Skip to main content
Log in

Efficient image encryption scheme based on generalized logistic map for real time image processing

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

In this era of the information age with digitalization, the transmission of sensitive real-time image information over insecure channels is highly-likely to be accessed or even attacked by an adversary. To prevent such unauthorized access, cryptography is being used to convert sensitive information in real-time images into unintelligible data. Most of the time, schemes are proposed with a high level of security. However, the challenge always remains the slower speeds due to their high complexity which makes them unusable in the applications of real-time images. In this paper, an efficient image encryption algorithm has been developed and tested for real-time images. The proposed scheme makes use of encryption with an efficient permutation technique based on a modular logistic map to bring down the size of the chaotic value vector, required to permute real-time image. We show that an efficient permutation is obtained using only \(\sqrt{N}\) chaotic numbers for a square image with 3N pixels (N Pixels in each color bit plane). The algorithm makes use of a 192-bit key; divided into smaller blocks and each block selected chaotically to diffuse the pixel using multiple XOR operations. The experimental analysis reveals that the proposed algorithm is immune to various statistical and differential attacks such as entropy, histogram analysis, spectral characteristic analysis, etc. A comparison of the proposed scheme with some state-of-the-art techniques show that it performs better, and as such, can be utilized for efficient real-time image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Kim, M., Lee, H.T., Ling, S., Tan, B.H.M., Wang, H.: Private compound wildcard queries using fully homomorphic encryption. IEEE Trans. Depend. Secure. Comput. 16(5), 743–756 (2017)

    Article  Google Scholar 

  2. Hellman, M.: An overview of public-key cryptography. IEEE Commun. Soc. Mag. 16(6), 24–32 (1978)

    Article  Google Scholar 

  3. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  4. Navnish, G., Amitabh, M., Babloo, K.: Information security: encryption and decryption with polyalphabetic substitution. Int. J. Comput. Sci. Commun. 2(1), 1–4 (2011)

    Google Scholar 

  5. Stallings, W.: Cryptography and network security: principles and practice. Pearson Education India, Bengaluru (2003)

    Google Scholar 

  6. Forouzan, B.A., Mukhopadhyay, D.: Cryptography and network security (Sie). McGraw-Hill Education, New York (2011)

    Google Scholar 

  7. Manogaran, C.T.G., Priyan, M.: Centralized fog computing security platform for IoT and cloud in the healthcare system. Exploring the convergence of big data and the internet of things, pp. 141–154. IGI Global, Pennysylvania (2017)

    Google Scholar 

  8. Parah, S.A., Sheikh, J.A., Bhat, G.M.: On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Elixir Comp. Sci. Eng. 49, 10141–10146 (2012)

    Google Scholar 

  9. Bhat, G.M., Sheikh, J.A, Parah, S.A.: Data hiding in ISB planes: a high capacity blind stenographic technique. Proceedings of IEEE sponsored international conference INCOSET-2012, Tiruchirapalli Tamilnadu, India, pp. 192–197 (2012)

  10. Parah, S., Sheikh, J., Bhat, G.M.: High capacity data embedding using joint intermediate significant bit and least significant technique. Int. J. Inf. Eng. Appl. 2(11), 1–11 (2013)

    Google Scholar 

  11. Sheikh, J.A., Parah, S.A., Bhat, G.M.: Data hiding in color images: a high capacity data hiding technique for covert communication. Comput. Eng. Intell. Syst. 4(13), 113–118 (2013)

    Google Scholar 

  12. Bhat, G.M., Sheikh, J.A, Parah, S.A.: On the realization of a spatial domain data hiding technique based on intermediate significant bit plane embedding (ISBPE) and post embedding pixel adjustment (PEPA). Proceedings of IEEE international conference on multimedia signal processing and communication technologies-IMPACT 2013, (AMU, Aligarh 23–25 November) pp. 51–55 (2013)

  13. Parah, S.A., Sheikh, J.A., Bhat, G.M.: Data hiding in scrambled images: a new double-layer security data hiding technique. Comput. Electr. Eng. 40(1), 70–82 (2014)

    Article  Google Scholar 

  14. Parah, S.A., Sheikh, J.A., Bhat, G.M.: ‘A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am. J. Eng. Technol. Res. 14(2), 38–44 (2014)

    Google Scholar 

  15. Sheikh, J.A., Parah, S.A., Bhat, G.M.: A secure and robust information hiding technique for covert communication. Int. J. Electron. 102(8), 1253–1266 (2015)

    Article  Google Scholar 

  16. Farhana, A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: On the realization of robust watermarking system for medical images. 12th IEEE India International Conference (INDICON) on electronics, energy, environment, communication, computers, control (E3-C3), 17–20 December, Jamia Millia Islamia, New Delhi, pp. 1–6 (2015)

