Skip to main content
Log in

A pixel permutation based image encryption technique using chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the last decade, with a rapid increase in multimedia productions, image encryption has become a significant part of information security. The inherent image features make image encryption different from text encryption and also makes it difficult to encrypt images using the traditional encryption techniques. This paper presents an overview of the different encryption algorithms in details, analyzing its effect in the field of image cryptography. The paper further discusses the role of chaos theory in the field of image encryption and makes use of the chaos theory to propose an image encryption technique that is based on pixel permutation. Existing image encryption techniques produce encrypted images that resemble a texture or noise like image increasing the chance of attack as it becomes perceivable as an encrypted image. The proposed image encryption technique produces an encrypted image and masquerades it with any general image, hence eluding the attacker. The proposed algorithm is also compared with the Arnold’s cat map algorithm visually as well as statistically using the evaluation metrics Structural Similarity Index (SSIM), Correlation coefficient (CC) and Number of changing Pixel Rate (NPCR).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Al-Khassaweneh M, Tawalbeh S (2013) A value transformation and random permutation-based coloured image encryption technique. Int J Inf Comput Secur 5 (4):290–300

    Google Scholar 

  2. Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–24

    Article  Google Scholar 

  3. Aljawarneh S, Yassein MB (2018) A multithreaded programming approach for multimedia big data: encryption system. Multimed Tools Appl 1:1–20

    Google Scholar 

  4. Badve O, Gupta BB, Gupta S (2016) Reviewing the security features in contemporary security policies and models for multiple platforms. In: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global, pp 479–504

  5. Bhanot R, Hans R (2015) A review and comparative analysis of various encryption algorithms. International Journal of Security and Its Applications 9(4):289–306

    Article  Google Scholar 

  6. Chen G, Mao Y, Chui CK (2004) Symmetric image encryption scheme based on 3D chaotic cat maps. Chaos. Solitons & Fractals. 21(3):749–61

    Article  MathSciNet  MATH  Google Scholar 

  7. Dang PP, Chau PM (2000) Image encryption for secure internet multimedia applications. IEEE Trans Consum Electron 46(3):395–403

    Article  Google Scholar 

  8. Davies B (2018) Exploring chaos: theory and experiment. CRC Press, Boca Raton

    Book  Google Scholar 

  9. Dey S, Ghosh R (2018) A review of cryptographic properties of S-boxes with generation and analysis of crypto secure S-boxes. PeerJ Preprints

  10. Fouda JA, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–88

    Article  MathSciNet  Google Scholar 

  11. Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–78

    Article  Google Scholar 

  12. Fu C, Lin BB, Miao YS, Liu X, Chen JJ (2011) A novel chaos-based bit-level permutation scheme for digital image encryption. Opt Commun 284(23):5415–23

    Article  Google Scholar 

  13. Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1-3):153–7

    Article  MATH  Google Scholar 

  14. Huang CK, Liao CW, Hsu SL, Jeng YC (2013) Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52(2):563–71

    Google Scholar 

  15. Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–7

    Article  Google Scholar 

  16. Kahate A (2013) Cryptography and network security. Tata McGraw-Hill Education, New York, pp 94–107

    Google Scholar 

  17. Khan MF, Ahmed A, Saleem K (2019) A novel cryptographic substitution box design using gaussian distribution. IEEE Access 7:15999–6007

    Article  Google Scholar 

  18. Konikoff J, Toplosky S (2010) Analysis of simplified DES algorithms. Cryptologia 34(3):211–24

    Article  MATH  Google Scholar 

  19. Krikor L, Baba S, Arif T, Shaaban Z (2009) Image encryption using DCT and stream cipher. Eur J Sci Res 32(1):47–57

    Google Scholar 

  20. Li C, Lin D, Feng B, Lu J, Hao F (2018) Cryptanalysis of a chaotic image encryption algorithm based on information entropy. IEEE Access 6:75834–75842

    Article  Google Scholar 

  21. Liu H, Wang X (2011) Color image encryption using spatial bit-level permutation and high-dimension chaotic system. Opt Commun 284(16-17):3895–903

    Article  Google Scholar 

  22. Liu Z, Li S, Liu W, Wang Y, Liu S (2013) Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding. Opt Lasers Eng 51(1):8–14

    Article  Google Scholar 

  23. Lukac R, Plataniotis KN (2005) Bit-level based secret sharing for image encryption. Pattern Recogn 38(5):767–72

    Article  MATH  Google Scholar 

  24. Nag A, Singh JP, Khan S, Biswas S, Sarkar D, Sarkar PP (2011) Image encryption using affine transform and XOR operation. In: 2011 international conference on signal processing, communication, computing and networking technologies (ICSCCN). IEEE, pp 309–312

