Skip to main content

A Secure RGB Image Encryption Algorithm in Optimized Virtual Planet Domain

  • Conference paper
  • First Online:
Optimization, Variational Analysis and Applications (IFSOVAA 2020)

Part of the book series: Springer Proceedings in Mathematics & Statistics ((PROMS,volume 355))

  • 622 Accesses

Abstract

The primary aim of this chapter is to provide an optimized, secure RGB image encryption algorithm using 4D hyper-chaotic system in Virtual Planet Domain (VPD). We have constructed a new keyspace, and it shows that the keyspace can resist brute force attacks infeasible. We have tested the proposed algorithm on standard test images. We have successfully verified the robustness of the proposed algorithm by using commonly known attacks such as the differential, cropped, noise, and entropy attacks. Finally, we compared the proposed technique with existing algorithms, and the data (shown in tables) confirms that the proposed algorithm is competitive and can resist exhaustive attacks efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abdlrudha, H.H., Nasir, Q.: Low complexity high security image encryption based on nested PWLCM chaotic map. In: International Conference for Internet Technology and Secured Transactions (ICITST), pp. 220–225. IEEE (2011)

    Google Scholar 

  2. Aguilar-Bustos, A., Cruz-Hernández, C.: Synchronization of discrete-time hyperchaotic systems: an application in communications. Chaos Solitons Fractals 41(3), 1301–1310 (2009)

    Article  MathSciNet  Google Scholar 

  3. Aguilar-Bustos, A., Cruz-Hernández, C., López-Gutiérrez, R., Posadas-Castillo, C.: Synchronization of different hyperchaotic maps for encryption. Nonlinear Dyn. Syst. Theory 8(3), 221–236 (2008)

    MathSciNet  MATH  Google Scholar 

  4. Ahadpour, S., Sadra, Y.: A chaos-based image encryption scheme using chaotic coupled map lattices (2012). arXiv:1211.0090

  5. Ahmad, M., Alam, M.S.: A new algorithm of encryption and decryption of images using chaotic mapping. Int. J. Comput. Sci. Eng. 2(1), 46–50 (2009)

    Google Scholar 

  6. Al-Najjar, H., et al.: Digital image encryption algorithm based on a linear independence scheme and the logistic map. In: Proceedings of ACIT-2011 (2011)

    Google Scholar 

  7. Arroyo, D., Alvarez, G., Amigó, J.M., Li, S.: Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Commun. Nonlinear Sci. Numer. Simul. 16(2), 805–813 (2011)

    Article  MathSciNet  Google Scholar 

  8. Behnia, S., Akhshani, A., Mahmodi, H., Akhavan, A.: A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals 35(2), 408–419 (2008)

    Article  MathSciNet  Google Scholar 

  9. Beylkin, G., Coifman, R., Rokhlin, V.: Fast wavelet transforms and numerical algorithms i. Commun Pure Appl. Math. 44(2), 141–183 (1991)

    Article  MathSciNet  Google Scholar 

  10. Caragata, D., Tutanescu, I.: On the security of a new image encryption scheme based on a chaotic function. Signal, Image Video Process. 8(4), 641–646 (2014)

    Article  Google Scholar 

  11. Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58(2), 83–91 (2001)

    Article  Google Scholar 

  12. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)

    Article  MathSciNet  Google Scholar 

  13. Chen, J.X., Zhu, Z.L., Fu, C., Yu, H., Zhang, Y.: Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process. 111, 294–307 (2015)

    Google Scholar 

  14. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)

    Article  Google Scholar 

  15. Faraoun, K.: Chaos-based key stream generator based on multiple maps combinations and its application to images encryption. Int. Arab J. Inf. Technol. 7(3), 231–240 (2010)

    Google Scholar 

  16. Fu, C., Lin, B.B., Miao, Y.S., Liu, X., Chen, J.J.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284(23), 5415–5423 (2011)

    Google Scholar 

  17. Fu, C., Meng, W.H., Zhan, Y.F., Zhu, Z.L., Lau, F.C., Chi, K.T., Ma, H.F.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43(8), 1000–1010 (2013)

    Article  Google Scholar 

  18. Fu, C., Zhang, G.Y., Zhu, M., Chen, Z., Lei, W.M.: A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Secur. Commun. Netw. (2018)

    Google Scholar 

  19. Gao, H., Zhang, Y., Liang, S., Li, D.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29(2), 393–399 (2006)

    Article  Google Scholar 

  20. Gao, T., Chen, Z.: A new image encryption algorithm based on hyper-chaos. Phys. Lett. A 372(4), 394–400 (2008)

    Article  Google Scholar 

  21. Han, F., Hu, J., Yu, X., Wang, Y.: Fingerprint images encryption via multi-scroll chaotic attractors. Appl. Math. Comput. 185(2), 931–939 (2007)

    MATH  Google Scholar 

  22. Hossain, M.B., Rahman, M.T., Rahman, A.S., Islam, S.: A new approach of image encryption using 3d chaotic map to enhance security of multimedia component. In: 2014 International Conference on Informatics, Electronics and Vision (ICIEV), pp. 1–6. IEEE (2014)

    Google Scholar 

  23. Kumar, M., Mohapatra, R., Agarwal, S., Sathish, G., Raw, S.: A new RGB image encryption using generalized Vigenére-type table over symmetric group associated with virtual planet domain. Multimed. Tools Appl. 78(8), 10227–10263 (2019)

