Abstract

Data transmission over the Internet and the personal network has been risen day by day due to the advancement of multimedia technology. Hence, it is today’s prime concern to protect the data from unauthorized access and encrypt the multimedia element as they are stored on the web servers and transmitted over the networks. Therefore, multimedia data encryption is essential. But, the multimedia encryption algorithm is complex to implement as it requires more time and memory space. For this reason, the lightweight image encryption algorithm gains popularity that requires less memory and less time along with low power or energy and provides supreme security for limited devices. In this study, we have studied the chaotic-based lightweight image encryption method. At first, we have presented a standard framework and algorithm based on two chaotic maps such as Arnold and logistic for lightweight image encryption and performed some experiments. We have analyzed different groups of images such as miscellaneous, medical, underwater, and texture. Experimentations have provided the largest entropy 7.9920 for medical image (chest X-ray), large key space 2m×m×8, and average encryption and decryption times are 3.9771 s and 3.1447 s, respectively. Besides, we have found an equal distribution of pixels and less correlation coefficients among adjacent pixels of the encrypted image. These criteria indicate an efficient image encryption method. Also, our method is efficient and less complex than the existing state-of-the-art methods.

1. Introduction

Data are very much sensitive, and its security is essential for today’s life. Data distribution over the physical medium and Internet has been increasing day by day which makes data security to become a concerning issue. Data security should avoid eavesdropping and provide confidentiality by encrypting the multimedia element. There exist several image encryption algorithms [13]. The conventional encryption algorithms such as Rivest–Shamir–Adleman (RSA), advanced encryption standard (AES), and data encryption standard (DES) are complex to implement. Hence, lightweight image encryption is required that provides enhanced security with low computational complexity. We have described the background and contributions of this work in the following sections.

1.1. Background

The lightweight encryption algorithms are based on the structure of the multimedia element on which they are stored [4]. The conventional encryption algorithm has high computational complexity and hence is not suitable for encryption. Asymmetric encryption algorithms require higher computational complexity compared to symmetric encryption algorithms, where a vector of a real number represents the image. Hence, the vector is very long as the sampling coefficients of the image are very large [5]. A digital image is a two-dimensional (2D) vector that contains pixels whose values are between 0 and 255. An image can be represented by any geometric shapes (circles/curves/lines) using these numbers [6]. So, it is very important to secure digital images. The lightweight encryption algorithm provides enhanced security among various sharing devices such as the Internet of Things- (IoT-) based applications where data security and privacy are prime concerns. Besides, information technology is rapidly developing. Hence, cloud computing spread severely in all sectors including industry, railway, commerce, and administration, where security is the most essential. Therefore, security architecture is needed in these sectors, so that unauthorized users cannot access the cloud [79]. For the last two decades, the applications of surveillance systems have been considerably increased. These systems are spread over all the places (public or private). The authenticated users identify or track the object which they want. Surveillance encryption algorithm encrypts the message or video frame to provide security [10].These IoT-based controlled applications and other applications need data security that should be provided by a lightweight image encryption method. The lightweight image encryption algorithm can be used in the cloud, surveillance systems, railway, dedicated network, Internet of Things (IoT), and medical applications.

1.2. Contributions

For protecting content from unauthorized access and distribution, an efficient image encryption technique is very important. Data privacy along with data security is a concerning issue for today’s Internet world. The lightweight image encryption method gives a promising framework by providing low computational complexity. The main contributions of this research are as follows:(i)To design a lightweight image encryption method that requires less time, less value for key transformation, and ensures lower correlation coefficients between adjacent pixels of the encrypted image(ii)To design a highly sensitive key for encrypting and decrypting images(iii)To compare our method with the existing state-of-the-art methods from various perspectives

The rest of the study is organized as follows: Section 2 describes the related literature with the problem statement. Some theories are described in Section 3. We described our proposed framework along with detailed steps of image encryption and decryption in Section 4. The experimental results are described in Section 5. Finally, we concluded our study along with future work in Section 6.

