Abstract
In the present era, the non-linear and dynamic phenomenon of chaos play a vital role in image encryption. In this paper, we proposes a new image encryption method based on cubic map and Hénon map. The cubic map is employed and combined with affine transformation in substitution phase. The key expansion technique is built up with the Hénon map. Finally, the encryption process incorporates the Nonlinear key mixing (Nmix) function which enables to propagate the bit-pattern from \(n^{th}\) ciphered pixel to \((n+1)^{th}\) ciphered pixel. The performance of the scheme has been successfully verified by several well known statistical attacks, differential attacks, and brute force search. Moreover, in comparative studies the proposed scheme has confirmed its potential with respect to related existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
De, S., Bhaumik, J., Giri, D.: A secure image encryption scheme based on three different chaotic maps. Multimedia Tools Appl. 81, 5485–5514 (2021). https://doi.org/10.1007/s11042-021-11696-0
Musanna, F., Dangwal, D., Kumar, S., Malik, V.: A chaos-based image encryption algorithm based on multiresolution singular value decomposition and a symmetric attractor. Imaging Sci. J. 68(1), 24–40 (2020)
Sheela, S.J., Suresh, K.V., Tandur, D.: Image encryption based on modified Henon map using hybrid chaotic shift transform. Multimedia Tools Appl. 77(19), 25223–25251 (2018). https://doi.org/10.1007/s11042-018-5782-2
Ahmad, J., Hwang, S.O.: A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools Appl. 75(21), 13951–13976 (2015). https://doi.org/10.1007/s11042-015-2973-y
Tong, X.J., Wang, Z., Zhang, M., Liu, Y., Xu, H., Ma, J.: An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn. 80(3), 1493–1508 (2015). https://doi.org/10.1007/s11071-015-1957-9
Seyedzadeh, S.M., Norouzi, B., Mosavi, M.R., Mirzakuchaki, S.: A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn. 81(3), 511–529 (2015). https://doi.org/10.1007/s11071-015-2008-2
Zhang, X., Mao, Y., Zhao, Z.: An efficient chaotic image encryption based on alternate circular S-boxes. Nonlinear Dyn. 78(1), 359–369 (2014). https://doi.org/10.1007/s11071-014-1445-7
Zhang, X., Zhao, Z., Wang, J.: Chaotic image encryption based on circular substitution box and key stream buffer. Signal Process. Image Commun. 29(8), 902–913 (2014)
Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)
Taneja, N., Raman, B., Gupta, I.: Combinational domain encryption for still visual data. Multimed Tools Appl. 59, 775–793 (2012)
Taneja, N., Raman, B., Gupta, I.: Chaos based cryptosystem for still visual data. Multimed Tools Appl. 61, 281–298 (2012)
Taneja, N., Raman, B., Gupta, I.: Chaos based partial encryption of SPIHT compressed images. Int. J. Wavelets Multiresolut. Inf. Process. 9(2), 317–331 (2011)
Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidisc. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 1, 31–38 (2011)
Bhaumik, J., Chowdhury, D.R.: Nmix: an ideal candidate for key mixing. In: Proceedings of International Conference on Security and Cryptography (SECRYPT), Milan, Italy, pp. 285–288 (2009)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcation Chaos 16(8), 2129–2151 (2006)
Stinson, D.: Cryptography: Theory and Practice, 2nd edn. CRC/C &H, Boca Raton (2002)
Rogers, T.D., Whitley, D.C.: Chaos in the cubic mapping. Math. Model. 4(1), 9–25 (1983)
Hénon, M.: A two-dimensional mapping with a strange attractor. Commun. Math. Phys. 50(1), 69–77 (1976)
University of California, San Diego, “STARE Image Database". https://cecas.clemson.edu/ahoover/stare/, Accessed 02 May 2018
Nottingham Trent University, UK, “UCID Image Database". http://jasoncantarella.com/downloads/ucid.v2.tar.gz, Accessed 02 May 2018
University of Southern California, “The USC-SIPI Image Database". http://sipi.usc.edu/database/database.php, Accessed 02 May 2018
Funt, et al.: HDR Dataset Computational Vision Lab Computing Science, Simon Fraser University, Burnaby, BC, Canada. http://www.cs.sfu.ca/colour/data/funt_hdr/, Accessed 02 May 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
De, S., Bhaumik, J., Giri, D. (2022). A New Image Encryption Based on Two Chaotic Maps and Affine Transform. In: Mukhopadhyay, S., Sarkar, S., Dutta, P., Mandal, J.K., Roy, S. (eds) Computational Intelligence in Communications and Business Analytics. CICBA 2022. Communications in Computer and Information Science, vol 1579. Springer, Cham. https://doi.org/10.1007/978-3-031-10766-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-10766-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-10765-8
Online ISBN: 978-3-031-10766-5
eBook Packages: Computer ScienceComputer Science (R0)