Skip to main content

An Image Encryption Method Using Henon Map and Josephus Traversal

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2018)

Abstract

Image security is a vital issue in multimedia communications. Chaos based image encryption has become very popular now a days due to the properties of chaotic systems such as unpredictability, ergodicity and sensitivity to initial conditions. This paper proposes a chaos based image encryption technique for gray scale images. Image pixels are scrambled using Josephus permutation sequence and Henon map is used in diffusion process. Encrypted image is obtained through permutation and diffusion process. Security analysis shows that the proposed encryption scheme can accomplish good encryption results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Xu, L., Li, Z., Li, J., Hua, W.: A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng. 78, 17–25 (2016)

    Article  Google Scholar 

  2. Zhang, W., Wong, K., Yu, H., Zhu, Z.: An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Commun. Nonlinear Sci. Numer. Simul. 18(8), 2066–2080 (2013)

    Article  MathSciNet  Google Scholar 

  3. Wang, X., Jin, C.: Image encryption using game of life permutation and PWLCM chaotic system. Opt. Commun. 285(4), 412–417 (2012)

    Article  Google Scholar 

  4. Ye, G., Huang, X.: An image encryption algorithm based on autoblocking and electrocardiography. IEEE MultiMed. 23(2), 64–71 (2016)

    Article  Google Scholar 

  5. Wu, X., Zhu, B., Hu, Y., Ran, Y.: A novel color image encryption scheme using rectangular transform-enhanced chaotic tent maps. IEEE Access 5, 6429–6436 (2017)

    Google Scholar 

  6. Hua, Z., Zhou, Y.: Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  7. Ye, R., Ma, Y.: A secure and robust image encryption scheme based on mixture of multiple generalized Bernoulli shift maps and Arnold maps. Int. J. Comput. Netw. Inf. Secur. 5(7), 21 (2013)

    Google Scholar 

  8. Hu, Y., Zhu, C., Wang, Z.: An improved piecewise linear chaotic map based image encryption algorithm. Sci. World J. (2014)

    Google Scholar 

  9. Nasir, Q., Abdlrudha, H.H.: High security nested PWLCM chaotic map bit-level permutation based image encryption. Int. J. Commun. Netw. Syst. Sci. 5(09), 548 (2012)

    Google Scholar 

  10. Abdlrudha, H.H., Nasir, Q.: Low complexity high security image encryption based on nested PWLCM chaotic map. In: 2011 International Conference for Internet Technology and Secured Transactions (ICITST), pp. 220–225. IEEE (2011)

    Google Scholar 

  11. Fu, C., Zhang, Z., Chen, Y., Wang, X.: An improved chaos-based image encryption scheme. In: International Conference on Computational Science, pp. 575–582. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Niyat, A.Y., Moattar, M.H., Torshiz, M.N.: Color image encryption based on hybrid hyper-chaotic system and cellular automata. Opt. Lasers Eng. 90, 225–237 (2017)

    Article  Google Scholar 

  13. Norouzi, B., Mirzakuchaki, S.: A fast color image encryption algorithm based on hyper-chaotic systems. Nonlinear Dyn. 78(2), 995–1015 (2014)

    Article  Google Scholar 

  14. Zhu, C.: A novel image encryption scheme based on improved hyperchaotic sequences. Opt. Commun. 285(1), 29–37 (2012)

    Article  Google Scholar 

  15. DeSheng, X., Yueshan, X.: Digital image scrambling based on Josephus traversing. Comput. Eng. Appl. 10 (2005)

    Google Scholar 

  16. Ye, G., Huang, X., Zhu, C.: Image encryption algorithm of double scrambling based on ASCII code of matrix element. In: 2007 International Conference on Computational Intelligence and Security, pp. 843–847. IEEE (2007)

    Google Scholar 

  17. Yang, G., Jin, H., Bai, N.: Image encryption using the chaotic Josephus matrix. Math. Probl. Eng. (2014)

    Google Scholar 

  18. Wang, X., Zhu, X., Zhang, Y.: An image encryption algorithm based on Josephus traversing and mixed chaotic map. IEEE Access 6, 23733–23746 (2018)

    Article  Google Scholar 

  19. Furht, B., Kirovski, D. (eds.): Multimedia Security Handbook. CRC Press, Boca Raton (2004)

    Google Scholar 

  20. Milnor, J.: On the concept of attractor. In: The Theory of Chaotic Attractors, pp. 243–264. Springer, New York (1985)

    Chapter  Google Scholar 

Download references

Acknowledgments

The authors acknowledge the support extended by DST-PURSE (Phase II), Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. U. Shahna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shahna, K.U., Mohamed, A. (2019). An Image Encryption Method Using Henon Map and Josephus Traversal. In: Abraham, A., Gandhi, N., Pant, M. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2018. Advances in Intelligent Systems and Computing, vol 939. Springer, Cham. https://doi.org/10.1007/978-3-030-16681-6_37

Download citation

Publish with us

Policies and ethics