Advertisement

Secure color image cryptosystem based on chaotic logistic in the FrFT domain

  • Osama S. Faragallah
  • Mohammed A. AlZain
  • Hala S. El-Sayed
  • Jehad F. Al-Amri
  • Walid El-ShafaiEmail author
  • Ashraf Afifi
  • Ensherah A. Naeem
  • Ben Soh
Article
  • 33 Downloads

Abstract

Recently, the digital multimedia security technology has been an interesting research theme due to fast advancement in employing real time multimedia through Internet and wireless networks. The market of multimedia streaming, such as exclusive video on demand (VoD) is a huge multi- billion-dollar market. This market is threatened by hackers. The multimedia streaming industry needs a cryptosystem that is both fast and secure. Chaotic cryptosystems have been proposed by many researchers in order to promote communication security. However, these chaotic schemes have some major problems, such as unacceptable expansion of data, slow performance speed, and shortcomings against differential attack. Therefore, this paper provides an efficient Fractional Fourier Transform (FrFT)-based logistic map (LM) color image encryption scheme by applying a 2D LM on FrFT. In the proposed FrFT-based LM color image encryption scheme, the 2D LM is employed as a confusion step to scramble the color image pixel positions in the FrFT and confuse the relationship between the cipherimage and the plainimage. For enhancing the encryption performance characteristics of the 2D LM under the FrFT, the angle of the FrFT is taken as an extra additional key in encryption. The proposed FrFT-based LM color image encryption scheme is examined and investigated using visual inspection, entropy, histograms, encryption quality, noise tests, and differential analysis. The obtained simulation tests demonstrate and verify the effectiveness of the FrFT-based LM color image encryption scheme. Moreover, our results also show a significant improvement in the performance of the confusion property with our proposed 2D LM encryption scheme using the FrFT. Also, we compared the proposed cryptosystem with recent state-of-the-art cryptosystems. Experimental results show that our proposed image cryptosystem is highly secure from the cryptographic point of view. Furthermore, the obtained test results ensured the superiority of our proposed cryptosystem for digital image transmission compared to the recent state-of-theart cryptosystems.

Keywords

Cryptography Image encryption Fractional fourier transform (FrFT) 2D logistic map (2D LM) Security analysis Noise immunity 

