Abstract
In this article, we have designed a new information confidentiality mechanism based on the combination of Blowfish encryption algorithm along with Henon and Chen chaotic dynamical systems. We have authenticated our proposed encryption algorithm over satellite and other standard digital images of image processing. Our proposed encryption algorithm is equally deployed as an encrtpter and decrypter while at the sending and receiving ends in satellite communication. In satellite communication, typical wireless mediums are used for transferring heavy payloads and usual telemetry. The priciple aim of this article is to design a new mechanism for the privacy of digital contents mainly satellite images. We have authenticated our anticipated mechanism with security performace analyses.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
Securing information in a modern digital world has become more important in every field of life. Keeping the secret information away from unauthentic clients or transforming it into a format that cannot be easily deciphered by the unauthorized viewer is known as information security [13, 43, 51]. The vital security components in the field of information theory are information confidentiality algorithms. These components are used to scramble the plain information into the incomprehensible format (known as encryption) which afterward unscramble by using the similar or dissimilar key (known as decryption) [20, 53, 54]. Since numerous enciphering algorithms are available in the literature and deliver the utmost security strength to an unauthorized user for information break, for example, Blowfish encryption scheme for checking its feature hiding capability in a satellite acquired image. Some applications have their essential concern with quick data processing capability (rapid ciphering phenomenon) with the trade-off of more security, but on the other hand, some cases are very keenly and critically keep the requirement of strengthening security [34, 39]. Many organizations whether in business or industry are mostly focused upon security issues rather than the pace of data processing. In the running era of modern digital communication, both the sender and receiver have a significant concern with the security for mutual correspondence. Keeping the sensitivity of the information, any chance of security ruptures present in the channel would cause a real misfortune at both ends of the transmitter and the receiver. Nowadays, various key systems in cryptography are providing ultra-secure mediums for ensuring information as well as securing data [1, 22].
In symmetric cryptographic systems, the key which is used for enciphering and deciphering process remains the same at both the ends of the transmitter and the receiver [33, 41]. Hence, before starting the transmission at both ends should make sure the key distribution for information exchange. The enciphering keys play a significant role and dependent upon the nature of the key length. Various symmetric schemes are available in the literature are, data encryption standard (DES), advanced encryption standard (AES), CAST, and Blowfish encryption algorithm [12, 17].
Blowfish is one of the most popular Feistel network block cipher and symmetric in nature, and comprised of 16-rounds along with the large key-dependent substitution boxes (S-boxes) for running simple encryption algorithm upon input data. The standard input block size in this cipher is 64 bits and key-length varies in between 32 and 448 bits, however, this cipher provides variable input block size which is also key-dependent and can vary in the form of 8, 16, 32 or 64 bits depending upon machines capability to handle longer calculations. In this regard key-length also varies from 4, 8, 16, 32 bits up to 56,112,224,448 bits based on input block size. The initialization phase for any type of an encryption scheme can be more complex, but the efficiency of the algorithm must be more convenient upon large microprocessors. Blowfish cipher can be implemented upon any type of an embedded platform with a sophisticated encryption/decryption rate and it has the provision of ineffective cryptanalysis to break the hidden information [36, 39]. Arguing the input block size for this cipher can be dependent on users’ requirements but nominal use of this cipher deals with the plain text of 64 bits along with key-length of 448 bits long [2].
Our principle aim of this investigation is to introduce a simple component which is based on chaotic dyanimcal systems which add more confusion and diffusion capability in tradtyional blowfish encryption algorithm. The proposed encryption algorithm reduce the number of round and increases the randomness which is one of the prime goal of modern confidentiality mechanism. Moreover, the anticipated scheme reduce the computational complexity and utimatley cost of encryption at different layers of multimedia. We have tested our suggested algorithm over satellite images and achieved reasonably favorable results in term of security analysis [3,4,5,6,7,8,9,10,11, 14,15,16, 18, 19, 21, 23,24,25,26,27,28,29,30,31,32, 35, 37, 38, 40, 42, 44,45,46,47,48,49,50, 52].
