Image encryption scheme with bit-level scrambling and multiplication diffusion

Abstract

As the most effective method of multimedia security protection, image encryption is widely used in data hiding, security authentication and content protection. However, the security and efficiency are still the key issues of image encryption algorithm. In this paper, a grayscale image encryption scheme based on the architecture of bit-level scrambling and multiplication diffusion is proposed. Firstly, the input image is decomposed into eight bit planes and randomly divided into three parts. Secondly, the scrambling process of each part is respectively realized by using binary tree, flip scrambling and improved circle index scrambling. Finally, the diffusing operation of the scrambled components is executed by improving the GF (257) domain multiplication. The remarkable advantage of the scrambling operation is that it not only effectively permutes the pixels, but also permutes the bits in each pixel, and consequently it sufficiently destroys the correlation of adjacent pixels. And the parallel processing of different scrambling operations will increase the confusion effect and real-time performance. Moreover, the key stream for scrambling and diffusion operations is designed and selected strictly dependent on the plain-image. Therefore, our encryption scheme significantly improves the security by disturbing known-plaintext and chosen-plaintext attacks. Simulation experiments and security analyses further verify that the proposed algorithm is secure and effective to withstand various attacks.

This is a preview of subscription content, access via your institution.

We’re sorry, something doesn't seem to be working properly.

Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

References

  1. 1.

    Atkins R, Mcdiarmid C (2019) Extremal distances for subtree transfer operations in binary trees. Ann Comb 23:1–26

    MathSciNet  MATH  Article  Google Scholar 

  2. 2.

    Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  3. 3.

    Carbajalgomez VH, Sanchezlopez C (2019) Determining accurate Lyapunov exponents of a multiscroll chaotic attractor based on SNFS. Nonlinear Dyn 98(3):2389–2402

    Article  Google Scholar 

  4. 4.

    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213

    Article  Google Scholar 

  5. 5.

    Chai X, Zheng X, Gan Z (2019) Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput Appl 32:8065–8088. https://doi.org/10.1007/s00521-019-04312-8

    Article  Google Scholar 

  6. 6.

    Chang D, Li Z, Wang M, Zeng Y (2018) A novel digital programmable multi-scroll chaotic system and its application in FPGA-based audio secure communication. AEU-Int J Electron Commun 88:20–29

    Article  Google Scholar 

  7. 7.

    Chidambaram N, Raj P, Karruppuswamy T, Amirtharajan R (2020) An advanced framework for highly secure and cloud-based storage of colour images. IET Image Process 14:3143–3153. https://doi.org/10.1049/iet-ipr.2018.5654

    Article  Google Scholar 

  8. 8.

    Diaconu A (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inform Sciences 355:314–327

    Article  Google Scholar 

  9. 9.

    Feng W, He Y (2018) Cryptanalysis and improvement of the hyper-chaotic image encryption scheme based on DNA encoding and scrambling. IEEE Photonics J 10(6):1–15

    Article  Google Scholar 

  10. 10.

    Feng W, He Y, Li H, Li C (2019) A plain-image-related chaotic image encryption algorithm based on DNA sequence operation and discrete logarithm. IEEE Access 7:181589–181609

    Article  Google Scholar 

  11. 11.

    Fu C, Meng W, Zhan Y (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010

    Article  Google Scholar 

  12. 12.

    Gluck R, Yokoyama T (2019) Constructing a binary tree from its traversals by reversible recursion and iteration. Inf Process Lett 147:32–37

    MathSciNet  MATH  Article  Google Scholar 

  13. 13.

    Golea NE, Melkemi KE (2017) ROI-based fragile watermarking for medical image tamper detection. Int J High Perform Comput Network 13(1):199–210

    Google Scholar 

  14. 14.

    Guo Y, Shao L, Yang L (2015) Bit-level image encryption algorithm based on Josephus and Henon chaotic map. Appl Res Comput 32(4):1131–1137

    Google Scholar 

  15. 15.

