Skip to main content
Erschienen in: Neural Computing and Applications 15/2020

21.12.2019 | Original Article

Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system

verfasst von: Majid Khan, Fawad Masood, Abdullah Alghafis

Erschienen in: Neural Computing and Applications | Ausgabe 15/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this article, our aim is to design a new and efficient digital information confidentiality mechanism. We have offered an encryption scheme which is based on fractals and multiple chaotic iterative maps in order to add more confusion and diffusion capability. Due to randomness nature and unique repetitive pattern of fractal increases key space to hundreds of bits and enhance security level of proposed cryptosystem. The projected algorithm is authenticated by utilizing security performance analyses. The security performances elucidate that our suggested technique is quite competent for digital image encryption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Sig Process 128:155–170 Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Sig Process 128:155–170
2.
Zurück zum Zitat Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf Secur J Glob Perspect 25(4–6):162–179 Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf Secur J Glob Perspect 25(4–6):162–179
3.
Zurück zum Zitat Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57–70 Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57–70
4.
Zurück zum Zitat Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18 Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
5.
Zurück zum Zitat Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29(4):993–999 Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29(4):993–999
6.
Zurück zum Zitat Wang XY, Zhang YQ, Bao XM (2015) A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6):3877–3897 Wang XY, Zhang YQ, Bao XM (2015) A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6):3877–3897
7.
Zurück zum Zitat Machkour M, Saaidi A, Benmaati ML (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the latin square image cipher. 3D Res 6(4):36 Machkour M, Saaidi A, Benmaati ML (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the latin square image cipher. 3D Res 6(4):36
8.
Zurück zum Zitat Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780 Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780
9.
Zurück zum Zitat Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497 Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497
10.
Zurück zum Zitat Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529MathSciNetMATH Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529MathSciNetMATH
11.
Zurück zum Zitat Boriga RE, Dăscălescu AC, Diaconu AV (2014) A new fast image encryption scheme based on 2D chaotic maps. IAENG Int J Comput Sci 41(4):249–258 Boriga RE, Dăscălescu AC, Diaconu AV (2014) A new fast image encryption scheme based on 2D chaotic maps. IAENG Int J Comput Sci 41(4):249–258
14.
Zurück zum Zitat Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78(18):26203–26222 Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78(18):26203–26222
16.
Zurück zum Zitat Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int J Theor Phys 58:2720–2743MathSciNetMATH Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int J Theor Phys 58:2720–2743MathSciNetMATH
17.
Zurück zum Zitat Rafiq A, Khan M (2019) Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimed Tools Appl 78:15527–15544 Rafiq A, Khan M (2019) Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimed Tools Appl 78:15527–15544
18.
Zurück zum Zitat Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE 13(11):e0206460 Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE 13(11):e0206460
19.
Zurück zum Zitat Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. Int J Theor Phys 57(11):3584–3594MATH Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. Int J Theor Phys 57(11):3584–3594MATH
20.
Zurück zum Zitat Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imaging 27(6):063022 Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imaging 27(6):063022
21.
Zurück zum Zitat Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913 Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913
22.
Zurück zum Zitat Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dyn 82:527–533 Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dyn 82:527–533
23.
Zurück zum Zitat Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455MathSciNet Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455MathSciNet
24.
Zurück zum Zitat Stallings W (2006) Cryptography and network security, 4/E. Pearson Education India, Bengaluru Stallings W (2006) Cryptography and network security, 4/E. Pearson Education India, Bengaluru
25.
Zurück zum Zitat Chuang CH, Yen ZY, Lin GS, Hong ZW (2011) A virtual optical encryption software system for image security. J Converg Inf Technol 6(2):357–364 Chuang CH, Yen ZY, Lin GS, Hong ZW (2011) A virtual optical encryption software system for image security. J Converg Inf Technol 6(2):357–364
26.
Zurück zum Zitat Al-Najjar HM (2012) Digital image encryption algorithm based on multi-dimensional chaotic system and pixels location. Int J Comput Theory Eng 4(3):357 Al-Najjar HM (2012) Digital image encryption algorithm based on multi-dimensional chaotic system and pixels location. Int J Comput Theory Eng 4(3):357
27.
Zurück zum Zitat Banthia AK, Tiwari N (2013) Image encryption using pseudo random number generators. Int J Comput Appl 67(20):1–8 Banthia AK, Tiwari N (2013) Image encryption using pseudo random number generators. Int J Comput Appl 67(20):1–8
28.
Zurück zum Zitat Rivest RL (1990) Cryptography. In: van Leeuwen J (ed) Algorithms and complexity. MIT Press, Cambridge, pp 717–755 Rivest RL (1990) Cryptography. In: van Leeuwen J (ed) Algorithms and complexity. MIT Press, Cambridge, pp 717–755
29.
