Abstract
A novel chaotic image encryption cryptosystem presented in this paper employs a newly proposed fractal sorting vector (FSV) and FSV based global bit-level chaotic permutation (FSV-GBCP). The proposed FSV had irregularity, self-similarity, and iterability, suiting for the construction of chaotic image encryption methods of any size. Based on FSV, the global bit-level permutation effectively improved the security of the cryptographic system. The experiment results and comparisons with other bit-level permutation encryption methods show that the proposed has short runtime and good encryption effect. Therefore, the cryptosystem is sufficient to achieve the desired level of security. The newly proposed FSV and FSV-GBCP have played the positive role in promoting the field of image encryption, and this research direction is worthy of further study and attention.
Similar content being viewed by others
References
Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58
Alawida M, Teh JS, Samsudin A, Alshoura W’H (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249–266
Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16(8):2129–2151
Ayubi P, Setayeshi S, Rahmani AM (2020) Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application. Journal of Information Security and Applications 52:102472
M. Benssalah, Y. Rhaskali,·K. Drouiche. An efficient image encryption scheme for TMIS based on elliptic curve integrated encryption and linear cryptography. Multimed Tools Appl, 2021, 80(2): 2081–2107.
Cao C, Sun KH, Liu WH (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122–133
Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327
Es-Sabry M, El Akkad N, Merras M et al (2020) A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators. Soft Comput 24(5):3829–3848
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 8(6):1259–1284
Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253
Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419
A. Kovalchuk, N. Lotoshynska, M.G. ML, et al. An Approach towards an Efficient Encryption-Decryption of Grayscale and Color Images. Procedia Computer Science, 2019, 155: 630–635.
Kovalchuk A, Izonin I, ML MG et al (2019) An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations. Procedia Computer Science 160:491–496
Kovalchuk A, Izonin I, ML MG et al (2019) Information Protection Service using Topological Image Coverage. Procedia Computer Science 160:503–508
Kovalchuk A, Izonin I, ML MG et al (2019) An Efficient Image Encryption Scheme using Projective Transformations. Procedia Computer Science 160:584–589
Li CQ, Lin DD, Lu JH (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE Multimedia 24(3):64–71
Li JF, Xiang SY, Wang HN et al (2018) A novel image encryption algorithm based on synchronized random bit generated in cascade-coupled chaotic semiconductor ring lasers. Opt Lasers Eng 102:170–180
Liao X, Yu YB, Li B et al (2020) A new payload partition strategy in color image steganography. IEEE Transactions on Circuits and Systems for Video Technology 30(3):685–696
Liu X, Song YR, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network. International Journal of Bifurcation and Chaos 29:2
Ma B, Shi YQ (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11(9):1914–1927
Ni ZC, Shi YQ, Ansari N et al (2006) Reversible data hiding. IEEE Transactions on Circuits and Systems for Video Technology 16(3):354–362
Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. Journal of Information Security and Applications 52:102470
Peng HP, Yang B, Li LX et al (2020) Secure and traceable image transmission scheme based on semitensor product compressed sensing in telemedicine system. IEEE Internet Things J 7(3):2432–2451
Popoff S, Lerosey G, Fink M, Boccara AC, Gigan S (2010) Image transmission through an opaque material. Nat Commun 1:81
A. Sarkar,·B. K. Singh. A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function. Multimed Tools Appl, 2021, 80(1): 799–829.
Shahna K, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162
Shanthakumari R, Malliga S (2021) Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm. Multimed Tools Appl 79(5–6):3975–3991
Tang ZJ, Song J, Zhang XQ et al (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11
Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36
Wang XY, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214
Wang XY, Luan DP, Bao XM (2014) Cryptanalysis of an image encryption algorithm using Chebyshev generator. Digital Signal Processing 25:244–247
Wang XY, Zhang YQ, Bao WM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61
Wang CP, Wang XY, Xia ZQ et al (2020) Image description with polar harmonic Fourier moments. IEEE Transactions on Circuits and Systems for Video Technology 30(12):4440–4452
Wu JH, Liao XF, Yang B (2018) Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process 142:292–300
Yadollahi M, Enayatifar R, Nematzadeh H, Lee M, Choi JY (2020) A novel image security technique based on nucleic acid concepts. Journal of Information Security and Applications 53:102505
Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273:329–351
Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dynamics 77(3):687–698
Zhang W, Wong KW, Yu H, Zhu ZL (2013) A symmetric color image encryption algorithm using the intrinsic features of bit distributions. Commun Nonlinear Sci Numer Simul 18(3):584–600
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Acknowledgments
This study was supported by the National Natural Science Foundation of China (No: 61672124), Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), and Jinan City 20 Universities Funding Projects Introducing Innovation Team Program (No: 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (No: MIMS20-M-02).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xian, Y., Wang, X., Zhang, Y. et al. A novel chaotic image encryption with FSV based global bit-level chaotic permutation. Multimed Tools Appl 82, 407–426 (2023). https://doi.org/10.1007/s11042-022-13280-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-13280-6