Abstract
Secure data transmission over the public channels have high impact and increasingly important due to theft and manipulation in contents. The requirement of public/ private organizations to develop an efficient scheme to provide security to their contents. We developed a digital contents encryption scheme based Arnold scrambling and Lucas series, which is very simple to implement but almost impossible to breach in this article. We perform encryption at standard images by using Lucas series at different iterations of scrambled images of Arnold transform. Numerical simulation analyses performed to analyze the efficiency and effectiveness of the projected structure.
Similar content being viewed by others
References
Ahmad J, Hwang SO (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951–13976
Ahmed F, Anees A, Abbas VU, Siyal MY (2014) A noisy channel tolerant image encryption scheme. Wirel Pers Commun 77(4):2771–2791
Aljawarneh S, Aldwairi M, Yassein MB (2018) Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model. J Comput Sci 25:152–160
Aljawarneh S, Radhakrishna V, Kumar PV, Janaki V (2016) A similarity measure for temporal pattern discovery in time series data generated by IoT. In: 2016 International conference on engineering & MIS (ICEMIS) (pp. 1–4). IEEE
Aljawarneh SA, Vangipuram R (2018) GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. J Supercomput:1–38
Aljawarneh SA, Vangipuram R, Puligadda VK, Vinjamuri J (2017) G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things. Futur Gener Comput Syst 74:430–443
Arnold VI (1968) The stability problem and ergodic properties for classical dynamical systems. In: Vladimir I. Arnold-Collected Works (pp. 107–113). Springer, Berlin, Heidelberg
Arnold VI, Avez A (1968) “Ergodic Problems of Classical Mechanics,” Benjamin, 1968. J Franks “Anosov diffeomorphisms” in global Analysis, proc Sympos, Pure math, American Mathematical Society 14:61–93
Belazi A, El-Latif AAA, Diaconu AV, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88:37–50
Belazi A, Khan M, El-Latif AAA, Belghith S (2017) Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption. Nonlinear Dynamics 87(1):337–361
Boriga RE, Dăscălescu AC, Diaconu AV (2014) A new fast image encryption scheme based on 2D chaotic maps. IAENG Int J Comput Sci 41(4):249–258
Chen W, Quan C, Tay CJ (2009) Optical color image encryption based on Arnold transform and interference method. Opt Commun 282:3680–3685
Dyson FJ, Falk H (1992) Period of a discrete cat mapping. Am Math Mon 99:603–614
El-Latif AAA, Abd-El-Atty B, Talha M (2018) Robust encryption of quantum medical images. IEEE Access 6:1073–1081
El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70(3):1559–1584
Elshamy AM, El-Samie FEA, Faragallah OS, Elshamy EM, El-sayed HS, El-zoghdy SF, Rashed ANZ, Mohamed AE-NA, Alhamad AQ (2016) Optical image cryptosystem using double random phase encoding and Arnold’s Cat map. Opt Quant Electron, Springer 48:212
Fang L, YuKai W (2010) Restoring of the watermarking image in Arnold scrambling. In: Signal Processing Systems (ICSPS), 2010 2nd International Conference on (Vol. 1, pp. V1–771). IEEE
Guo Q, Liu Z, Liu S (2010) Color image encryption by using Arnold and discrete fractional random transforms in IHS space. Opt Lasers Eng 48(12):1174–1181
Huang HF (2010) An Image Scrambling Encryption Algorithm Combined Arnold and Chaotic Transform. In Int. Conf. China Communication (pp. 208–210)
Hussain I, Anees A, Aslam M, Ahmed R, Siddiqui N (2018) A noise resistant symmetric key cryptosystem based on S8 S-boxes and chaotic maps. The European Physical Journal Plus 133:1–23
Keating JP (1991) Asymptotic properties of the periodic orbits of the cat. Nonlinearity 4:277–307
Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455
Khan M (2015) A novel image encryption scheme based on multiple chaotic S-boxes. Nonlinear Dynamics 82(1–2):527–533
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S 8 permutation. Neural Comput & Applic 29(4):993–999
Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06594-6
Khan M, Shah T (2014) A construction of novel chaos base nonlinear component of block cipher. Nonlinear Dynamics 76(1):377–382
Khan M, Shah T (2014) A novel image encryption technique based on Hénon chaotic map and S 8 symmetric group. Neural Comput & Applic 25(7–8):1717–1722
Khan M, Shah T (2015) An efficient chaotic image encryption scheme. Neural Comput & Applic 26:1137–1148
Khan M, Shah T, Batool SI (2016) A new implementation of chaotic S-boxes in CAPTCHA. SIViP 10(2):293–300
Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460
Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer's arbitrary spin. Int J Theor Phys. https://doi.org/10.1007/s10773-019-04162-z
Khawaja MA, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl. https://doi.org/10.1007/s11042-019-07866-w
Khawaja MA, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys. https://doi.org/10.1007/s10773-019-04188-3
Li L, Abd-El-Atty B, El-Latif AAA, Ghoneim A (2017) Quantum color image encryption based on multiple discrete chaotic systems. In 2017 Federated Conference on Computer Science and Information Systems (FedCSIS) (pp. 555–559). IEEE
Liu Z, Chen H, Liu T, Li P, Xu L, Dai J, Liu S (2011) Image encryption by using gyrator transform and Arnold transform. Journal of Electronic Imaging 20(1):013020
Liu Z, Xu L, Liu T, Chen H, Li P, Lin C, Liu S (2011) Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt Commun 284:123–128
Minati M, Priyadarsini M, Adhikary MC, Sunit K (September 2012) Image encryption using fibonacci-lucas transformation. International Journal on Cryptography and Information Security (IJCIS) 2(3)
Munir, N. and Khan, M., 2018, September. A Generalization of Algebraic Expression for Nonlinear Component of Symmetric Key Algorithms of Any Characteristic p. In 2018 International Conference on Applied and Engineering Mathematics (ICAEM) (pp. 48–52). IEEE.
