Abstract
This paper proposes a design of 2-D chaotic Baker map for image encryption which utilizes three modes of operations: 1) the cipher block chaining (CBC) mode, 2) the cipher feedback (CFB) mode, and 3) the output feedback (OFB) mode. The proposed image cryptosystem is characterized by a short encryption time of scalevariant images and a high level of confusion and diffusion due to its shuffling and substitution processes. This is useful in applications such as online streaming of paid videos, in which both the speed of encryption\decryption and a good encryption quality is required. A comparison between the proposed image cryptosystem, the traditional 2-D chaotic Baker map permutation cryptosystem, and the RC6 substitution cryptosystem is presented in the paper. A comparison is held with relevant techniques and the results reveal that the proposed image cryptosystem achieves a high degree of security. It is also more immune to noise than the RC6 cryptosystem and takes less processing time for images with large dimensions than both the chaotic cryptosystem and the RC6 cryptosystem. The superiority of the proposed cryptosystem has been proved for image encryption against the recent techniques from the cryptographic viewpoint.
Similar content being viewed by others
References
Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075
Amin M, Faragallah OS, El-Latif AAA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497
Wang XY, Yang L, Liu R, Kadir A (2010) A chaotic image encryption algorithm based on perceptron model. Nonlinear Dynam 62(3):615–621
Zhu ZL, Zhang W, Wong KW, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181(6):1171–1186
Wang XY, Zhang YQ, Bao XM (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61
Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Signal Process 92(5):1202–1215
Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of Fridrich's chaotic image encryption scheme. Signal Process 132:150–154
Xu L, Gou X, Li Z, Li J (2017) A novel chaotic image encryption algorithm using block scrambling and dynamic index-based diffusion. Opt Lasers Eng 91:41–52
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213
Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246
Kwok HS, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529
Kadir R, Shahril R, Maarof MA (2010) A modified image encryption scheme based on 2D chaotic map. In: Computer and communication engineering (ICCCE), 2010 international conference on IEEE, May, pp 1–5
Kanso A, Ghebleh M (2012) A novel image encryption algorithm based on a 3D chaotic map. Commun Nonlinear Sci Numer Simul 17(7):2943–2959
Zhang Y, Xiao D, Shu Y, Li J (2013) A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations. Signal Process Image Commun 28(3):292–300
Tewari A, Gupta BB (2017) J cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. Supercomput 73:1085. https://doi.org/10.1007/s11227-016-1849-x
Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security, 1st edn. IGI Global, Hershey
Stergiou C, Psannis KE, Kim B-G, Gupta B (2018) Secure integration of IoT and cloud computing. Futur Gener Comput Syst 78(Part 3):964–975
Gutub A, Al-Ghamdi M (2019) Image based steganography to facilitate improving counting-based secret sharing. 3D Res 10(1, 36 pages):1–36. https://doi.org/10.1007/s13319-019-0216-0
Parvez M, Gutub A (2011) Vibrant color image steganography using channel differences and secret data distribution. Kuwait J Sci Eng 38:127–142
Alassaf N, Alkazemi B, Gutub A (2017) Applicable light-weight cryptography to secure medical data in IoT systems. J Res Eng Appl Sci 2:50–58
Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2018) Integrity verification for digital Holy Quran verses using cryptographic hash function and compression. J King Saud Uni Comput Inf Sci
Alanazi N, Alanizy A, Baghoza N, Al Ghamdi M, Gutub A (2018) 3-layer PC text security via combining compression, AES cryptography 2LSB image steganography. J Res Eng Appl Sci 3(4). https://doi.org/10.1016/j.jksuci.2018.02.006
Gutub A, Aljuaid N (2018) Multi-bits stego-system for hiding text in multimedia images based on user security priority. J Comput Hardw Eng 1(2):118–124. https://doi.org/10.63019/jche.v1i2.513
Alassaf N, Gutub A, Parah S, Al Ghamdi M (2018) Enhancing speed of SIMON: a light-weight-cryptographic algorithm for IoT applications. Multimed Tools Appl. https://doi.org/10.1007/s11042-018-6801-z
Aljuaid N, Gutub A, Khan E (2018) Enhancing PC data security via combining RSA cryptography and video based steganography. J Inf Secur Cybercrimes Res 1. https://doi.org/10.26735/16587790.2018.006
Gutub A, Al-Juaid N, Khan E (2019) Counting-based secret sharing technique for multimedia applications. Multimed Tools Appl 78(5):5591–5619
Al-Ghamdi M, Al-Ghamdi M, Gutub A (2018) Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multimed Tools Appl 78:1–28
Elhosany HM, Hossin HE, Kazemian HB, Faragallah OS (2012) C9. Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation. In: Radio science conference (NRSC), 2012 29th national, IEEE, April, pp 223–235
Yu C, Li J, Li X et al (2018) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl 77:4585. https://doi.org/10.1007/s11042-017-4637-6
Mary SJ, Christopher CS, Joe SSA (2016) Novel scheme for compressed image authentication using LSB watermarking and EMRC6 encryption. Circuits Syst 7(08):1722
Alsmirat MA, Al-Alem F, Al-Ayyoub M et al (2019) Impact of digital fingerprint image quality on the fingerprint recognition accuracy. Multimed Tools Appl 78:3649. https://doi.org/10.1007/s11042-017-5537-5
Özkaynak F, Özer AB (2016) Cryptanalysis of a new image encryption algorithm based on chaos. Optik Int J Light Electron Optics 127(13):5190–5192
Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483
Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9(13):2015–2023
Chen JX, Zhu ZL, Fu C, Yu H (2015) Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains. Optics Commun 341:263–270
Chen J, Zhu ZL, Zhang LB, Zhang Y, Yang BQ (2018) Exploiting self-adaptive permutation–diffusion and DNA random encoding for secure and efficient image encryption. Signal Process 142:340–353
Guesmi R, Farah MAB, Kachouri A, Samet M (2016) Hash key-based image encryption using crossover operator and chaos. Multimed Tools Appl 75(8):4753–4769
Anand MV, Targhi EE, Tabia GN, Unruh D (2016) Post-quantum security of the CBC, CFB, OFB, CTR, and XTS modes of operation. In: International workshop on post-quantum cryptography. Springer, Cham, pp 44–63
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Elashry, I.F., El-Shafai, W., Hasan, E.S. et al. Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl 79, 20665–20687 (2020). https://doi.org/10.1007/s11042-019-08322-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08322-5