[go: up one dir, main page]

Skip to main content

A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13340))

Included in the following conference series:

Abstract

With the development of information technology, image secrecy technology has gradually received widespread attention. A chaotic image encryption scheme based on the mixture of sub-block spiral scans transform and matrix multiplication is proposed. Firstly, an increased sub-block segmentation spiral scanning method is presented, which enhances the effect of confusion during encryption. Secondly, a novel method of constructing the multiplying matrix of left and right has been utilized, which greatly reduces the encryption time while ensuring the encryption effect. Finally, the simulation and the analysis illustrate that the proposed algorithm has a greater cryptography effect and better key safety, while it can also effectively withstand exhaustive attacks, statistical attacks, and differential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, C.P., Wang, X.Y., Xia, Z.Q., Ma, B., Shi, Y.Q.: Image description with polar harmonic Fourier moments. IEEE Trans. Circ. Syst. Video Technol. 30(12), 4440–4452 (2020)

    Article  Google Scholar 

  2. Wang, C.P., Ma, B., Xia, Z.Q., Li, J., Li, Q., Shi, Y.Q.: Stereoscopic image description with Trinion Fractional-order continuous Orthogonal moments. IEEE Trans. Circ. Syst. Video Technol. (2021). https://doi.org/10.1109/TCSVT.2021.3094882

  3. Li, X., Long, G., Li, S.: Encrypted medical records search with supporting of fuzzy multi-keyword and relevance ranking. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds.) ICAIS 2021. LNCS, vol. 12737, pp. 85–101. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78612-0_7

    Chapter  Google Scholar 

  4. Duhayyim, M.A., Al-Wesabi, F.N., Marzouk, R., Hamza, M.A., Hilal, A.M., Eltahir, M.M.: Novel image encryption and compression scheme for IoT environment. Comput. Mater. Continua 71(1), 1443–1457 (2022)

    Article  Google Scholar 

  5. Zheng, X., Cao, C., Deng, J.: DCDC-LSB: double cover dark channel least significant bit steganography. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds.) ICAIS 2021. LNCS, vol. 12737, pp. 360–375. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-78612-0_29

    Chapter  Google Scholar 

  6. Sanam, N., Ali, A., Shah, T., Farooq, G.: Non-associative algebra redesigning block cipher with color image encryption. Comput. Mater. Continua 67(1), 1–21 (2021)

    Article  Google Scholar 

  7. Xia, Z.H., Wang, L., Tang, J., Xiong, N.N., Weng, J.: A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing. IEEE Trans. Netw. Sci. Eng. 8(1), 318–330 (2020)

    Article  MathSciNet  Google Scholar 

  8. Yuan, C.S., Xia, Z.H., Sun, X.M., Wu, Q.M.J.: Deep residual network with adaptive learning framework for fingerprint liveness detection. IEEE Trans. Cogn. Dev. Syst. 12(3), 461–473 (2019)

    Article  Google Scholar 

  9. Zou, M.L., Liu, Z.X., Chen, X.Y.: A meaningful image encryption algorithm based on prediction error and wavelet transform. J. Big Data 1(3), 151–158 (2019)

    Article  Google Scholar 

  10. Xian, Y.J., Wang, X.Y.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154–1169 (2021)

    Article  MathSciNet  Google Scholar 

  11. Wang, X.Y., Yang, J.J.: A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf. Sci. 569, 217–240 (2021)

    Article  MathSciNet  Google Scholar 

  12. Arab, A., Rostami, M.J., Ghavami, B.: An image encryption method based on chaos system and AES algorithm. J. Supercomput. 75(10), 6663–6682 (2019)

    Article  Google Scholar 

  13. Wang, X., Gao, S.: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci. 539, 195–214 (2020)

    Article  MathSciNet  Google Scholar 

  14. Silva-García, V.M., Flores-Carapia, R., Rentería-Márquez, C., Luna-Benoso, B., Aldape-Pérez, M.: Substitution box generation using Chaos: an image encryption application. Appl. Math. Comput. 332, 123–135 (2018)

    MathSciNet  MATH  Google Scholar 

  15. Wang, L.M., Dong, T.D., Ge, M.F.: Finite-time synchronization of memristor chaotic systems and its application in image encryption. Appl. Math. Comput. 347, 293–305 (2019)

    MATH  Google Scholar 

  16. Wang, X.Y., Feng, L., Zhao, H.Y.: Fast image encryption algorithm based on parallel computing system. Inf. Sci. 486, 340–358 (2019)

    Article  Google Scholar 

  17. Abd Ellatif, A.A., Niu, X.M., Amin, M.: A new image cipher in time and frequency domains. Opt. Commun. 285(21–22), 4241–4251 (2012)

