Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Efficient image encryption using the Tinkerbell map in conjunction with linear feedback shift registers

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Images are considered crucial for conveying information due to their visualisation properties and capacity to hold a large amount of data. To safeguard image data from potential risks of information leakage, numerous image encryption algorithms have been developed. These algorithms often make use of chaotic maps, known for their high unpredictability, ergodicity, and sensitivity to parameters and initial values. This paper introduces a new chaos-based digital image encryption algorithm to protect digital images from unauthorised access or attacks. The algorithm heavily relies on permutation and diffusion processes. Specifically, it employs two rounds of pixel permutation using a Tinkerbell chaotic map sequence on the source image and two rounds of pixel diffusion using the Linear Feedback Shift Register and Logistic Map sequences on the permuted image. The encryption algorithm’s effectiveness is thoroughly examined through various cryptanalysis techniques, including key space analysis, information entropy, correlation coefficient, differential attack, key sensitivity, histogram analysis, occlusion attack, noise attack, and encryption execution time. The experimental results are then compared with the most recent literature to demonstrate the algorithm’s reliability and its ability to withstand diverse attacks. Notably, the proposed algorithm stands out as a secure and viable encryption solution, requiring less computational time than previous studies, thus making it a more practical option for real-world applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability statements

Image data utilised for analysis of the proposed approach, along with related methods, is publicly available.

References

  1. (2023) Fractal coding and analysis group. https://links.uwaterloo.ca/Repository.html

  2. (1999) Medical image samples. https://barre.dev/medical/samples/

  3. Alexan W, Chen YL, Por LY, Gabr M (2023) Hyperchaotic maps and the single neuron model: a novel framework for chaos-based image encryption. Symmetry 15(5):1081

    Article  Google Scholar 

  4. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurc Chaos 16(08):2129–2151

    Article  MathSciNet  Google Scholar 

  5. Amina Y, Bekkouche T, Daachi MEH, Diffellah N (2023) A novel trigonometric 3D chaotic map and its application in a double permutation-diffusion image encryption. Multimed Tools Appl 1–24

  6. Askar S, Karawia A, Alshamrani A (2015) Image encryption algorithm based on chaotic economic model. Math Probl Eng 2015. https://doi.org/10.1155/2015/341729

  7. Balasamy K, Shamia D (2023) Feature extraction-based medical image watermarking using fuzzy-based median filter. IETE J Res 69(1):83–91

    Article  Google Scholar 

  8. Cao LC, Luo YL, Qiu SH, Liu JX (2015) A perturbation method to the tent map based on lyapunov exponent and its application. Chin Phys B 24(10):100501

    Article  Google Scholar 

  9. Cao W, Mao Y, Zhou Y (2020) Designing a 2D infinite collapse map for image encryption. Sig Process 171:107457

    Article  Google Scholar 

  10. Chen Y, Tang C, Ye R (2020) Cryptanalysis and improvement of medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sig Process 167:107286

    Article  Google Scholar 

  11. El-Shafai W, Khallaf F, El-Rabaie ESM, El-Samie FEA (2021) Robust medical image encryption based on DNA-chaos cryptosystem for secure telemedicine and healthcare applications. J Ambient Intell Humaniz Comput 12(10):9007–9035. https://doi.org/10.1007/s12652-020-02597-5

    Article  Google Scholar 

  12. Erkan U, Toktas A, Toktas F, Alenezi F (2022) 2D e\(\pi \)-map for image encryption. Inf Sci 589:770–789. https://doi.org/10.1016/j.ins.2021.12.126

    Article  Google Scholar 

  13. Fan S, Chen K, Tian J (2023) A novel image encryption algorithm based on coupled map lattices model. Multimed Tools Appl 1–16

  14. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284. https://doi.org/10.1142/S021812749800098X

    Article  MathSciNet  Google Scholar 

  15. Gao Z, Liu Z, Wang L (2021) An image encryption algorithm based on the improved sine-tent map. Discret Dyn Nat Soc 2021:1–16

    Google Scholar 

  16. Ge S, Xia Z, Fei J, Tong Y, Weng J, Li M (2023) A robust document image watermarking scheme using deep neural network. Multimed Tools Appl 1–24

  17. Goldsztejn A, Hayes W, Collins P (2011) Tinkerbell is chaotic. SIAM J Appl Dyn Syst 10(4):1480–1501

    Article  MathSciNet  Google Scholar 

  18. Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm. Phys Lett A 346(1–3):153–157

    Article  Google Scholar 

  19. Han X, Mou J, Liu T, Cao Y (2021) A new fractional-order 2D discrete chaotic map and its DSP implement. Eur Phys J Spec Top 230(21):3913–3925. https://doi.org/10.1140/epjs/s11734-021-00331-6

