Abstract
In this article, our aim is to design a new and efficient digital information confidentiality mechanism. We have offered an encryption scheme which is based on fractals and multiple chaotic iterative maps in order to add more confusion and diffusion capability. Due to randomness nature and unique repetitive pattern of fractal increases key space to hundreds of bits and enhance security level of proposed cryptosystem. The projected algorithm is authenticated by utilizing security performance analyses. The security performances elucidate that our suggested technique is quite competent for digital image encryption.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
The increasing demands of numerous online communication systems and web applications made it possible to access digital information within no time. The existing era is the technologically advanced age of digital information. The transmission of digital information through insecure lines of communication is at its peak. There has always been an increasing demand of information security mechanism for different organizations in order to protect their secret information from being hacked or stolen by an unfair means. Today, digital information can be transmitted via different communication channels which surely adds easiness in our daily lives. This easiness also added number of serious threats due to advancement in cyber threat intelligence. Recently, we have seen several cyber threads in which ransomware is one of the most powerful cyber-attacks which infected several governments and private organization online systems. Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.
Cryptovirology is a one of the growing fields of further investigations in order to use cryptographic algorithm to construct a powerful malicious viruses and cyber-attacks. This area of research was conceived with the perception that asymmetric key cryptosystems can be utilized to breakdown the balance between what an antivirus examiner perceives in regard to malware and what the assailant sees. The antivirus examiner sees an open key contained in the malware through the invader grasps people in public key enclosed in the software such as viruses or Trojans designed to cause damage or disruption to a computer system and also the relating secret key (outside the Trojans) since the assailant made the key combination for the assault. The public key permits the malware to accomplish trapdoor one-route tasks on the infected computer system that just the invader can fix. There is a need of robust encryption algorithm not only limited to digital information in order to secure the confidentiality of information but also multilayer security systems for online available servers. In recent paradigms, digital information is one of the most important sources in different online web applications where information travels in different form of digital medium such as email, electronic e-news, online banking and social media. The most relevant digital information mediums are images, audios and videos, etc. The security of digital mediums is one of the vital problems even in the digitally advanced era of science and technology. Now to address this issue of security of digital medium, several encryption techniques were devised in order to provide the secrecy to multimedia contents [1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23].
In modern age, transmission of digital data goes over various sorts of insecure network without treatment with special types of techniques to ensure secure communication. These digital data contain high amount of confidential information which need special types of techniques and algorithms to make it secure over insecure line of communication. Information security is demand of present day which includes three crux principles which are confidentiality integrity and availability commonly known as CIA triad. The expertise of data converting from plain text to intelligible form for security against any type of external illegal acquiring, modification, changing, illegitimate access for the personal benefit or gain while transmitting it over secure or insecure network is known as cryptography [24,25,26,27]. It is practice of secure communication against third parties which is known as advertisers [28]. Cryptography demand is increasing constantly in different fields for instance mathematics, engineering, and physics along with different civil as well military sectors. The encryption standards are already developed long ago like advanced encryption standard (AES), data encryption standard (DES), triple data encryption standard (TEDS), Blowfish and RC5 vice versa. Encrypted data will be particular for key which was used with plain text for symmetric key encryption [29]. The strength or robustness of data depends upon two things, i.e., the algorithm designed or proposed, and key used for encryption.
