Abstract
Cipher images that are generated using encryption algorithms are noise-like image, which shows a clear indication for the presence of encrypted data. The noise-like image lures an adversary to carry out attacks. An approach for the generation of visually meaningful multiple-image encryption scheme is presented in this paper. Multiple cipher image data are embedded in the insignificant real data of a host image. Simulation results and security analyses express the high-quality performance of the proposed method. Comparison with Bao and Zhou (Inf Sci 324:197–207, 2015) and Kanso and Ghebleh (Opt Lasers Eng 90:196–208, 2017) visually meaningful image encryption schemes, the proposed scheme has got better ability to embed more images with least distortion to the visual perspective of the host image.
Similar content being viewed by others
References
Liu, W.; Sun, K.; Zhu, C.: A fast image encryption algorithm based on chaotic map. Opt. Lasers Eng. 84, 26–36 (2016)
Brindha, M.; Ammasai, G.N.G.: Image encryption scheme based on block based confusion and multiple levels of diffusion. IET Comput. Vis. 10(6), 593–602 (2016)
Dai, Y.; Wang, H.; Wang, Y.: Chaotic medical image encryption algorithm based on bit-plane decomposition. Int. J. Pattern Recognit. Artif. Intell. 30(4), 1657001–1657015 (2016)
Chong’s, D.: Asymmetric color image encryption scheme using discrete-time map and hash value. Optik 126, 574–2585 (2015)
Hongjun, L.; Abdurahman, K.: Asymmetric color image encryption scheme using 2D discrete-time map. Sig. Process. 113, 104–112 (2015)
Devaraj, P.; Kavitha, C.: An image encryption scheme using dynamic S-boxes. Nonlinear Dyn. 86(2), 927–940 (2016)
Li, C.; Luo, G.; Qin, K.; Chunbao, L.: An image encryption scheme based on chaotic tent map. Nonlinear Dyn. 87, 127–133 (2016). https://doi.org/10.1007/s11071-016-3030-8
Wang, X.; Teng, L.; Qin, X.: A novel colour image encryption algorithm based on chaos. Sig. Process. 92(4), 1101–1108 (2012)
Jianhua, L.; Hui, L.: Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inf. Secur. 7(4), 265–270 (2013)
Wadi, S.M.; Zainal, N.: High definition image encryption algorithm based on AES modification. Wireless Pers. Commun. 79, 811–829 (2014)
Fahad, T.; Bin, M.: Chaotic and AES cryptosystem for satellite imagery. Telecommun. Syst. 52(2), 573–581 (2013)
Li, L.; Ahmed, A.A.L.; Xiamu, N.: Elliptic curve ElGamal based homomorphic image encryption scheme for sharing secret images. Sig. Process. 92, 1069–1078 (2012)
Behnia, S.; Akhavan, A.; Akhshani, A.; Samsudin, A.: Image encryption based on the Jacobian elliptic maps. J. Syst. Softw. 86, 2419–2438 (2013)
Ahmed, A.A.L.; Xiamu, N.: A hybrid chaotic system and cyclic elliptic curve for image encryption. Int. J. Electron. Commun. 67, 136–143 (2013)
Tawalbeh, L.; Mowafi, M.; Aljoby, W.: Use of elliptic curve cryptography for multimedia encryption. IET Inf. Secur. 7, 67–74 (2012)
Guesmi, R.; Farah, M.A.B.; Kachouri, A.; Samet, M.: A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dyn. 83(3), 1123–1136 (2016)
Manish, K.; Akhlad, I.; Pranjal, K.: A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Sig. Process. 125, 187–202 (2016)
Lima, J.B.; Madeiro, F.; Sales, F.J.R.: Encryption of medical images based on the cosine number transform. Sig. Process. Image Commun. 35, 1–8 (2015)
Lima, J.B.; Lima, E.A.O.; Madeiro, F.: Image encryption based on the finite field cosine transform. Sig. Process. Image Commun. 28, 1537–1547 (2013)
Mariusz, D.; Michal, P.; Roman, R.: A new quaternion-based encryption method for DICOM images. IEEE Trans. Image Process. 24(11), 4614–4622 (2015)
Yap, W.S.; Phan, R.C.W.; Goi, B.M.: Cryptanalysis of a high-definition image encryption based on AES modification. Wirel. Pers. Commun. 88, 685–699 (2016)
Tu, G.; Liao, X.; Xiang, T.: Cryptanalysis of a color image encryption algorithm based on chaos. Optik 124, 5411–5415 (2013)
Hong, L.; Yanbing, L.: Cryptanalysis an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve. Opt. Laser Technol. 56, 15–19 (2014)
Bao, L.; Zhou, Y.: Image encryption: generating visually meaningful encrypted images. Inf. Sci. 324, 197–207 (2015)
Kanso, A.; Ghebleh, M.: An algorithm for encryption of secret images into meaningful images. Opt. Lasers Eng. 90, 196–208 (2017)
Xiuli, C.; Zhihua, G.; Yiran, C.; Yushu, Z.: A visually secure image encryption scheme based on compressive sensing. Signal Process. 134, 35–51 (2016). https://doi.org/10.1016/j.sigpro.2016.11.016
Calderbank, A.; Daubechies, I.; Sweldens, W.; Yeo, B.L.: Wavelet transforms that map integers to integers. Appl. Comput. Harmon. Anal. 5, 332–369 (1998)
Dolendro, L.; Manglem, Kh: A robust image encryption scheme based on chaotic system and elliptic curve over finite field. Multimed. Tools Appl. 76(8), 1–24 (2017)
Robert, M.M.: Simple mathematical models with very complicated dynamics. Nature 261(5560), 459–467 (1976)
Whitfield, D.; Martin, E.H.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Neal, K.: Elliptic curve cryptosystems. Math. Comput. 48, 203–209 (1987)
Victor, M.: Use of elliptic curves in cryptography. Adv. Cryptol. CRYPTO’85 218, 417–426 (1986)
Bianchi, T.; Piva, A.; Barni, M.: Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Secur. 5(1), 180–187 (2010)
Andrew, R.; Juan, S.; James, N.; Miles, S.; Elaine, B.; Stefan, L.; Mark, L.; Mark, V.; David, B.; Alan, H.; James, D.; San, V.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology Special Publication 800-22 Revision 1a (2010)
Vladimir, A.; Avez, A.: Ergodic Problems in Classical Mechanics. Benjamin, New York (1968)
Sample Images. http://sipi.usc.edu/database/. Accessed 03 Sep 2016
ECC Brainpool Standard Curves and Curve Generation v. 1.0. http://www.ecc-brainpool.org/download/Domain-parameters.pdf (2005)
Zhou, W.; Alan, C.B.; Hamid, R.S.; Eero, P.S.: Image quality assessment: from error visibility to structural similarity. IEEE Trans. Image Process. 13, 600–612 (2004)
Kerckhoffs, A.: La cryptographie militaire. J. Sci. Mil. 9, 5–38 (1883)
Pollard, J.M.: Monte Carlo methods for index computation (mod p). Math. Comp. 32, 918–924 (1978)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Dolendro Singh, L., Manglem Singh, K. Visually Meaningful Multi-image Encryption Scheme. Arab J Sci Eng 43, 7397–7407 (2018). https://doi.org/10.1007/s13369-018-3104-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13369-018-3104-7