Abstract
We present an algorithm for image encryption for secure transmission and storage of images over insecure public networks. Our algorithm uses Composite Logistic Sine Map (CLSM) and Secure Hash Algorithm-256 (SHA-256). The algorithm first scrambles the pixels of the plain image based on pseudo random number sequence (PRNS) generated by the CLSM. This is followed by diffusing the pixel values by using values generated by SHA-256. The initial conditions and parameters of the CLSM together with a nonce chosen by the user act as key for the algorithm. The nonce is used to initialize the SHA-256 that generates hash values for the diffusion phase. The algorithm has a very wide key space to defeat any brute force or guessing attack. The proposed algorithm was tested with several images of different characteristics against nine security measures. The tests results show that the scheme is robust, scalable and capable of providing strong security to data. The lightweight arithmetic and logical operations involved in the used chaotic map and in permutation-substitution steps enable it to have fast speed due to low computational overhead. This makes it suitable for low power battery operated devices equipped with inexpensive processors having limited computing speed.












Similar content being viewed by others
References
Broumandnia Ali (2019) The 3d modular chaotic map to digital color image encryption. Futur Gener Comput Syst 99:489–499
Cao Chun, Sun Kehui, Liu Wenhao (2018) A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process 143:122–133
Elashry IF, El-Shafai W, Hasan ES, El-Rabaie S, Abbas AM, Abd El-Samie FE, Faragallah OS (2020) Efficient chaotic-based image cryptosystem with different modes of operation. Multimed Tools Appl. pages 1–23
Essaid M, Akharraz I, Saaidi A (2019) Image encryption scheme based on a new secure variant of hill cipher and 1d chaotic maps. J Inform Sec Appl. 47:173 – 187
Gueron S, Johnson S, Walker J (2011) Sha-512/256. In 2011 Eighth International Conference on Information Technology: New Generations, pages 354–358. IEEE
Hasheminejad A, Rostami MJ (2019) A novel bit level multiphase algorithm for image encryption based on pwlcm chaotic map. Optik 184:205–213
Hongyue X, Lingfeng L (2020) An improved digital logistic map and its application in image encryption. Multimed Tools Appl 79(41):30329–30355
Jian Z, Da H (2019) Image encryption algorithm based on quantum chaotic map and dna coding. Multimed Tools Appl. 78(11):15605–15621
Kamrani A, Zenkouar K, Najah S (2020) A new set of image encryption algorithms based on discrete orthogonal moments and chaos theory. Multimed Tools and Appl 79(27):20263–20279
Lee WK, Phan RCW, Yap WS, Goi BM (2018) Spring: a novel parallel chaos-based image encryption scheme. Nonlinear Dynamics, 92(2):575–593
Lei Z, Xiaoqiang Z (2020) Multiple-image encryption algorithm based on bit planes and chaos. Multimed Tools Appl 79:20753–20771
Li H, Yu C, Wang X (2020) A novel 1d chaotic system for image encryption, authentication and compression in cloud. Multimed Tools Appl. pages 1–38
Liansheng S, Cong D, Xiao Z, Ailing T, Anand A (2019) Double-image encryption based on interference and logistic map under the framework of double random phase encoding. Opt Lasers Eng 122:113–122
Luo Y, Lin J, Liu J, Wei D, Cao L, Zhou R, Cao Y, Ding X (2019) A robust image encryption algorithm based on chua’s circuit and compressive sensing. Signal Process 161:227–247
Luo Y, Jin y, Lai W, Liu L (2019) A novel chaotic image encryption algorithm based on improved baker map and logistic map. Multimed Tools Appls 78(15):22023–22043
Mondal B, Biswas N, Mandal T (2017) A comparative study on cryptographic image scrambling. In 2nd International Conference on Research in Intelligent and Computing in Engineering (RICE-2017), volume10, pages 261–268. Annals of Computer Science and Information Systems
Mondal B, Mandal T (2020) A secure image encryption scheme based on genetic operations and a new hybrid pseudo random number generator. Multimed Tools Appls 79:17497–17520
Mondal B, Sinha D, Gupta NK, Kumar N, Goyal P (2012) An optimal (n, n) secret image sharing scheme. UACEE Int J Comp Sci Appl. 2(3):61–66
Montero-Canela R, Zambrano-Serrano E, Tamariz-Flores EI, Muñoz-Pacheco JM, Torrealba-Meléndez R (2020) Fractional chaos based-cryptosystem for generating encryption keys in ad hoc networks. Ad Hoc Networks 97
Mozaffari S (2018) Parallel image encryption with bitplane decomposition and genetic algorithm. Multimedia Tools and Applications 77(19):25799–25819
Naskar PK, Bhattacharyya S, Nandy D, Chaudhuri A (2020) A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dynamics
Nashreen N, Tania G, Indrajit B (2019) Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map. J Inf Secur Appl 47:320–328
Ping P, Xu F, Yingchi M, Zhijian W (2018) Designing permutation substitution image encryption networks with henon map. Neurocomputing 283:53–63
Rayappan, D, Pandiyan, M (2020) Lightweight feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment. Wireless Networks, pages 1–19
Shoukat IA, Iqbal U, Rauf A, Faheem MR (2020) Randomized substitution method for effectively secure block ciphers in iot environment. Arab J Sci Eng. 45(12):11019–11036
Talhaoui MZ, Wang X, Midoun MA (2020) A new one-dimensional cosine polynomial chaotic map and its use in image encryption. The Visual Computer, pages 1–11
Valandar MY, Barani MJ, Ayubi P (2019) A fast color image encryption technique based on three dimensional chaotic map. Optik, 193:162921
Yang L, Zhang J (2020) A multidimensional chaotic image encryption algorithm based on dna coding. Multimed Tools Appl
Zhou Y, Bao L, Chen CP (2014) A new 1d chaotic system for image encryption. Signal Processing 97:172–182
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Suman, R.R., Mondal, B. & Mandal, T. A secure encryption scheme using a Composite Logistic Sine Map (CLSM) and SHA-256. Multimed Tools Appl 81, 27089–27110 (2022). https://doi.org/10.1007/s11042-021-11460-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-11460-4