Recently, chaos plays an important role due to its diverse applicability and similar characteristic related to cryptography. In 1989, Robert Mathews for the very first time investigated secure transmission through chaotic behavior and properties of cryptography [30]. The introduction of chaos theory in cryptography attracted many individual’s students and researchers. The enduring concerns about their security and utilizing speed continue to limit its implementation [31,32,33,34,35]. Chaotic systems are highly random in nature and exhibit certain type of properties which make it suitable to use it for security intendment. Conceding that the initial conditions are known to bystander, the cryptosystem is known as deterministic with respect to bystander and shows highly unpredictable characteristics including topology mixing, randomness, sensitive to initial condition, ergodicity, vice versa [36]. These unpredictable characteristics are eminently auspicious for constructing and designing secure cryptosystem [37, 38]. Chaotic iterative maps and dynamical systems are in fashion in order to add confusion and diffusion capability which are the most vital possessions while designing any strong cryptosystems [39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57]. The idea of confusion is fundamentally achieved through substitution, and diffusion can be achieved by utilizing permutation. Shannon’s [58] highlights his ideas of how to create a secure cipher, including the properties of confusion and diffusion. Confusion refers to how each single bit of a ciphertext should depend on multiple bits of a key. Diffusion refers to how a change in a single bit of plaintext should on average change half the bits of the resulting ciphertext, and vice versa. This effect is also known as the avalanche effect. From last two decades, several image encryption schemes were designed so far which ensure the substitution–permutation (SP) network characteristics. In this article, our principle aim is to design an efficient image encryption scheme based on chaotic fractals, Fibonacci series and discrete map.
The rest of the paper is organized as follows. In Sect. 2, we have discussed brief introduction about fractals which will be quite useful while developing our proposed image encryption scheme. Section 3 is preceded with proposed technique, while Sect. 4 is about security performance test analysis. Finally in Sect. 5, we have added concluding section (Fig. 1).
2 Fractals types and geometry
Fractals are set of collection of sequence of numbers over large number of terms in complex domain [13]. These are reiterative and repetitive geometry shapes in image that have identical degree of irregularity at all proportions and behave similarly under repeated iteration [39]. Images of Mandelbrot fractal [12] and Julia fractals are shown in Fig. 2a, b, respectively. Benoit Mandelbrot (1924–2010) originally scientist of Poland later moved to France introduced Mandelbrot set in 1979 and expended his idea to geometry of nature. Mandelbrot worked on fractals, chaos theory and Mandelbrot set [40]. In 1979, Benoit Mandelbrot after Julia set of fractals studied complex structure of repetitive structures in one another known as Mandelbrot set of fractals [39]. Fractals are based on property of self-similarity and are identical or similar to itself [41]. The Mandelbrot set lies in complex plane ‘c’ for which orbit 0 under iteration of complex polynomial quadratic equation is \(Z_{n + 1} = Z_{n}^{2} + c\) which remains bounded. The choice of collection of fractals depends upon minutiae and colors. It can be obtained through IFS systems because of the absence of complication in it. The two main characteristics of fractals are that they have infinite details at single point and are self-repetitive structure [42]. Fractals have similar properties related to chaotic nature of sensitiveness which leads to secure cryptosystem; with the combination of these two techniques, it has quite promising output related to secure enciphered system against some external attack to break down cryptosystem [40, 43]. The generation of keys depends upon complex equation and intruder always tries to find out combination of keys to find exact key to decrypt it which is known as Brute force attack; though if any system having large key space, it leads to number of guesses and will lead to more complexity if the number of guesses increases due to larger key space of respective technique. Fractals have large key space as compared to other techniques; so due to these characteristics, intruder will try every combination of keys and will lead to more complex system. Fractals geometry is repeated pattern of images; each image is divided into subsections known as repetition of images inside images or simply copy of images inside one another. Fractal image is identic in nature when zoomed at any point of fractal image [44]. It is iterated for finite number of times in mathematical equation for the generation of fractals. Julia set of fractal starts with nonzero and iterates for fixed ‘C,’ while Mandelbrot starts from zero with varying ‘C’ factor in equation. The complex plane is always two-dimensional plane having two axes one vertically known as imaginary axis, while the one lies horizontal known as real axis. It is demonstrated as in complex plane with sequence is characterize by the iteration so that infinite sequence \(C_{0} ,C_{1} , \ldots ,C_{n}\) remains bounded. For \(C_{0} = C_{0}\) and n = 0, 1, 2, 3, ….
The equation for Mandelbrot can be defined in complex plane as:
3 Proposed technique for cryptosystem
Main intendment is providing secure and robust algorithm with minimum vulnerability. In this communication, we proceeded with fractals, Fibonacci with chaotic maps and investigated its results with current techniques which showed incomparable security for communication.