    Article  Google Scholar 

  20. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Sig Process 144:134–144

    Article  Google Scholar 

  21. Huang S, Huang L, Cai S, Xiong X, Liu Y (2022) Novel and secure plaintext-related image encryption algorithm based on compressive sensing and tent-sine system. IET Image Process. https://doi.org/10.1049/ipr2.12429

  22. Huang Y, Zhou L (2023) A hyper-chaos-based image encryption scheme with double parity alternate scrambling. Multimed Tools Appl 1–15

  23. Joshi AB, Kumar D, Mishra D, Guleria V (2020) Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map. J Mod Opt 67(10):933–949

    Article  MathSciNet  Google Scholar 

  24. Kanwal S, Inam S, Hajjej F, Cheikhrouhou O, Nawaz Z, Waqar A, Khan M et al (2022) A new image encryption technique based on sine map, chaotic tent map, and circulant matrices. Secur Commun Netw 2022

  25. Kumar CM, Vidhya R, Brindha M (2022) An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function. Appl Intell 52(3):2556–2585

    Article  Google Scholar 

  26. Lai Q, Hu G, Erkan U, Toktas A (2023) A novel pixel-split image encryption scheme based on 2D salomon map. Expert Syst Appl 213(118):845

    Google Scholar 

  27. Lai Q, Wan Z, Kamdem Kuate PD (2020) Modelling and circuit realisation of a new no-equilibrium chaotic system with hidden attractor and coexisting attractors. Electron Lett 56(20):1044–1046

    Article  Google Scholar 

  28. Li L, Luo Y, Qiu S, Ouyang X, Cao L, Tang S (2022) Image encryption using chaotic map and cellular automata. Multimed Tools Appl pp. 1–19. https://doi.org/10.1007/s11042-022-12621-9

  29. Li M, Xu M, Luo J, Fan H (2019) Cryptanalysis of an image encryption using 2d henon-sine map and DNA approach. IEEE Access 7:63336–63345

    Article  Google Scholar 

  30. Liu L, Miao S (2017) An image encryption algorithm based on Baker map with varying parameter. Multimed Tools Appl 76(15):16511–16527. https://doi.org/10.1007/s11042-016-3925-x

    Article  Google Scholar 

  31. Man Z, Li J, Di X, Sheng Y, Liu Z (2021) Double image encryption algorithm based on neural network and chaos. Chaos, Solitons Fractals 152:111318

    Article  MathSciNet  Google Scholar 

  32. Matthews R (1989) On the derivation of a “chaotic’’ encryption algorithm. Cryptologia 13(1):29–42. https://doi.org/10.1080/0161-118991863745

    Article  MathSciNet  Google Scholar 

  33. Melman A, Evsutin O (2023) Image data hiding schemes based on metaheuristic optimization: a review. Artif Intell Rev 1–73

  34. Mishra P, Bhaya C, Pal AK, Singh AK (2021) A medical image cryptosystem using bit-level diffusion with DNA coding. J Ambient Intell Humaniz Comput 1–22. https://doi.org/10.1007/s12652-021-03410-7

  35. Moumen A (2018) Medical and biological image analysis. In: Medical and biological image analysis. IntechOpen

  36. Sx Nan, Feng Xf Wu, Yf Zhang H (2022) Remote sensing image compression and encryption based on block compressive sensing and 2D-LCCCM. Nonlinear Dyn 108(3):2705–2729

    Article  Google Scholar 

  37. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Sig Process 138:129–137

    Article  Google Scholar 

  38. Raghuvanshi KK, Kumar S, Kumar S, Kumar S (2021) Development of new encryption system using Brownian motion based diffusion. Multimed Tools Appl 80(14):21011–21040. https://doi.org/10.1007/s11042-021-10665-x

    Article  Google Scholar 

  39. Rohith S, Bhat KNH, Sharma AN (2014) Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of linear feedback shift register. In: 2014 International conference on advances in electronics computers and communications, pp 1–6

  40. Salomon R (1996) Re-evaluating genetic algorithm performance under coordinate rotation of benchmark functions: a survey of some theoretical and practical aspects of genetic algorithms. BioSystems 39(3):263–278

    Article  Google Scholar 

  41. Sharma M, Ranjan RK, Bharti V (2023) An image encryption algorithm based on a novel hyperchaotic Henon sine map. Multimed Tools Appl 82(8):11949–11972