  25. Nie T, Zhang T (2009) A study of DES and Blowfish encryption algorithm. In: Tencon 2009-2009 IEEE region 10 conference. IEEE, pp 1–4

  26. Norcen R, Podesser M, Pommer A, Schmidt HP, Uhl A (2003) Confidential storage and transmission of medical image data. Comput Biol Med 33(3):277–92

    Article  Google Scholar 

  27. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–34

    Article  Google Scholar 

  28. Patil P, Narayankar P, Narayan DG, Meena SM (2016) Comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Computer Science. 78:617–24

    Article  Google Scholar 

  29. Qian Z, Zhou H, Zhang X, Zhang W (2016) Separable reversible data hiding in encrypted JPEG bitstreams. IEEE Trans Dependable Secure Comput 15 (6):1055–1067

    Article  Google Scholar 

  30. Reyad O, Mofaddel MA, Abd-Elhafiez WM, Fathy M (2017) A novel image encryption scheme based on different block sizes for grayscale and color images. In: 2017 12th international conference on computer engineering and systems (ICCES). IEEE, pp 455–461

  31. Rijmen V, Daemen J (2001) Advanced encryption standard. Proceedings of federal information processing standards publications. National Institute of Standards and Technology, pp 19–22

  32. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–6

    Article  MathSciNet  MATH  Google Scholar 

  33. Schaefer EF (1996) A simplified data encryption standard algorithm. Cryptologia 20(1):77–84

    Article  MATH  Google Scholar 

  34. Schneier B (1993) Description of a new variable-length key, 64-bit block cipher (Blowfish). InInternational Workshop on Fast Software Encryption. Springer, Berlin, pp 191–204

    MATH  Google Scholar 

  35. Selent D (2010) Advanced encryption standard. Rivier Academic Journal 6(2):1–4

    Google Scholar 

  36. Singh P, Yadav AK, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91:187–95

    Article  Google Scholar 

  37. Smid ME, Branstad DK (1988) Data encryption standard: past and future. Proc IEEE 76(5):550–9

    Article  Google Scholar 

  38. Tang L (1997) Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the fourth ACM international conference on Multimedia. ACM, pp 219–229

  39. Vaidyanathan S, Rajagopal K (2017) LabVIEW implementation of chaotic masking with adaptively synchronised forced Van der Pol oscillators and its application in real-time image encryption. Int J Simul Process Model 12(2):165–78

    Article  Google Scholar 

  40. Wahballa O, Wahaballa A, Li F, Idris II, Xu C (2017) Medical image encryption scheme based on arnold transformation and ID-AK protocol. IJ Network Security 19(5):776–84

    Google Scholar 

  41. Wang J, Zheng N, Chen B, Principe JC (2017) Associations among image assessments as cost functions in linear decomposition: MSE, SSIM, and Correlation Coefficient. arXiv:1708.01541

  42. Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6:23733–46

    Article  Google Scholar 

  43. Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Process 13 (4):600–12

    Article  Google Scholar 

  44. Wu Y, Noonan JP, Agaian S (2011) UACI Randomness tests for image encryption NPCR Cyber journals: multidisciplinary journals in science and technology. Journal of Selected Areas in Telecommunications (JSAT) 1(2):31–8

    Google Scholar 

  45. Xie EY, Li C, Yu S, Lu J (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process 132:150–154

    Article  Google Scholar 

  46. Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn 69(4):2079–87

    Article  MathSciNet  Google Scholar 

  47. Yun-Peng Z, Wei L, Shui-Ping C, Zheng-Jun Z, Xuan N, Wei-Di D (2009) Digital image encryption algorithm based on chaos and improved DES. In: SMC 2009 IEEE international conference on systems, man and cybernetics, 2009. IEEE, pp 474–479

  48. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–80

    Article  Google Scholar 

  49. Zhou N, Wang Y, Gong L (2011) Novel optical image encryption scheme based on fractional Mellin transform. Opt Commun 284(13):3234–42

    Article  Google Scholar 

  50. Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inform Sci 181(6):1171–86

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shamama Anwar.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anwar, S., Meghana, S. A pixel permutation based image encryption technique using chaotic map. Multimed Tools Appl 78, 27569–27590 (2019). https://doi.org/10.1007/s11042-019-07852-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07852-2

Keywords

Navigation