3.1 Kaplan–Yorke chaotic map
Chaotic maps have some desirable properties suitable for designing secure and robust cryptosystem. Kaplan–Yorke is a chaotic two-dimensional discrete dynamical map which exhibits chaotic behavior that helps in exceptional security for proposed algorithm [45,46,47]. The Kaplan–Yorke map takes a point \((x_{n} ,y_{n} )\) and gives new points in two-dimensional plane; it can be expressed as follows:
where ‘mod’ is the modulo operator, and this two-dimensional map depends upon constant \(\alpha\).
3.2 Fibonacci series
Leonardo Fibonacci mathematical genius born in Pisa, Italy, had vast study on computational systems. He wrote several mathematical topics though the mathematical genius is remembering for introducing of mathematical Fibonacci sequence. Fibonacci series have many applications in different fields of mathematics, engineering, vice versa [48, 49]. Fibonacci series in mathematics are sequence of integers in which the assumed integer is the sum of previous two integers, depending on your chosen term from the series (Fig. 3). It can be defined as reoccurrence or repetitiveness relation
where initial conditions are as follows:
3.3 Procedure involved in accomplishing proposed algorithm
-
1.
Plain image P entitle Lena of size 512 × 512 with JPG file extension is taken.
-
2.
Plain test image is split into owned three layers (RGB).
-
3.
Generation of Mandelbrot fractal image in no zoom state with dimension of 512 × 512.
-
4.
Extraction of real values from the complex domain of generated fractal in step 3
-
5.
Generation of Fibonacci series having same length of 512 × 512.
-
6.
Multiplication of real values of Mandelbrot fractal with the output values of series generated by Fibonacci series.
-
7.
Generation of chaotic Kaplan–Yorke map having same length of dimension 512 × 512.
-
8.
Bitwise XOR operation of output values of Fibonacci series with preceding values of chaotic Kaplan–Yorke map
-
9.
Finalization is with bitwise XOR operation of previous step 7 with channels generated in step 2 (Fig. 4).
3.4 Software and system specification
In this section, we performed number of tests using registered MATLAB 2017(a) with operating system of windows 10 64-bit architecture. The specifications included for simulation of results are 8 GB ram, 1.9 GHz processor, intel core™ i3 third-generation central processing unit.
4 Performance and security analysis
We investigated multiple tests over proposed algorithm and simulated using MATLAB as a testing environment for certain types of test images, while colored Lena 512 × 512 is taken as standard image for this article.
4.1 Histogram analysis
Histogram is representation of values of pixels graphically. Histogram shows intensity value of each pixel making full of histogram. The number of possible intensity values depends upon image taken with bits. Uniform distribution of values of pixels measure exceptional security against brute force and alternative methods for cracking secure confidential information, while unnecessary jerky or non-uniform pixels values assert insecure information which feel necessity of certain types of secure techniques treatment. We analyzed histogram analysis for different test images with different dimensions. We have investigated different gray channels of test color images at two distinct points, i.e., histogram pixel values after using Mandelbrot and Fibonacci series and pixels values after whole process including chaotic map, addition of chaotic properties of randomness with Mandelbrot or Julia Fractal and Fibonacci series have much exceptional output. The pixels are distributed from 0 to 255 in horizontal direction (Figs. 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26). In Figs. 5b and 7a–c, there are number of slopes of pixels as compared to 512 × 512 of Lena in Fig. 9a–c, and 512 × 512 × 3 of Lena in Fig. 10b, the pixels gone to smooth one level means the security level is much high and information at each pixel is difficult to be taken out. In Figs. 11, 15, 19, 23 part ‘b,’ there are number of abruptness and ramp of pixels for different test images; this means information is vulnerable to be attacked. In our proposed algorithm with other test images for 512 × 512 × 3 and 512 × 512 in Figs. 14, 18, 22, 26 part ‘b’ and Figs. 13, 17, 21, 25 while examining of pixels values, the information of each pixel shows high resemblance to one another. The intruder will be unable to take out exact information.