2. Literature Review and Problem Statement

This section describes the related literature of lightweight image encryption and addresses some issues that must be improved.

2.1. Literature Study

Several studies [68] have already been performed based on lightweight image encryption. In the scheme [11], a rotation matrix based on bit-level permutation and block-diffusion was proposed. At first, the host image is divided by 8 × 8 nonoverlapping blocks with a random matrix, and then, each block is transformed into an 8 × 8 × 8 three-dimensional (3D) cube-shaped binary matrix. Then, the 3D matrix is multiplied with the random matrix, and the permutation is carried out. After that, the system performs block diffusion for coping with any further statistical change of the image. The experiments show satisfactory security performance along with better robustness under several attacks. In another scheme [12], a technique based on heterogeneous bit permutation and correlated chaos was proposed for color image encryption. Here, for reducing the computational cost and improving the permutation efficiency, the heterogeneous bit permutation is used before the expanded XOR operation on three channels (red (R), green (G), and black (B)) of the color image. Then, pseudorandom sequences are generated by a one-dimensional (1D) chaotic map during the encryption process. The experiment gave secure and effective results. Besides, a novel algorithm based on bit permutation and DNA encoding was proposed by Zhang et al. [13]. At first, the hash value is calculated for an input DNA sequence, and the image is scrambled by using the chaotic sequence. The bit permutation of the image is implemented by the butterfly network, and the DNA matrix of the image is generated. For improving the security of the system, an algebraic operation with the DNA sequence is performed. Finally, the operation of the DNA sequence enhances the confusion and diffusion matrices. The experiments show that the algorithm has a large key space, strong sensitivity, and high robustness under various attacks. A lightweight chaotic image encryption algorithm for a 32 bit microcontroller was proposed for designing a real-time embedded system [14]. The performance of the algorithm is suitable for real-time applications, and its safety is observed via different studies such as randomness analysis, sensitivity analysis, encryption quality analysis, differential analysis, statistical analysis, visual analysis, and attack analysis. Besides, for railway cloud service, a lightweight authenticated encryption scheme based on a novel discrete chaotic S-box coupled map lattice (SCML) was proposed in the scheme [15]. SCML minimizes the dynamic degradation of the chaotic system, and the encryption process protects the data from unauthorized access. Also, it maintains the data integrity in one pass. The proposed scheme is secure and robust under various attacks. Besides, privacy for surveillance video is also essential. The entire video is encrypted by the region of interest (ROI) scheme. A lightweight encryption method based on layered cellular automata (LCA) for satellite applications was proposed in the scheme [16]. Here, the ROI’s are encrypted individually and stored at the camera memory and used by the individual depends on the user’s needs. Any user can see this surveillance video online without ROI in real-time, and the results show that the method is robust and secure. For mobile cloud storage, another privacy-preserving lightweight image encryption (PLIE) method was proposed in the scheme [17], where data privacy is very important. Here, the image metadata is saved in the mobile cloud by using a lightweight encryption method. User’s privacy is maintained by the process SDS (split, distribute, and scramble) in mobile. Then, the data are stored in the mobile cloud. In this case, the encryption time is reduced by 50% than the AES method. Image encryption requires a large volume of data that needs an efficient algorithm. In 2018 [18], a secure and time-efficient image encryption method was proposed based on permutation, diffusion, and multiple one-dimensional (1D) chaotic maps. Here, chaotic maps such as beta, logistic sine, logistic tent, tent-sine, and PWLCM (piece-wise linear chaotic map) are used for ensuring the security of the system. The system ensures large key space and higher information entropy that indicate improved security. The method is robust against chosen plaintext attack (CPA) and known plaintext attack (KPA). But, the system is not designed for color images. Existing cryptosystems perform permutation at the pixel level. But the pixel level permutation methods do not ensure enough security for the system. Hence, a new 3D puzzle for bit permutation along with a chaotic system for encryption was proposed in the scheme [19]. The method is secure and robust against statistical and differential attacks for diffusion and confusion.