    Article  Google Scholar 

  24. Kwok, H., Tang, W.K.: A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4), 1518–1529 (2007)

    Article  MathSciNet  Google Scholar 

  25. Li, C., Arroyo, D., Lo, K.T.: Breaking a chaotic cryptographic scheme based on composition maps. Int. J. Bifurc. Chaos 20(08), 2561–2568 (2010)

    Article  MathSciNet  Google Scholar 

  26. Liu, H., Wang, X.: Triple-image encryption scheme based on one-time key stream generated by chaos and plain images. J. Syst. Softw. 86(3), 826–834 (2013)

    Article  Google Scholar 

  27. López-Mancilla, D., Cruz-Hernández, C.: Output synchronization of chaotic systems: model-matching approach with application to secure communication. Nonlinear Dyn. Syst. Theory 5(2), 141–156 (2005)

    MathSciNet  MATH  Google Scholar 

  28. López-Mancilla, D., Cruz-Hernández, C.: Output synchronization of chaotic systems under nonvanishing perturbations. Chaos Solitons Fractals 37(4), 1172–1186 (2008)

    Article  MathSciNet  Google Scholar 

  29. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3d chaotic baker maps. Int. J. Bifurc. Chaos 14(10), 3613–3624 (2004)

    Article  MathSciNet  Google Scholar 

  30. Masmoudi, A., Bouhlel, M.S., Puech, W.: A new image cryptosystem based on chaotic map and continued fractions. In: 18th European Signal Processing Conference, pp. 1504–1508. IEEE (2010)

    Google Scholar 

  31. Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 13(1), 29–42 (1989)

    Article  MathSciNet  Google Scholar 

  32. Meier, A.V.: The ElGamal cryptosystem (2005)

    Google Scholar 

  33. Pareek, N.K., Patidar, V., Sud, K.K.: Image encryption using chaotic logistic map. Image Vis. Comput. 24(9), 926–934 (2006)

    Article  Google Scholar 

  34. Rao, R.V., Savsani, V.J., Vakharia, D.: Teaching-learning-based optimization: a novel method for constrained mechanical design optimization problems. Comput.-Aided Des. 43(3), 303–315 (2011)

    Article  Google Scholar 

  35. Slimane, N.B., Bouallegue, K., Machhout, M.: A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1. In: International Conference on Control, Automation and Diagnosis (ICCAD), pp. 141–145. IEEE (2017)

    Google Scholar 

  36. Solak, E., Çokal, C.: Algebraic break of image ciphers based on discretized chaotic map lattices. Inf. Sci. 181(1), 227–233 (2011)

    Article  MathSciNet  Google Scholar 

  37. Solak, E., Çokal, C., Yildiz, O.T., Biyikoğlu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos 20(05), 1405–1413 (2010)

    Article  MathSciNet  Google Scholar 

  38. Srivastava, A.: A survey report on different techniques of image encryption. Int. J. Emerg. Technol. Adv. Eng. 2(6), 163–167 (2012)

    Google Scholar 

  39. Sun, F., Liu, S., Li, Z., Lü, Z.: A novel image encryption scheme based on spatial chaos map. Chaos Solitons Fractals 38(3), 631–640 (2008)

    Article  MathSciNet  Google Scholar 

  40. Tang, Y., Wang, Z., Fang, J.A.: Image encryption using chaotic coupled map lattices with time-varying delays. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2456–2468 (2010)

    Google Scholar 

  41. Wang, X., Liu, L.: Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dyn. 73(1–2), 795–800 (2013)

    Article  MathSciNet  Google Scholar 

  42. Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)

    Article  Google Scholar 

  43. Wang, X.Y., Gu, S.X.: New chaotic encryption algorithm based on chaotic sequence and plain text. IET Inf. Secur. 8(3), 213–216 (2014)

    Article  Google Scholar 

  44. Wei, X., Guo, L., Zhang, Q., Zhang, J., Lian, S.: A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J. Syst. Softw. 85(2), 290–299 (2012)

    Article  Google Scholar 

  45. Wong, K.W., Kwok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)

    Article  Google Scholar 

  46. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J.: Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1(2), 31–38 (2011)

    Google Scholar 

  47. Xie, T., Liu, Y., Tang, J.: Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system. Opt.-Int. J. Light Electron Opt. 125(24), 7166–7169 (2014)

    Article  Google Scholar 

  48. Zou, F., Chen, D., Xu, Q.: A survey of teaching-learning-based optimization. Neurocomputing 335, 366–383 (2019)

    Article  Google Scholar 

Download references

Acknowledgements

The author is thankful to the Science and Engineering Research Board, Government of India, for providing financial support through the project file no: YSS/2015/000930. The author is also grateful to the anonymous referees for their constructive comments and valuable suggestions, which have helped to improve the chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manish Kumar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumar, M. (2021). A Secure RGB Image Encryption Algorithm in Optimized Virtual Planet Domain. In: Laha, V., Maréchal, P., Mishra, S.K. (eds) Optimization, Variational Analysis and Applications. IFSOVAA 2020. Springer Proceedings in Mathematics & Statistics, vol 355. Springer, Singapore. https://doi.org/10.1007/978-981-16-1819-2_16

Download citation

Publish with us

Policies and ethics