4.2 Correlation coefficient analysis
Correlation coefficient is a momentous method for the examination of security of data. In correlation coefficient, we investigate pixel similarities between plain image and encrypted image horizontally, vertically and diagonally. The range of correlation coefficient always spread over extreme values of − 1 and 1. The digit 0 show maximum uncorrelated pixels with respect to nearby pixels, while digit 1 shows maximum correlation of pixels in neighborhood. The mathematical expression for correlation coefficient is given as:
where \(\sigma_{XY}\) is covariance, \(\sigma_{X}\) and \(\sigma_{Y}\) are standard deviations of random variables X and Y, respectively. We assumed two cases of correlation. First case is examination for combined channels image, i.e., 512 × 512 × 3 for R, G and B combined in three different directions, while in other cases, individual channels are examined for three directions, respectively.
4.2.1 Image correlation coefficient
We measured correlation of adjacent pixels for 512 × 512 × 3 and 256 × 256 × 3 size images in Table 1. The average value for all ternary direction in Table 1 is 0.9751 for plain image of Lena, and average cipher for all three directions is 0.0005 which shows much better robustness against differential attacks because the average value is zero up to three digits after decimal point. In Table 1, plain values of respected test images like Tiffany, Splash, Airplane and additional Tiffany of size 256 × 256 × 3, i.e., with half of size of the previous Tiffany can be seen. The average values for remaining test images are 0.975 which are very close to 1 and show highly vulnerability, while average cipher images at ternary direction are approximately 0.002 which are close to zero and show good secure algorithm designed. The comparison of values for plain and enciphered images is shown in Table 2. The proposed average value of encrypted Lena image is calculated approximately to 0.0005 and is compared with the number of preexisting algorithms [50,51,52,53,54,55,56,57] in Table 2. According to [50], the average value for three directions of preexisting algorithm is 0.0045 compared to proposed algorithm value which is 0.0005 give evidence of exceedingly robustness of designed system.
4.2.2 Channel-wise image correlation
In this case, we examined correlation of adjacent pixels for three different directions, i.e., horizontal, diagonal and vertical for 512 × 512 and 256 × 256 channel-wise dimension images and compared values with layer-wise plain and encrypted images for different images and are given in Table 3. We examined values for five test images with all three layers of colored images including four 512 × 512 dimension images with one Tiffany for 256 × 256 image. The average value in Table 3 for plain Lena for red layer is approximately 0.9782 with cipher average value of − 0.0014 which is the evidence of good encryption (Figs. 27, 28, 29, 30, 31, 32, 33, 34).
4.3 Information entropy test analysis
Entropy analysis is used to evaluate values of gray-scale layers of various images. It is always important to find out randomness and robustness for proposed secure cryptosystem. The larger the value of entropy, the more uniform the distribution of gray-level values in the image. The quality of system can be measured through information entropy analysis [58]. This quantity can be defined as:
where \(p(x_{j} )\) defines probability mass function (PMF) for the event ‘\(x_{j}\),’ where ‘b’ is logarithmic base used in entropy definition and ‘X’ is the random variable which takes ‘n’ outcomes. Ideally, entropy value is always equal to 8 for good secure encrypted image. The tabulation of different test images for entropy investigation is given in Tables 4, 5 and 6, respectively. The result shows that entropy values are approaching to 8, i.e., 7.999 is almost equal to 8 for all test images of 512 × 512 for channel wise. While looking into full image of 512 × 512 × 3, the proposed system value approaches to 7.9998. According to Table 5, the proposed algorithm value has three nine after decimal point for 512 × 512 × 3 while comparing it to the preexisting values of different algorithm designed in [1,2,3,4,5,6,7,8] show improved and superior to available algorithms. Above explanation concludes that the proposed cryptosystem is highly secure against any attack and can be used for today’s real communication security.
4.4 MSE test analysis
Mean square error is an average of pixel-by-pixel squared difference of two images, i.e., original image and encrypted image. MSE can be expressed as
where \(M \times N\) shows total size of test image, ‘i’ and ‘j’ represent rows and columns, ‘P’ and ‘C’ show plain and ciphered image, respectively, at ‘i’ and ‘j’ position, respectively. MSE must be greater for better robust cryptosystem. Table 7 shows different values of MSE and PSNR for different taken test images of sizing 512 × 512 and 256 × 256 correspondingly. Maximum channel values are approaching to ten thousand figures and some are much above from ten thousand while examining into Table 7. Tiffany image layer values proved that the algorithm is highly desirable to be implemented for real-time communication.