In another scheme [20], the method first divides the color image into three channels (R, G, and B) and transposes the channels to the bit-plane. Then, the Arnold cat map (ACM) scrambles the bit-plane matrix and alternate logistic map confuse and diffuse the R, G, and B channels of the scrambled image. The system is highly secure and robust against brute-force attacks. A quantum image encryption method was proposed based on the logistic map using intrabit and interbit permutation in the scheme [21]. At first, the image is represented by the quantum model, and then, the permutation operations (intra and inter) are performed on the bit planes. The encrypted image is finally achieved by the chaotic diffusion process. The method is robust against the brute-force attacks and uniformly bit distributed and secure. For transferring the text files between embedded IoT devices, a secured and efficient, lightweight symmetric encryption method was proposed in [22]. Here, a novel tiny symmetric encryption algorithm (NTSA) is used for transferring large files with enhanced security among IoT devices. In this case, during each round of encryption, an additional key of confusion is introduced dynamically. The method is robust and secured than existing methods. Fast data sharing among various devices is increasing day by day. But it creates challenges for data security. In this regard, a Huffman coding-based lightweight encryption method for data transmission was proposed in the scheme [23]. Here, a HEliOS (Huffman compression-based encryption method using lightweight dynamic order statistic tree) method is used to transmit the digital data. The digital data is first compressed as “secret” or small-sized, so that an attacker does not decode it. The method is fast and secure for data transmission for smart devices. Another work has been developed based on permutation [24]. But, the computational complexity is not observed in this method. In 2019, Patro and Acharya [25] proposed bit-level image encryption based on 1D chaotic maps. The method can be applied to real-time applications. But, the method is not designed for color images. Another image encryption method [26] is proposed based on permutation, diffusion, chaotic, and hyperchaotic maps. For increasing privacy and security, a new encryption/decryption method [27] was proposed by integrating multiple chaotic maps. A new map is generated from this combined multiple chaotic maps, which is robust against various attacks. For good image encryption, the lowest value is selected as a correlation factor. The best correlation value of the selected chaotic map is used for image encryption and decryption. The proposed method provides satisfactory results in terms of robustness compared to existing methods. Also, the method is secure, has lower computational complexity, and provides better information entropy. The conventional image encryption algorithms ensure high security, but they are complex to calculate and slow in speed for real-time applications. For overcoming these issues, a novel image encryption algorithm with high speed was designed based on the Bülban chaotic map [28]. This chaotic map is generated by using only a limited number of rows and columns. A substitution-permutation system is designed to increase the security of the system. This procedure removes the correlation between adjacent pixels. For preventing the leakage of information, the pixel values are masked. The system is highly secure and fast by the experimental results for real-time applications. But the method is not suitable for real-time applications with high resolution of images. Zheng et al. proposed an image encryption method based on a multichaotic system and DNA coding [29]. Here, the two chaotic maps such as N2D-LSCM (two-dimensional logistic-sine coupling map) and NHenon (new Henon map) are combined. The generated two pseudorandom sequences by N2D-LSCM are used for scrambling the sequence and DNA coding matrix, respectively. Their proposed system is highly secure and robust against common image processing attacks. But the method is not suitable for color images and functioning efficiently. The traditional chaotic algorithms require more cost. Hence, in the scheme [30], a lightweight image encryption algorithm was designed based on the message passing (MP) algorithm and chaotic map. The proposed algorithm is cost-effective in terms of time and space. The adjacent pixels are interconnected to each other without any extra space cost by the MP algorithm, and the encrypted image is produced. The pseudorandom sequences are generated by the two-dimensional (2D) logistic map. The edge pixels are affected by the external message that is produced from these pseudorandom sequences. The experimental results ensure that the method is robust against various attacks, secure, cost-effective, reduces correlation coefficients between adjacent pixels of the encrypted image, and ensures a good information entropy value of 7.996749.

