Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

Fast chaotic encryption scheme based on separable moments and parallel computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we propose three novel image encryption algorithms. Separable moments and parallel computing are combined in order to enhance the security aspect and time performance. The three proposed algorithms are based on TKM (Tchebichef-Krawtchouk moments), THM (Tchebichef-Hahn moments) and KHM (Krawtchouk-Hahn moments) respectively. A novel chaotic scheme is introduced, that enhances security by adding a layer of block permutation on top of the classical confusion/diffusion scheme, and reduces time cost through parallel computing. This approach offers improved security and faster performance compared to classical encryption schemes. The proposed algorithms are tested under several criteria and the experimental results show a remarkable resilience against all well-known attacks. Furthermore, the novel parallel encryption scheme exhibits a drastic improvement in the time performance. The proposed algorithms are compared to the state-of-the-art methods and they stand out as a promising choice for reliable use in real world applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data Availability

All data generated or analyzed during this study are included in this published article.

References

  1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifur Chaos 16(08):2129–2151

    MathSciNet  Google Scholar 

  2. Batioua I, Benouini R, Zenkouar K, Zahi A et al (2017) 3d image analysis by separable discrete orthogonal moments based on krawtchouk and tchebichef polynomials. Pattern Recogn 71:264–277

    Google Scholar 

  3. Chai X, Fu J, Gan Z, Lu Y, Zhang Y (2022) An image encryption scheme based on multi-objective optimization and block compressed sensing. Nonlinear Dyn 108(3):2671–2704

    Google Scholar 

  4. Guan M, Yang X, Hu W (2019) Chaotic image encryption algorithm using frequency-domain dna encoding. IET Image Process 13(9):1535–1539

    Google Scholar 

  5. Hankerson D, Hoffman G, Leonard DA, Lindner CC, Phelps KT, Rodger CA, Wall JR (2000) Coding theory and cryptography: the essentials. CRC Press

    Google Scholar 

  6. Hénon M (2004) A two-dimensional mapping with a strange attractor. Theory Chaotic Attrac 94–102

  7. Hore A, Ziou D (2010) Image quality metrics: Psnr vs. ssim. In: 2010 20th international conference on pattern recognition, pp 2366–2369. IEEE

  8. Hu G, Li B (2021) A uniform chaotic system with extended parameter range for image encryption. Nonlinear Dyn 103(3):2819–2840

    Google Scholar 

  9. Hu MK (1962) Visual pattern recognition by moment invariants. IRE Trans Inf Theory 8(2):179–187

    Google Scholar 

  10. Hua Z, Jin F, Xu B, Huang H (2018) 2d logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Google Scholar 

  11. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Google Scholar 

  12. Hua Z, Zhu Z, Yi S, Zhang Z, Huang H (2021) Cross-plane colour image encryption using a two-dimensional logistic tent modular map. Inf Sci 546:1063–1083

    MathSciNet  Google Scholar 

  13. Huang CK, Nien HH (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127

    Google Scholar 

  14. Janakiraman S, Thenmozhi K, Rayappan JBB, Amirtharajan R (2018) Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller. Microprocess Microsyst 56:1–12

    Google Scholar 

  15. Jiang NZX, Lan X (2006) Advances in machine vision, image processing, and pattern analysis. In: International Workshop on Intelligent Computing in Pattern Analysis/Synthesis, IWICPAS. Springer

  16. Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimedia Tools Appl 79(27):20263–20279

    Google Scholar 

  17. Khedr WI (2019) A new efficient and configurable image encryption structure for secure transmission. Multimed Tools Appl 1–25

  18. Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual mpeg-video encryption algorithms. IEEE Trans Circ Sys Vid Tech 17(2):214–223

    Google Scholar 

  19. Li S, Li C, Chen G, Zhang D, Bourbakis NG (2004) A general cryptanalysis of permutation-only multimedia encryption algorithms. IACR’s Crypto ePrint Arch Rep 374:2004

  20. Lin H, Si J, Abousleman GP (2008) Orthogonal rotation-invariant moments for digital image processing. IEEE Trans Image Process 17(3):272–282

    MathSciNet  Google Scholar 

  21. Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifur Chaos 30(12):2050173

    MathSciNet  Google Scholar 

  22. Liu H, Kadir A, Xu C (2020) Cryptanalysis and constructing s-box based on chaotic map and backtracking. Appl Math Comput 376:125153

    MathSciNet  Google Scholar 

  23. Liu H, Wang X, Kadir A (2021) Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput 25(16):11077–11086

    Google Scholar 

  24. Liu H, Wen F, Kadir A (2019) Construction of a new 2d chebyshev-sine map and its application to color image encryption. Multimed Tools Appl 78(12):15997–16010

    Google Scholar 

  25. Liu S, Guo C, Sheridan JT (2014) A review of optical image encryption techniques. Opt Laser Technol 57:327–342

    Google Scholar 

  26. Lorenz EN (1963) Deterministic nonperiodic flow. J Atmos Sci 20(2):130–141

    MathSciNet  Google Scholar 

  27. Lu Q, Zhu C, Deng X (2020) An efficient image encryption scheme based on the lss chaotic map and single s-box. IEEE Access 8:25664–25678

    Google Scholar 

  28. Markandey V, deFigueiredo R (1992) Robot sensing techniques based on high-dimensional moment invariants and tensors. IEEE Trans Robot Autom 8(2):186–195

