Skip to main content

Advertisement

Log in

A Fast and Effective Image Encryption Scheme Based on DSVSM and (7, 4) Hamming Code

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In this work, a fast and effective chaos-based image cryptosystem is proposed. Collaborated with a dynamical state variables selection mechanism (DSVSM) and (7, 4) Hamming code, discrete fractional-order system with high computation complexity is innovatively introduced in this paper. In our scheme, the chaotic system only needs to be pre-iterated once and different combinations of state variables produced by DSVSM are used to encrypt different images. What’s more, these combinations of state variables are extremely sensitive to pixel changes and can introduce differential pixels into the confusion and diffusion process. Therefore, with the help of the proposed pixel-selecting-exchanging based confusion strategy, an excellent differential spreading effect can be generated to accelerate our block diffusion efficiency. Finally, in order to further advance the performance of the proposed cryptosystem, the transmission of state variables will be hidden in the corresponding cipher image through (7, 4) Hamming coding. Simulation results and performance analysis substantiate that the proposed cryptosystem has superior security, high efficiency and more in line with the real-time secure image communication.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Cheng G, Wang C, Xu C (2022) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimedia Tools and Applications 79(39–40):29243–29263

    MATH  Google Scholar 

  2. Zhou M, Wang C (2020) A novel image encryption scheme based on conservative hyperchaotic system and closed-loop diffusion between blocks. Signal Process 171:107484

    Article  MATH  Google Scholar 

  3. Chen K, Chang C, Chin C (2019) Real-Time Error-Free Reversible Data Hiding in Encrypted Images Using (7, 4) Hamming Code and Most Significant Bit Prediction[J]. Symmetry 11(1):51–67

    Article  MATH  Google Scholar 

  4. Cao Z, Yin Z, Hu H, Gao X, Wang L (2016) High capacity data hiding scheme based on (7, 4) Hamming code[J]. Springerplus 5:175

    Article  MATH  Google Scholar 

  5. Wang C, Ma B, Xia Z, Li J, Li Q (2021) Stereoscopic image description with trinion fractional-order continuous orthogonal moments. IEEE Transactions on Circuits and Systems for Video Technology

  6. Wang X, Wang X, Ma B, Li Q, Shi Y (2021) High Precision Error Prediction Algorithm Based on Ridge Regression Predictor for Reversible Data Hiding[J]. IEEE Signal Proc Lett 28:1125–1129

    Article  MATH  Google Scholar 

  7. Ma B, Shi Y (2016) A reversible data hiding scheme based on code division multiplexing. IEEE Transactions on Information Forensics and Security 11(9):1914–1927

    Article  MATH  Google Scholar 

  8. Li Q, Wang X, Ma B, Wang X, Wang C (2021) Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Transactions on Circuits and Systems for Video Technology

  9. Xu Q, Sun K, Cao C, Zhu C (2019) A fast image encryption algorithm based on compressive sensing and hyperchaotic map[J]. Opt Lasers Eng 121:203–214

    Article  MATH  Google Scholar 

  10. Ye G, Pan C, Dong Y, Shi Y, HX, (2020) Image encryption and hiding algorithm based on compressive sensing and random numbers insertion[J]. Signal Process 172:107563

  11. Han XT, Mou J, Jahanshahi H, Cao YH, Bu F, Zhang Y (2022) A new set of hyperchaotic maps based on modulation and coupling. Eur Phys J Plus 137(4)

  12. Sha Y, Sun B, Chen X, Mou J, Jahanshahi H (2022) A Chaotic Image Encryption Scheme Based on Genetic Central Dogma and KMP Method. International Journal of Bifurcation and Chaos 32(12):2250186

    Article  MathSciNet  MATH  Google Scholar 

  13. Liu X, Mou J, Yan H, Cao Y (2022) Memcapacitor-Coupled Chebyshev Hyperchaotic Map. International Journal of Bifurcation and Chaos 32(12):225018

    Article  MathSciNet  MATH  Google Scholar 

  14. Li X, Mou J, Banerjee S, Wang Z, Cao Y (2022) Design and DSP implementation of a fractional-rder detuned laser hyperchaotic circuit with applications in image encryption. Chaos, Solitons Fractals 159:112133