A secure encryption algorithm protects the images from unauthorized access. There exist various image encryption algorithms such as symmetric and asymmetric key cryptographies. A session key-based fast, secure, and lightweight image encryption method was designed by Gupta et al. [31]. The session key is generated by the genetic algorithm. The system security is ensured by the crossover and mutation operators of the genetic algorithm. The method is suitable for both grayscale and color images and outperforms better than existing methods. But the method is not designed for the devices based on the Internet of Things (IoT). There exists a variation of lightweight image encryption algorithms in cost-effectiveness (time and memory space) and security. For developing these issues, a secure lightweight image encryption algorithm was designed for smart cities and IoT-enabled devices [32]. The enhanced security is achieved by increasing the block sizes, key, and number of rounds. The method is not functioning well for IoT-based devices that consume more power and memory. For resisting KPA and differential attacks, the sensitivity of high key and high plaintext is essential. An improved algorithm was designed by Lin and Wu [33] for analyzing the existing cryptographic methods based on chaotic maps and resisting the CPA. Here, the plaintext image is dependent on image encryption. In this case, an enhanced CIES-UBPRPD (chaotic map-based image encryption system using both plaintexts related permutation and diffusion) is designed to get a higher plaintext sensitivity than the original CIES-UBPRPD method. The method is secure and robust, but it requires more time to execute than the original CIES-UBPRPD method. In 2020, an image encryption method [34] was proposed based on compressive sensing and random numbers insertion. In this case, three encryption methods are required for ensuring the security of the system. The method requires less time to encrypt the image and is robust against rotation, noise, and cropping attacks. Also, the reconstructed image is good in quality. But the pixel values of the encrypted image are not equally distributed by the histogram analysis, which may lead to a statistical attack. Huang et al. [35] proposed an encryption method based on a chaotic system and 2D linear canonical transform (LCT). The method is robust and secure than the previous methods. But the method is not implemented for color images. A four-dimensional (4D) chaotic system is designed based on coexisting hidden chaotic attractors [36]. The method is secure and implemented on hardware. But the key sensitivity, correlation analysis, histogram analysis, key space, and time complexity are not observed. Ye et al. [37] proposed an encryption method based on quaternion discrete fractional Hartley transform and improved pixel adaptive diffusion. The transmission load is reduced, and encryption capacity is increased. But the method is not tested for color images. In 2020, an image encryption method [38] is proposed based on permutation, diffusion, and 1D chaotic maps. The method is robust against KPA and CPA. The method evaluates the performance of various 1D chaotic maps for encrypting images. Experimental results show that 1D chaotic maps such as logistic-sine map (LSM), Kent map (KM), logistic map (LM), logistic tent map (LTM), tent map (TM), tent-sine map (TSM), and beta map (BM) ensure better security and are robust against histogram attack except for DM (dyadic map) and SPLM (sinus-power logistic map). Patro et al. [39] proposed a multiple-image encryption method based on cross-coupled chaotic maps. But the system is not tested for color images. In 2020, another image encryption method [40] is proposed based on permutation, diffusion, and PWLCM. But the method is not simulated for color images. Patro et al. [41] proposed a secure, lossless, and noise-resistive image encryption method based on chaos, hyperchaos, and DNA sequence operation. The method is robust against KPA, CPA, differential, statistical, and noise attacks. Also, the method is more secured than previous methods. But the method is not designed for color images. Medical images are transmitted through the Internet and accessed by the general public. Hence, the security of medical images is very important. For addressing this issue, a medical image encryption method [42] is proposed based on a logistic map, DNA (deoxyribonucleic acid) sequence, and IWT (integer wavelet transform). The method ensures better security than the existing methods and is robust against brute-force attacks. But the system is not designed for color images. Another medical image security system is proposed based on Chua’s diode and strange attractor [43]. This system is implemented on a three-layer hardware-software-based interface. But the method does not use any chaotic map for encrypting images. It needs a large storage for storing the medical image. For addressing this issue, in 2020, Lakshmi et al. [44] proposed a medical image encryption method in a cloud platform based on HNN (Hopfield neural network). The method ensures improved security than the existing methods. Also, the method is robust against CPA. But, the conventional chaotic maps are not used in this method. In 2021, an efficient medical image encryption method is proposed based on IWT, DNA computing, and chaos [45]. The method is robust against KPA and CPA. But, it is not implemented for color images.

