Skip to main content
Log in

A novel chaotic image encryption with FSV based global bit-level chaotic permutation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

A novel chaotic image encryption cryptosystem presented in this paper employs a newly proposed fractal sorting vector (FSV) and FSV based global bit-level chaotic permutation (FSV-GBCP). The proposed FSV had irregularity, self-similarity, and iterability, suiting for the construction of chaotic image encryption methods of any size. Based on FSV, the global bit-level permutation effectively improved the security of the cryptographic system. The experiment results and comparisons with other bit-level permutation encryption methods show that the proposed has short runtime and good encryption effect. Therefore, the cryptosystem is sufficient to achieve the desired level of security. The newly proposed FSV and FSV-GBCP have played the positive role in promoting the field of image encryption, and this research direction is worthy of further study and attention.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58

    Article  Google Scholar 

  2. Alawida M, Teh JS, Samsudin A, Alshoura W’H (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249–266

    Article  MATH  Google Scholar 

  3. Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16(8):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  4. Ayubi P, Setayeshi S, Rahmani AM (2020) Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application. Journal of Information Security and Applications 52:102472

    Article  Google Scholar 

  5. M. Benssalah, Y. Rhaskali,·K. Drouiche. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl, 2021, 80(2): 2081–2107.

    Article  Google Scholar 

  6. Cao C, Sun KH, Liu WH (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  7. Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327

    Article  Google Scholar 

  8. Es-Sabry M, El Akkad N, Merras M et al (2020) A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput 24(5):3829–3848

    Article  Google Scholar 

  9. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  10. Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  11. Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Article  Google Scholar 

  12. A. Kovalchuk, N. Lotoshynska, M.G. ML, et al. An Approach towards an Efficient Encryption-Decryption of Grayscale and Color Images. Procedia Computer Science, 2019, 155: 630–635.

  13. Kovalchuk A, Izonin I, ML MG et al (2019) An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations. Procedia Computer Science 160:491–496

    Article  Google Scholar 

  14. Kovalchuk A, Izonin I, ML MG et al (2019) Information Protection Service using Topological Image Coverage. Procedia Computer Science 160:503–508

    Article  Google Scholar 

  15. Kovalchuk A, Izonin I, ML MG et al (2019) An Efficient Image Encryption Scheme using Projective Transformations. Procedia Computer Science 160:584–589

    Article  Google Scholar 

  16. Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimedia 24(3):64–71

    Article  Google Scholar 

  17. Li JF, Xiang SY, Wang HN et al (2018) A novel image encryption algorithm based on synchronized random bit generated in cascade-coupled chaotic semiconductor ring lasers. Opt Lasers Eng 102:170–180

    Article  Google Scholar 

  18. Liao X, Yu YB, Li B et al (2020) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685–696

    Article  Google Scholar 

  19. Liu X, Song YR, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network. International Journal of Bifurcation and Chaos 29:2

    Article  MathSciNet  MATH  Google Scholar 

  20. Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11(9):1914–1927

    Article  Google Scholar 

  21. Ni ZC, Shi YQ, Ansari N et al (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362

    Article  Google Scholar 

  22. Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. Journal of Information Security and Applications 52:102470

    Article  Google Scholar 

  23. Peng HP, Yang B, Li LX et al (2020) Secure and traceable image transmission scheme based on semitensor product compressed sensing in telemedicine system. IEEE Internet Things J 7(3):2432–2451

    Article  Google Scholar 

  24. Popoff S, Lerosey G, Fink M, Boccara AC, Gigan S (2010) Image transmission through an opaque material. Nat Commun 1:81

    Article  Google Scholar 

  25. A. Sarkar,·B. K. Singh. A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function. Multimed Tools Appl, 2021, 80(1): 799–829.

    Article  Google Scholar 

  26. Shahna K, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162

    Article  Google Scholar 

  27. Shanthakumari R, Malliga S (2021) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5–6):3975–3991

    Google Scholar 

  28. Tang ZJ, Song J, Zhang XQ et al (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11

    Article  Google Scholar 

  29. Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    Article  MathSciNet  MATH  Google Scholar 

  30. Wang XY, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214

    Article  MathSciNet  MATH  Google Scholar 

  31. Wang XY, Luan DP, Bao XM (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing 25:244–247

    Article  Google Scholar 

  32. Wang XY, Zhang YQ, Bao WM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61

    Article  Google Scholar 

  33. Wang CP, Wang XY, Xia ZQ et al (2020) Image description with polar harmonic Fourier moments. IEEE Transactions on Circuits and Systems for Video Technology 30(12):4440–4452

    Article  Google Scholar 

  34. Wu JH, Liao XF, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300

    Article  Google Scholar 

  35. Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi JY (2020) A novel image security technique based on nucleic acid concepts. Journal of Information Security and Applications 53:102505

    Article  Google Scholar 

  36. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351

    Article  Google Scholar 

  37. Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687–698

    Article  Google Scholar 

  38. Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584–600

    Article  MathSciNet  MATH  Google Scholar 

  39. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186

    Article  Google Scholar 

Download references

Acknowledgments

This study was supported by the National Natural Science Foundation of China (No: 61672124), Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), and Jinan City 20 Universities Funding Projects Introducing Innovation Team Program (No: 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (No: MIMS20-M-02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yongjin Xian or Xingyuan Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xian, Y., Wang, X., Zhang, Y. et al. A novel chaotic image encryption with FSV based global bit-level chaotic permutation. Multimed Tools Appl 82, 407–426 (2023). https://doi.org/10.1007/s11042-022-13280-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13280-6

Keywords

Navigation