    Hua Z, Jin F, Xu B (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Article  Google Scholar 

  16. 16.

    Huang L, Cai S, Xiong X, Xiao M (2019) On symmetric color image encryption system with permutation-diffusion simultaneous operation. Opt Lasers Eng 115:7–20

    Article  Google Scholar 

  17. 17.

    Kumar A (2019) Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int J Cloud Appl Comput 9(3):22–36

    Google Scholar 

  18. 18.

    Lakshmi C, Thenmozhi K, Rayappan JB et al (2019) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl:1–13

  19. 19.

    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  20. 20.

    Li C, Lin D, Lu J (2017) Cryptanalyzing an image-scrambling encryption algorithm of pixel bits. IEEE MultiMedia 24(3):64–71

    Article  Google Scholar 

  21. 21.

    Li C, Lin D, Feng B (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842

    Article  Google Scholar 

  22. 22.

    Li D, Deng L, Gupta BB, Wang H, Choi C (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inform Sciences 479:432–447

    Article  Google Scholar 

  23. 23.

    Li C, Li Z, Feng W, Tong Y, Du J, Wei D (2019) Dynamical behavior and image encryption application of a memristor-based circuit system. AEU-Int J Electron Commun 110:152861

    Article  Google Scholar 

  24. 24.

    Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Article  Google Scholar 

  25. 25.

    Matthews R (1989) On the derivation of a chaotic encryption algorithm. Cryptologia 13(1):29–42

    MathSciNet  Article  Google Scholar 

  26. 26.

    Mirzaei O, Yaghoobi M, Irani H (2012) A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67:557–566

    MathSciNet  Article  Google Scholar 

  27. 27.

    Murilloescobar MA, Cruzhernandez C, Abundizperez F (2015) A RGB image encryption algorithm based on total plain-image characteristics and chaos. Circ Syst Signal Pr 109:119–131

    Google Scholar 

  28. 28.

    Peng F, Zhang X, Lin Z, Long M (2019) A tunable selective encryption scheme for H.265/HEVC based on chroma IPM and coefficient scrambling. IEEE Trans Circuits Syst Video Technol, https://doi.org/10.1109/tcsvt.2019.2924910.

  29. 29.

    Pham V, Akgul A, Volos C (2017) Dynamics and circuit realization of a no-equilibrium chaotic system with a boostable variable. AEU-Int J Electron Commun 78:134–140

    Article  Google Scholar 

  30. 30.

    Ping P, Xu F, Mao Y (2017) Designing permutation-substitution image encryption networks with Henon map. Neurocomputing 283:53–63

    Article  Google Scholar 

  31. 31.

    Preishuber M, Hütter T, Katzenbeisser S, Uhl A (2018) Depreciating motivation and empirical security analysis of chaos-based image and video encryption. IEEE Trans Inf Foren Sec 13(9):2137–2150

    Article  Google Scholar 

  32. 32.

    Rajagopal K, Jahanshahi H, Varan M (2018) A hyperchaotic memristor oscillator with fuzzy based chaos control and LQR based chaos synchronization. AEU-Int J Electron Commun 94:55–68

    Article  Google Scholar 

  33. 33.

    Rehman AU, Khan JS, Ahmad J (2016) A new image encryption scheme based on dynamic s-boxes and chaotic maps. 3D Research 7(1):1–8

    Article  Google Scholar 

  34. 34.

    Sivaraman R, Rajagopalan S, Amirtharajan R (2020) FPGA based generic RO TRNG architecture for image confusion. Multimed Tools Appl 79:13841–13868. https://doi.org/10.1007/s11042-019-08592-z

  35. 35.

    Sun S (2018) A novel hyperchaotic image encryption scheme based on DNA encoding, pixel-level scrambling and bit-level scrambling. IEEE Photonics J 10(2):1–14

    Google Scholar 

  36. 36.

    Tang Z, Song J, Zhang X (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11

    Article  Google Scholar 

  37. 37.