2.2. Problem Statement

From the discussions of Section 2.1, we can conclude(i)Some encryption algorithms are slow, while some require more time to execute(ii)Some algorithms are not suitable for IoT devices and real-time applications(iii)Some are less robust against plaintext and differential attacks(iv)Also, some algorithms are limited by image type and complex to calculate(v)Besides, most of the existing lightweight image encryption algorithms have low plaintext sensitivity and are not functioning well for images with high resolution

We are motivated by the above limitations in developing an optimized framework for lightweight image encryption by combining Arnold and logistic maps.

3. Theoretical Background

The chaotic map is an evolution function that displays the chaotic behavior in terms of continuous-time or discrete-time parameters [46]. There exist some chaotic maps such as Arnold cat map, basin chaotic map, circle map, Chen-Lee system, complex cubic map, exponential map, Gauss map, Henon map, and logistic map. These maps are used in a dynamic system. This section keeps an eye on the theoretical background of our used two chaotic maps.

3.1. Arnold’s Chaotic Map

Arnold’s chaotic map is a chaotic map mathematically generated from a revolving surface, discovered by Vladimir Arnold [47]. This surface (or torus) is created by rotating a circle in 3D space. This chaotic map is the transformation , where T2 is the torus. In matrix notation, this can be written by the following equation:where x and y are the row and columns of the matrix, respectively.

3.2. Logistic Chaotic Map

The logistic map is one of the chaotic maps and a polynomial function of degree 2 [48]. In this case, the chaotic behavior is generated from the nonlinear system. In mathematics, this map can be written by the following nonlinear equation:where xn is the ratio between the existing population and maximum population and 0 < xn < 1. r is the parameter whose value is between 0 and 4.

4. Research Method

This section discusses the proposed framework and the detailed steps of image encryption and decryption algorithms.

4.1. Proposed Framework

At first, the Arnold map is applied to the plain (or host) image. Then, the parameters for the logistic map are selected. After then, the cipher (or encrypted) image is generated. The image decryption is performed in a reverse way. The above-discussed framework is shown in Figure 1(a). The flowchart for finding the best parameter for the logistic map is illustrated in Figure 1(b). At first, the parameter is initialized, and the estimation function is calculated. If the termination occurs, then the method will be stopped. Otherwise, the mutation occurs, and a looping condition is generated for calculating the estimated function.

4.2. Detailed Steps of Image Encryption and Decryption

The image encryption and decryption phases of the proposed method are simple. The detailed algorithms for image encryption and decryption are shown in Algorithms 1 and 2, respectively. The genetic algorithm is used to find the optimum initial value for the logistic map, which is shown in step 2 in Algorithm 1. For the Arnold method, there is one parameter, and for logistic, there are two parameters: , which is the initial value and , which is the control variable. AEncrypt and LEncrypt are the processes related to the Arnold and logistic encryptions, respectively. LDecrypt and ADecrypt are related to the decryption for logistic and Arnold maps, respectively.

Input: original image,
Output: encrypted image, , and key,
Step 1: select Arnold parameter: user generated a random value for Arnold encryption.
Step 2: select as random value for the logistic map
Select best parameter (initial value) for the logistic map, which is
  for
     
    
   if
     
    else
       
   end
  end
Step 3:
    
       
Input: encrypted image, and key,
Output: original image,
Step 1: extract as
Step 2: decrypt by logistic map:
  
Step 3: decrypt by Arnold map:
  

Suppose our image is 3 × 3 in dimensional and the image has the following pixel values. The pixel values are shown in Figure 2(a). We have encrypted the pixels of this figure by our proposed method. The total steps are described as follows:

4.2.1. Select Arnold Parameter

This step is completely independent of image type and size. In this step, the user generates an Arnold parameter () for shuffling the image. Let the selected value for is 10.