    Article  MATH  Google Scholar 

  15. Ma T, Mou J, Yan H, Cao Y (2022) A New Class of Hopfield Neural Network with Double Memristive Synapses and Its DSP Implementation[J]. Eur Phys J Plus 13(10):1135

    Article  MATH  Google Scholar 

  16. Ren L, Mou J, Banerjee S, Zhang Y (2023) A Hyperchaotic Map with A New Discrete Memristor Model: Design, Dynamical Analysis, Implementation and Application. Chaos, Solitons Fractals 159:112133

    MathSciNet  MATH  Google Scholar 

  17. Ma C, Mou J, Yang F, Yan H (2020) A fractional-order hopfield neural network chaotic system and its circuit realization. Eur Phys J Plus 135(1):1–16

    Article  MATH  Google Scholar 

  18. Li C, Yang Y, Yang X, Zi X, Xiao F (2022) A tristable locally active memristor and its application in Hopfield neural network. Nonlinear Dyn 108(2):1697–1717

    Article  MATH  Google Scholar 

  19. Li C, Li H, Xie W, Du J (2022) A S-type bistable locally active memristor model and its analog implementation in an oscillator circuit. Nonlinear Dyn 106(1):1041–1058

    Article  MATH  Google Scholar 

  20. Zhou Y, Li C, Li W, Li H, Feng W, Qian K (2022) Image encryption algorithm with circle index table scrambling and partition diffusion. Nonlinear Dyn 103(2):2043–2061

    Article  MATH  Google Scholar 

  21. Li C, Yang Z, Li H, Feng W, Du J (2021) Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimedia Tools and Applications 80(12):18479–18501

    Article  MATH  Google Scholar 

  22. Xiong L, Yang F, Mou J, An X, Zhang X (2022) A memristive system and its applications in red-blue 3D glasses and image encryption algorithm with DNA variation. Nonlinear Dyn 107(5):1–23

    MATH  Google Scholar 

  23. Xiong L, Zhang X, Teng S (2020) Experimental verification of a comparative research platform for various nonlinearity and weak signal detection based on a memristor-based Chua’s system. International Journal of Bifurcation and Chaos 30(13):2050193

    Article  MathSciNet  MATH  Google Scholar 

  24. Yu F, Kong X, Chen H, Yu Q, Cai S, Huang Y (2022) A 6D Fractional-Order Memristive Hopfield Neural Network and its Application in Image Encryption. Frontiers in Physics, 109

  25. Cheng G, Wang C, Xu C (2020) A novel hyper-chaotic image encryption scheme based on quantum genetic algorithm and compressive sensing. Multimedia Tools and Applications 79(39):29243–29263

    Article  Google Scholar 

  26. Yu F, Zhang Z, Shen H, Huang Y, Cai S, Jin J (2021) Design and FPGA implementation of a pseudo-random number generator based on a Hopfield neural network under electromagnetic radiation. Frontiers in Physics 7:181884–181898

    MATH  Google Scholar 

  27. Lin H, Wang C, Yu F, Xu C, Hong Q (2021) An Extremely Simple Multiwing Chaotic System: Dynamics Analysis, Encryption Application, and Hardware Implementation. IEEE Trans Ind Electron 68(12):12708–12719

    Article  MATH  Google Scholar 

  28. Jie D, Zhou M, Wang C, Wang S, Xu C (2021) Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops. Multimedia Tools and Applications 80(9):13821–13840

    Article  MATH  Google Scholar 

  29. Zhu C, Gan Z, Lu Y, Chai X (2019) An image encryption algorithm based on 3-D DNA level permutation and substitution scheme[J]. Multimedia Tools and Applications 79(11–12):7227–7258

    MATH  Google Scholar 

  30. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps[J]. International Journal of Bifurcation and chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  31. Yang F, Mou J, Ma C, Cao Y (2020) Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application[J]. Opt Lasers Eng 129(24):106031

    Article  MATH  Google Scholar 

  32. Li X, Mou J, Xiong L, Wang Z, Xu J (2021) Fractional-order double-ring erbium-doped fiber laser chaotic system and its application on image encryption[J]. Opt Lasers Technol 140(3):107074

