Abstract
In the last decade, with a rapid increase in multimedia productions, image encryption has become a significant part of information security. The inherent image features make image encryption different from text encryption and also makes it difficult to encrypt images using the traditional encryption techniques. This paper presents an overview of the different encryption algorithms in details, analyzing its effect in the field of image cryptography. The paper further discusses the role of chaos theory in the field of image encryption and makes use of the chaos theory to propose an image encryption technique that is based on pixel permutation. Existing image encryption techniques produce encrypted images that resemble a texture or noise like image increasing the chance of attack as it becomes perceivable as an encrypted image. The proposed image encryption technique produces an encrypted image and masquerades it with any general image, hence eluding the attacker. The proposed algorithm is also compared with the Arnold’s cat map algorithm visually as well as statistically using the evaluation metrics Structural Similarity Index (SSIM), Correlation coefficient (CC) and Number of changing Pixel Rate (NPCR).
Similar content being viewed by others
References
Al-Khassaweneh M, Tawalbeh S (2013) A value transformation and random permutation-based coloured image encryption technique. Int J Inf Comput Secur 5 (4):290–300
Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–24
Aljawarneh S, Yassein MB (2018) A multithreaded programming approach for multimedia big data: encryption system. Multimed Tools Appl 1:1–20
Badve O, Gupta BB, Gupta S (2016) Reviewing the security features in contemporary security policies and models for multiple platforms. In: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, pp 479–504
Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications 9(4):289–306
Chen G, Mao Y, Chui CK (2004) Symmetric image encryption scheme based on 3D chaotic cat maps. Chaos. Solitons & Fractals. 21(3):749–61
Dang PP, Chau PM (2000) Image encryption for secure internet multimedia applications. IEEE Trans Consum Electron 46(3):395–403
Davies B (2018) Exploring chaos: theory and experiment. CRC Press, Boca Raton
Dey S, Ghosh R (2018) A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes. PeerJ Preprints
Fouda JA, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–88
Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–78
Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–23
Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1-3):153–7
Huang CK, Liao CW, Hsu SL, Jeng YC (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52(2):563–71
Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–7
Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education, New York, pp 94–107
Khan MF, Ahmed A, Saleem K (2019) A novel cryptographic substitution box design using gaussian distribution. IEEE Access 7:15999–6007
Konikoff J, Toplosky S (2010) Analysis of simplified DES algorithms. Cryptologia 34(3):211–24
Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57
Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842
Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–903
Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Opt Lasers Eng 51(1):8–14
Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–72
Nag A, Singh JP, Khan S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 international conference on signal processing, communication, computing and networking technologies (ICSCCN). IEEE, pp 309–312
Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: Tencon 2009-2009 IEEE region 10 conference. IEEE, pp 1–4
Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(3):277–92
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–34
Patil P, Narayankar P, Narayan DG, Meena SM (2016) Comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science. 78:617–24
Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans Dependable Secure Comput 15 (6):1055–1067
Reyad O, Mofaddel MA, Abd-Elhafiez WM, Fathy M (2017) A novel image encryption scheme based on different block sizes for grayscale and color images. In: 2017 12th international conference on computer engineering and systems (ICCES). IEEE, pp 455–461
Rijmen V, Daemen J (2001) Advanced encryption standard. Proceedings of federal information processing standards publications. National Institute of Standards and Technology, pp 19–22
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–6
Schaefer EF (1996) A simplified data encryption standard algorithm. Cryptologia 20(1):77–84
Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (Blowfish). InInternational Workshop on Fast Software Encryption. Springer, Berlin, pp 191–204
Selent D (2010) Advanced encryption standard. Rivier Academic Journal 6(2):1–4
Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187–95
Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550–9
Tang L (1997) Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the fourth ACM international conference on Multimedia. ACM, pp 219–229
Vaidyanathan S, Rajagopal K (2017) LabVIEW implementation of chaotic masking with adaptively synchronised forced Van der Pol oscillators and its application in real-time image encryption. Int J Simul Process Model 12(2):165–78
Wahballa O, Wahaballa A, Li F, Idris II, Xu C (2017) Medical image encryption scheme based on arnold transformation and ID-AK protocol. IJ Network Security 19(5):776–84
Wang J, Zheng N, Chen B, Principe JC (2017) Associations among image assessments as cost functions in linear decomposition: MSE, SSIM, and Correlation Coefficient. arXiv:1708.01541
Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733–46
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–12
Wu Y, Noonan JP, Agaian S (2011) UACI Randomness tests for image encryption NPCR Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–8
Xie EY, Li C, Yu S, Lu J (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process 132:150–154
Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn 69(4):2079–87
Yun-Peng Z, Wei L, Shui-Ping C, Zheng-Jun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: SMC 2009 IEEE international conference on systems, man and cybernetics, 2009. IEEE, pp 474–479
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–80
Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234–42
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sci 181(6):1171–86
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Anwar, S., Meghana, S. A pixel permutation based image encryption technique using chaotic map. Multimed Tools Appl 78, 27569–27590 (2019). https://doi.org/10.1007/s11042-019-07852-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07852-2