This article is sorted out in 6 segments to demonstrate the hybrid chaotic blowfish criteria for high-resolution imaginaries and the standard normal images. The fundamental terminologies of chaotic maps and blowfish criteria are explained in Section 2, the proposed algorithm and the experimentation on the variety of digital data deliberated in Section 3, the performance and security evaluations assessed in Section 4, and Section 5 provides the concluding remarks.
2 Fundamental terminologies
The demonstration of the blowfish network, encryption, as well as the decryption is exhibited in this section. The anticipated methodology and its implementation is inspected in the remainder of this article.
2.1 Chaotic Dyanimcs
Chaos is gererically refered as state of disorder. As per Robert L. Devaney, dynamical system must have following properties in order to classify as a chaotic system:
-
i
Topologically transitive must exist,
-
ii
Initial condiation must be sensitive
-
iii
Dense periodic orbits must exist.
These chaotic dynamical systems can be further calsseified as discret or continuous. Discrete chaotic dyanimcal system contains iterative maps, wheresas continuous chaotic system consists of differential euqations [18,19,20, 42, 54].
2.2 Three dimensional Henon and Chen’s chaotic map
This section discusses the overview of three dimisioanl Henon and Chen chaotic maps along with mathematical expreesions and chaotic paramters. Our propsed image encryption mechanism is based on chaotic system. The mathematical expression for three dimisional Henon chaotic iterative map is give below:
The mentioned chaotic attractor generates more complex Hénon map in comparison with the maps generated from other existing chaotic attractors; when 1.54 < |a| < 2, 0 < |b| < 1 along with initial conditions x0 = 1, y0 = 0and z0 = 0. Following mathematical expression represents the iterative map of chaotic Chen:
where a > 0, b > 0 and c such that (2c > a) represent the system parameters. Chen’s system is considered as chaotic when the values of parameters are; a = 35, b = 3 and c ∈ [20, 28.4]. Chen’s system has chaotic attractor when a = 35, b = 3, and c = 28. The exceptional three complex dynamic property and dimentionality makes the Chen’s chaotic system comparatively difficult.
2.3 Blowfish encryption
Bruce Schneider perposed blowfish in 1993 and it is generally categorized in symmetric block ciphering techniques which are viably used for scrambling the secret information [37]. As mentioned earlier that this algorithm can be utilized in a variable-length key environment, which can vary from 4 to 32 bits to secure the information. Blowfish algorithms has a Feistel network type structure, emphasizing an encryption capacity of 16 times. The operating blowfish algorithm in a 32 bits’ environment, the standard block size for plain data at the input will be 64 bits long, while the key length varies up to 448 bits. Having an intricate beginning stage required before the encryption process, the extreme effectiveness of this scheme can be visualized upon the vast microchips as being a strong proof for a genuine encryption scheme for securing information [28, 32].
2.4 Blowfish decryption
The deciphering process is carried out in a quite similar fashion as ciphering is done, aside from the fact that the key sequence P1, P2… P18 is utilized in reverse order. It is conspicuous that XOR operation is guaranteed to be commutative and keep acquaintance, in this regard a misguidance is created for the backward request of the enciphering process as at the beginning of the decryption algorithm. To simulate the deciphering phenomena of P17 and P18 are XORed with encrypted text at the earliest stage and the P-array sequence is utilized in reverse for converse request. The timetable for the Blowfish key initialization is introduced by S-boxes and P-array having the qualities of “pi” hexadecimal values that may contain no irrefutable example. While having the key length of 448 bits, this fact can be positively conceivable that 448 bits point of internment guarantee of making each sub-key using the entire key sequence, and in this way the last four P-array estimations are not enough to influence the whole cipher-text. This point must be taken into account when an alternate number of rounds are chosen for calculation, despite having the fact that security strength debilitates with reducing the number of rounds [39].
3 Proposed image encryption algorithm
Chaotic maps have a capability of quick iterations because of their simplicity in functions. Chaos-based encryption schemes are therefore faster in real-time applications, especially for developing image encryption systems. In the recent past, many researchers have found that there exist relationships between the properties of chaos and cryptography [14]. The extremely sensitive initial conditions and deterministic pseudorandom performance have similarities between the cryptographic schemes and chaotic maps. The two general principles while designing any type of cryptographic schemes are confusion and diffusion phenomena’s which leads to concealing of plain image structure and reducing the statistical dependency of pixels in encrypted images. Applying the mixing property of blowfish and chaos-based encryption algorithms will enhance the security strength (complexity) of the enciphered images.
