A Simple, Secure, and Time-Efficient Bit-Plane Operated Bit-Level Image Encryption Scheme Using 1-D Chaotic Maps

  • K. Abhimanyu Kumar PatroEmail author
  • Bibhudendra Acharya
Conference paper


Nowadays, multimedia data, especially, image security is a challenging task for all cryptographic researchers throughout the world. A time-efficient, secure, and simple bit-plane operated bit-level image encryption scheme is proposed in this paper to secure images. The proposed work performs bit-plane diffusion operation using piece-wise linear chaotic map (PWLCM) and bit-level column–row shuffling operation using Beta map. This method uses hash-based keys to prevent the algorithm against chosen-plaintext attack (CPA) and known-plaintext attack (KPA). The main significance of this algorithm is the improved key space \(\left( {1.0853 \times 2^{676} } \right)\) and time-efficiency (0.148 s required for encryption) using the simple encryption procedures. Security analyses and computer simulations indicate the good encryption result and stronger security in terms of higher key space, better time-efficiency, higher plaintext and key sensitivity of the proposed scheme.


Security Image encryption Bit-plane operation Hash algorithm Chaotic maps Key space Time-efficiency 


  1. 1.
    Coppersmith D (1994) The Data Encryption Standard (DES) and its strengths against attacks, IBM J Res Dev 38:243–250.CrossRefGoogle Scholar
  2. 2.
    Pub NF. 197 (2001) Advanced encryption standard (AES). Federal Information Processing Standards Publication. 197, 441-0311.Google Scholar
  3. 3.
    Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption, Chaos Solitons Fractals 29:393–399.CrossRefGoogle Scholar
  4. 4.
    Samhita P, Prasad P, Patro KAK, Acharya B (2016) A Secure Chaos-based Image Encryption and Decryption Using Crossover and Mutation Operator, Int J Cont T Appl 9:17–28.Google Scholar
  5. 5.
    Gupta A, Thawait R, Patro KAK, Acharya B (2016) A Novel Image Encryption Based on Bit-Shuffled Improved Tent Map, Int J Cont T Appl 9:1–16.Google Scholar
  6. 6.
    Shadangi V, Choudhary SK, Patro KAK, Acharya B (2017) Novel Arnold Scrambling Based CBC-AES Image Encryption, Int J Cont T Appl 10:93–105.Google Scholar
  7. 7.
    Guesmi R, Amine M, Farah B et al. (2016) Hash key-based image encryption using crossover operator and chaos, Multimed Tools Appl 75:4753–4769.CrossRefGoogle Scholar
  8. 8.
    Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2, Nonlinear Dyn 83:1123–1136.MathSciNetCrossRefGoogle Scholar
  9. 9.
    Matthews R (2010) On the derivation of a chaotic encryption algorithm, Cryptologia XIII 37–41.Google Scholar
  10. 10.
    Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map, Opt Lasers Eng 84:26–36.CrossRefGoogle Scholar
  11. 11.
    Wang X, Wang S, Zhang Y, Guo K (2017) A novel image encryption algorithm based on chaotic shuffling method, Inf Secur J A Glob Perspect 0:1–10.Google Scholar
  12. 12.
    Abd El-Latif AA, Li L, Zhang T, Wang N, Song X, Niu X (2012) Digital image encryption scheme based on multiple chaotic systems, Sens Imaging 13:67–88.CrossRefGoogle Scholar
  13. 13.
    Ahmad M, Khurana S, Singh S, AlSharari HD (2017) A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps, 3D Res 8.Google Scholar
  14. 14.
    Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps, Optics and Lasers in Engineering 96:39–49.CrossRefGoogle Scholar
  15. 15.
    Wang XY, Yang L (2012) Design of pseudo-random bit generator based on chaotic maps, Int J Mod Phy B 26:1250208.MathSciNetCrossRefGoogle Scholar
  16. 16.
    Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps, Int J Bifurcation Chaos 15:3119–3151.MathSciNetCrossRefGoogle Scholar
  17. 17.
    Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules, Multimed Tools Appl 75:1–23.CrossRefGoogle Scholar
  18. 18.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations, Opt Laser Engg 88:197–213.CrossRefGoogle Scholar
  19. 19.
    Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences 181:1171–1186.CrossRefGoogle Scholar
  20. 20.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice, Information Sciences 273:329–351.CrossRefGoogle Scholar
  21. 21.
    Patro KAK, Acharya B (2018) Secure multi–level permutation operation based multiple colour image encryption, J Inf Secur Appl 40:111–133.CrossRefGoogle Scholar
  22. 22.
    Patro KAK, Banerjee A, Acharya B (2017) A Simple, Secure and Time Efficient Multi-way Rotational Permutation and Diffusion Based Image Encryption by Using Multiple 1-D Chaotic Maps, In International Conference on Next Generation Computing Technologies, Springer, Singapore, 396–418.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • K. Abhimanyu Kumar Patro
    • 1
    Email author
  • Bibhudendra Acharya
    • 1
  1. 1.Department of Electronics and Telecommunication EngineeringNational Institute of Technology RaipurRaipurIndia

Personalised recommendations