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497
Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2015) A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos. Multimed Tools Appl 74(3):781–811
Premaratne P, Premaratne M (2012) Key-based scrambling for secure image communication. In International Conference on Intelligent Computing (pp. 259–263). Springer, Berlin, Heidelberg
Radhakrishna V, Aljawarneh SA, Kumar PV, Choo KKR (2018) A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns. Soft Comput 22(6):1903–1919
Radhakrishna V, Kumar GR, Aljawarneh S (2017) Optimising business intelligence results through strategic application of software process model. International Journal of Intelligent Enterprise 4(1–2):128–142
Soleymani A, Nordin J, Sundararajan E (2004) A chaotic cryptosystem for images based on Henon and Arnold cat map. Hindawi Scientic World, pp. 1–21
Stoyanov B, Kordov K (2015) Image encryption using Chebyshev map and rotation equation. Entropy 17(4):2117–2139
Wang XY, Zhang YQ, Bao XM (2015) A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6):3877–3897
Waseem HM, Khan M (2018) Information Confidentiality Using Quantum Spinning, Rotation and Finite State Machine. Int J Theor Phys 57(11):3584–3594
Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B Lasers Opt 125(2):27
Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. Journal of Electronic Imaging 27(6):063022
Weber AG (1997) The USC-SIPI image database version 5. USC-SIPI Report 315:1–24
Wei Z, Moroz I, Sprott JC, Wang Z, Zhang W (2017) Detecting hidden chaotic regions and complex dynamics in the self-exciting homopolar disc dynamo. International Journal of Bifurcation and Chaos 27(02):1730008
Wei Z, Pham VT, Kapitaniak T, Wang Z (2016) Bifurcation analysis and circuit realization for multiple-delayed Wang–Chen system with hidden chaotic attractors. Nonlinear Dynamics 85(3):1635–1650
Wei Z, Yu P, Zhang W, Yao M (2015) Study of hidden attractors, multiple limit cycles from Hopf bifurcation and boundedness of motion in the generalized hyperchaotic Rabinovich system. Nonlinear Dynamics 82(1–2):131–141
Wei Z, Zhu B, Yang J, Perc M, Slavinec M (2019) Bifurcation analysis of two disc dynamos with viscous friction and multiple time delays. Appl Math Comput 347:265–281
Yan X, Wang S, El-Latif AAA, Niu X (2015) New approaches for efficient information hiding-based secret image sharing schemes. SIViP 9(3):499–510
Yassein MB, Aljawarneh S, Al-huthaifi RK (2017) Enhancements of LEACH protocol: Security and open issues. In 2017 International Conference on Engineering and Technology (ICET) (pp. 1–8). IEEE.
Yassein MB, Aljawarneh S, Qawasmeh E, Mardini W, Khamayseh Y (2017) Comprehensive study of symmetric key and asymmetric key encryption algorithms. In: 2017 international conference on engineering and technology (ICET) (pp. 1–7). IEEE
Younas I, Khan M (2018) A New Efficient Digital Image Encryption Based on Inverse Left Almost Semi Group and Lorenz Chaotic System. Entropy 20(12):913
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780
Zhou Y, Agaian S, Joyner VM, Panetta K (2008) Two Fibonacci p-code based image scrambling algorithms. In: Image Processing: Algorithms and Systems VI (Vol. 6812, p. 681215). International Society for Optics and Photonics
Zhou NR, Hua TX, Gong LH, Pei DJ, Liao QH (2015) Quantum image encryption based on generalized Arnold transform and double random-phase encoding. Quantum Inf Process 14(4):1193–1213
Acknowledgements
Both authors Hafiz Muhammad Waseem and Dr. Syeda Iram Batool are greatly thankful to Vice Chancellor Dr. Syed Wilayat Husain, Dean Iqbal Rasool Memon and Director Cyber & information security Dr. Muhammad Amin, Institute of Space Technology, Islamabad Pakistan, for providing decent atmosphere for research and development.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
We have no conflict of interest to declare concerning the publication of this article.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Batool, S.I., Waseem, H.M. A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78, 27611–27637 (2019). https://doi.org/10.1007/s11042-019-07881-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-07881-x