Skip to main content
Erschienen in: Soft Computing 5/2020

25.06.2019 | Methodologies and Application

A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators

verfasst von: Mohammed Es-Sabry, Nabil El Akkad, Mostafa Merras, Abderrahim Saaidi, Khalid Satori

Erschienen in: Soft Computing | Ausgabe 5/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this work, we proposed a new approach to encrypt color images using two matrices with size of 16 × 16 whose integer values are between 0 and 255 generated randomly, and the bit-shift operators. These matrices are used to perform the first encryption phase. The first value of the first matrix is calculated from the pixels of each channel (red, green and blue) of the original image; the rest of the values are randomly generated; each value must be unique; the values of the second matrix are unique and generated randomly. The first encryption phase of the original image is done by digraph (two-digit sequence). We take the first digit in the first matrix, the second digit in the second matrix; then, we look in these matrices for the numbers that complete the rectangle. In the second encryption phase, we used a right circular shift of bits; the number of bits to shift is calculated according to a function which considers the values of the two matrices as well as their positions (row and column). Therefore, any change in the two keys (two matrices) will completely change the encrypted image. Our encryption system is resistant against brute force attacks, statistical attacks as well as differential attacks. The results are justified by applying several safety criteria, such as correlation coefficient, entropy and peak signal-to-noise ratio (PSNR). In addition, our method is very sensitive to the change made, either in the original image or in the two keys used for the encryption, which was justified by calculating the number of changing pixel rate (NPCR > 99.69) and the unified averaged changed intensity (UACI > 33.54).

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Borujeni SE, Eshghi M (2011) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst 52:525–537 Borujeni SE, Eshghi M (2011) Chaotic image encryption system using phase-magnitude transformation and pixel substitution. J Telecommun Syst 52:525–537
Zurück zum Zitat Es-Sabry M, El Akkad N, Merras M, Saaidi A, Satori K (2018a) A novel text encryption algorithm based on the two-square Cipher and Caesar Cipher. Int Conf Big Data Cloud Appl 872:78–88CrossRef Es-Sabry M, El Akkad N, Merras M, Saaidi A, Satori K (2018a) A novel text encryption algorithm based on the two-square Cipher and Caesar Cipher. Int Conf Big Data Cloud Appl 872:78–88CrossRef
Zurück zum Zitat Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. pp 1105–1110 Fridrich J (1997) Image encryption based on chaotic maps. In: 1997 IEEE international conference on systems, man, and cybernetics. Computational cybernetics and simulation, vol 2. pp 1105–1110
Zurück zum Zitat Hua ZY, Zhou YC, Pun CM, Philip Chen CL (2015) 2D Sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRef Hua ZY, Zhou YC, Pun CM, Philip Chen CL (2015) 2D Sine logistic modulation map for image encryption. Inf Sci 297:80–94CrossRef
Zurück zum Zitat Hwang DC, Shin DH, Kim ES (2007) A novel three-dimensional digital watermarking scheme basing on integral imaging. Optics Commun 277:40–49CrossRef Hwang DC, Shin DH, Kim ES (2007) A novel three-dimensional digital watermarking scheme basing on integral imaging. Optics Commun 277:40–49CrossRef
Zurück zum Zitat Lesne A (2006) Chaos in biology. Riv Biol 99:467–481 Lesne A (2006) Chaos in biology. Riv Biol 99:467–481
Zurück zum Zitat Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371–1381CrossRef Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371–1381CrossRef
Zurück zum Zitat Ling C, Wu X, Sun S (1999) A general efficient method for chaotic signal estimation. IEEE Trans Signal Process 47:1424–1428CrossRef Ling C, Wu X, Sun S (1999) A general efficient method for chaotic signal estimation. IEEE Trans Signal Process 47:1424–1428CrossRef
Zurück zum Zitat Liu CX, Lu JJ (2010) A novel fractional order hyperchaotic system and its circuit realization. Int J Mod Phys B 24:1299–1307CrossRef Liu CX, Lu JJ (2010) A novel fractional order hyperchaotic system and its circuit realization. Int J Mod Phys B 24:1299–1307CrossRef
Zurück zum Zitat Lu L, Luan L, Meng L, Li CR (2012) Study on spatiotemporal chaos tracking synchronization of a class of complex network. Nonlinear Dyn 70:89–95MathSciNetCrossRef Lu L, Luan L, Meng L, Li CR (2012) Study on spatiotemporal chaos tracking synchronization of a class of complex network. Nonlinear Dyn 70:89–95MathSciNetCrossRef
Zurück zum Zitat Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. Multimed Syst 20:45–64CrossRef Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. Multimed Syst 20:45–64CrossRef
Zurück zum Zitat Piao YR, Shin DH, Kim ES (2009) Robust image encryption by combined use of integral imaging and pixel scrambling techniques. Opt Lasers Eng 47:1273–1281CrossRef Piao YR, Shin DH, Kim ES (2009) Robust image encryption by combined use of integral imaging and pixel scrambling techniques. Opt Lasers Eng 47:1273–1281CrossRef
Zurück zum Zitat Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117–123CrossRef Singh N, Sinha A (2008) Optical image encryption using fractional Fourier transform and chaos. Opt Lasers Eng 46:117–123CrossRef
Zurück zum Zitat Skrobek A (2007) Cryptanalysis of chaotic stream cipher. Phys Lett A 363:84–90CrossRef Skrobek A (2007) Cryptanalysis of chaotic stream cipher. Phys Lett A 363:84–90CrossRef
Zurück zum Zitat Tong X, Cui M, Wang Z (2009) A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J Opt Commun 282:2722–2728CrossRef Tong X, Cui M, Wang Z (2009) A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator. J Opt Commun 282:2722–2728CrossRef
Zurück zum Zitat Tong XG, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493–1508MathSciNetCrossRef Tong XG, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493–1508MathSciNetCrossRef
Zurück zum Zitat Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943–1950CrossRef Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943–1950CrossRef
Zurück zum Zitat Wang X, Zhao D, Chen L (2006) Image encryption based on extended fractional Fourier transform and digital holography technique. Opt Commun 260:449–453CrossRef Wang X, Zhao D, Chen L (2006) Image encryption based on extended fractional Fourier transform and digital holography technique. Opt Commun 260:449–453CrossRef
Zurück zum Zitat Weidenmuller HA, Mitchell GE (2009) Random matrices and chaos in nuclear physics. Rev Mod Phys 81:539–589CrossRef Weidenmuller HA, Mitchell GE (2009) Random matrices and chaos in nuclear physics. Rev Mod Phys 81:539–589CrossRef
Zurück zum Zitat Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22:359–366CrossRef Wu X, Hu H, Zhang B (2004) Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Solitons Fractals 22:359–366CrossRef
Zurück zum Zitat Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24:759–765MathSciNetCrossRef Zhang L, Liao X, Wang X (2005) An image encryption approach based on chaotic maps. Chaos Solitons Fractals 24:759–765MathSciNetCrossRef
Zurück zum Zitat Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37CrossRef Zhu C (2012) A novel image encryption scheme based on improved hyperchaotic sequences. J Opt Commun 285:29–37CrossRef
Metadaten
Titel
A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators
verfasst von
Mohammed Es-Sabry
Nabil El Akkad
Mostafa Merras
Abderrahim Saaidi
Khalid Satori
Publikationsdatum
25.06.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 5/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04151-8

Weitere Artikel der Ausgabe 5/2020

Soft Computing 5/2020 Zur Ausgabe

Premium Partner