Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A novel image encryption scheme based on Arnold scrambling and Lucas series

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Secure data transmission over the public channels have high impact and increasingly important due to theft and manipulation in contents. The requirement of public/ private organizations to develop an efficient scheme to provide security to their contents. We developed a digital contents encryption scheme based Arnold scrambling and Lucas series, which is very simple to implement but almost impossible to breach in this article. We perform encryption at standard images by using Lucas series at different iterations of scrambled images of Arnold transform. Numerical simulation analyses performed to analyze the efficiency and effectiveness of the projected structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951–13976

    Article  Google Scholar 

  2. Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Pers Commun 77(4):2771–2791

    Article  Google Scholar 

  3. Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160

    Article  Google Scholar 

  4. Aljawarneh S, Radhakrishna V, Kumar PV, Janaki V (2016) A similarity measure for temporal pattern discovery in time series data generated by IoT. In: 2016 International conference on engineering & MIS (ICEMIS) (pp. 1–4). IEEE

  5. Aljawarneh SA, Vangipuram R (2018) GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. J Supercomput:1–38

  6. Aljawarneh SA, Vangipuram R, Puligadda VK, Vinjamuri J (2017) G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things. Futur Gener Comput Syst 74:430–443

    Article  Google Scholar 

  7. Arnold VI (1968) The stability problem and ergodic properties for classical dynamical systems. In: Vladimir I. Arnold-Collected Works (pp. 107–113). Springer, Berlin, Heidelberg

  8. Arnold VI, Avez A (1968) “Ergodic Problems of Classical Mechanics,” Benjamin, 1968. J Franks “Anosov diffeomorphisms” in global Analysis, proc Sympos, Pure math, American Mathematical Society 14:61–93

    Google Scholar 

  9. Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50

    Article  Google Scholar 

  10. Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynamics 87(1):337–361

    Article  Google Scholar 

  11. Boriga RE, Dăscălescu AC, Diaconu AV (2014) A new fast image encryption scheme based on 2D chaotic maps. IAENG Int J Comput Sci 41(4):249–258

    Google Scholar 

  12. Chen W, Quan C, Tay CJ (2009) Optical color image encryption based on Arnold transform and interference method. Opt Commun 282:3680–3685

    Article  Google Scholar 

  13. Dyson FJ, Falk H (1992) Period of a discrete cat mapping. Am Math Mon 99:603–614

    Article  MathSciNet  MATH  Google Scholar 

  14. El-Latif AAA, Abd-El-Atty B, Talha M (2018) Robust encryption of quantum medical images. IEEE Access 6:1073–1081

    Article  Google Scholar 

  15. El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70(3):1559–1584

    Article  Google Scholar 

  16. Elshamy AM, El-Samie FEA, Faragallah OS, Elshamy EM, El-sayed HS, El-zoghdy SF, Rashed ANZ, Mohamed AE-NA, Alhamad AQ (2016) Optical image cryptosystem using double random phase encoding and Arnold’s Cat map. Opt Quant Electron, Springer 48:212

    Article  Google Scholar 

  17. Fang L, YuKai W (2010) Restoring of the watermarking image in Arnold scrambling. In: Signal Processing Systems (ICSPS), 2010 2nd International Conference on (Vol. 1, pp. V1–771). IEEE

  18. Guo Q, Liu Z, Liu S (2010) Color image encryption by using Arnold and discrete fractional random transforms in IHS space. Opt Lasers Eng 48(12):1174–1181

    Article  Google Scholar 

  19. Huang HF (2010) An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform. In Int. Conf. China Communication (pp. 208–210)

  20. Hussain I, Anees A, Aslam M, Ahmed R, Siddiqui N (2018) A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps. The European Physical Journal Plus 133:1–23

    Article  Google Scholar 

  21. Keating JP (1991) Asymptotic properties of the periodic orbits of the cat. Nonlinearity 4:277–307

    Article  MathSciNet  MATH  Google Scholar 

  22. Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455

    Article  MathSciNet  Google Scholar 

  23. Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dynamics 82(1–2):527–533

    Article  MathSciNet  Google Scholar 

  24. Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput & Applic 29(4):993–999

    Article  Google Scholar 

  25. Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06594-6

  26. Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics 76(1):377–382

    Article  MathSciNet  MATH  Google Scholar 

  27. Khan M, Shah T (2014) A novel image encryption technique based on Hénon chaotic map and S 8 symmetric group. Neural Comput & Applic 25(7–8):1717–1722

    Article  Google Scholar 

  28. Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26:1137–1148

    Article  Google Scholar 

  29. Khan M, Shah T, Batool SI (2016) A new implementation of chaotic S-boxes in CAPTCHA. SIViP 10(2):293–300

    Article  Google Scholar 

  30. Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460

    Article  Google Scholar 

  31. Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int J Theor Phys. https://doi.org/10.1007/s10773-019-04162-z

  32. Khawaja MA, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl. https://doi.org/10.1007/s11042-019-07866-w

  33. Khawaja MA, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys. https://doi.org/10.1007/s10773-019-04188-3

  34. Li L, Abd-El-Atty B, El-Latif AAA, Ghoneim A (2017) Quantum color image encryption based on multiple discrete chaotic systems. In 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 555–559). IEEE

