Skip to main content
Log in

A multilevel distributed image based encryption for full integrity

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Sending and receiving information in today’s world has become easy. Recent advancements in the technology have made the world shrink. The transfer of data hence has become effortless. At one touch of the ‘send’ button, the data is made available to the required receiver. This has put the sender and receiver at ease to communicate. Ensuring the safety of the data being transmitted and also that it is in the right hands are the prime aspects of the communication process. Anyone who is interested in knowing the information may mess about the data. Hence it is required to protect the information from the unauthorized user. The very intention of this work is to provide enough security to the confidential color images that are to reach only the legitimate receiver. This paper focuses on the essential quantum of work required to ensure that the confidential images are out of harm’s way. It also is a sincere effort to accomplish the same using not very complicated techniques and to make use of a combination of simple algorithms like tent map and logistic map. The goal of the work is achieved with exertion which employs the technique of splitting the image into required number of appropriate blocks followed by the implementation of the vital processes: confusion and diffusion to achieve the mission. Confusion involves shuffling of the blocks and diffusion is implemented using a random sequence. This technique applied has helped to reach the least amount of correlation between the pixels in the ciphered image. The lesser is the degree of association between the nearby pixels in the encrypted image, higher is the efficiency of the encryption. The method implemented in this work is a simple version of the combination of tent map and logistic map and is trouble free and at the same time gives the required security to the image so that no unauthenticated user can make out the data even if he manages to get the ciphered adaptation of it.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25

Similar content being viewed by others

References

  1. Abuturab MR An Asymmetric Color Image Cryptosystem Based on Schur Decomposition in Gyrator Transform Domain. Opt Lasers Eng 582014:39–47. https://doi.org/10.1016/j.optlaseng.2014.01.025

  2. Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A Noisy Channel Tolerant Image Encryption Scheme. Wirel Pers Commun 77:2771–2791. https://doi.org/10.1007/s11277-014-1667-5

    Article  Google Scholar 

  3. Alsaedi M (2017) Colored image encryption and decryption using multi-chaos 2D quadratic strange attractors and matrix transformations. Multimed Tools Appl 76:24527–24547. https://doi.org/10.1007/s11042-016-4206-4

    Article  Google Scholar 

  4. Beloucif A, Noui O, Noui L (2016) Design of a Tweakable Image Encryption Algorithm Using Chaos-Based Schema. Int J Inf Comput Secur 8(3):205–220. https://doi.org/10.1504/IJICS.2016.079183

    Article  Google Scholar 

  5. Brindha M, Ammasai Gounden NG, Sriram M (2015) A Hybrid Image Encryption Algorithm using Ahao and Conway's Game-of-Life Cellular Automata. Security and Communication Networks, Hoboken

    Google Scholar 

  6. Chai X et al A Fast Chaos-Based Image Encryption Scheme with a Novel Plain Image-Related Swapping Block Permutation and Block Diffusion. Multimed Tools Appl 76(142017):15561–15585. https://doi.org/10.1007/s11042-016-3858-4

  7. Chen R-J, Chen Y-H, Chen C-S, Lai J-L Image encryption/decryption system using 2-D cellular automataİ. IEEE 10th International Symposium on Consumer Electronics 2006:1–6

  8. Chen R-J, Wen-Kai L, Lai J-L (2005) Image encryption using progressive cellular Automata substitution and SCAN. IEEE International Symposium on Circuits and Systems 2:1690–1693

    Google Scholar 

  9. Chong F, Chen J-J, Zou H, Meng W-H, Zhan Y-F, Ya-Wen Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378. https://doi.org/10.1364/OE.20.002363

    Article  Google Scholar 

  10. Jin J (2012) An image encryption based on elementary cellular automataİ. Optics and Lasers in Engineering, Elsevier Publication 50(12):1836–1843

    Article  Google Scholar 

  11. Kumar S et al. (2015) Comparative Analysis of Color Image Encryption Using 2D Chaotic Maps, pp. 379–87, 10.1007/978-81-322-2247-7_39