    Article  Google Scholar 

  42. Signing VF, Tegue GG, Kountchou M, Njitacke Z, Tsafack N, Nkapkop J, Etoundi CL, Kengne J (2022) A cryptosystem based on a chameleon chaotic system and dynamic DNA coding. Chaos, Solitons Fractals 155(111):777. https://doi.org/10.1016/j.chaos.2021.111777

    Article  MathSciNet  Google Scholar 

  43. Smid M, Branstad D (1988) Data encryption standard: past and future. Proc of the IEEE 76(5):550–559. https://doi.org/10.1109/5.4441

    Article  Google Scholar 

  44. Sun J (2021) 2D-SCMCI hyperchaotic map for image encryption algorithm. IEEE Access 9:59313–59327

    Article  Google Scholar 

  45. Suri S, Vijay R (2019) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Humaniz Comput 10(6):2277–2290. https://doi.org/10.1007/s12652-018-0825-0

    Article  Google Scholar 

  46. Teng L, Wang X, Xian Y (2022) Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion. Inf Sci 605:71–85. https://doi.org/10.1016/j.ins.2022.05.032

    Article  Google Scholar 

  47. Vaidya SP (2022) Fingerprint-based robust medical image watermarking in hybrid transform. Vis Comput 1–16. https://doi.org/10.1007/s00371-022-02406-4

  48. Vincent R, Joan D (2001) Advanced encryption standard. In: Proceedings of federal information processing standards publications, national institute of standards and technology, pp 19–22

  49. Wang H, Xiao D, Chen X, Huang H (2018) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Sig Process 144:444–452

    Article  Google Scholar 

  50. Wang M, Wang X, Zhao T, Zhang C, Xia Z, Yao N (2021) Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme. Inf Sci 544:1–24. https://doi.org/10.1016/j.ins.2020.07.051

    Article  MathSciNet  Google Scholar 

  51. Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    Article  Google Scholar 

  52. Wang X, Gao S (2021) A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimed Tools Appl 80(7):10301–10322. https://doi.org/10.1007/s11042-020-10101-6

    Article  Google Scholar 

  53. Wang Z, Feng G, Wu H, Zhang X (2023) Data hiding during image processing using capsule networks. Neurocomputing 537:49–60

    Article  Google Scholar 

  54. Wu J, Liao X, Yang B (2018) Image encryption using 2d hénon-Sine map and DNA approach. Sig Process 153:11–23

    Article  Google Scholar 

  55. Xian Y, Wang X (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169. https://doi.org/10.1016/j.ins.2020.09.055

    Article  MathSciNet  Google Scholar 

  56. Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5):2191–2199

    Article  MathSciNet  Google Scholar 

  57. Yang YG, Wang BP, Yang YL, Zhou YH, Shi WM, Liao X (2021) Visually meaningful image encryption based on universal embedding model. Inf Sci 562:304–324. https://doi.org/10.1016/j.ins.2021.01.041

    Article  MathSciNet  Google Scholar 

  58. Yavuz E, Yazıcı R, Kasapbaşı MC, Yamaç E (2016) A chaos-based image encryption algorithm with simple logical functions. Comput Electr Eng 54:471–483

    Article  Google Scholar 

  59. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Secur Commun Netw 9(13):2015–2023. https://doi.org/10.1002/sec.1458

    Article  Google Scholar 

  60. Yuan HM, Liu Y, Gong LH, Wang J (2017) A new image cryptosystem based on 2D hyper-chaotic system. Multimed Tools Appl 76(6):8087–8108. https://doi.org/10.1007/s11042-016-3454-7

    Article  Google Scholar 

  61. Zhang W, Wang S, Han W, Yu H, Zhu Z (2020) An image encryption algorithm based on random hamiltonian path. Entropy 22(1):73. https://doi.org/10.3390/e22010073

    Article  MathSciNet  Google Scholar 

  62. Zheng J, Luo Z, Zeng Q (2020) An efficient image encryption algorithm based on multi chaotic system and random DAN coding. Multimed Tools Appl 79(39):29901–29921. https://doi.org/10.1007/s11042-020-09454-9

    Article  Google Scholar 

Download references

Funding

The first author received financial support from CSIR, India, with sanction order no. (08/0133(13253)/2022-EMR-I) for conducting this research work.

Author information

Authors and Affiliations

Authors

Contributions

There are equal contributions to this research from all the authors of this article.

Corresponding author

Correspondence to Dhirendra Kumar.

Ethics declarations

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pal, P.K., Kumar, D. & Agarwal, V. Efficient image encryption using the Tinkerbell map in conjunction with linear feedback shift registers. Multimed Tools Appl 83, 44903–44932 (2024). https://doi.org/10.1007/s11042-023-17236-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-17236-2

Keywords