Skip to main content

A Simple, Secure, and Time-Efficient Bit-Plane Operated Bit-Level Image Encryption Scheme Using 1-D Chaotic Maps

  • Conference paper
  • First Online:

Abstract

Nowadays, multimedia data, especially, image security is a challenging task for all cryptographic researchers throughout the world. A time-efficient, secure, and simple bit-plane operated bit-level image encryption scheme is proposed in this paper to secure images. The proposed work performs bit-plane diffusion operation using piece-wise linear chaotic map (PWLCM) and bit-level column–row shuffling operation using Beta map. This method uses hash-based keys to prevent the algorithm against chosen-plaintext attack (CPA) and known-plaintext attack (KPA). The main significance of this algorithm is the improved key space \(\left( {1.0853 \times 2^{676} } \right)\) and time-efficiency (0.148 s required for encryption) using the simple encryption procedures. Security analyses and computer simulations indicate the good encryption result and stronger security in terms of higher key space, better time-efficiency, higher plaintext and key sensitivity of the proposed scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Coppersmith D (1994) The Data Encryption Standard (DES) and its strengths against attacks, IBM J Res Dev 38:243–250.

    Article  Google Scholar 

  2. Pub NF. 197 (2001) Advanced encryption standard (AES). Federal Information Processing Standards Publication. 197, 441-0311.

    Google Scholar 

  3. Gao H, Zhang Y, Liang S, Li D (2006) A new chaotic algorithm for image encryption, Chaos Solitons Fractals 29:393–399.

    Article  Google Scholar 

  4. Samhita P, Prasad P, Patro KAK, Acharya B (2016) A Secure Chaos-based Image Encryption and Decryption Using Crossover and Mutation Operator, Int J Cont T Appl 9:17–28.

    Google Scholar 

  5. Gupta A, Thawait R, Patro KAK, Acharya B (2016) A Novel Image Encryption Based on Bit-Shuffled Improved Tent Map, Int J Cont T Appl 9:1–16.

    Google Scholar 

  6. Shadangi V, Choudhary SK, Patro KAK, Acharya B (2017) Novel Arnold Scrambling Based CBC-AES Image Encryption, Int J Cont T Appl 10:93–105.

    Google Scholar 

  7. Guesmi R, Amine M, Farah B et al. (2016) Hash key-based image encryption using crossover operator and chaos, Multimed Tools Appl 75:4753–4769.

    Article  Google Scholar 

  8. Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2, Nonlinear Dyn 83:1123–1136.

    Article  MathSciNet  Google Scholar 

  9. Matthews R (2010) On the derivation of a chaotic encryption algorithm, Cryptologia XIII 37–41.

    Google Scholar 

  10. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map, Opt Lasers Eng 84:26–36.

    Article  Google Scholar 

  11. Wang X, Wang S, Zhang Y, Guo K (2017) A novel image encryption algorithm based on chaotic shuffling method, Inf Secur J A Glob Perspect 0:1–10.

    Google Scholar 

  12. Abd El-Latif AA, Li L, Zhang T, Wang N, Song X, Niu X (2012) Digital image encryption scheme based on multiple chaotic systems, Sens Imaging 13:67–88.

    Article  Google Scholar 

  13. Ahmad M, Khurana S, Singh S, AlSharari HD (2017) A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps, 3D Res 8.

    Google Scholar 

  14. Zahmoul R, Ejbali R, Zaied M (2017) Image encryption based on new Beta chaotic maps, Optics and Lasers in Engineering 96:39–49.

    Article  Google Scholar 

  15. Wang XY, Yang L (2012) Design of pseudo-random bit generator based on chaotic maps, Int J Mod Phy B 26:1250208.

    Article  MathSciNet  Google Scholar 

  16. Li S, Chen G, Mou X (2005) On the dynamical degradation of digital piecewise linear chaotic maps, Int J Bifurcation Chaos 15:3119–3151.

    Article  MathSciNet  Google Scholar 

  17. Kulsoom A, Xiao D, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules, Multimed Tools Appl 75:1–23.

    Article  Google Scholar 

  18. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations, Opt Laser Engg 88:197–213.

    Article  Google Scholar 

  19. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation, Information Sciences 181:1171–1186.

    Article  Google Scholar 

  20. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice, Information Sciences 273:329–351.

    Article  Google Scholar 

  21. Patro KAK, Acharya B (2018) Secure multi–level permutation operation based multiple colour image encryption, J Inf Secur Appl 40:111–133.

    Article  Google Scholar 

  22. Patro KAK, Banerjee A, Acharya B (2017) A Simple, Secure and Time Efficient Multi-way Rotational Permutation and Diffusion Based Image Encryption by Using Multiple 1-D Chaotic Maps, In International Conference on Next Generation Computing Technologies, Springer, Singapore, 396–418.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Abhimanyu Kumar Patro .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patro, K.A.K., Acharya, B. (2019). A Simple, Secure, and Time-Efficient Bit-Plane Operated Bit-Level Image Encryption Scheme Using 1-D Chaotic Maps. In: Chattopadhyay, J., Singh, R., Bhattacherjee, V. (eds) Innovations in Soft Computing and Information Technology . Springer, Singapore. https://doi.org/10.1007/978-981-13-3185-5_23

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3185-5_23

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3184-8

  • Online ISBN: 978-981-13-3185-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics