Abstract
Image encryption and decryption using a key sequence based on the multi-mapping method of an image pixel is proposed in this paper. The generated key sequences are based on the logistic map, elliptic curves (EC) and Henon map. In the beginning, the one-dimensional sequence is generated using logistic map for the bifurcation parameter and initial value. The generated sequences are XORed with image pixels as a first mapping step. Then the resulted pixels are XORed with key sequence based on elliptic curve random number generator (ECRNG) as a second mapping step. Finally, the resulted pixels XORed with key sequence generated by Henon map. The obtained cipher image introduces good cryptographic properties in the case of multi-mapping. The performance of the proposed scheme is analyzed by computing Histogram, Entropy, and Correlation between the original and encrypted images. The proposed method provides an immense improvement in the encrypted image.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Auyporn, W., Vongpradhip, S.: A robust image encryption method based on bit plane decomposition and multiple chaotic maps. Int. J. Signal Process. Syst. 3(1), 8–13 (2015)
Reyad, O., Mofaddel, M.A., Abdelhafiez, W.M., Fathy, M.: A novel image encryption scheme based on different block size for grayscale and color images. In: 12th International Conference on Computer Engineering and Systems (ICCES), pp. 455–461. IEEE (2017)
Reyad, O., Kotulski, Z., Abdelhafiez, W.M.: Image encryption using chaos-driven elliptic curve pseudo-random number generators. Appl. Math. Inf. Sci. 10(4), 1283–1292 (2016)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurcat. Chaos 8, 1259–1284 (1998)
Ahmad, S., Alam, K., Rahman, H., Tamura, S.: A comparison between symmetric and asymmetric key encryption algorithm based decryption mixnets. In: International Conference in Networking Systems and Security (NSysS), pp. 1–5. IEEE (2015)
Reyad, O.: Text message encoding based on elliptic curve cryptography and a mapping methodology. Inf. Sci. Lett. 7(1), 7–11 (2018)
Shah, J., Dohbi, J.S.: Review of image encryption and decryption techniques for 2D images. Int. J. Eng. Technol. Manage. Res. 5(1), 81–84 (2018)
Dhiman, R., Singh, B.: Image encryption techniques: a literature Review. Int. J. Adv. Res. Comput. Sci. 8(7), 239–244 (2017)
Lagmiri, S.N., Elalami, N., Elalami, J.: Color and gray images encryption algorithm using chaotic systems of different dimensions. Int. J. Comput. Sci. Network Secur. 18(1), 79–86 (2018)
Zhang, X., Han, F., Niu, Y.: Chaotic image encryption algorithm based on bit permutation and dynamic DNA encoding. Hindawi Comput. Intell. Neurosci. 1–11 (2017)
Zang, Y., Li, X., Hou, W.: A fast image encryption scheme based on AES. In: 2nd International Conference on Image, Vision and Computing, pp. 624–628. IEEE (2017)
Chen, X., Hu, C.: Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J. Biol. Sci. 24(8), 1821–1827 (2017)
Huang, H., Yang, S.: Image encryption technique combining compressive sensing with double random-phase encoding. Hindawi Math. Probl. Eng. (2018)
Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)
Bresten, C.L., Jung, J.H.: A study on the numerical convergence of the discrete logistic map. Commun. Nonlinear Sci. Numer. Simul. 14, 3076–3088 (2009)
Silverman, J.H.: The Arithmetic of Elliptic Curves. Springer, New York (2009)
Reyad, O., Kotulski, Z.: On pseudo-random number generators using elliptic curves and chaotic systems. Appl. Math. Inf. Sci. 9(1), 31–38 (2015)
Reyad, O., Kotulski, Z.: Statistical analysis of the chaos-driven elliptic curve pseudo-random number generators. In: CCIS, vol. 448, pp. 38–48. Springer, Heidelberg (2014)
Szczepanski, J., Kotulski, Z.: Pseudorandom number generators based on chaotic dynamical systems. Open. Syst. Inf. Dyn. 8, 137–146 (2001)
Sarmah, H.K., Paul, R.: Period doubling route to chaos in a two parameter invertible map with constant Jacobian. Int. J. Res. Rev. Appl. Sci. (IJRRAS) 3, 72–82 (2010)
Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. J. Comput. Appl. Math. 59, 3320–3327 (2010)
Rhouma, R., Meherzi, S., Belghith, S.: OCML-based colour image encryption. Chaos Soliton Fract. 40(1), 309–318 (2009)
Gonzalez, R.C., Woods, R.E.: Digital Image Processing, 3rd edn. Prentice-Hall Inc., Upper Saddle River (2006)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. IEEE Transl. J. Sel. Areas Telecommun. (JSAT) 31–38 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Abd-Elhafiez, W.M., Reyad, O., Mofaddel, M.A., Fathy, M. (2020). Image Encryption Algorithm Methodology Based on Multi-mapping Image Pixel. In: Hassanien, A., Azar, A., Gaber, T., Bhatnagar, R., F. Tolba, M. (eds) The International Conference on Advanced Machine Learning Technologies and Applications (AMLTA2019). AMLTA 2019. Advances in Intelligent Systems and Computing, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-030-14118-9_64
Download citation
DOI: https://doi.org/10.1007/978-3-030-14118-9_64
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14117-2
Online ISBN: 978-3-030-14118-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)