang, C., Dong, J., Sun, X.: Non-uniform watermark sharing based on optimal iterative BTC for image tampering recovery. IEEE Multimedia (2018, to appear).  https://doi.org/10.1109/MMUL.2018.112142509 Google Scholar
  21. 21.
    Tang, Z., Zhang, X.: Secure image encryption without size limitation using Arnold transform and random strategies. J. Multimed. 6(2), 202–206 (2011)CrossRefGoogle Scholar
  22. 22.
    Li, M., Liang, T., He, Y.: Arnold transform based image scrambling method. In: 3rd International Conference on Multimedia Technology (ICMT 2013), pp. 1309–1316 (2013)Google Scholar
  23. 23.
    Shang, Z., Ren, H., Zhang, J.: A block location scrambling algorithm of digital image based on Arnold transformation. In: The 9th International Conference for Young Computer Scientists, pp. 2942–2947 (2008)Google Scholar
  24. 24.
    Liu, S., Guo, C., Sheridan, J.T.: A review of optical image encryption techniques. Opt. Laser Technol. 57, 327–342 (2014)CrossRefGoogle Scholar
  25. 25.
    Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)CrossRefGoogle Scholar
  26. 26.
    Zhang, G., Liu, Q.: A novel image encryption method based on total shuffling scheme. Opt. Commun. 284, 2775–2780 (2011)CrossRefGoogle Scholar
  27. 27.
    Belazi, A., El-Latif, A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process. 128, 155–170 (2016)CrossRefGoogle Scholar
  28. 28.
    Liu, Y., Wang, J., Fan, J., Gong, L.: Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences. Multimed. Tools Appl. 75, 4363–4382 (2016)CrossRefGoogle Scholar
  29. 29.
    Hu, T., Liu, Y., Gong, L., Ouyang, C.: An image encryption scheme combining chaos with cycle operation for DNA sequences. Nonlinear Dyn. 87, 51–66 (2017)CrossRefGoogle Scholar
  30. 30.
    Qin, C., Zhang, X.: Effective reversible data hiding in encrypted image with privacy protection for image content. J. Vis. Commun. Image Represent. 31, 154–164 (2015)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Computer Science and TechnologyShanghai University of Electric PowerShanghaiPeople’s Republic of China

Personalised recommendations