Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Digital image is transmitted more and more frequently through the network. To protect the security of batch images in an open network, a multiple-image encryption algorithm is proposed. Firstly, multiple images are combined into an image cube and then three-dimensional integer lifting wavelet transform (3D-LWT) is performed on it; secondly, the low-frequency part is scrambled to obtain the scrambled image cube in frequency domain; thirdly, three-dimensional inverse integer lifting wavelet transform (3D-ILWT) is performed to obtain the scrambled image cube in the spatial domain; finally, the scrambled image cube is replaced by the dynamic stereo S-box. The experimental results and algorithm analyses show that the key space of the algorithm can reach up to 2628, and its key sensitivity is very strong. Therefore the algorithm is strongly secure and robust.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23

Similar content being viewed by others

Data availability

The data that support the findings of this study are available upon reasonable request from the authors.

References

  1. Aasawari S, Laiphrakpam DS (2021) Multiple images encryption based on 3D scrambling and hyper-chaotic system [J]. Inf Sci 550(3):252–267

    MathSciNet  Google Scholar 

  2. Abboud AJ, Albu-Rghaif AN, Jassim AK (2018) Balancing compression and encryption of satellite imagery [J]. International. J Electric Comput Eng 8(5):3568–3586

    Google Scholar 

  3. Al-Khasawneh MA, Shamsuddin SM, Hasan S, et al. (2018) An improved chaotic image encryption Algorithm [C]// International Conference on Smart Computing and Electronic Enterprise (ICSCEE): 1–8

  4. Al-Maadeed TA et al (2021) A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes [J]. Multimed Tools Appl 80(16):24801–24822

    Google Scholar 

  5. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems [J]. Int J Bifurcation Chaos 16(8):2129–2151

    MathSciNet  Google Scholar 

  6. Dezhao K, Xueju S, Qinzu X et al (2013) Multiple-image encryption scheme based on cascaded fractional Fourier transform [J]. Appl Opt 52(12):2619–2625

    Google Scholar 

  7. Dongming H, Zhilong Z, Xin Z et al (2023) A flexible and visually meaningful multi-image compression, encryptionand hiding scheme based on 2D compressive sensing [J]. Heliyon 9(3):1–17

    Google Scholar 

  8. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps [J]. Int J Bifurcation Chaos 8(6):1259–1284

    MathSciNet  Google Scholar 

  9. Hegui Z, Lewen D, Yating L et al (2021) A three-dimensional bit-level image encryption algorithm with Rubik's cube method [J]. Math Comput Simul 185(2):754–770

    MathSciNet  Google Scholar 

  10. Huiyan Z, Guodong L (2022) Multi-image encryption algorithm based on wavelet transform and 3D shuffling scrambling [J]. Multimed Tools Appl 81(7):24757–24776

    Google Scholar 

  11. Ingrid D, Wim S (1998) Factoring wavelet transforms into lifting steps [J]. J Fourier Anal Appl 4(3):247–269

    MathSciNet  Google Scholar 

  12. Javan AA, Kekha et al (2021) Medical images encryption based on adaptive-robust multi-dode synchronization of chen hyper-chaotic systems [J]. Sensors 21(11):3925

    Google Scholar 

  13. Jiantao Z, Xianming L, Au OC et al (2014) Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation [J]. IEEE Trans Inf Forensic Secur 9(1):39–50

    Google Scholar 

  14. Jieyu Z, Lingfeng L (2020) Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map [J]. IET Image Process 14(11):2310–2320

    Google Scholar 

  15. Jun P, Yang W, Shangzhu J, et al. (2020) Image encryption based on fractional-order chen hyperchaotic system. 2020 15th IEEE conference on industrial electronics and applications (ICIEA). IEEE. pp: 213–217

  16. Kumar V, Ashishr G (2021) A 2D logistic map and Lorenz-Rossler chaotic system based RGB image encryption approach [J]. Multimed Tools Appl 80(3):3749–3773

    Google Scholar 

  17. Lei Z, Xiaoqiang Z (2020) Multiple-image encryption algorithm based on bit planes and chaos [J]. Multimed Tools Appl 79(29):20753–20771

    Google Scholar 

  18. Li L, Abd-El-Atty B, Abd El-Latif AA, et al  (2017) Quantum color image encryption based on multiple discrete chaotic systems [C]. Computer Science & Information Systems. IEEE, pp 555–559

  19. Liao Xin Y, Yingbo LB et al (2019) A new payload partition strategy in color image steganography [J]. IEEE Trans Circ Syst Vid Technol 30(3):685–696

    Google Scholar 

  20. LilianHuang WS, Jianhong X et al (2020) Chaotic color image encryption scheme using deoxyribonucleic acid (DNA) coding calculations and arithmetic over the Galois field [J]. Math Probl Eng:1–22

  21. Liyong B, Jianchao T, Hongwei D et al (2021) The N-level (N≥ 4) logistic cascade homogenized mapping for image encryption [J]. Nonlin Dyn 105(2):1911–1935

    Google Scholar 

  22. Ma Manman Y, Xuelian CH et al (2022) Dynamic DNA coding multi-image encryption based on compound chaos [J]. J Electron Imaging 31(4):1–16

    Google Scholar 

  23. Manish K, Prateek G (2021) A new medical image encryption algorithm based on the 1D logistic map associated with pseudo-random numbers [J]. Multimed Tools Appl 80(12):18941–18967