4.5 PSNR test analysis
Peak signal-to-noise signal (PSNR) is a measure used for quality of image and can be expressed as
where \(I_{\hbox{max} }\) is maximum value of pixel for test image. Peak signal-to-noise ratio is a factor which can be calculated in unit of decibels. Mean square output values and peak signal-to-noise ratio output values are contrary to one another. Mean square error must be greater in value for better secure of cryptosystem and peak signal-to-noise ratio must be lesser in value for better secure of data. According to Table 7, PSNR values are different for different test images of different dimensions. The approximate average value is almost 7 which is good enough for ensuring secure cryptosystem.
4.6 Sensitivity Analysis
4.6.1 Mean absolute error analysis
Mean absolute error (MAE) is a type of criterion applied to explore attainment of special attack known as resisting differential attack. Suppose \(M \times N\) be the total size of test image, ‘C’ be the cipher and ‘P’ be the gray pixels of plain image at ith row and jth column subsequently. Maximum absolute error can be computed from the given formula:
The bigger value of mean absolute error investigation represents the strong security of cryptosystem. If mean absolute error value is not enough larger, then fulfillment of resistant differential attack is performed. The average MAE is almost 75 for acceptable secure algorithm. The value of MAE of proposed algorithm is > 75. According to Table 8, the proposed algorithm value is 92 which is above acceptable value of 75, while Tiffany of both dimensions and Airplane show double the value of acceptable range of 75 that satisfies encouraging cryptosystem. According to Table 9, the comparison of values of different test images with proposed and preexisting values takes place. The value of MAE for Lena is 78 in preexisting algorithm in Ref. [9] same as for Tiffany of 512 dimension with 182 almost double of preexisting algorithm value of 94.36 which show better resistivity against cryptographic attacks.
4.6.2 NPCR test analysis
Number of pixel change rate is a type of test which refers to change of pixels occurring with alteration of lone pixel of standard plain image. When the value approaches to 99.60 almost for NPCR, then this means that the system will be approached to more sensitive level and will be more efficient for resisting a plain text attack. The ideal value for NPCR is always 100. In Figs. 10, 11 and 12, respectively, the proposed value for NPCR is 99.61 for all three channels and all test images except Tiffany which shows some exceptional value of 99.74 as given in Table 10. According to Table 11, we evaluated and examined for combined channels image with the same value of 99.61 except for Tiffany which is 99.74. In Table 12, comparison of values of the proposed algorithm and some preexisting values in [2, 8, 10, 11, 56] is shown. While looking into table, the proposed algorithm value of NPCR of Lena is greater in number than the referred algorithm values shown in Table 12. In this test, we considered two enciphered images whose provenience image is particular. The two cipher images are \(C_{1(i,j)}\) and \(C_{2(i,j)}\) but the provenience image is different by only pixel difference. NPCR value can be computed from the given formula as follows:
where \(D_{(i,j)}\) is illustrated as
4.6.3 UACI test analysis
UACI also abbreviated as unified average changing intensity testifies intermediate intenseness difference among original and enciphered image. This test when approached to 33 percent shows that cryptosystem is becoming more efficient against any attack. In Table 10, the proposed algorithm value, Tiffany and Slash is 33.786, 36.13 and 33.86, respectively. In Table 12, comparison of values shown with preexisting values in Refs. [10, 2], [11], [56], [11] are 33.373, 33.51, 33.12, 33.48 and 33.41 are lesser in number compared to introduced algorithm confirm robust cryptosystem. UACI can be calculated using the formula:
4.7 NIST randomness analysis
NIST test analysis which can be abbreviated as national institute of standard and technology is a physical science laboratory and non-regulatory agency which published statistical tests of (SP 800-22) based on numbers and based on complete unpredictability for cryptography. It is one of the most valuable and strongest methods of investigation and inquiry, and it is completely based on zero and one sequence. The main justification of these sequence is that the result out of enciphered image is always predicted as a binary data stream file. The results are shown in Tables 13 and 14, respectively.