4.2.2. Select Best Parameter for Logistic Map

In this step, the optimization algorithm is used to find the best initial value for the logistic map. The range for the initial value is between 0 and 1. Depending on this initial value, the chaotic series is generated. For a chaotic map, there exist two values: one initial value, , and another chaotic control variable, . At first, the user randomly chooses r from the range (0–4). Then, the best is chosen by the genetic algorithm. For 0.1, we get the entropy of 3.1699 for Figure 2, and this is the best entropy.

4.2.3. Get Entropy and Coefficient Values

Then, we have encrypted the pixels of Figure 2(a) by Arnold parameter 10 and got the horizontal coefficient of 0.3298. After then, the logistic parameter 0.1 is used for encrypting the image, and the encrypted pixel values are generated. This is shown in Figure 2(b). In this case, the values of entropy and horizontal coefficient are 3.1699 and −0.1558, respectively.

Hence, by combining Arnold with a logistic map, the image information entropy is not increased. But this combination decreases the correlation coefficient between adjacent pixels, which is one of the important parameters for an ideal image encryption system. Therefore, we can select the best parameter for information entropy.

5. Experimental Results

The experiment has been performed in MATLAB R2016, an environment with a computer of core i7, 2.90 GHz processor, and 16 GB RAM. We have used four groups of images for conducting our experiment. The image groups are miscellaneous, medical, underwater, and texture images. Miscellaneous (lena and baboon) images are taken from the USC-SIPI (the University of Southern California-Signal and Image Processing Institute) image database [49]. The chest X-ray and ECG signals belonging to medical images are taken from the Chest X-ray Images (pneumonia) database [50] and ECG heartbeat categorization dataset [51], respectively. Underwater-like fish species and marine animal images are taken from the fish species image dataset [52] and the brackish dataset [53], respectively. Also, the texture (straw and grass) images are taken from the USC-SIPI image database [49].

We have chosen two images from each group. Each image is divided into three different sizes such as 128 × 128, 256 × 256, and 512 × 512 pixels. We have applied Arnold, logistic, Arnold + logistic, and (half Arnold + half logistic) maps to our host image “Lena” of size 512 × 512, which is shown in Figure 3. Here, for each map, the original image size is 79 kB. We have seen that the size of the encrypted image for the Arnold map, which is 253 kB, is lower than the other chaotic maps. The encryption and decryption times in second (s) are increased for all the methods except logistic map and half Arnold + half logistic, which are 0.8147 s and 0.8638 s and 4.6695 s and 4.5395 s, respectively. Therefore, we can say that the logistic map requires less time to encrypt and decrypt the host image than other chaotic maps.

However, this section discusses various analyses such as entropy analysis, histogram analysis, correlation analysis, key sensitivity analysis, key space analysis, and computational complexity analysis. At the end of this section, our proposed method is compared with existing lightweight image encryption methods. We have compared our results with existing state-of-the-art methods by complexity analysis, statistical analysis, and correlation coefficients analysis of the encrypted image.