Chaotic maps can be assigned to both the continuous and discrete time-domains. The discrete maps usually occur in an iterated function scenario, which are considered as the rounds of cryptosystems. This type of similarity between the chaotic systems and cryptography is utilized to propose cryptosystems based on chaotic maps [7, 19, 26, 46]. Developing a certain chaotic map is based on some parameters which are equivalent to the ciphering keys in the cryptographic system, whereas by applying the chaotic system in a stream cipher, a long pseudorandom keystream is generated for enciphering each bit of the plain image but on the other hand, block ciphers introduced differently, as the initial controlling parameter is the secret key which is used for confusion at the beginning of encryption process. Finally, a chaotic system iterates upon the plain information for a serval times to obtain the cipher-text. The significant concern in a cryptosystem is the security and complexity which is created by the algorithm for information scrambling. This agenda is considered more deeply when map parameters are selected to use in cryptography. In the proposed chaos-based encryption scheme, we have encrypted the hyperspectral imaginary, airplane and the pepper images of size 512 × 512 with only two rounds (see Figs. 2, 3 and 4). These figures reveal that the histogram of our proposed encryption scheme (see Figs. 8, 9 and 10) achieved the uniformity in encrypted information having a high degree of randomness with no clue to eavesdropper where is the major information places.
3.1 Experimentation of proposed algorithm
The experimentation of Blowfish cipher has been carried out upon plain image P(i, j) having M × N dimension, where “i” represents the ith row and “j” is the jth column of an image pixel.
-
1.
Take a digital image with three layers
-
2.
Take two three dimensional chaotic dynamical systems
-
3.
Iterate the both dynamical system upto the size of digital image
-
4.
Perform bitwise xor operation on each one dimensional preudo random number generators (PRNG)
-
5.
Transform the images into corresponding layers and then transform each layer into 1×n direction.
-
6.
Define the criteria of word length collection for piecewise processing of plain image and encryption key.
-
7.
Specify the number of blowfish rounds to be run.
-
8.
Initialize the S-boxes depending upon input word size. The S-box contents can be initialized by users’ own choice, as there are 232 binary combinations among which user has to choose 4 × 256 entries for the four S-boxes.
-
9.
After the encryption transformation, the dimensions of the ciphered layers are converted into the plain image dimensions.
-
10.
Combine all the ciphered layers for the formation of a single enciphered image.
-
11.
Apply bitwise xor of obtained chaos based PRNG in step 4 with cipher image obtained in step 10 and display the final encrypted image.
We investigate the performance of the blowfish algorithm by implementing the abovementioned algorithm steps on the hyperspectral image and the standard Airplane and Pepper images with a constant number of variable key lengths and rounds. We examined the standard blowfish encryption algorithm against randomness by fixing the number of encryption rounds.
4 Performance and security evaluations
To observe the affectability of the anticipated algorithm of Fig. 1, distinctive standard analyses (factual examination, uncertainty test, and sensibility assessment) are performed on the standard as well as hyperspectral imaginaries. The orginal images are taken from the ‘signal and image processing institute (SIPI) database [50]. In order to validate the perposed scheme, we performed few trials on another satellite acquired in terms of the number of rounds by keeping key length constant (See Table 1 and Fig. 6). As seen even after encryption of satellite images with maximum rounds and having a different key length, some patches exist in encrypted images reflects the weakness of the blowfish algorithm for satellite imagery (see Fig. 5).
We encrypt a satellite images given in Fig. 6 with our modified Bowfish encryption algorithm that shows desirous encrypted image along with the flat histograms which is one of the vital element of any robust encryption scheme. The performance results for the Fig. 2 depicted in Table 2. It is quite evident from the numerical investigation of our obtained results available in Table 2 that antipated encryption mechanism gives reasonably good encryption strength (Figs. 3, 4 and 5).