5 Conclusion
In the above communication, we concluded that chaos with addition to fractals and Fibonacci has exceptional output while examining its results using different tests. Due to fascinating and exceptional results, it can be implemented in real-time communication. The method can be extended by addition of more multiple chaotic maps and fractals with different dimensions with inclusion of different well-generated random behavior series. The method helps us with better encryption, security and robustness with no probability to be attack. The invulnerability of above system can also be extended to video and audio encryption in coming days.
References
Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Sig Process 128:155–170
Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inf Secur J Glob Perspect 25(4–6):162–179
Huang X, Ye G (2014) An image encryption algorithm based on hyper-chaos and DNA sequence. Multimed Tools Appl 72(1):57–70
Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique. Opt Lasers Eng 66:10–18
Khan M, Asghar Z (2018) A novel construction of substitution box for image encryption applications with Gingerbreadman chaotic map and S8 permutation. Neural Comput Appl 29(4):993–999
Wang XY, Zhang YQ, Bao XM (2015) A colour image encryption scheme using permutation-substitution based on chaos. Entropy 17(6):3877–3897
Machkour M, Saaidi A, Benmaati ML (2015) A novel image encryption algorithm based on the two-dimensional logistic map and the latin square image cipher. 3D Res 6(4):36
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780
Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497
Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1–2):511–529
Boriga RE, Dăscălescu AC, Diaconu AV (2014) A new fast image encryption scheme based on 2D chaotic maps. IAENG Int J Comput Sci 41(4):249–258
Khan M, Hussain I, Jamal SS, Amin M (2019) A privacy scheme for digital images based on quantum particles. Int J Theor Phys. https://doi.org/10.1007/s10773-019-04301-6
Khan M, Munir N (2019) A novel image encryption technique based on generalized advanced encryption standard based on field of any characteristic. Wirel Pers Commun. https://doi.org/10.1007/s11277-019-06594-6
Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78(18):26203–26222
Waseem HM, Majid K (2019) A new approach to digital content privacy using quantum spin and finite-state machine. Appl Phys B 125:27. https://doi.org/10.1007/s00340-019-7142-y
Khan M, Waseem HM (2019) A novel digital contents privacy scheme based on Kramer’s arbitrary spin. Int J Theor Phys 58:2720–2743
Rafiq A, Khan M (2019) Construction of new S-boxes based on triangle groups and its applications in copyright protection. Multimed Tools Appl 78:15527–15544
Khan M, Waseem HM (2018) A novel image encryption scheme based on quantum dynamical spinning and rotations. PLoS ONE 13(11):e0206460
Waseem HM, Khan M (2018) Information confidentiality using quantum spinning, rotation and finite state machine. Int J Theor Phys 57(11):3584–3594
Waseem HM, Khan M, Shah T (2018) Image privacy scheme using quantum spinning and rotation. J Electron Imaging 27(6):063022
Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and Lorenz chaotic system. Entropy 20(12):913
Khan M (2015) A novel image encryption scheme based on multi-parameters chaotic S-boxes. Nonlinear Dyn 82:527–533
Khan M (2015) An image encryption by using Fourier series. J Vib Control 21:3450–3455
Stallings W (2006) Cryptography and network security, 4/E. Pearson Education India, Bengaluru
Chuang CH, Yen ZY, Lin GS, Hong ZW (2011) A virtual optical encryption software system for image security. J Converg Inf Technol 6(2):357–364
Al-Najjar HM (2012) Digital image encryption algorithm based on multi-dimensional chaotic system and pixels location. Int J Comput Theory Eng 4(3):357
Banthia AK, Tiwari N (2013) Image encryption using pseudo random number generators. Int J Comput Appl 67(20):1–8
Rivest RL (1990) Cryptography. In: van Leeuwen J (ed) Algorithms and complexity. MIT Press, Cambridge, pp 717–755
Kartit Z, Azougaghe A, Idrissi HK, El Marraki M, Hedabou M, Belkasmi M, Kartit A (2016) Applying encryption algorithm for data security in cloud storage. In: Sabir E, Medromi H, Sadik M (eds) Advances in ubiquitous networking. Springer, Singapore, pp 141–154
Wheeler DD, Matthews RA (1991) Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 15(2):140–152
Chen Y, Liao X (2005) Cryptanalysis on a modified Baptista-type cryptosystem with chaotic masking algorithm. Phys Lett A 342(5–6):389–396
Xie EY, Li C, Yu S, Lü J (2017) On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Sig Process 132:150–154
Akhavan A, Samsudin A, Akhshani A (2015) Cryptanalysis of “an improvement over an image encryption method based on total shuffling”. Opt Commun 350:77–82
Akhavan A, Samsudin A, Akhshani A (2017) Cryptanalysis of an image encryption algorithm based on DNA encoding. Opt Laser Technol 95:94–99
Baptista MS (1998) Cryptography with chaos. Phys Lett A 240(1–2):50–54
Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101:30–41
Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283:232–236
Mandelbrot BB (1983) The fractal geometry of nature, vol 173. W. H. Freeman, New York
Gomory R (2010) Benoît Mandelbrot (1924–2010). Nature 468:378
Addison PS (1997) Fractals and chaos: an illustrated course. CRC Press, Boca Raton
Khawaja MA, Khan M (2019) A new construction of confusion component of block ciphers. Multimed Tools Appl. https://doi.org/10.1007/s11042-019-07866-w
Kashanian H, Davoudi M, Khorramfar H (2016) Image encryption using chaos functions and fractal key. Int J Comput Sci Netw Secur 16(10):87
Abd-El-Hafiz SK, Radwan AG, Haleem SHA, Barakat ML (2014) A fractal-based image encryption system. IET Image Proc 8(12):742–752
Peitgen HO, Walther HO (eds) (2006) Functional differential equations and approximation of fixed points. Proceedings, Bonn, July 1978, vol 730. Springer
Russell DA, Hanson JD, Ott E (1980) Dimension of strange attractors. Phys Rev Lett 45(14):1175
Grassberger P, Procaccia I (1983) Measuring the strangeness of strange attractors. Physica D 9(1–2):189–208
Tiner JH (2004) Exploring the world of mathematics: from ancient record keeping to the latest advances in computers. New Leaf Publishing Group, Green Forest
Beck M, Geoghegan R (2010) The art of proof: basic training for deeper mathematics. Springer, Berlin
Batool SI, Waseem HM (2019) A novel image encryption scheme based on Arnold scrambling and Lucas series. Multimed Tools Appl 78:27611–27637
Mazloom S, Eftekhari-Moghadam AM (2009) Color image encryption based on coupled nonlinear chaotic map. Chaos Solitons Fractals 42(3):1745–1754
Seyedzadeh SM, Mirzakuchaki S (2012) A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map. Sig Process 92(5):1202–1215
Liu S, Sun J, Xu Z (2009) An improved image encryption algorithm based on chaotic system. JCP 4(11):1091–1100
Akhshani A, Akhavan A, Lim SC, Hassan Z (2012) An image encryption scheme based on quantum logistic map. Commun Nonlinear Sci Numer Simul 17(12):4653–4661
Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Sig Process 92(4):1101–1108
El-Latif AAA, Li L, Wang N, Han Q, Niu X (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces. Signal Process 93:2986–3000
Wang X, Yang L (2012) A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models. Opt Commun 285(20):4033–4042
Wu Y, Zhou Y, Noonan JP, Agaian S (2014) Design of image cipher using latin squares. Inf Sci 264:317–339
Shannon CE (1949) Communication theory of secrecy systems. Bell Labs Tech J 28:656–715
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Khan, M., Masood, F. & Alghafis, A. Secure image encryption scheme based on fractals key with Fibonacci series and discrete dynamical system. Neural Comput & Applic 32, 11837–11857 (2020). https://doi.org/10.1007/s00521-019-04667-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00521-019-04667-y