5.1. Entropy Analysis

Information entropy measures the uncertainty or randomness of an encryption system. It is the significant criterion of a standard encryption algorithm. Usually, a higher information entropy value produces a better encryption algorithm. In our proposed method, we have combined Arnold and logistic chaotic maps. The optimization technique is used for getting the best initial value for a chaotic map. Based on our method, Table 1 provides some statistical data for different groups of images with different sizes. It includes image types, image name, image size, NPCR (number of changing pixel rate), UACI (unified averaged changed intensity), PSNR (peak signal-to-noise ratio), MSE (mean squared error), and entropy of the encrypted image. From this table, our observations are as follows:(i)When the image size is increased, the largest NPCR, UACI, and entropy values are found, but the PSNR values are the least. This indicates an efficient image encryption technique.(ii)General (miscellaneous) images get the least entropy than other images

5.2. Histogram Analysis

A perfect image encryption technique divides the encrypted image into equal frequency. Therefore, the attacker gets only a little information from the encrypted image. The image histogram represents an image by the total number of pixels for each tonal value. The histograms of several general original and encrypted images are shown in Figures 4 and 5, respectively. From the original histogram, we get an idea about the frequency of pixels. But there is approximately equal distribution of pixels for encrypted images. Hence, the attacker cannot get any information from the histograms of the encrypted images.

5.3. Correlation Analysis

The correlation identifies the relationship between adjacent pixels of the image. For an original image, there is a relationship between adjacent pixels. From Figures 6(a)–6(d), we have seen that the pixels are so much close to each other. This criterion defines the tightly correlated image. But for Figures 7(a)–7(d), there exists no relationship between pixels. Therefore, the pixels are not so much close to each other. Rather, they are equally distributed into the whole places of the image.

Table 2 provides the correlation coefficients between adjacent pixels for different groups of images. We have measured the correlation coefficients between adjacent pixels in horizontal, vertical, diagonal, and antidiagonal directions. The correlation coefficients of encrypted images are decreased for each image of three different sizes. Hence, there exists less relation between adjacent pixels of the encrypted image. Therefore, it is difficult for an attacker to guess about the neighborhood pixel values of the encrypted image. Also, less correlation indicates that the proposed method is robust against statistical attack [54]. These criteria indicate an efficient image encryption method.

5.4. Key Sensitivity Analysis

A good image encryption system is very much sensitive to the key. A little bit of change in the input key has a larger impact on the encryption system. In Figure 8, we have encrypted an image with the key, K. To check the image’s sensitivity, we have also encrypted the image with two other keys: K1 and K2. The generated images are shown in Figures 8(b) and 8(c), respectively. The difference between these two images is shown in Figure 8(d), which is close to a black image that means a significant difference occurs. On the other hand, we have encrypted the host image of Figure 8(a) by the original key, K, which is shown in Figure 8(e). The encrypted image of Figure 8(e) is decrypted with two other keys: K1 and K2, which are seen in Figures 8(f) and 8(g), respectively. These generated two images are completely different from the encrypted image. The difference between these two generated images is shown in Figure 8(h). This image is also a black image that means a significant difference occurs. Therefore, the proposed method is very much sensitive for both encryption and decryption keys. Hence, our proposal is an ideal image encryption method.

5.5. Key Space Analysis

For resisting the brute force attacks, the key space of an image should be large enough. But, we have to remember about the speed. There is a relationship between speed and key size. We have mainly two keys: one for the Arnold map and another for the logistic map. The parameter for the Arnold map is chosen randomly for the user-defined domain, µ, and the parameter for the logistic map is chosen from 0-1. The value is increased by 0.1, and then, the series of the logistic map is mapped by a user-defined another domain λ. This domain is completely secret, and only the sender knows about it. Even the receiver does not know about this domain. From the logistic map, we have generated the logistic series with the size of m × m. This size is the same as to image size. So, there exist m × m × 8 bits only for the logistic map. Hence, there are 2m×m×8 ways only for the logistic map, which is very large from the cryptographic perspective. Thus, it is not possible for the attacker to find the key easily. Therefore, our system is robust against brute-force attacks and indicates an efficient image encryption method.