4.1 Histograms uniformity analysis
To measure the security strength of enciphered images, histograms consistency is the most important parameter to perform [24]. We computed enciphered image histrogram which are independently processed by the blowfish algorithm at different rounds, later on, the hybrid solution of chaos and blowfish will be tested. A 256 color level images of size 1026 × 765 and 1028 × 766 having varied ingredients experimented in Figs. 6, 7 and 8. Plain image histograms of Figs. 6, 7 and 8 occur with extremely sharp rising and decreasing shapes but in case of ciphered images (which are processed at different rounds of Blowfish), the histograms are not strongly uniformed but look much better compared to the histograms of the plain images. These type of histograms which are not flat enough even after the ciphering process, make some attacks a bit easier to recover the hidden information. On the other hand, a chaotic enciphered histogram makes this thing almost impossible to recover the original digital contents (Fig. 7).
We have examined the plain and enciphered images and found the consequences of the enciphered contents of Figs. 7, 8, 9 and 10 follow the consistency, which indicates the factual assaults hard.
4.2 Randomness analysis
The most prominent feature to measure the randomness in enciphered information are entropy and NIST analyses [4, 40]. Entropy is characterized as follows:
where xi is the pixel of an image (whether plain or encrypted) and 2Nis all samples numbers. For the perfect indiscrimination of the digital information, the Shannon entropy should be 8 for 8-bit digital contents. Entropy readings the satellite acquired images of Fig. 11 in their plain and enciphered form are accounted in Table 3, whereas the results of standard RGB images accounted in Table 4. By achieving the randmonmess in encryption mechanism is one of the fundamental criteira which can be achived through entropy metric which is given in Tables 3 and 4 respectively. The comparative investigations of Table 4 clearly elucidates the effectiveness of our suggested encryption over digital medium. Our proposed digital privacy mechanism has high entropy values shows that there is no leakages in digital images with hight degree of randomness.
The proposed structure results in Table 4 have a predominant effect over and the existing techniques and legitimately close to the perfect estimation of Shannon entropy. These results clarify the release of data inconsequential and the structure of Fig. 1 is secured upon entropy assaults.
4.3 NIST (SP 800–22)
Evaluating security in a ciphered image for a certain algorithm, we need to consider extraordinary complex image structure, identical delivery, extensive period, and efficiency. With the agenda of these parameters for the crucial test of a cipher, we perform the NIST (National Institute of Standards and Technology) suite over the encrypted data [16, 21]. we performed the NIST (SP 800–22) test to analyze the randomness created in digital content by the blowfish scheme. The numerical values of all randomness measurements are given in Table 5 which was proposed by NIST as a benchmakrs. According to NIST criteria, the numerical values of all measurments must be greater than 0.01 in order to pass this criteria effectively. Our suggested scheme confidently passed all the existing standard randomness metrics of NIST.
4.4 Correlation coefficient analysis
Correlation analysis is an extensive study to evaluate the connection between the plain and the corresponding encrypted image [5, 9]. This analysis also highlights the capability of the proposed encryption scheme in terms of the utmost content changing of the input information. The correlation between two different data sets (plain image data set and corresponding encrypted image at different rounds of Blowfish) evaluated horizontally, vertically, and diagonally adjacent pixels as shown in Figs. 11, 12, 13 and 14.
where yand x are the adjacent pixel values at grayscale, \( {\sigma}_y^2 \)and \( {\sigma}_x^2 \) are the variances, and σxy is the covariance of random variables x and y.
We have calculated the numerous encrypted and plain pairs of the image by estimating their two dimensional coefficients of correlation with the following expression:
where Cand Pare the plain and encrypted contents with their mean approximations are \( \overline{C} \)and \( \overline{P} \), and M, N are the height and width of the content respectively. The corresponding coefficients for the original and encoded contents for the foreseen structure of Fig. 1 and their evaluations with the most recent strategy portrayed in Tables 6.
Table 6 indicates the coefficients of pixels’ affiliation at grayscale, which are exceptionally near zero and has better outcomes over the most recent approach.