    Article  Google Scholar 

  18. Belazi, A., Abd Ellatif, A.A., Belghith, S.: A novel image encryption scheme based on substitution-permutation network and chaos. Sig. Process. 128, 155–170 (2016)

    Article  Google Scholar 

  19. Parvaz, R., Zarebnia, M.: A combination chaotic system and application in color image encryption. Opt. Laser Technol. 101, 30–41 (2018)

    Article  Google Scholar 

  20. Liu, H.J., Kadir, A., Sun, X.B.: Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Proc. 11(5), 324–332 (2017)

    Article  Google Scholar 

  21. Chai, X.L., Zheng, X.Y., Gan, Z.H., Han, D.J., Chen, Y.R.: An image encryption algorithm based on chaotic system and compressive sensing. Sig. Process. 148, 124–144 (2018)

    Article  Google Scholar 

  22. Wu, J.H., Liao, X.F., Yang, B.: Image encryption using 2D Henon-Sine map and DNA approach. Sig. Process. 153, 11–23 (2018)

    Article  Google Scholar 

  23. Singh, P., Yadav, A.K., Singh, K.: Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt. Lasers Eng. 91, 187–195 (2017)

    Article  Google Scholar 

  24. Belazi, A., Abd El-Latif, A.A., Diaconu, A.V., Rhouma, R., Belghith, S.: Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt. Lasers Eng. 88, 37–50 (2017)

    Article  Google Scholar 

  25. Annaby, M.H., Rushdi, M.A., Nehary, E.A.: Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt. Lasers Eng. 103, 9–23 (2018)

    Article  Google Scholar 

  26. Zhang, M., Tong, X.J.: Joint image encryption and compression scheme based on IWT and SPIHT. Opt. Lasers Eng. 90, 254–274 (2017)

    Article  Google Scholar 

  27. Wu, C., Wang, Y., Chen, Y., Wang, J., Wang, Q.H.: Asymmetric encryption of multiple-image based on compressed sensing and phase-truncation in cylindrical diffraction domain. Opt. Commun. 431, 203–209 (2019)

    Article  Google Scholar 

  28. Wang, X., et al.: S-box based image encryption application using a chaotic system without equilibrium. Appl. Sci. Basel 9(4), 781 (2019)

    Article  Google Scholar 

  29. Zhou, Y.C., Cao, W.J., Chen, C.L.P.: Image encryption using binary bitplane. Sig. Process. 100, 197–207 (2014)

    Article  Google Scholar 

  30. Wong, K.W., Kwok, S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372(15), 2645–2652 (2008)

    Article  Google Scholar 

  31. Xu, L., Gou, X., Li, Z., Li, J.: A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion. Opt. Lasers Eng. 91, 41–52 (2017)

    Article  Google Scholar 

  32. Palacios-Luengas, L., Delgado-Gutiérrez, G., Díaz-Méndez, J.A., Vázquez-Medina, R.: Symmetric cryptosystem based on skew tent map. Multimedia Tools Appl. 77(2), 2739–2770 (2017)

    Article  Google Scholar 

  33. Souyah, A., Faraoun, K.M.: An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn. 86(1), 639–653 (2016)

    Article  MathSciNet  Google Scholar 

  34. Hua, Z.Y., Jin, F., Xu, B.X., Huang, H.J.: 2D Logistic-Sine-coupling map for image encryption. Sig. Process. 149, 148–161 (2018)

    Article  Google Scholar 

  35. Shahna, K.U., Mohamed, A.: A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl. Soft Comput. 90, 106162 (2020)

    Article  Google Scholar 

  36. Diaconu, A.V.: Circular inter–intra pixels bit-level permutation and chaos-based image encryption. Inf. Sci. 355, 314–327 (2016)

    Article  Google Scholar 

  37. Cao, C., Sun, K.H., Liu, W.H.: A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Sig. Process. 143, 122–133 (2018)

    Article  Google Scholar 

  38. Li, J.F., Xiang, S.Y., Wang, H.N., Gong, J.K., Wen, A.J.: A novel image encryption algorithm based on synchronized random bit generated in cascade-coupled chaotic semiconductor ring lasers. Opt. Lasers Eng. 102, 170–180 (2018)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the National Natural Science Foundation of China under Grant 61672124 and 61701070, Liaoning Province Science and Technology Innovation Leading Talents Program Project under Grant XLYC1802013, Key R&D Projects of Liaoning Province under Grant 2019020105-JH2/103, Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program under Grant 2019GXRC031.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingyuan Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xian, Y., Wang, X., Wang, X., Li, Q., Ma, B. (2022). A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix Multiplication. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2022. Lecture Notes in Computer Science, vol 13340. Springer, Cham. https://doi.org/10.1007/978-3-031-06791-4_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-06791-4_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-06790-7

  • Online ISBN: 978-3-031-06791-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics