MLCM: An efficient image encryption technique for IoT application based on multi-layer chaotic maps

Document Type : Research Paper

Authors

1 Ashur University College, Baghdad, Iraq

2 Department of Computer Technologies Engineering, AL-Esraa University College, Baghdad, Iraq

3 Faculty of Engineering, Uruk University, Baghdad, Iraq

4 Department of Computer Science, Cihan University-Erbil, Kurdistan Region, Iraq

5 Department of Mathematics, Hodeidah University-Hodeidah, Yemen

Abstract

The importance of image encryption has considerably increased especially after the dramatic evolution of the internet of things (IOT) and due to the simplicity of capturing and transferring digital images. Although there are several encryption approaches, chaos-based image encryption is considered the most appropriate approach for image applications because of its sensitivity to initial conditions and control parameters. This research aims at generating an encrypted image free of statistical information to make cryptanalysis infeasible. Therefore, a new method was introduced in this paper called Multi-layer Chaotic Maps (MLCM) based on confusion and diffusion. Basically, the confusion method uses the Sensitive Logistic Map (SLM), Hénon Map, and the additive white Gaussian noise to generate random numbers to be used in the pixel permutation method. However, the diffusion method uses Extended Bernoulli Map (EBM), Tinkerbell, Burgers, and Ricker maps to generate the random matrix. The correlation between adjacent pixels was minimized to have a very small value $(x 10-3)$. Besides, the keyspace was extended to be very large $\left(2^{450}\right)$ considering the key sensitivity to hinder brute force attack. Finally, a histogram was idealized to be perfectly equal in all occurrences and the resulted information entropy was equal to the ideal value(8), which means that the resulted encrypted image is free of statistical properties in terms of histogram and information entropy. Based on the findings, the high randomness of the generated random sequences of the proposed confusion and diffusion methods is capable of producing a robust image encryption framework against all types of cryptanalysis attacks.

Keywords

[1] M.Z. Abdullah and Z.J. Khaleefah, Design and implement of a hybrid cryptography textual system, Int. Conf.
Engin. Technol. (ICET), 2017, pp. 1–6.
[2] M.A. Al-Khasawneh, I. Uddin, S.A.A. Shah, A.M. Khasawneh, L. Abualigah and M. Mahmoud, An improved
chaotic image encryption algorithm using hadoop-based mapreduce framework for massive remote sensed images
in parallel iot applications, Cluster Comput. 25 (2022), no. 2, 999–1013.
[3] X. Bai, L. Zhang, J. Li, Z. Yu, Z. Yang, Y. Wang, X. Chen and X. Zhou, Coherent imaging of objects through
thin-layer highly scattering medium based on optical encryption, Optics Commun. 506 (2022), 127558.
[4] E. Balamurugan, L.R. Flaih, D. Yuvaraj, K. Sangeetha, A. Jayanthiladevi and T.S. Kumar, Use case of artificial
intelligence in machine learning manufacturing 4.0, Int. Conf. Comput. Intell. Knowledge Econ. (ICCIKE), 2019,
pp. 656–659.
[5] M. Budiman, A neural cryptography approach for digital image security using vigenere cipher and tree parity
machine, J. Phys.: Conf. Ser. 1898 (2021), 012039.
[6] J. Choi and N. Y. Yu, Secure image encryption based on compressed sensing and scrambling for internet-ofmultimedia things, IEEE Access 10 (2022), 10706–10718.
[7] V. Dahiphale, G. Bansod, and J. Patil, Anu-ii: A fast and efficient lightweight encryption design for security in
iot, Int. Conf. Big Data, IoT and Data Sci. (BID), 2017, pp. 130–137.
[8] K. Dharavathu and S.A. Mosa. Efficient transmission of an encrypted image through a mimo–ofdm system with
different encryption schemes, Sens. Imag. 21 (2020), no. 1, 1–31.
[9] R. Durga, E. Poovammal, K. Ramana, R.H. Jhanveri, S. Singh and B. Yoon. Ces blocks-a novel chaotic encryption
schemes based blockchain system for an iot environment, IEEE Access 10 (2022), 11354–11371.
[10] M. Farah, A. Farah and T. Farah, An image encryption scheme based on a new hybrid chaotic map and optimized
substitution box, Nonlinear Dyn. 99 (2020), no. 4, 3041–3064.
[11] V. Gaur, R.K. Gujral, A. Mehta, N. Gupta and R. Bansal, Enhanced digital image encryption using sine transformed complex chaotic sequence, Proc. Int. Conf. Artific. Intell. Appl., 2021, pp. 149–160.
[12] A. Hafsa, A. Sghaier, J. Malek, and M. Machhout, Image encryption method based on improved ecc and modified
aes algorithm, Multimedia Tools Appl. 80 (2021), no. 13, 19769–19801.
[13] M. Hashim, M.S. Taha, A.H.M. Aman, A.H.A. Hashim, M.S.M. Rahim and S. Islam, Securing medical data
transmission systems based on integrating algorithm of encryption and steganography, 7th Int. Conf. Mechatronics
Engin. (ICOM), 2019, pp. 1–6.
[14] M.M. Hashim, A.K. Mohsin and M.S.M. Rahim, All-encompassing review of biometric information protection in
fingerprints based steganography, Proc. 3rd Int. Symp. Comput. Sci. Intell. Control, 2019, pp. 1–8.
[15] Z. Hu and S. Kais, A quantum encryption design featuring confusion, diffusion, and mode of operation, arXiv
preprint arXiv:2010.03062, (2020).[16] Z. Hua, Y. Zhou and H. Huang, Cosine-transform-based chaotic system for image encryption, Inf. Sci. 480 (2019),
403–419.
[17] S.T. Kamal, K.M. Hosny, T.M. Elgindy, M.M. Darwish and M.M. Fouda, A new image encryption algorithm for
grey and color medical images, IEEE Access 9 (2021), 37855–37865.
[18] J. Khan, J. P. Li, B. Ahamad, S. Parveen, A.U. Haq, G.A. Khan and A.K. Sangaiah, Smsh: Secure surveillance
mechanism on smart healthcare iot system with probabilistic image encryption, IEEE Access 8 (2020), 15747–
15767.
[19] P.R. Krishna, C.V.S. Teja and V. Thanikaiselvan, A chaos based image encryption using Tinkerbell map functions,
Second Int. Conf. Electron. Commun. Aerospace Technol. (ICECA), 2018, pp. 578–582.
[20] K.S. Kumar, G. Sreenivasulu and S. V. Rajan, Block based svd approach for additive white gaussian noise level
estimation in satellite images, 3rd Int. Conf. Comput. Sustain. Glob. Dev. (INDIACom), 2016, pp. 1464–1468.
[21] T. M. Kumar, K.S. Reddy, S. Rinaldi, B.D. Parameshachari and K. Arunachalam, A low area high speed fpga
implementation of aes architecture for cryptography application, Electron. 10 (2021), no. 16, 2023.
[22] V. Kumar and A. Girdhar, A 2d logistic map and lorenz-rossler chaotic system based rgb image encryption
approach, Multimedia Tools Appl. 80 (2021), no. 3, 3749–3773.
[23] B. Li, Y. Feng, Z. Xiong, W. Yang and G. Liu. Research on ai security enhanced encryption algorithm of autonomous iot systems, Inf. Sci. 575 (2021), 379–398.
[24] W. Li, X. Chang, A. Yan and H. Zhang, Asymmetric multiple image elliptic curve cryptography, Optics Lasers
Engin. 136 (2021), 106319.
[25] C.-H. Lin, G.-H. Hu, C.-Y. Chan and J.-J. Yan, Chaos-based synchronized dynamic keys and their application to
image encryption with an improved aes algorithm, Appl. Sci. 11 (2021), no. 3, 1329.
[26] A.A. Maryoosh, Z.S. Dhaif and R.A. Mustafa, Image confusion and diffusion based on multi-chaotic system and
mix-column, Bull. Electric. Engin. Inf. 10 (2021), no. 4, 2100–2109.
[27] M.M. Matalgah and A.M. Magableh, Simple encryption algorithm with improved performance in wireless communications, IEEE Radio Wireless Symp., 2011, pp. 215–218.
[28] A.N. Mazher and J. Waleed, Implementation of modified gso based magic cube keys generation in cryptography,
Eastern-Eur. J. Enterprise Technol. 1 (2021), no. 9, 43–49.
[29] S. Medileh, A. Laouid, R. Euler, A. Bounceur, M. Hammoudeh, M. AlShaikh, A. Eleyan and O.A. Khashan, A
flexible encryption technique for the internet of things environment, Ad Hoc Networks 106 (2020), 102240.
[30] G. Ming, Eagle: A new symmetric encryption algorithm against any linear attacks and differential attacks (the
existence of one-way function means p!= np), preprint.
[31] P. Mohanakrishnan, K. Suthendran, S. Arumugam and T. Panneerselvam. Mixed noise elimination and data
hiding for secure data transmission, Int. Conf. Theor. Comput. Sci. Discrete Math. 2016, pp. 156–164.
[32] A. S. Muhammad and F. Ozkaynak, ¨ Siea: secure image encryption algorithm based on chaotic systems optimization algorithms and pufs, Symmetry 13 (2021), no. 5, 824.
[33] K. Muhammad, R. Hamza, J. Ahmad, J. Lloret, H. Wang, and S.W. Baik, Secure surveillance framework for iot
systems using probabilistic image encryption, IEEE Trans. Ind. Inf. 14 (2018), no. 8, 3679–3689.
[34] R. Munir. A block-based image encryption algorithm in frequency domain using chaotic permutation, 8th Int.
Conf. Telecommun. Syst. Serv. Appl.(TSSA), 2014, pp. 1-5.
[35] P.S.K. Oberko, V.-H.K.S. Obeng, and H. Xiong, A survey on multi-authority and decentralized attribute-based
encryption, J. Ambient Intell. Humanized Comput. 13 (2022), no. 1, 515–533
[36] A. Ouannas, A.-A. Khennaoui, S. Bendoukha, T.P. Vo, V.-T. Pham and V.V. Huynh, The fractional form of the
tinkerbell map is chaotic, Appl. Sci. 8 (2018), no. 12, 2640.
[37] A. G. Radwan, On some generalized discrete logistic maps, J. Adv. Res. 4 (2013), no. 2, 163–171.
[38] A. Sahasrabuddhe and D.S. Laiphrakpam, Multiple images encryption based on 3d scrambling and hyper-chaoticsystem, Inf. Sci. 550 (2021), 252–267.
[39] R. Senkerik, M. Pluhacek, I. Zelinka and Z.K. Oplatkova, Utilization of the discrete chaotic systems as the pseudo
random number generators, Modern Trends Tech. Comput. Sci., Springer, Cham, 2014, pp. 155–164.
[40] A.A. Shah, S.A. Parah, M. Rashid and M. Elhoseny, Efficient image encryption scheme based on generalized
logistic map for real time image processing, J. Real-Time Image Process. 17 (2020), no. 6, 2139–2151.
[41] M.H. Shukur, Design a mobile medication dispenser based on iot technology, 3rd Int. Conf. Commun. Engin.
Comput. Sci. (CIC-COCOS19), 2019.
[42] M.S. Taha, M.S.M. Rahim, S.A. Lafta, M.M. Hashim and H.M. Alzuabidi, Combination of steganography and
cryptography: A short survey, IOP Conf. Series: Mater. Sci. Engin. 518 (2019), 052003.
[43] M.S.H. Talpur, M.Z.A. Bhuiyan and G. Wang. Shared–node iot network architecture with ubiquitous homomorphic
encryption for healthcare monitoring, Int. J. Embed. Syst. 7 (2015), no. 1, 43–54.
[44] A. Toktas, U. Erkan and D. Ustun. An image encryption scheme based on an optimal chaotic map derived by
multi-objective optimization using abc algorithm, Nonlinear Dyn. 105 (2021), no. 2, 1885–1909.
[45] D. Trujillo-Toledo, O. L´opez-Bonilla, E. Garcia-Guerrero, E. Tlelo-Cuautle, D. L´opez-Mancilla, O. Guill´enFern´andez, and E. Inzunza-Gonz´alez, Real-time rgb image encryption for iot applications using enhanced sequences from chaotic maps, Chaos, Solitons Fractals 153 (2021), 111506.
[46] A.S. Unde and P. Deepthi. Design and analysis of compressive sensing-based lightweight encryption scheme for
multimedia iot, IEEE Trans. Circ. Syst. II: Express Briefs 67 (2019), no. 1, 167–171.
[47] H. Wang, J. Wang, Y.-C. Geng, Y. Song and J.-Q. Liu, Quantum image encryption based on iterative framework
of frequency-spatial domain transforms, Int. J. Theor. Phys. 56 (2017), no. 10, 3029–3049.
[48] J. Wu, X. Liao and B. Yang, Image encryption using 2d he´non-sine map and dna approach, Signal Process. 153
(2018), 11–23.
[49] W. Zhang, Z. Zhu and H. Yu, A symmetric image encryption algorithm based on a coupled logistic–bernoulli map
and cellular automata diffusion strategy, Entropy 21 (2019), no. 5, 504.
[50] X. Zhang, G. Zhu and S. Ma, Remote-sensing image encryption in hybrid domains, Optics Commun. 285 (2012),
no. 7, 1736–1743.
Volume 13, Issue 2
July 2022
Pages 1591-1615
  • Receive Date: 09 January 2022
  • Revise Date: 20 February 2022
  • Accept Date: 25 March 2022