4.5 Pixels’ similarity analyses
The resemblance of digital contents in an image (plain or encrypted) can be exposed by performing similarity analyses. We have evaluated the structural content (SC), structure similarity index measure (SSIM) and normalized cross-correlation (NCC) to observe the variation in structure between the plain and enciphered contents [15, 35]. The NC mearse correlation between resemblance and traces, whereas SC regulates the noise level and sharpness, and SSIM relates the luminance, divergence and assembly among the encrypted and plain contents. The utmost resemblance value of the adjacent pixels in an image may approach 1, and the extreme dissimilarity with neighboring contents will generate the similarity reading approaching to 0. While doing similarity analysis our prime agenda is to investigate the different similarity measures which may occur between cipher Ci,j and plain Pi,j images to approximate the structural dissimilarity after encryption. These analyses are deliberated in Table 7 by using the following expressions.
The plain and enciphered contents specified by Pk, l and Ck, l, the standard deviation is σp c and mean values are μcand μp. The SSIM, SC, and NCC esteem approaches 1 if there are numerous traces of associations or structural resemblance found between the contents. The similarity evaluations for the plain-encoded contents with the foreseen structure of Fig. 1 and their valuations with the most recent approaches outlined in Tables 7 and 8.
4.6 Pixels’ difference analyses
To assess the error in digital contents, we evaluate mean square error (MSE), peak signal to noise ratio (PSNR) and mean absolute error (MAE) [29, 44]. The deviation of encrypted contents concerning the plain contents and the accuracy of interminable variables are evaluated here by MAE. The prominence of the encoded contents can be quantified by MSE and PSNR. Smaller the MSE esteem concerning PSNR identifies the similarity between the contents. The evaluations of these investigations examined here by assessing the succeeding expressions:
where Pk, l and Ck, l are the pixels’ location for the plain and encoded contents at kth row and lth column respectively, and IMAX is the estimation of the maximum conceivable pixel of the digital content.
The quality of encryption for the digital content can be improved by more prominent the MSE regard and flat the PSNR, or vice-versa [27]. These error assessments are displayed in Table 9 for the attainability of the anticipated plan on standard digital content.
4.7 Differential assaults analysis
To measure differential assault for a certain image encryption scheme, we require the alteration impact of a solo pixel in a plain image and overall enciphered image for calculating two parameters namely.
-
Number of Pixels Change Rate (NPCR)
-
Unified Average Intensity (UACI)
The NPCR and UACI for two ciphered images C1(i, j) and C2(i, j) can be assessed by the following expressions are given below:
where \( x\left(i,j\right)=\left\{{}_{1,\kern0.36em {C}_1\left(i,j\right)\ne {C}_2\left(i,j\right)}^{0,\kern0.36em {C}_1\left(i,j\right)={C}_2\left(i,j\right)}\right.. \)
In order to understand the plain image sensitivity, we cipher it first and then alter one pixel randomly [30, 31, 52]. Tables 10, 11 and 12 presents the aforementioned assessments. The values of NPCR and UACI are quite closed to standard estimates which shows that our encryption mechanism rubost agains plaintext sensitivity attacks (see Table 11). The small change two plain image with one pixel change and encrypting these plain images results statistically different images is clearly relecting from the close examination of Tables 10, 11 and 12. These plaintext sensitivity is one of the important aspect of any robust encryption tool which is achived through these two measuments namely NPCR and UACI for suggested scheme (See Tables 10, 11).
5 Conclusion and future recommendations
We have deviced a new digital information confidentialy scheme for different digital mediums namely satellite images and standard color images with three bands. The new anticipated scheme utilized two different chaotic dynamical systems which are responsible for creating confusion capabiittes at layers level in standard and satellite images. Morover, these chaotic dynamical systems are further joined with standard blowfish algorithm which reduce the computational cost and adding more confusuion and diffusion charactetisics in our proposed mechanism. With this simple and ronust combination we have reduced the rounds of standard fiestal based ciper. The proposed mechanism can also be implemented in a real roposed mechanism. With this simple and ronust combination we have reduced the rounds of standard fiestal based ciper. The proposed mechanism can also be implemented in a real time audio and video streams with its lightweight version due to evolution of new emerging idea of internet of thing (IoTs).