    Article  MATH  Google Scholar 

  33. Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm[J]. Nonlinear Dyn 94(1):745–756

    Article  MATH  Google Scholar 

  34. Chai X, Fu J, Zhang J, Han D, Gan Z (2021) Exploiting preprocessing-permutation-diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system[J]. Neural Comput & Applic 33(16):10371–10402

    Article  MATH  Google Scholar 

  35. Gan Z, Chai X, Han D, Chen Y (2018) A chaotic image encryption algorithm based on 3-D bit-plane permutation[J]. Neural Comput & Applic 3(11):7111–7130

    Article  MATH  Google Scholar 

  36. Chen J, Zhu Z, Fu C, Yu H, Zhang L (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism[J]. Commun Nonlinear Sci Numer Simul 20(3):846–860

    Article  MATH  Google Scholar 

  37. Talhaoui M, Wang X (2021) A new fractional one dimensional chaotic map and its application in high-speed image encryption[J]. Information Sciences 550:13–26

    Article  MathSciNet  MATH  Google Scholar 

  38. Chai X, Gan Z, Lu Y, Chen Y, Han D (2017) A novel image encryption algorithm based on the chaotic system and DNA computing[J]. Int J Mod Phys C 28(05):1750069

    Article  MathSciNet  MATH  Google Scholar 

  39. Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations[J]. Signal Process Image Commun 52:6–19

    Article  MATH  Google Scholar 

  40. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197–213

    Article  MATH  Google Scholar 

  41. Liu L, Miao S (2018) A new simple one-dimensional chaotic map and its application for image encryption[J]. Multimedia Tools and Applications 77(16):21445–21462

    Article  MATH  Google Scholar 

  42. Wang X, Feng L, Li R, Zhang F (2019) A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model[J]. Nonlinear Dyn 95(4):2797–2824

    Article  MATH  Google Scholar 

  43. Hua Z, Jin F, Xu B, Huang H (2018) 2D Logistic-Sine-coupling map for image encryption[J]. Signal Process 149:148–161

    Article  MATH  Google Scholar 

  44. Butt K, Li G, Khan S, Manzoor S (2020) Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD[J]. Entropy (Basel) 22(1):112

    Article  MathSciNet  MATH  Google Scholar 

  45. Zhang W, Wong K, Yu H, Zhu Z (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J]. Commun Nonlinear Sci Numer Simul 18(8):2066–2080

    Article  MathSciNet  MATH  Google Scholar 

  46. Wang Y, Wong K, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm[J]. Appl Soft Comput 11(1):514–522

    Article  MATH  Google Scholar 

  47. Seyedzadeh S, Norouzi B, Mosavi M, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map[J]. Nonlinear Dyn 81(1):511–529

    Article  MathSciNet  MATH  Google Scholar 

  48. Talhaoui M, Wang X, Midoun M (2020) Fast image encryption algorithm with high security level using the Bulban chaotic map[J]. J Real-Time Image Proc 18(1):85–98

    Article  MATH  Google Scholar 

  49. Sha Y, Cao Y, Yan H, Jun M, Gao X (2021) An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations[J]. IEEE Access 9:96321–96336

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported by Provincial Natural Science Foundation of Liaoning (Grant Nos. 2020-MS-274); National Natural Science Foundation of China (Grant Nos. 62061014). The Basic Scientific Research Projects of Colleges and Universities of Liaoning Province (Grant Nos. LJKZ0545).

Author information

Authors and Affiliations

Authors

Contributions

Yuwen Sha designed and carried out experiments, data analyzed and manuscript wrote. Bo Sun made the theoretical guidance for this paper. Linian Wang carried out experiment. Hadi Jahanshahi improved the algorithm. All authors reviewed the manuscript.

Corresponding author

Correspondence to Bo Sun.

Ethics declarations

Conflicts of interest

No conflicts of interests about the publication by all authors.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sha, Y., Sun, B., Jahanshahi, H. et al. A Fast and Effective Image Encryption Scheme Based on DSVSM and (7, 4) Hamming Code. Mobile Netw Appl 29, 567–582 (2024). https://doi.org/10.1007/s11036-023-02133-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-023-02133-7

Keywords

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy