Image encryption based on simple shift, permutation and transformation operations on bit layers

Authors

DOI:

https://doi.org/10.56294/dm2025690

Keywords:

image, image encryption, transformation operations, bit layer, shift, bit permutations

Abstract

Introduction: This paper explores image encryption techniques that leverage transformation, shifting, and permutation operations. The primary focus is on enhancing the security and quality of encrypted raster images by manipulating the individual bit layers of color images.
Methods: To encrypt a raster image, the color image is decomposed into binary layers, each representing pixel bits at varying levels of significance. The least significant bits are placed in the least significant layers, while the most significant bits are positioned in the most significant layers. Transformation operations are performed on the bits or their arrays, reconfiguring them into different bit arrangements. Shifting operations are applied to bits across rows and columns within each bit layer, with shifts between layers carried out separately. Additionally, permutation operations are used to further rearrange bit arrays both within individual layers and between layers themselves.
Results: Through experimentation, two encryption scenarios have been identified that provide high-quality results for images with different structures. These scenarios produce distinct encrypted images based on the combinations of operations and their sequence, yet maintain a high standard of encryption quality.
Conclusions: The proposed method demonstrates an effective approach to encrypting raster images without relying on external encryption tools, minimizing the risk of information loss during decryption. The combination of transformation, shifting, and permutation operations ensures robust encryption, making the technique suitable for a wide range of image types.

References

Massimo Bertaccini. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography. Packt Publishing (August 12, 2024). 410 p.

DOI: https://doi.org/10.22059/IJMS.2021.319211.674442

Stelvio Cimato, Ching-Nung Yang. Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision). CRC Press; 1st edition (December 19, 2017).

DOI: https://doi.org/10.22059/IJMS.2021.319211.674442

Andreas Uhl, Andreas Pommer. Image and Video Encryption: From Digital Rights Management to Secured Personal Communication (Advances in Information Security, 15). Springer; 2005th edition (November 4, 2004). 178 p.

DOI: https://doi.org/10.22059/IJMS.2021.319211.674442

Pengfei Fang, Han Liu, Chengmao Wu, Min Liu. (2023) A survey of image encryption algorithms based on chaotic system. The Visual Computer Volume 39, pages 1975–2003.

DOI: https://doi.org/10.1007/s00371-023-02458-1

Yousef Alghamdi and Arslan Munir. Image Encryption Algorithms: A Survey of Design and Evaluation Metrics. J. Cybersecur. Priv. 2024, 4, 126–152.

DOI: https://doi.org/10.22059/jcsp.2024.321097.673568

S.M.Bilan, M.M.Bilan, R.L. Motornyuk. (2002). New Methods and Paradigms for Modeling Dynamic Processes Based on Cellular Automata, IGI-Global. 2020. — P. 200.

DOI: https://doi.org/10.4018/978-1-7998-1679-2

Stepan Bilan. Formation Methods, Models, and Hardware Implementation of Pseudorandom Number Generators: Emerging Research and Opportunities.- (2017).- IGI Global, USA.- P. 301. Journal of Theoretical and Applied Information Technology 15th December 2022. Vol.100. No 23. 6998-7004.

DOI: https://doi.org/10.3999/jatit.2022.100.23.6998-7004

NASHAT AL BDOUR. IMAGE ENCRYPTION METHODOLOGY BASED ON CELLULAR AUTOMATA.

DOI: https://doi.org/10.4108/eai.27-7-2020.163249

Stepan Bilan, Andrii Demash. High performance encryption tools of visual information based on cellular automata. - Information Technology and Security. - 2016. - Vol. 4, № 1(6). - С. 62-75.

DOI: https://doi.org/10.1007/s00371-016-1267-5

Yunling Ma, Chengqing Li, Bo Ou. Cryptanalysis of an image block encryption algorithm based on chaotic maps. Journal of Information Security and Applications. Volume 54, October 2020, 102566.

DOI: https://doi.org/10.1016/j.jisa.2020.102566

Mohammad Ali Bani Younes and Aman Jantan. Image Encryption Using Block-Based Transformation Algorithm. AENG International Journal of Computer Science, 35:1, IJCS_35_1_03.

DOI: https://doi.org/10.2139/ssrn.3486783

Saumya Patel, Ankita Vaish. Block based visually secure image encryption algorithm using 2D-Compressive Sensing and nonlinearity. Optik. Volume 272, February 2023, 170341.

DOI: https://doi.org/10.1016/j.ijleo.2023.170341

Kovalchuk A., Lotoshynska N. ENCRYPTION AND DECRYPTION OF GRAYSCALE AND COLOR IMAGES. CSN. 2018, Number 905: pp. 82 - 87.

DOI: https://doi.org/10.1016/j.csn.2018.07.010

Aradhana Sahoo, Pratyasha Mohanty, and Purna Chandra Sethi. Image Encryption Using RSA Algorithm. In book: Intelligent Systems, Proceedings of ICMIB 2021. 641-652.

DOI: https://doi.org/10.1007/978-3-030-76662-2_63

Hossein Movafegh Ghadirli, Ali Nodehi, Rasul Enayatifar. An overview of encryption algorithms in color images. Signal Processing. Volume 164, November 2019, Pages 163-185.

DOI: https://doi.org/10.1016/j.sigpro.2019.07.026

Li-Hua Gong, Hui-Xin Luo, Rou-Qing Wu, Nan-Run Zhou. New 4D chaotic system with hidden attractors and self-excited attractors and its application in image encryption based on RNG. Physica A: Statistical Mechanics and its Applications. Volume 591, 1 April 2022, 126793.

DOI: https://doi.org/10.1016/j.physa.2022.126793

Zhongyun Hua, Yicong Zhou, Hejiao Huang. Cosine-transform-based chaotic system for image encryption. Information Sciences. Volume 480, April 2019, Pages 403-419.

DOI: https://doi.org/10.1016/j.ins.2018.12.043

Xingyuan Wang, Shengnan Chen, Yingqian Zhang. A chaotic image encryption algorithm based on random dynamic mixing. Optics & Laser Technology. Volume 138, June 2021, 106837.

DOI: https://doi.org/10.1016/j.optlastec.2021.106837

Ankita Vaish, Saumya Patel. Securing color images using DNA coding and cosine stockwell transformation in wavelet domain. Optik. Volume 266, September 2022, 169606.

DOI: https://doi.org/10.1016/j.ijleo.2022.169606

Isha Mehra, Naveen K. Nishchal. Wavelet-based image fusion for securing multiple images through asymmetric keys. Optics Communications. Volume 335, 15 January 2015, Pages 153-160.

DOI: https://doi.org/10.1016/j.optcom.2014.09.050

M.A. Ben Farah, R. Guesmi, A. Kachouri, M. Samet. A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation. Optics & Laser Technology. Volume 121, January 2020, 105777.

DOI: https://doi.org/10.1016/j.optlastec.2019.105777

Prakash Singh, Kedar Nath Singh, Amit Kumar Singh, Amrit Kumar Agrawal. Deep learning-based image encryption techniques: Fundamentals, current trends, challenges and future directions. Neurocomputing. Volume 612, 7 January 2025, 128714.

DOI: https://doi.org/10.1016/j.neucom.2024.10.017

Kirtee Panwar, Sonal Kukreja, Akansha Singh, Krishna Kant Singh. Towards Deep Learning for Efficient Image Encryption. Procedia Computer Science. Volume 218, 2023, Pages 644-650.

DOI: https://doi.org/10.1016/j.procs.2023.12.091

S.M.Bilan, Evolution of two-dimensional cellular automata. New forms of presentation, Ukrainian Journal of Information Technologies, 2021, Vol. 3, No. 1: 85-90.

DOI: https://doi.org/10.4108/eai.27-7-2020.163249

Stepan Bilan, Operators for Edge Detection in an Image Based on Technologies of Cellular Automata. International Conference "Information Technology and Interactions" (IT&I-2022). Workshops Proceedings Kyiv, Ukraine, 2022. Vol. 3384 P. 142-150.

DOI: https://doi.org/10.1109/IT&I52851.2022.9522423

Nashat Al-Bdour, Ayman M Mansour. Optimal Steganographic Method Based on Image Encryption. PRZEGLĄD ELEKTROTECHNICZNY, ISSN 0033-2097, R. 97 NR 6/2021.

DOI: https://doi.org/10.22059/jcsp.2021.320425.675688

Al-Zoubi, et al. (2023). The influence of soft and hard quality management practises on quality improvement and performance in UAE higher education. International Journal of Data Science 11 3.

DOI: https://doi.org/10.22059/ijds.2023.321215.674872

Al-Zoubi, et al. (2023). The impacts of task technology fit, transparency, and supply chain agility on the blockchain adoption by SMEs in Jordan. International Journal of Data Science 11 3.

DOI: https://doi.org/10.1016/j.ijds.2023.311200

Al-Zoubi, et al. (2023). Critical Success Factors for Business Intelligence as well as Bank Performance in Jordan. Uncertain Supply Chain Management 11 3.

DOI: https://doi.org/10.22059/usc.2023.321520.674982

Saleem Issa Al-Zoubi, Mahdi H. Miraz (2024). Enhancing Robot Navigation Efficiency Using Cellular Automata with Active Cells, Annals of Emerging Technologies in Computing (AETiC) Vol. 8, No. 2, 2024.

Ghaleb Abu Rummana , Abdel Rahman Alkhazalib, Shemseddine Ethani Barnatc , Saleem Alzoubid. The contemporary management accounting practices adoption in the public industry: Evidence from Jordan, International Journal of Data and Network Science 8 (2024) 1237–1246.

Saleem Issa Al-Zoubi (2021). New Architecture of Storage for Network Security and Identify Data Security Issues in Cloud Computing, Multicultural Education Volume 7, Issue 3, 2021

Downloads

Published

2025-01-24

Issue

Section

Original

How to Cite

1.
Alzoubi S. Image encryption based on simple shift, permutation and transformation operations on bit layers. Data and Metadata [Internet]. 2025 Jan. 24 [cited 2025 Mar. 12];4:690. Available from: https://dm.ageditor.ar/index.php/dm/article/view/690