Skip to main content

Image Encryption Algorithm Methodology Based on Multi-mapping Image Pixel

  • Conference paper
  • First Online:
The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019) (AMLTA 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 921))

Abstract

Image encryption and decryption using a key sequence based on the multi-mapping method of an image pixel is proposed in this paper. The generated key sequences are based on the logistic map, elliptic curves (EC) and Henon map. In the beginning, the one-dimensional sequence is generated using logistic map for the bifurcation parameter and initial value. The generated sequences are XORed with image pixels as a first mapping step. Then the resulted pixels are XORed with key sequence based on elliptic curve random number generator (ECRNG) as a second mapping step. Finally, the resulted pixels XORed with key sequence generated by Henon map. The obtained cipher image introduces good cryptographic properties in the case of multi-mapping. The performance of the proposed scheme is analyzed by computing Histogram, Entropy, and Correlation between the original and encrypted images. The proposed method provides an immense improvement in the encrypted image.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. 3(1), 8–13 (2015)

    Google Scholar 

  2. Reyad, O., Mofaddel, M.A., Abdelhafiez, W.M., Fathy, M.: A novel image encryption scheme based on different block size for grayscale and color images. In: 12th International Conference on Computer Engineering and Systems (ICCES), pp. 455–461. IEEE (2017)

    Google Scholar 

  3. Reyad, O., Kotulski, Z., Abdelhafiez, W.M.: Image encryption using chaos-driven elliptic curve pseudo-random number generators. Appl. Math. Inf. Sci. 10(4), 1283–1292 (2016)

    Article  Google Scholar 

  4. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998)

    Article  MathSciNet  Google Scholar 

  5. Ahmad, S., Alam, K., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In: International Conference in Networking Systems and Security (NSysS), pp. 1–5. IEEE (2015)

    Google Scholar 

  6. Reyad, O.: Text message encoding based on elliptic curve cryptography and a mapping methodology. Inf. Sci. Lett. 7(1), 7–11 (2018)

    Article  Google Scholar 

  7. Shah, J., Dohbi, J.S.: Review of image encryption and decryption techniques for 2D images. Int. J. Eng. Technol. Manage. Res. 5(1), 81–84 (2018)

    Google Scholar 

  8. Dhiman, R., Singh, B.: Image encryption techniques: a literature Review. Int. J. Adv. Res. Comput. Sci. 8(7), 239–244 (2017)

    Article  Google Scholar 

  9. Lagmiri, S.N., Elalami, N., Elalami, J.: Color and gray images encryption algorithm using chaotic systems of different dimensions. Int. J. Comput. Sci. Network Secur. 18(1), 79–86 (2018)

    Google Scholar 

  10. Zhang, X., Han, F., Niu, Y.: Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 1–11 (2017)

    Google Scholar 

  11. Zang, Y., Li, X., Hou, W.: A fast image encryption scheme based on AES. In: 2nd International Conference on Image, Vision and Computing, pp. 624–628. IEEE (2017)

    Google Scholar 

  12. Chen, X., Hu, C.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 1821–1827 (2017)

    Article  Google Scholar 

  13. Huang, H., Yang, S.: Image encryption technique combining compressive sensing with double random-phase encoding. Hindawi Math. Probl. Eng. (2018)

    Google Scholar 

  14. Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)

    Article  Google Scholar 

  15. Bresten, C.L., Jung, J.H.: A study on the numerical convergence of the discrete logistic map. Commun. Nonlinear Sci. Numer. Simul. 14, 3076–3088 (2009)

    Article  MathSciNet  Google Scholar 

  16. Silverman, J.H.: The Arithmetic of Elliptic Curves. Springer, New York (2009)

    Book  Google Scholar 

  17. Reyad, O., Kotulski, Z.: On pseudo-random number generators using elliptic curves and chaotic systems. Appl. Math. Inf. Sci. 9(1), 31–38 (2015)

    Article  MathSciNet  Google Scholar 

  18. Reyad, O., Kotulski, Z.: Statistical analysis of the chaos-driven elliptic curve pseudo-random number generators. In: CCIS, vol. 448, pp. 38–48. Springer, Heidelberg (2014)

    Google Scholar 

  19. Szczepanski, J., Kotulski, Z.: Pseudorandom number generators based on chaotic dynamical systems. Open. Syst. Inf. Dyn. 8, 137–146 (2001)

    Article  MathSciNet  Google Scholar 

  20. Sarmah, H.K., Paul, R.: Period doubling route to chaos in a two parameter invertible map with constant Jacobian. Int. J. Res. Rev. Appl. Sci. (IJRRAS) 3, 72–82 (2010)

    MATH  Google Scholar 

  21. Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. J. Comput. Appl. Math. 59, 3320–3327 (2010)

    Article  MathSciNet  Google Scholar 

  22. Rhouma, R., Meherzi, S., Belghith, S.: OCML-based colour image encryption. Chaos Soliton Fract. 40(1), 309–318 (2009)

    Article  Google Scholar 

  23. Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Prentice-Hall Inc., Upper Saddle River (2006)

    Google Scholar 

  24. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. IEEE Transl. J. Sel. Areas Telecommun. (JSAT) 31–38 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to W. M. Abd-Elhafiez .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abd-Elhafiez, W.M., Reyad, O., Mofaddel, M.A., Fathy, M. (2020). Image Encryption Algorithm Methodology Based on Multi-mapping Image Pixel. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., F. Tolba, M. (eds) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-030-14118-9_64

Download citation

Publish with us

Policies and ethics