5.6. Computational Complexity Analysis

We have analyzed for computational complexity in terms of time for different groups of images. When the image size is increased, the image encryption and decryption times in second (s) have been increased. But the growth rate for image encryption time is greater than the image decryption time. For selecting the best initial value, we must run an optimization algorithm. The encryption and decryption times are independent of the image type. But these times are dependent on the image size. This analysis is given in Table 3. From this table, we have observed that there exists a little bit of difference between encryption and decryption time. It takes time to find out the best parameter for the chaotic map in encryption, which is dependent on the image. On the other hand, the value of the parameter for the chaotic map was already known in the decryption phase. Hence, it requires more time to encrypt the images than to decrypt.

5.7. Comparison with Existing State-of-the-Art Methods

We have compared our proposed method with existing lightweight image encryption methods. The computational complexity of our proposed method is compared with existing methods, which is given in Table 4. We have seen that our method requires less time in total in second (s) to execute than existing methods [20, 30]. Method [14] is a hardware-based encryption system. So, it is fast. On the other hand, the encryption time for the image of size 256 × 256 for method [31] is also less than our method, as method [31] applies the genetic algorithm on the key. But we have used this optimization algorithm on the image, which is more applicable. Method [33] uses a more advanced personal computer (PC) than us that is configured with Intel Core i7, 3.2 GHz processor, and 32 GB RAM. Hence, it takes less time to execute. The statistical parameters indicate the system’s security, which are given in Table 5. We have seen that NPCR, UACI, and entropy values are not satisfied with the previous methods. It is because of using the plain chaotic map to encrypt the image in our method. The values of correlation coefficients between adjacent pixels of the encrypted image are given in Table 6. From this table, we can say that for using the Arnold map, our correlation values getting lower than most of the existing methods except methods [20, 24] and [33] because methods [20, 33] use color images where the values are more changed. Method [24] uses bit-level permutation along with a chaotic map for image encryption. Therefore, these methods exhibit fewer correlation coefficients between adjacent pixels of the encrypted image.

Therefore, from the above discussions, we can say that the overall performance of our proposed method is good enough because fewer values are required to be transformed as the key, which is one of the important properties of the lightweight cryptosystem.

6. Conclusions and Future Works

Usual multimedia encryption algorithms require more time and memory space. For this reason, the lightweight image encryption algorithm gains wide acceptance, as it requires less memory and less time along with high security. With this view, here, we have proposed an optimized framework by combining two chaotic encrypting methods such as Arnold and logistic maps. We have performed experimental analysis and obtained satisfactory results. Our proposal is very much sensitive to the secret key. The attacker does not get any information from the encrypted image. Also, the proposed method is robust against brute force attacks and requires less time to execute than the existing methods. It also requires less value to transform the key, which ensures an efficient lightweight image encryption method. Besides, the method provides lower correlation coefficients between adjacent pixels of the encrypted image than other methods, indicating an efficient image encryption system. But the statistical parameter values are less than the existing methods because of using the plain chaotic map. The more the values of statistical parameters are, the more the system will be secured. Arnold’s chaotic map has a disadvantage like a periodicity. Besides, the logistic chaotic map has the characteristic of simplicity but not ergodicity, as well as it has a short chaotic range of 3.57–4.0. In the future, we will try to increase the values of statistical parameters by combining improved Arnold chaotic map and logistic-sine map or logistic-tent map or tent-sine map or piece-wise linear chaotic map for increasing the security level of the system. By observing histogram images, it is found that the grayscale pixel values are not properly uniformed. So, there may be a chance of a statistical attack. Subsequently, we will analyze our proposal for different attacks such as statistical, noise, and occlusion attacks to test the robustness. We will perform histogram variance analysis and chi-square test analysis to measure the grayscale uniformity quantitatively. For this, we will compare our proposal for robustness with existing state-of-the-art methods to prove our method a better one. After that, we will analyze the time complexity of our proposal step-by-step. Also, the proposed method can be implemented for color images in the future.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Authors’ Contributions

All authors have contributed equally to write this manuscript.

Acknowledgments

The authors are thankful to the Information and Communication Technology Division of the Government of the People’s Republic of Bangladesh for a Ph.D. fellowship to Mahbuba Begum.