Notes

References

  1. 1.
    Abu-Marie W, Gutub A, Abu-Mansour H (2010) Image Based Steganography Using Truth Table Based and Determinate Array on RGB Indicator. International Journal of Signal & Image Processing 1(3)Google Scholar
  2. 2.
    Alanazi, N, Alanizy, A, Baghoza, N, Al Ghamdi, M, Gutub, A (2018). 3-Layer PC Text Security via Combining Compression, AES Cryptography 2LSB Image SteganographyGoogle Scholar
  3. 3.
    Alassaf N, Alkazemi B, Gutub A (2003) Applicable light-weight cryptography to secure medical data in IoT systems. ArabiaGoogle Scholar
  4. 4.
    Alassaf N, Gutub A, Parah S, Ghamdi A, Manal (2018) Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl.  https://doi.org/10.1007/s11042-018-6801-z
  5. 5.
    Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl:1–28Google Scholar
  6. 6.
    Aljawarneh SA, Moftah RA, Maatuk AM (2016) Investigations of automatic methods for detecting the polymorphic worms signatures. Futur Gener Comput Syst 60:67–77CrossRefGoogle Scholar
  7. 7.
    Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724CrossRefGoogle Scholar
  8. 8.
    Aljawarneh S, Yassein MB (2018) A multithreaded programming approach for multimedia big data: encryption system. Multimed Tools Appl 77(9):10997–11016CrossRefGoogle Scholar
  9. 9.
    Aljuaid N, Gutub A, Khan E (2018) Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography. Journal of Information Security and Cybercrimes Research (JISCR) 1.  https://doi.org/10.26735/16587790.2018.006
  10. 10.
    Al-Otaibi NA, Gutub AA (2014) 2-leyer security system for hiding sensitive text data on personal computers. Lecture Notes on Information Theory 2(2):151–157Google Scholar
  11. 11.
    Alsaidi A, Al-lehaibi K, Alzahrani H, AlGhamdi M, Gutub A (2018) Compression multi-level crypto stego security of texts utilizing colored email forwarding. Journal of Computer Science & Computational Mathematics (JCSCM) 8(3):33–42CrossRefGoogle Scholar
  12. 12.
    Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of Digital Fingerprint Image Quality on the Fingerprint Recognition Accuracy. Multimed Tools Appl 78:3649.  https://doi.org/10.1007/s11042-017-5537-5 CrossRefGoogle Scholar
  13. 13.
    Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497MathSciNetCrossRefGoogle Scholar
  14. 14.
    Atawneh S, Almomani A, Al Bazar H, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451–18472CrossRefGoogle Scholar
  15. 15.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213CrossRefGoogle Scholar
  16. 16.
    Chen JX, Zhu ZL, Fu C, Yu H (2015) Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Optics Comm 341:263–270CrossRefGoogle Scholar
  17. 17.
    Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353CrossRefGoogle Scholar
  18. 18.
    Elhosany HM, Hossin HE, Kazemian HB, Faragallah OS (2012) C9. Chaotic encryption of images in the Fractional Fourier Transform domain using different modes of operation. In Radio Science Conference (NRSC), 2012 29th National (pp. 223-235). IEEEGoogle Scholar
  19. 19.
    El-Latif AAA, Abd-El-Atty B, Hossain MS, Rahman MA, Alamri A, Gupta BB (2018) Efficient quantum information hiding for remote medical image sharing. IEEE Access 6:21075–21083CrossRefGoogle Scholar
  20. 20.
    Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769CrossRefGoogle Scholar
  21. 21.
    Gupta BB (2018) Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives. CRC Press, Taylor & Francis 666Google Scholar
  22. 22.
    Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security (1st ed.). IGI Global, HersheyCrossRefGoogle Scholar
  23. 23.
    Gutub AAA (2010) Pixel indicator technique for RGB image steganography. Journal of Emerging Technologies in Web Intelligence 2(1):56–64Google Scholar
  24. 24.
    Gutub A, Al-Ghamdi M (2019) Image Based Steganography to Facilitate Improving Counting-Based Secret Sharing. 3D Res 10(1):6CrossRefGoogle Scholar
  25. 25.
    Gutub A, Aljuaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority.  https://doi.org/10.63019/jche.v1i2.513
  26. 26.
    Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619CrossRefGoogle Scholar
  27. 27.
    Gutub AAA, Khan FAA (2012) Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. In 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT) (pp. 116-121). IEEEGoogle Scholar
  28. 28.
    Hamza R, Yan Z, Muhammad K, Bellavista P, Titouna F (2019) A privacy-preserving cryptosystem for IoT E-healthcare. Inf SciGoogle Scholar
  29. 29.
    Jiang X, Sun J, Li C, Ding H (2018) Video Image Defogging Recognition Based on Recurrent Neural Network. IEEE Transactions on Industrial Informatics 14(7):3281–3288CrossRefGoogle Scholar
  30. 30.
    Kong D, Shen X (2014) Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transform. Opt Laser Technol 57:343–349CrossRefGoogle Scholar
  31. 31.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246CrossRefGoogle Scholar
  32. 32.
    Li J, Yu C, Gupta BB, Ren X (2018) Color image watermarking scheme based on quaternion Hadamard transform and Schur decomposition. Multimed Tools Appl 77(4):4545–4561CrossRefGoogle Scholar
  33. 33.
    Mary SJ, Christopher CS, Joe SSA (2016) Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits and Systems 7(08):1722CrossRefGoogle Scholar
  34. 34.
    Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik-International Journal for Light and Electron Optics 127(13):5190–5192CrossRefGoogle Scholar
  35. 35.
    Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait Journal of Science and Engineering 38:127–142Google Scholar
  36. 36.
    Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075CrossRefGoogle Scholar
  37. 37.
    Ran Q, Zhao T, Yuan L, Wang J, Xu L (2014) Vector power multiple-parameter fractional Fourier transform of image encryption algorithm. Opt Lasers Eng 62:80–86CrossRefGoogle Scholar
  38. 38.
    Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215CrossRefGoogle Scholar
  39. 39.
    Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynamics 62(3):615–621MathSciNetCrossRefGoogle Scholar
  40. 40.
    Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61CrossRefGoogle Scholar
  41. 41.
    Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Opt Lasers Eng 91:41–52CrossRefGoogle Scholar
  42. 42.
    Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483CrossRefGoogle Scholar
  43. 43.
    Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks 9(13):2015–2023Google Scholar
  44. 44.
    Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer-generated hologram. Multimed Tools Appl 77:4585.  https://doi.org/10.1007/s11042-017-4637-6 CrossRefGoogle Scholar
  45. 45.
    Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186CrossRefGoogle Scholar
  46. 46.
    Zou L, Sun J, Gao M, Wan W, Gupta BB (2019) A novel coverless information hiding method based on the average pixel value of the sub-images. Multimed Tools Appl 78(7):7965–7980CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Science and Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  2. 2.Department of Information Technology, College of Computers and Information TechnologyTaif UniversityAl-HawiyaKingdom of Saudi Arabia
  3. 3.Department of Electrical Engineering, Faculty of EngineeringMenoufia UniversityShebin El-komEgypt
  4. 4.Department of Electronics and Electrical Communications Engineering, Faculty of Electronic EngineeringMenoufia UniversityMenoufEgypt
  5. 5.Department of Electrical Engineering and ComputersHigher Technological Institute10th of RamadanEgypt
  6. 6.Department of Electronics and Electrical CommunicationsHigher Institute of Engineering and TechnologyKafrelsheikhEgypt
  7. 7.Department of Computer Science and Computer EngineeringLa Trobe UniversityBundooraAustralia

Personalised recommendations