    Google Scholar 

  24. Munir N, Khan M, ShaukatJamal S et al (2021) Cryptanalysis of hybrid secure image encryption based on Julia set fractals and three-dimensional Lorenz chaotic map [J]. Math Comput Simul 190(9):826–836

    MathSciNet  Google Scholar 

  25. Pak C, Kim J, Pang R et al (2021) A new color image encryption using 2D improved logistic coupling map [J]. Multimed Tools Appl 80(17):25367–25387

    Google Scholar 

  26. Renjie N, Fan W, Jun W et al (2021) Multi-image encryption based on compressed sensing and deep learning in optical gyrator domain [J]. IEEE Photon J 13(3):1–16

    Google Scholar 

  27. Roy S, Shrivastava M, Rawat U et al (2021) IESCA: an efficient image encryption scheme using 2-D cellular automata [J]. J Inf Secur Appl 61(5):102919–102937

    Google Scholar 

  28. Shafique A, Fawad A (2020) Image encryption using dynamic S-box substitution in the wavelet domain [J]. Wirel Pers Commun 115(3):2243–2268

    Google Scholar 

  29. Shevchenko II (2014) Lyapunov exponents in resonance multiplets [J]. Phys Lett A 378(1–2):34–42

    MathSciNet  Google Scholar 

  30. Shiwei J, Yuan G, Wei C (2020) Meaningful ciphertext encryption algorithm based on bit scrambling, discrete wavelet transform, and improved chaos [J]. IET Image Process 15(10):1053–1071

    Google Scholar 

  31. Tao W, Minghui W (2020) Hyperchaotic image encryption algorithm based on bit-level permutation and DNA encoding [J]. Opt Laser Technol 132(12):1–13

    Google Scholar 

  32. Vandana R, Pal AK (2021) An image encryption scheme in bit plane content using Henon map based generated edge map [J]. Multimed Tools Appl 80(14):22275–22300

    Google Scholar 

  33. Xiaofeng W, Bin L, Wang Y et al (2021) An efficient batch images encryption method based on DNA encoding and PWLCM [J]. Multimed Tools Appl 80(17):1–29

    Google Scholar 

  34. Xiaohong G (2021) A color image encryption algorithm based on an improved Hénon map [J]. Physica Scripta 96(6):1–18

    Google Scholar 

  35. Xiaoqiang Z, Jingjing L (2022) Multiple-image encryption algorithm based on the dice-rotation model and improved chaos [J]. J Electron Imaging 31(4):043047–043073

    Google Scholar 

  36. Xiaoqiang Z, Xuesong W (2017) Multiple-image encryption algorithm based on mixed image element and permutation [J]. Comput Electr Eng 62(5):6–16

    Google Scholar 

  37. Xiaoqiang Z, Xuesong W (2017) Multiple-image encryption algorithm based on mixed image element and chaos [J]. Comput Electr Eng 62(6):401–413

    Google Scholar 

  38. Xiaoqiang Z, Xuesong W (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system [J]. Multimed Tools Appl 78(8):7841–7869

    Google Scholar 

  39. Xiaoqing W, Hao Z, Xingyuan W et al (2020) Novel multiple images encryption algorithm using CML system and DNA encoding [J]. IET Image Process 14(3):518–529

    Google Scholar 

  40. Xin L, Kaide L, Xinshan Z et al (2020) Robust detection of image operator chain with two-stream convolutional neural network [J]. IEEE J Select Top Signal Process 14(5):955–968

    Google Scholar 

  41. Xin L, Jiaojiao Y, Mingliang C et al (2020) Adaptive payload distribution in multiple images steganography based on image texture features [J]. IEEE Trans Depend Secure Comput 19(2):897–911

    Google Scholar 

  42. Xiuli C, Jianqiang B, Zhihua G (2020) Color image compression and encryption scheme based on compressive sensing and double random encryption strategy [J]. Signal Process 176(11):1–18

    Google Scholar 

  43. Xiuli C, Xiangcheng Z, Zhihua G et al (2021) Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption [J]. Signal Process 183(6):1–24

    Google Scholar 

  44. Xiulun Y, Xianye L, Xiangfeng M et al (2018) Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme [J]. Opt Lasers Eng 102(3):106–111

    Google Scholar 

  45. Ye Tian L, Zhimao. (2017) Novel permutation-diffusion image encryption algorithm with chaotic dynamic S-box and DNA sequence operation [J]. AIP Adv 7(8):1–23

    Google Scholar 

  46. Yong Z (2018) The unified image encryption algorithm based on chaos and cubic S-box [J]. Inf Sci 450:361–377

    MathSciNet  Google Scholar 

  47. Yousif YF, Abboud AJ, Radhi HY (2020) Robust image encryption with scanning technology, the El-Gamal algorithm and chaos theory [J]. IEEE Access 8(24):155184–155209

    Google Scholar 

  48. Yousif YF, Abboud AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques [J]. Multimed Tools Appl 81(19):27453–27493

    Google Scholar 

  49. Zhihua G, Jianqiang B, Wenke D et al (2021) Exploiting 2D compressed sensing and information entropy for secure color image compression and encryption [J]. Neural Comput & Applic:1–23

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqiang Zhang.

Ethics declarations

Conflict interest

The author declare that they have no conflicts of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Liao, J. Multiple-image encryption algorithm based on 3D-LWT and dynamic stereo S-box. Multimed Tools Appl 83, 16337–16362 (2024). https://doi.org/10.1007/s11042-023-16162-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-16162-7

Keywords