    Tang Z, Wang F, Zhang X (2017) Image encryption based on random projection partition and chaotic system. Multimed Tools Appl 76(6):8257–8283

    Article  Google Scholar 

  38. 38.

    Volos C, Akgul A, Pham V (2017) A simple chaotic circuit with a hyperbolic sine function and its use in a sound encryption scheme. Nonlinear Dyn 89(2):1047–1061

    Article  Google Scholar 

  39. 39.

    Wang F (2019) Simple method for enlarging positive LE and accelerating calculation speed of chaotic system. Electron Lett 55(16):884–886

    Article  Google Scholar 

  40. 40.

    Wang X, Liu C, Zhang H (2016) An effective and fast image encryption algorithm based on Chaos and interweaving of ranks. Nonlinear Dyn 84(3):1595–1607

    MathSciNet  MATH  Article  Google Scholar 

  41. 41.

    Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746

    Article  Google Scholar 

  42. 42.

    Wang X, Zhao H, Hou Y, Luo C, Zhang Y, Wang C (2019) Chaotic image encryption algorithm based on pseudo-random bit sequence and DNA plane. Mod Phys Lett B 33(22):1950263

    MathSciNet  Article  Google Scholar 

  43. 43.

    Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Journal of Selected Areas in Telecommunications 1(2):31–38

    Google Scholar 

  44. 44.

    Wu Y, Zhou Y, Saveriades G (2013) Local Shannon entropy measure with statistical tests for image randomness. Inform Sciences 222:323–342

    MathSciNet  MATH  Article  Google Scholar 

  45. 45.

    Xu L, Li Z, Li J (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    Article  Google Scholar 

  46. 46.

    Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354

    Article  Google Scholar 

  47. 47.

    Ye G, Pan C, Huang X (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcat Chaos 28(01):185001

    MathSciNet  Article  Google Scholar 

  48. 48.

    Yin Q, Wang C (2018) A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. Int J Bifurcation Chaos 28(4):1850047

    MathSciNet  MATH  Article  Google Scholar 

  49. 49.

    Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inform Sciences 450:361–377

    MathSciNet  MATH  Article  Google Scholar 

  50. 50.

    Zhang Y (2019) A fast image encryption algorithm based on convolution operation. IETE J Res 65(1):4–18

    Article  Google Scholar 

  51. 51.

    Zhang J, Ju C, Divo E, Zhong Y, Chi B (2019) A binary-tree subdivision method for evaluation of singular integrals in 3D BEM. Eng Anal Bound Elem 103:80–93

    MathSciNet  MATH  Article  Google Scholar 

  52. 52.

    Zhou Y, Bao L, Chen CL (2013) Image encryption using a new parametric switching chaotic system. Signal Process 93(11):3039–3052

    Article  Google Scholar 

  53. 53.

    Zhou Y, Hua Z, Pun C (2015) Cascade chaotic system with applications. IEEE Trans Syst Man Cybern Syst 45(9):2001–2012

    Google Scholar 

  54. 54.

    Zhu H, Zhang X, Yu H (2017) An image encryption algorithm based on compound homogeneous hyper-chaotic system. Nonlinear Dyn 89(1):61–79

    Article  Google Scholar 

  55. 55.

    Zhu H, Zhao Y, Song Y (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by Hunan Provincial Natural Science Foundation of China (Nos. 2019JJ40109, 2020JJ4338, 2020JJ4337); Research Foundation of Education Bureau of Hunan Province of China (No. 18A314); Science and Technology Program of Hunan Province (No. 2019TP1014); research and innovation project of the graduate students of Hunan Institute of Science and Technology (Nos. YCX2019A12, YCX2020A40); Science and Research Creative Team of Hunan Institute of Science and Technology (No. 2019-TD-10).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Chun-Lai Li.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Li, CL., Zhou, Y., Li, HM. et al. Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-021-10631-7

Download citation

Keywords

  • Binary tree
  • Chaos dynamics
  • Multiplication diffusion
  • Image encryption