    Google Scholar 

  29. Mukundan R, Ong S, Lee PA (2001) Image analysis by tchebichef moments. IEEE Trans Image Process 10(9):1357–1364

    MathSciNet  Google Scholar 

  30. Munoz-Rodriguez J (2010) Computational cryptography based on trigonometric algorithms and intensity superposition. Imaging Sci J 58(2):61–80

    Google Scholar 

  31. Ping P, Xu F, Mao Y, Wang Z (2018) Designing permutation-substitution image encryption networks with henon map. Neurocomputing 283:53–63

    Google Scholar 

  32. Ravichandran D, Murthy B, Balasubramanian V, Fathima S, Amirtharajan R et al (2021) An efficient medical image encryption using hybrid dna computing and chaos in transform domain. Med Biol Eng Comput 59(3):589–605

    Google Scholar 

  33. Sankpal PR, Vijaya P (2014) Image encryption using chaotic maps: a survey. In: 2014 fifth international conference on signal and image processing, pp 102–107. IEEE

  34. Sayyouri M, Hmimid A, Qjidaa H (2016) Image analysis using separable discrete moments of charlier-hahn. Multimed Tools Appl 75(1):547–571

    Google Scholar 

  35. Shah AA, Parah SA, Rashid M, Elhoseny M (2020) Efficient image encryption scheme based on generalized logistic map for real time image processing. J Real-Time Image Proc 17(6):2139–2151

    Google Scholar 

  36. Si Y, Liu H, Chen Y (2021) Constructing keyed strong s-box using an enhanced quadratic map. Int J Bifur Chaos 31(10):2150146

    MathSciNet  Google Scholar 

  37. Si Y, Liu H, Chen Y (2022) Constructing a 3d exponential hyperchaotic map with application to prng. Int J Bifur Chaos 32(07):2250095

    MathSciNet  Google Scholar 

  38. Teague MR (1980) Image analysis via the general theory of moments. Josa 70(8):920–930

    MathSciNet  Google Scholar 

  39. Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2d-clss hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71–85

    Google Scholar 

  40. Tsougenis E, Papakostas GA, Koulouriotis DE (2015) Image watermarking via separable moments. Multimed Tools Appl 74(11):3985–4012

    Google Scholar 

  41. Von Solms R (1998) Information security management (3): the code of practice for information security management (bs 7799). Inf Manag omput Secur

  42. Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comp Secur 38:97–102

    Google Scholar 

  43. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Google Scholar 

  44. Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652

    Google Scholar 

  45. Wu GC, Deng ZG, Baleanu D, Zeng DQ (2019) New variable-order fractional chaotic systems for fast image encryption. Chaos Interdiscip J Nonlinear Sci 29(8):083103

    MathSciNet  Google Scholar 

  46. Xiao B, Luo J, Bi X, Li W, Chen B (2020) Fractional discrete tchebyshev moments and their applications in image encryption and watermarking. Inf Sci 516:545–559

    MathSciNet  Google Scholar 

  47. Yamni M, Karmouni H, Sayyouri M, Qjidaa H (2021) Image watermarking using separable fractional moments of charlier-meixner. J Frankl Inst 358(4):2535–2560

    MathSciNet  Google Scholar 

  48. Yap PT, Paramesran R, Ong SH (2003) Image analysis by krawtchouk moments. IEEE Trans Image Process 12(11):1367–1377

    MathSciNet  Google Scholar 

  49. Ye G, Pan C, Huang X, Mei Q (2018) An efficient pixel-level chaotic image encryption algorithm. Nonlinear Dyn 94(1):745–756

    Google Scholar 

  50. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Google Scholar 

  51. Zhao H, Wang S, Wang X (2022) Fast image encryption algorithm based on multi-parameter fractal matrix and mpmcml system. Chaos, Solitons Fractals 164:112742

    MathSciNet  Google Scholar 

  52. Zhao M, Liu H (2022) Construction of a nondegenerate 2d chaotic map with application to irreversible parallel key expansion algorithm. Int J Bifur Chaos 32(06):2250081

    MathSciNet  Google Scholar 

  53. Zhong H, Li G (2022) Multi-image encryption algorithm based on wavelet transform and 3d shuffling scrambling. Multimed Tools Appl 81(17):24757–24776

    Google Scholar 

  54. Zhou J, Shu H, Zhu H, Toumoulin C, Luo L (2005) Image analysis by discrete orthogonal hahn moments. In: International conference image analysis and recognition, pp 524–531. Springer

  55. Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. Opt Commun 285(1):29–37

    Google Scholar 

  56. Zhu H (2012) Image representation using separable two-dimensional continuous and discrete orthogonal moments. Pattern Recogn 45(4):1540–1558

    Google Scholar 

  57. Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21(8):790

Download references

Acknowledgements

The authors thankfully acknowledge the Laboratory of Intelligent Systems and Applications (LSIA) for his support to achieve this work.

Funding

This research did not receive any specific grant from funding agencies in the public, commercial, or not-for-profit sectors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdelhalim Kamrani.

Ethics declarations

Conflict of Interest

The authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kamrani, A., Zenkouar, K., Najah, S. et al. Fast chaotic encryption scheme based on separable moments and parallel computing. Multimed Tools Appl 83, 38793–38817 (2024). https://doi.org/10.1007/s11042-023-17034-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17034-w

Keywords