  12. Mollaeefar M et al (2017) A Novel Encryption Scheme for Colored Image Based on High Level Chaotic Maps. Multimed Tools Appl 76(1):607–629. https://doi.org/10.1007/s11042-015-3064-9

    Article  Google Scholar 

  13. Pak C, Huang L (2017) A New Color Image Encryption Using Combination of the 1D Chaotic Map. Signal Process 138, Elsevier B.V.:129–137. https://doi.org/10.1016/j.sigpro.2017.03.011

    Article  Google Scholar 

  14. Pan H, Lei Y, Jian C (2018) Research on digital image encryption algorithm based on double logistic chaotic map. EURASIP Journal on Image and Video Processing 2018:142. https://doi.org/10.1186/s13640-018-0386-3

    Article  Google Scholar 

  15. Pareek NK, Patidar V (2006) Image encryption using chaotic logistic map, image and vision computing. Elsevier Publication 24(9):926–934

    Google Scholar 

  16. Qiang Z, Wei X (2013) RGB Color Image Encryption Method Based on Lorenz Chaotic System and DNA Computation. IETE Tech Rev 30(5):404–409. https://doi.org/10.4103/0256-4602.123123

    Article  Google Scholar 

  17. Sharma M (2016) Chaos Based Image Encryption Using Two Step Iterated Logistic Map. pp. 1–5

  18. Sharma V, Agnihotri HC, Chetan HP An Image Encryption and Decryption Techniques Using Two Chaotic Schemes. International Journal of Research in Advent Technology 2(2) E-ISSN: 2321-9637

  19. Swathi Suresh M, Varghese DA (2015) An Efficient and optimized RC5 Image Encryption Algorithm for Secured Image Transmission. International Journal of Imaging and Robotics 15(3):117–125

    Google Scholar 

  20. Toughi S et al (2017) An Image Encryption Scheme Based on Elliptic Curve Pseudo Random and Advanced Encryption System. Signal Process 141, Elsevier B.V.:217–227. https://doi.org/10.1016/j.sigpro.2017.06.010

    Article  Google Scholar 

  21. Xuelong Z, Li Q, Manwu X, Fengyu L (2005) A symmetric cryptography based on Extended cellular automataİ. IEEE International Conference on Systems Man and Cybernetics 1:499–503

    Google Scholar 

  22. Yang Y-G, Xia J, Jia X, Zhang H (2013) Novel image encryption/decryption based on quantum Fourier transform and double phase encoding. Quantum Inf Process 12:3477–3493. https://doi.org/10.1007/s11128-013-0612-y

    Article  MathSciNet  MATH  Google Scholar 

  23. Ye R (2011) A Novel Chaos-Based Image Encryption Scheme with an Efficient Permutation-Diffusion Mechanism. Opt Commun 284(22, Elsevier B.V.):5290–5298. https://doi.org/10.1016/j.optcom.2011.07.070

    Article  Google Scholar 

  24. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks, Hoboken

    Book  Google Scholar 

  25. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A Chaotic Image Encryption Algorithm Based on Information Entropy. International Journal of Bifurcation and Chaos 28(1). https://doi.org/10.1142/S0218127418500104

  26. Ye G, Zhao H (2016) Huajin ChaiChaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067–2077. https://doi.org/10.1007/s11071-015-2465-7

    Article  Google Scholar 

  27. Yun-Peng Z, Wei L, Shui-Ping C, Zhengjun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: IEEE International Conference on Systems Man and Cybernetics, pp. 474–479

  28. Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimed Tools Appl 77:6647–6669. https://doi.org/10.1007/s11042-017-4577-1

    Article  Google Scholar 

  29. Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Optics Communications, Elsevier Publication 285(5):594–608

    Google Scholar 

  30. Ziba Eslami N, Bakhshandeh A (2013) An improvement over an image encryption method based on total shuffling. Opt Commun 286:51–55

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Sumathi.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sumathi, R., Raajan, N.R. A multilevel distributed image based encryption for full integrity. Multimed Tools Appl 79, 2161–2183 (2020). https://doi.org/10.1007/s11042-019-08104-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-08104-z

Keywords

Mathematics subject classification

Navigation