Zurück zum Zitat Kartit Z, Azougaghe A, Idrissi HK, El Marraki M, Hedabou M, Belkasmi M, Kartit A (2016) Applying encryption algorithm for data security in cloud storage. In: Sabir E, Medromi H, Sadik M (eds) Advances in ubiquitous networking. Springer, Singapore, pp 141–154 Kartit Z, Azougaghe A, Idrissi HK, El Marraki M, Hedabou M, Belkasmi M, Kartit A (2016) Applying encryption algorithm for data security in cloud storage. In: Sabir E, Medromi H, Sadik M (eds) Advances in ubiquitous networking. Springer, Singapore, pp 141–154
30.
Zurück zum Zitat Wheeler DD, Matthews RA (1991) Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15(2):140–152 Wheeler DD, Matthews RA (1991) Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15(2):140–152
31.
Zurück zum Zitat Chen Y, Liao X (2005) Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm. Phys Lett A 342(5–6):389–396MATH Chen Y, Liao X (2005) Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm. Phys Lett A 342(5–6):389–396MATH
32.
Zurück zum Zitat Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Sig Process 132:150–154 Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Sig Process 132:150–154
33.
Zurück zum Zitat Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of “an improvement over an image encryption method based on total shuffling”. Opt Commun 350:77–82 Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of “an improvement over an image encryption method based on total shuffling”. Opt Commun 350:77–82
34.
Zurück zum Zitat Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99 Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99
36.
Zurück zum Zitat Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41 Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41
37.
Zurück zum Zitat Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283:232–236MATH Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283:232–236MATH
38.
Zurück zum Zitat Mandelbrot BB (1983) The fractal geometry of nature, vol 173. W. H. Freeman, New York Mandelbrot BB (1983) The fractal geometry of nature, vol 173. W. H. Freeman, New York
39.
Zurück zum Zitat Gomory R (2010) Benoît Mandelbrot (1924–2010). Nature 468:378 Gomory R (2010) Benoît Mandelbrot (1924–2010). Nature 468:378
40.
Zurück zum Zitat Addison PS (1997) Fractals and chaos: an illustrated course. CRC Press, Boca RatonMATH Addison PS (1997) Fractals and chaos: an illustrated course. CRC Press, Boca RatonMATH
42.
Zurück zum Zitat Kashanian H, Davoudi M, Khorramfar H (2016) Image encryption using chaos functions and fractal key. Int J Comput Sci Netw Secur 16(10):87 Kashanian H, Davoudi M, Khorramfar H (2016) Image encryption using chaos functions and fractal key. Int J Comput Sci Netw Secur 16(10):87
43.
Zurück zum Zitat Abd-El-Hafiz SK, Radwan AG, Haleem SHA, Barakat ML (2014) A fractal-based image encryption system. IET Image Proc 8(12):742–752 Abd-El-Hafiz SK, Radwan AG, Haleem SHA, Barakat ML (2014) A fractal-based image encryption system. IET Image Proc 8(12):742–752
44.
Zurück zum Zitat Peitgen HO, Walther HO (eds) (2006) Functional differential equations and approximation of fixed points. Proceedings, Bonn, July 1978, vol 730. Springer Peitgen HO, Walther HO (eds) (2006) Functional differential equations and approximation of fixed points. Proceedings, Bonn, July 1978, vol 730. Springer
45.
Zurück zum Zitat Russell DA, Hanson JD, Ott E (1980) Dimension of strange attractors. Phys Rev Lett 45(14):1175MathSciNet Russell DA, Hanson JD, Ott E (1980) Dimension of strange attractors. Phys Rev Lett 45(14):1175MathSciNet
46.
Zurück zum Zitat Grassberger P, Procaccia I (1983) Measuring the strangeness of strange attractors. Physica D 9(1–2):189–208MathSciNetMATH Grassberger P, Procaccia I (1983) Measuring the strangeness of strange attractors. Physica D 9(1–2):189–208MathSciNetMATH
47.
Zurück zum Zitat Tiner JH (2004) Exploring the world of mathematics: from ancient record keeping to the latest advances in computers. New Leaf Publishing Group, Green Forest Tiner JH (2004) Exploring the world of mathematics: from ancient record keeping to the latest advances in computers. New Leaf Publishing Group, Green Forest
48.
Zurück zum Zitat Beck M, Geoghegan R (2010) The art of proof: basic training for deeper mathematics. Springer, BerlinMATH Beck M, Geoghegan R (2010) The art of proof: basic training for deeper mathematics. Springer, BerlinMATH
49.
Zurück zum Zitat Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611–27637 Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611–27637
50.
Zurück zum Zitat Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754MATH Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754MATH
51.
Zurück zum Zitat Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Sig Process 92(5):1202–1215 Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Sig Process 92(5):1202–1215
52.
Zurück zum Zitat Liu S, Sun J, Xu Z (2009) An improved image encryption algorithm based on chaotic system. JCP 4(11):1091–1100 Liu S, Sun J, Xu Z (2009) An improved image encryption algorithm based on chaotic system. JCP 4(11):1091–1100
53.
Zurück zum Zitat Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661MathSciNetMATH Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661MathSciNetMATH
54.
Zurück zum Zitat Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Sig Process 92(4):1101–1108 Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Sig Process 92(4):1101–1108
55.
Zurück zum Zitat El-Latif AAA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93:2986–3000 El-Latif AAA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93:2986–3000
56.
Zurück zum Zitat Wang X, Yang L (2012) A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Opt Commun 285(20):4033–4042 Wang X, Yang L (2012) A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Opt Commun 285(20):4033–4042
57.
Zurück zum Zitat Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339MathSciNetMATH Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339MathSciNetMATH
58.
Metadaten
Titel
Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system
verfasst von
Majid Khan
Fawad Masood
Abdullah Alghafis
Publikationsdatum
21.12.2019
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 15/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04667-y

Weitere Artikel der Ausgabe 15/2020

Neural Computing and Applications 15/2020 Zur Ausgabe

Premium Partner