References
Abd Ulkareem Nasser M, Abduljaleel IQ (2013) Speech encryption using chaotic map and blowfish algorithms. J Basrah Res (Sciences) 39(2A):68–76
Ahmad R, Manaf AA, Ismail W (2016) Implementation of a high-performance blowfish for secure wireless communication. J Telecom Electronic Comput Eng (JTEC) 8(6):147–151
Alghafis A, Waseem HM, Khan M (2019) A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states. Physica A: Statistical Mechanics and its Applications:123908
Alghafis A, Munir N, Khan M, Hussain I (2020) An encryption scheme based on discrete quantum map and continuous chaotic system. Int J Theor Phys:1–14
Alghafis A, Firdousi F, Khan M, Batool SI, Amin M (2020) An efficient image encryption scheme based on chaotic and deoxyribonucleic acid sequencing. Math Comput Simul 177:441–466
Alghafis A, Waseem HM, Khan M, Jamal SS, Amin M, Batool SI (2020) A novel digital contents privacy scheme based on quantum harmonic oscillator and schrodinger paradox. Wireless Networks
Ali KM, Khan M (2019) Application based construction and optimization of substitution boxes over 2D mixed chaotic maps. Int J Theor Phys 58(9):3091–3117
Arshad U, Batool SI, Amin M (2019) A novel image encryption scheme based on Walsh compressed quantum spinning chaotic Lorenz system. Int J Theor Phys 58(10):3565–3588
Arshad U, Khan M, Shaukat S, Amin M, Shah T (2020) An efficient image privacy scheme based on nonlinear chaotic system and linear canonical transformation. Physica A: Statistical Mechanics and its Applications 546:123458
Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78(19):27611–27637
Batool SI, Amin M, Waseem HM (2020) Public key digital contents confidentiality scheme based on quantum spin and finite state automation. Physica A: Statistical Mechanics and its Applications 537:122677
Blömer J, Seifert JP (2003, January). Fault based cryptanalysis of the advanced encryption standard (AES). In International Conference on Financial Cryptography (pp. 162-181). Springer, Berlin, Heidelberg.
Bulgurcu B, Cavusoglu H, Benbasat I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q 34(3):523–548
Buscarino A, Fortuna L, Frasca M, Sciuto G (2014) A concise guide to chaotic electronic circuits. Springer International Publishing, Heidelberg, Germany
Çataltaş Ö, Tütüncü K (2017, September) Comparison of LSB image steganography technique in different color spaces. In 2017 international artificial intelligence and data processing symposium (IDAP) (pp. 1-6). IEEE.
Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-box. Chaos, Solitons Fractals 95:92–101
Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250
Erdmann D, Murphy S (1992) Hénon stream cipher. Electron Lett 28(9):893–895
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(06):1259–1284
Guo JI (2000, May). A new chaotic key-based design for image encryption and decryption. In 2000 IEEE International Symposium on Circuits and Systems (ISCAS) (Vol. 4, pp. 49-52). IEEE.
Hamza R (2017) A novel pseudo random sequence generator for image-cryptographic applications. J Inform Secur Appl 35:119–127
Jawad LM, Sulong G (2015) Chaotic map-embedded blowfish algorithm for security enhancement of colour image encryption. Nonlinear Dynamics 81(4):2079–2093
Khan M, Shah T (2014) A novel image encryption technique based on Hénon chaotic map and S 8 symmetric group. Neural Comput & Applic 25(7–8):1717–1722
Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS One 13(11):e0206460
Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int J Theor Phys 58(8):2720–2743
Khan M, Masood F, Alghafis A, Amin M, Batool Naqvi SI (2019) A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion. PLoS One 14(12):e0225031
Khan M, Hussain I, Jamal SS, Amin M (2019) A privacy scheme for digital images based on quantum particles. Int J Theor Phys 58(12):4293–4310
Krishnamurthy GN, Ramaswamy V (2010) Encryption quality analysis and security evaluation of CAST-128 algorithm and its modified version using digital images. arXiv preprint arXiv:1004.0571.