  35. Liu Z, Chen H, Liu T, Li P, Xu L, Dai J, Liu S (2011) Image encryption by using gyrator transform and Arnold transform. Journal of Electronic Imaging 20(1):013020

    Article  Google Scholar 

  36. Liu Z, Xu L, Liu T, Chen H, Li P, Lin C, Liu S (2011) Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt Commun 284:123–128

    Article  Google Scholar 

  37. Minati M, Priyadarsini M, Adhikary MC, Sunit K (September 2012) Image encryption using fibonacci-lucas transformation. International Journal on Cryptography and Information Security (IJCIS) 2(3)

  38. Munir, N. and Khan, M., 2018, September. A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE.

  39. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

    Article  Google Scholar 

  40. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781–811

    Article  Google Scholar 

  41. Premaratne P, Premaratne M (2012) Key-based scrambling for secure image communication. In International Conference on Intelligent Computing (pp. 259–263). Springer, Berlin, Heidelberg

  42. Radhakrishna V, Aljawarneh SA, Kumar PV, Choo KKR (2018) A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Comput 22(6):1903–1919

    Article  Google Scholar 

  43. Radhakrishna V, Kumar GR, Aljawarneh S (2017) Optimising business intelligence results through strategic application of software process model. International Journal of Intelligent Enterprise 4(1–2):128–142

    Article  Google Scholar 

  44. Soleymani A, Nordin J, Sundararajan E (2004) A chaotic cryptosystem for images based on Henon and Arnold cat map. Hindawi Scientic World, pp. 1–21

  45. Stoyanov B, Kordov K (2015) Image encryption using Chebyshev map and rotation equation. Entropy 17(4):2117–2139

    Article  MathSciNet  Google Scholar 

  46. Wang XY, Zhang YQ, Bao XM (2015) A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6):3877–3897

    Article  Google Scholar 

  47. Waseem HM, Khan M (2018) Information Confidentiality Using Quantum Spinning, Rotation and Finite State Machine. Int J Theor Phys 57(11):3584–3594

    Article  MATH  Google Scholar 

  48. Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B Lasers Opt 125(2):27

    Article  MathSciNet  Google Scholar 

  49. Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging 27(6):063022

    Article  Google Scholar 

  50. Weber AG (1997) The USC-SIPI image database version 5. USC-SIPI Report 315:1–24

    Google Scholar 

  51. Wei Z, Moroz I, Sprott JC, Wang Z, Zhang W (2017) Detecting hidden chaotic regions and complex dynamics in the self-exciting homopolar disc dynamo. International Journal of Bifurcation and Chaos 27(02):1730008

    Article  MathSciNet  MATH  Google Scholar 

  52. Wei Z, Pham VT, Kapitaniak T, Wang Z (2016) Bifurcation analysis and circuit realization for multiple-delayed Wang–Chen system with hidden chaotic attractors. Nonlinear Dynamics 85(3):1635–1650

    Article  MathSciNet  MATH  Google Scholar 

  53. Wei Z, Yu P, Zhang W, Yao M (2015) Study of hidden attractors, multiple limit cycles from Hopf bifurcation and boundedness of motion in the generalized hyperchaotic Rabinovich system. Nonlinear Dynamics 82(1–2):131–141

    Article  MathSciNet  MATH  Google Scholar 

  54. Wei Z, Zhu B, Yang J, Perc M, Slavinec M (2019) Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl Math Comput 347:265–281

    MathSciNet  Google Scholar 

  55. Yan X, Wang S, El-Latif AAA, Niu X (2015) New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9(3):499–510

    Article  Google Scholar 

  56. Yassein MB, Aljawarneh S, Al-huthaifi RK (2017) Enhancements of LEACH protocol: Security and open issues. In 2017 International Conference on Engineering and Technology (ICET) (pp. 1–8). IEEE.

  57. Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2017) Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 international conference on engineering and technology (ICET) (pp. 1–7). IEEE

  58. Younas I, Khan M (2018) A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 20(12):913

    Article  Google Scholar 

  59. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780

    Article  Google Scholar 

  60. Zhou Y, Agaian S, Joyner VM, Panetta K (2008) Two Fibonacci p-code based image scrambling algorithms. In: Image Processing: Algorithms and Systems VI (Vol. 6812, p. 681215). International Society for Optics and Photonics

  61. Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process 14(4):1193–1213

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

Both authors Hafiz Muhammad Waseem and Dr. Syeda Iram Batool are greatly thankful to Vice Chancellor Dr. Syed Wilayat Husain, Dean Iqbal Rasool Memon and Director Cyber & information security Dr. Muhammad Amin, Institute of Space Technology, Islamabad Pakistan, for providing decent atmosphere for research and development.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syeda Iram Batool.

Ethics declarations

Conflict of interest

We have no conflict of interest to declare concerning the publication of this article.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Batool, S.I., Waseem, H.M. A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78, 27611–27637 (2019). https://doi.org/10.1007/s11042-019-07881-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-019-07881-x

Keywords