  17. Nazir, A., Parah, S.A., Sheikh, J.A., Farhana, A., Bhat, G.M.: Information hiding in medical images: a robust medical image watermarking system for e-healthcare. Multimedia Tools Appl. 76(8), 10599–10633 (2015)

    Google Scholar 

  18. Parah, S.A., Sheikh, J.A., Bhat, G.M.: Hiding in encrypted images: a three-tier security data hiding system. Multidimens. Syst. Signal Process. 28, 549–572 (2015). https://doi.org/10.1007/s11045-015-0358-z

    Article  MATH  Google Scholar 

  19. Akhoon, J.A., Parah, S.A., Sheikh, J.A., Bhat, G.M.: Information hiding in edges: a high capacity information hiding technique using hybrid edge detection. Multimedia Tools Appl. 77, 185–207 (2016). https://doi.org/10.1007/s11042-016-4253-x

    Article  Google Scholar 

  20. Loan, N., Parah, S.A., Sheikh, J.A., Bhat, G.M.: Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digital Signal Process. 53, 11–24 (2016). https://doi.org/10.1016/j.dsp.2016.02.005

    Article  Google Scholar 

  21. Ahad, F., Parah, S.A., Sheikh, J.A., Loan, N.A., Bhat, G.M.: Reversible and high capacity data hiding technique for e-healthcare applications. Multimedia Tools Appl. 76, 3943–3975 (2016). https://doi.org/10.1007/s11042-016-4196-2

    Article  Google Scholar 

  22. Sheikh, J.A., Parah, S.A., Bhat, G.M.: StegNmark: a joint Stego-watermark approach for early tamper detection. Intell. Techn. Signal Process. Multimedia Secur. 660, 427–452 (2016). https://doi.org/10.1007/978-3-319-44790-2_19

    Article  Google Scholar 

  23. Sheikh, J.A., Sheikh, J.A., Assad, U.I., Bhat, G.M.: Realization and robustness evaluation of a blind spatial domain watermarking technique. Int. J. Electron. 104(4), 659–672 (2016). https://doi.org/10.1080/00207217.2016.1242162

    Article  Google Scholar 

  24. Bhat, G.M., Parah, S.A., Sheikh, J.A., Loan, N.: Utilizing neighborhood coefficient correlation: a new image watermarking technique robust to singular and hybrid attacks. Multidimension. Syst. Signal Process. 29(3), 1095–1117 (2017). https://doi.org/10.1007/s11045-017-0490-z

    Article  MathSciNet  MATH  Google Scholar 

  25. Xu, Q., Sun, K., Cao, C., Zhu, C.: A fast image encryption algorithm based on compressive sensing and hyperchaotic map. Opt. Lasers Eng. 121, 203–214 (2019)

    Article  Google Scholar 

  26. Goubin, L., Patarin, J., Yang, B.Y.: Multivariate cryptography. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of cryptography and security. Springer, Boston (2011). https://doi.org/10.1007/978-1-4419-5906-5_421

    Chapter  Google Scholar 

  27. Nilsson, A., Johansson, T., Wagner, P.S.: Error amplification in code-based cryptography. IACR Trans. Cryptogr. Hardw. Embed Syst. 2019(1), 238–258 (2019)

    Google Scholar 

  28. Blaz, B.: Breaking RSA with quantum computing, https://mafija.fmf.unilj.si/seminar/files/2007_2008/BreakingRSA.pdf

  29. Tornea, O., Borda, M. E.: DNA cryptographic algorithms. International conference on advancements of medicine and health care through technology, Springer, Berlin, vol. 26, pp. 223–226 (2009)

  30. Hilborn, R.C.: Chaos and nonlinear dynamics: an introduction for scientists and engineers. Oxford University Press, Oxford (2000)

    Book  MATH  Google Scholar 

  31. Parvin, Z., Seyedarabi, H., Shamsi, M.: A new secure and sensitive image encryption scheme based on new substitution with chaotic function. Multimedia Tools Appl. 75, 10631–10648 (2016). https://doi.org/10.1007/s11042-014-2115-y

    Article  Google Scholar 

  32. Tong, X., Cui, M.: Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis. Comput. 26(6), 843–850 (2008)

    Article  Google Scholar 

  33. Afolabi, A.O., Adagunodo, R.: Implementation of an improved data encryption algorithm in a web-based learning system. Phys. Int. 2(1), 31–35 (2011)

    Article  Google Scholar 

  34. Gaurav, S.: Secure file transmission scheme based on hybrid encryption technique. Int. J. Manag. IT Eng. 2(1), 229–238 (2012)

    MathSciNet  Google Scholar 

  35. Goldreich, O.: Introduction to complexity theory lecture notes. Weizmann Institute of Science, Israel, 24. https://www.wisdom.weizmann.ac.il/~oded/PS/CC/all.pdf (1999)