Lee CS, Kuo YH, Yu PT (1997) Weighted fuzzy mean filters for image processing. Fuzzy Sets Syst 89(2):157–180
Liao X, Lai S, Zhou Q (2010) A novel image encryption algorithm based on self-adaptive wave transmission. Signal Process 90(9):2714–2722
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327
Mousa A (2005, June) Data encryption performance based on blowfish. In 47th International Symposium ELMAR, 2005. (pp. 131-134). IEEE.
Nath A, Ghosh S, Mallick MA (2010, July) Symmetric key cryptography using random key generator. In Security and Management (pp. 234-242).
Nie T, Zhang T (2009, January) A study of DES and blowfish encryption algorithm. In Tencon 2009-2009 IEEE Region 10 Conference (pp. 1-4). IEEE.
Pal K, Ghosh G, Koley S, Bhattacharya M (2013, December) A new combined crypto-watermarking technique using RSA algorithm and discrete cosine transform to retrieve embedded EPR from noisy bio-medical images. In 2013 IEEE 1st International Conference on Condition Assessment Techniques in Electrical Systems (CATCON) (pp. 368-373). IEEE.
Prasetyo KN, Purwanto Y, Darlis D (2014, May) An implementation of data encryption for internet of things using blowfish algorithm on FPGA. In 2014 2nd International Conference on Information and Communication Technology (ICoICT) (pp. 75-79). IEEE.
Schneier B (1993, December) Description of a new variable-length key, 64-bit block cipher (blowfish). In International Workshop on Fast Software Encryption (pp. 191-204). Springer, Berlin, Heidelberg.
Shah T, Hussain I, Gondal MA, Mahmood H (2011) Statistical analysis of S-box in image encryption applications based on majority logic criterion. International Journal of Physical Sciences 6(16):4110–4127
Singh P, Singh K (2013) Image encryption and decryption using blowfish algorithm in MATLAB. Int J Sci Eng Res 4(7):150–154
Tariq S, Khan M, Alghafis A, Amin M (2020) A novel hybrid encryption scheme based on chaotic Lorenz system and logarithmic key generation. Multimed Tools Appl:1–23
Thakur J, Kumar N (2011) DES, AES and blowfish: symmetric key cryptography algorithms simulation based performance analysis. Int J Emerg Technol Adv Eng 1(2):6–12
Ueta T, Chen G (2000) Bifurcation analysis of Chen's equation. Int J Bifurc Chaos 10(08):1917–1931
Von Solms R, Van Niekerk J (2013) From information security to cyber security. Comput Secur 38:97–102
Wang Q, Gao J, Lin W, Yuan Y (2019) Learning from synthetic data for crowd counting in the wild. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 8198-8207).
Wang X, Feng L, Zhao H (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358
Waqas UA, Khan M, Batool SI (2020) A new watermarking scheme based on Daubechies wavelet and chaotic map for quick response code images. Multimed Tools Appl 79(9):6891–6914
Waseem HM, Khan M (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125(2):27
Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imag 27(6):063022
Waseem HM, Alghafis A, Khan M (2020) An efficient public key cryptosystem based on dihedral group and quantum spin states. IEEE Access 8:71821–71832
Weber A (1997) The USC-SIPI image database. Signal and Image Processing Institute of the University of Southern California. URL: http://sipi.usc.edu/services/database.
Whitman ME, Mattord HJ (2011). Principles of information security. Cengage Learning.
Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology. J Selected Areas Telecomm (JSAT) 1(2):31–38
Yanling W (2009, March). Image scrambling method based on chaotic sequences and mapping. In 2009 First International Workshop on Education Technology and Computer Science (Vol. 3, pp. 453-457). IEEE.
Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recogn Lett 31(5):347–354
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
It is declared that we have no conflict concerning the publication of this article.
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Abbas, S.Z., Ibrahim, H. & Khan, M. A hybrid chaotic blowfish encryption for high-resolution satellite imagery. Multimed Tools Appl 80, 26069–26091 (2021). https://doi.org/10.1007/s11042-021-10898-w
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10898-w