Exploring a novel fusion-scheme based on mathematical equation system for encryption-image algorithm


Exploring the conception of robust encryption techniques for the security of digital images is a permanent necessity due to the existence of the Internet where sending and receiving information to establish communication is a high priority activity. Encryption process is carried out by data transformation, i.e. shuffled or scrambled, so that the information can not be read by an unauthorized receiver and it can exclusively be decrypted using valid-keys. In this paper, a novel fusion-scheme based on mathematical equation system for encryption-image algorithm is explored. In order to do that, numerical pixels are introduced in a system of equations for fusing images with three different private-keys. In addition, classical tests between original and encrypted images such as correlation coefficient, number of changing pixel rate (NPCR), unified average changed intensity (UACI) and entropy have been carried out to support the effectiveness of image fusion for image encryption.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11


  1. 1.

    Bansal R, Chawla R, Gupta S (2016) A comparison of image encryption techniques based on chaotic maps. In: 2016 3Rd international conference on computing for sustainable global development (INDIACom), pp 933–938

  2. 2.

    Borujeni Shahram Etemadi EM (2009) Chaotic image encryption design using tompkins-paige algorithm. In: Mathematical problems in engineering 2009, vol 22, pp 762–652

  3. 3.

    Chen H (2019) Component Fusion Image Encryption Method Based on Composite Chaotic Model 2019 4th International Conference on Mechanical, Control and Computer Engineering (ICMCCE). Hohhot, China, pp 493–4934

    Google Scholar 

  4. 4.

    Chen D, Zhu Z, Yang G (2008) An improved image encryption algorithm based on chaos. In: 2008 The 9th international conference for young computer scientists, pp 2792–2796

  5. 5.

    Chidambaram N, et al. (2018) A Logistic Approach to Route Image in a Protected Way-a Skeptimistic Image Image Encryption a Fusion, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore

  6. 6.

    Chunguang H, Hai C, Yu S, Qun D (2015) Permutation of image encryption system based on block cipher and stream cipher encryption algorithm. In: 2015 Third international conference on robot, vision and signal process- ing (RVSP), pp 163–166

  7. 7.

    Cid C, Murphy S, Robshaw M (2004) Computational and algebraic aspects of the advanced encryption standard. In: Proceedings of the Seventh Inter- national Workshop on Computer Algebra in Scientific Computing, CASC 2004, pp 93–103

  8. 8.

    Dongfeng S, Jian H, Yingjian W, et al. (2017) Simultaneous fusion, imaging and encryption of multiple objects using a single-pixel detector. Sci Rep 7:13172

    Article  Google Scholar 

  9. 9.

    Essaid M, Akharraz I, Saaidi A, Mouhib A (2019) A novel image encryption scheme based on permutation/diffusion process using an improved 2D chaotic system,2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS). Fez, Morocco, pp 1–6

    Google Scholar 

  10. 10.

    Hamici Z (2017) Image cryptography based on the imitation of gene fusion and horizontal gene transfer, 2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA). Montreal, QC, pp 1–6

    Google Scholar 

  11. 11.

    Huang CK, Liao CW, Hsu SL, Jeng YC (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52(2):563–571

    Google Scholar 

  12. 12.

    Kalubandi VKP, Vaddi H, Ramineni V, Loganathan A (2016) A novel image encryption algorithm using AES and visual cryptography. In: 2016 2Nd international conference on next generation computing technologies (NGCT), pp 808–813

  13. 13.

    Khan M (2018) W.H.: A novel image encryption scheme based on quantum dynamical spinning and rotations. PLOs one 13(11)

  14. 14.

    Liang Y, Xiao Z (2018) Image encryption algorithm based on compressive sensing and fractional DCT via polynomial interpolation. Int j Autom comput

  15. 15.

    Liu S, Sun J, Xu Z, Liu J (2008) Analysis on an image encryption algorithm. In: 2008 International workshop on education technology and training 2008 international workshop on geoscientific and remote sensing, vol 1, pp 803–806

  16. 16.

    Nag A, Singh JP, Khan S, Ghosh S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 International conference on signal processing, communication, computing and networking technologies, pp 309–312

  17. 17.

    Nasir Q, Abdlrudha HH (2012) High Security nested PWLCM chaotic map Bit-Level permutation based image encryption. In: International Journal of Communication, Network and System Sciences, vol 5, pp 548–556

  18. 18.

    Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. J Image Video Proc 2018 142

  19. 19.

    Ramasamy P, Ranganathan V, Kadry S, Damasevicius R, Blazauskas T (2019) An image encryption scheme based on block scrambling, modified zigzag transformation and key generation using enhanced Logistic-Tent map. Entropy 21:656

    MathSciNet  Article  Google Scholar 

  20. 20.

    Somaraj S, Hussain MA (2015) Performance and security analysis for image encryption using key image. In: Indian journal of science and technology 8(35)

  21. 21.

    Sun S, Guo Y, Wu R (2019). In: IEEE Access, vol 7, pp 28539–28547

  22. 22.

    Wolfram S (1999) The Mathematica book, version 4 cambridge university press

  23. 23.

    Wu Y, Member S, Noonan JP, Member L, Agaian S, Member S (2011) NPCR And UACI randomness tests for image encryption. In: Multidisciplinary journals in science and technology, journal of selected areas in telecommunications JSAT

  24. 24.

    Ye Z, Yin H, Ye Y (2017) Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain. In: 2017 14th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE), https://doi.org/10.1109/ICEEE.2017.8108905, pp 1–6

  25. 25.

    Yu G, Shen Y, Zhang G, Yang Y (2013) A chaos-based color image encryption algorithm. In: 2013 Sixth international symposium on computational intelligence and design, vol 2, pp 92–95

  26. 26.

    Zhang Y (2013) Encryption speed improvement on an improvement over an image encryption method based on total shuffling. In: Proceedings of 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, pp 201–205

  27. 27.

    Zhang X, Chen W (2008) A new chaotic algorithm for image encryption. In: 2008 International conference on audio, language and image processing, pp 889–892

  28. 28.

    Zhang Y, Zhang Z, Lei Y (2010) Research on chaotic cryptosystem based on time delay feedback Chua circuit. In: 2010 International conference on computer and communication technologies in agriculture engineering, vol 3, pp 187–190

Download references

Author information



Corresponding author

Correspondence to Delia Torres-Muñoz.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Torres-Muñoz, D., Vázquez-Leal, H. & Hernández-Mejía, C. Exploring a novel fusion-scheme based on mathematical equation system for encryption-image algorithm. Multimed Tools Appl (2020). https://doi.org/10.1007/s11042-020-09168-y

Download citation


  • Encryption image
  • Linear equation system
  • Fusion image
  • Statistics attack