  36. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  37. Pub, N. F.: Advanced encryption standard (AES). Federal information processing standards publication, vol. 197. https://www.federalregister.gov/documents/2001/12/06/01-30232/announcing-approval-of-federal-information-processing-standard-fips-197-advanced-encryption-standard (2001)

  38. Farheen, S., Bikiran, C., Shobha, M.S., Jitendranath, M.: A study on data encryption using AES and RSA. Int. J. Innov. Res. Comput. Commun. Eng. 5(4), 8807–8811 (2017)

    Google Scholar 

  39. Sinha, A., Singh, K.: A technique for image encryption using a digital signature. Opt. Commun. 218(4–6), 229–234 (2003)

    Article  Google Scholar 

  40. Blackedge, J.M., Ahmed, M., Farooq, O.: Chaotic image encryption algorithm based on frequency domain scrambling. Dublin Institute of Technology, Dublin (2010)

    Google Scholar 

  41. Li, C., Chen, G.: On the security of a class of image encryption schemes. IEEE international symposium on circuits and systems ISCAS 2008, Washington USA, pp. 3290–3293 (2008)

  42. Xiao, G., Lu, M., Qin, L., Lai, X.: New field of cryptography: DNA cryptography. Chin. Sci. Bull. 51(12), 1413–1420 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  43. Leier, A., Richter, C., Banzhaf, W., Rauhe, H.: Cryptography with DNA binary strands. Biosystems 57(1), 13–22 (2000)

    Article  Google Scholar 

  44. Maniyath, S.R., Supriya, M.: An uncompressed image encryption algorithm based on DNA sequences. Comput. Sci. Inf. Technol. 2, 258–270 (2011)

    Google Scholar 

  45. Kumar, D., Singh, S.: Secret data writing using DNA sequences. International conference on emerging trends in networks and computer communications (ETNCC), pp. 402–405 (2011)

  46. Debbarma, N., Kumari, L., Raheja, J.L.: 2D Chaos based color image encryption using pseudorandom key generation. Chaos 2(4), 387–392 (2013)

    Google Scholar 

  47. Sakthidasan, K., Krishna, B.S.: A new chaotic algorithm for image encryption and decryption of digital color images. Int. J. Inf. Educ. Technol. 1(2), 137–141 (2011)

    Google Scholar 

  48. Al-Najjar, H.M., Al-Najjar, A.M.: Image encryption algorithm based on the logistic map and pixel mapping table. Proceedings of international Arab conference on information technology, pp. 56–60 (2011)

  49. Waghmare, A., Bhagat, A., Surve, A., Kalgutkar, S.: Chaos based image encryption and decryption. Int. J. Adv. Res. Comput. Commun. Eng. 5(4), 64–68 (2016)

    Google Scholar 

  50. Shah, A.A., Parah, S.A.: Chaos-based novel cryptographic technique based on a new logistic map. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1), 73–94 (2017)

    Article  Google Scholar 

  51. Murillo-Escobar, M.A., Abundiz-Pérez, F., Cruz-Hernández, C., López-Gutiérrez, R.M.: A novel symmetric text encryption algorithm based on logistic map. Proceedings of the international conference on communications, signal processing and computers, pp. 49–53 (2014).

  52. Joshi, A., Kumari, M.: Encryption of RGB image using Arnold transform and involuntary matrices. IJARCCE 4(9), 489–494 (2015)

    Google Scholar 

  53. Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. 3(1), 8–13 (2015)

    Google Scholar 

  54. Pareek, N.K., Patidar, V., Sud, K.K.: Diffusion-substitution based gray image encryption algorithm. Digital Signal Process. 23(8), 894–901 (2013)

    Article  MathSciNet  Google Scholar 

  55. Yang, H., Wong, K.W., Liao, X., Zhang, W., Wei, P.: A fast image encryption and authentication scheme based on chaotic maps. Commun. Nonlinear Sci. Numer. Simul. 15(11), 3507–3517 (2010)

    Article  MATH  Google Scholar 

  56. El-Latif, A.A.A., Niu, X.: A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU Int. J. Electron. Commun. 67(2), 136–143 (2013)

    Article  Google Scholar 

  57. Norouzi, B., Seyedzadeh, S.M., Mirzakuchaki, S., Mosavi, M.R.: A novel image encryption based on a hash function with only a two-round diffusion process. Multimedia Syst. 20(1), 45–64 (2014)

    Article  MATH  Google Scholar 

  58. Patro, K.A.K., Acharya, B.: An efficient colour image encryption scheme based on 1-D chaotic maps. J. Inf. Secur. Appl. 46, 23–41 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabir A. Parah.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shah, A.A., Parah, S.A., Rashid, M. et al. Efficient image encryption scheme based on generalized logistic map for real time image processing. J Real-Time Image Proc 17, 2139–2151 (2020). https://doi.org/10.1007/s11554-020-01008-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-020-01008-4

Keywords

Navigation