Skip to main content
Log in

Image encryption algorithm based on cross-scrambling and rapid-mode diffusion

  • Original article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

An efficient encryption algorithm largely depends on the chaotic performance of chaotic map. The stronger the chaotic performance of chaotic map, the higher the security of the algorithm. For the purpose of improving the chaotic performance, we put forward a novel two-dimensional Sine-embedded-coupling map (2D-SECM) in this paper. By comparing with other 2D chaotic maps, 2D-SECM has more excellent pseudo-random characteristics, unpredictability, and wider range of chaos. For the purpose of studying its application, we put forward an image encryption approach based on 2D-SECM (SECM-IEA). SECM-IEA includes bit-level scrambling based on cross-transform and a round of fast diffusion processing. Simulation experiment and security evaluation reveal that SECM-IEA can resist common types of attacks and has more excellent security than some algorithms. It is demonstrated that SECM has better chaotic performance from the perspective of encryption performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

Data availability

Data will be made available on reasonable request.

References

  1. Bhattacharjee, T., Maity, H.K., Maity, S.P.: On FPGA implementation in medical secret image sharing with data hiding. Multimed. Tools Appl. 81(13), 18755–18781 (2022)

    Article  Google Scholar 

  2. Yang, C.H., Weng, C.Y., Chen, J.Y.: High-fidelity reversible data hiding in encrypted image based on difference-preserving encryption. Soft Comput. 26(4), 1727–1742 (2022)

    Article  Google Scholar 

  3. Wang, X.Y., Zhao, M.C.: An image encryption algorithm based on hyperchaotic mapping and DNA coding. Opt. Laser Technol. 143, 107316 (2021)

    Article  Google Scholar 

  4. Hosny, K.M., Kamal, S.T., Darwish, M.M.: A color image encryption technique using block scrambling and chaos. Multimed. Tools Appl. 81(1), 505–525 (2022)

    Article  Google Scholar 

  5. Wang, X.Y., Chen, X.: An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos Solitons Fractals 147, 110962 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  6. Khan, J.S., Kayhan, S.K.: Chaos and compressive sensing based novel image encryption scheme. J. Inf. Secur. Appl. 58, 102711 (2021)

    Google Scholar 

  7. Shi, Y.D., Hu, Y.A., Wang, B.: Image encryption scheme based on multiscale block compressed sensing and Markov model. Entropy 23(10), 1297 (2021)

    Article  Google Scholar 

  8. Zhang, X., Ye, R.S.: A novel RGB encryption algorithm based on DNA sequences and chaos. Multimed. Tools Appl. 80(6), 8809–8833 (2021)

    Article  Google Scholar 

  9. Zheng, J.Y., Liu, L.F.: Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map. IET Image Proc. 14(11), 2310–2320 (2020)

    Article  Google Scholar 

  10. Devi, R.S., Thenmozhi, K., Rayappan, J.B.B., Amirtharajan, R., Praveenkumar, P.: Entropy influenced RNA diffused quantum chaos to conserve medical data privacy. Int. J. Theor. Phys. 58(6), 1937–1956 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  11. Wang, X.Y., Gao, S.: Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16–36 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  12. Wang, X.Y., Gao, S.: Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf. Sci. 539, 195–214 (2020)

    Article  MathSciNet  MATH  Google Scholar 

  13. Murali, P., Niranjana, G., Paul, A.J., Muthu, J.S.: Domain-flexible selective image encryption based on genetic operations and chaotic maps. Vis. Comput. (2022). https://doi.org/10.1007/s00371-021-02384-z

    Article  Google Scholar 

  14. Kaur, M., Singh, D., Kumar, V.: Improved seven-dimensional (i7D) hyperchaotic map-based image encryption technique. Soft Comput. 26(6), 2689–2698 (2022)

    Article  Google Scholar 

  15. Cheng, S.S., Sun, J.R., Xu, C.: A color image encryption scheme based on a hybrid cascaded chaotic mapping. Int. J. Bifurc. Chaos 31(9), 2150125 (2021)

    Article  MATH  Google Scholar 

  16. Zhang, S.J., Liu, L.F.: A novel image encryption algorithm based on SPWLCM and DNA coding. Math. Comput. Simul. 190, 723–744 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  17. Li, T., Du, B.X., Liang, X.W.: Image encryption algorithm based on logistic and two-dimensional Lorenz. IEEE Access 8, 13792–13805 (2020)

    Article  Google Scholar 

  18. Ding, Y., Duan, Z.K., Li, S.R.: 2D arcsine and sine combined logistic map for image encryption. Vis. Comput. (2022). https://doi.org/10.1007/s00371-022-02426-0

    Article  Google Scholar 

  19. Hosny, K.M., Kamal, S.T., Darwish, M.M.: A novel color image encryption based on fractional shifted Gegenbauer moments and 2D logistic-sine map. Vis. Comput. (2022). https://doi.org/10.1007/s00371-021-02382-1

    Article  Google Scholar 

  20. Dou, Y.Q., Li, M.: Cryptanalysis of a new color image encryption using combination of the 1D chaotic map. Appl. Sci. Basel 10(6), 2187 (2020)

    Article  Google Scholar 

  21. Talhaoui, M.Z., Wang, X.Y., Talhaoui, A.: A new one-dimensional chaotic map and its application in a novel permutation-less image encryption scheme. Vis. Comput. 37(7), 1757–1768 (2020)

    Article  MATH  Google Scholar 

  22. Liu, C.Y., Ding, Q.: A color image encryption scheme based on a novel 3D chaotic mapping. Complexity 2020, 3837209 (2020)

    Article  Google Scholar 

  23. Zhu, S.Q., Zhu, C.X.: Plaintext-related image encryption algorithm based on block structure and five-dimensional chaotic map. IEEE Access 7, 147106–147118 (2019)

    Article  Google Scholar 

  24. Hua, Z.Y., Zhou, Y.C., Pun, C.M., Chen, C.P.L.: 2D sine logistic modulation map for image encryption. Inf. Sci. 297, 80–94 (2015)

    Article  Google Scholar 

  25. Hua, Z.Y., Zhou, Y.C.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)

    Article  Google Scholar 

  26. Hua, Z.Y., Jin, F., Xu, B.X., Huang, H.J.: 2D logistic-sine-coupling map for image encryption. Signal Process. 149, 148–161 (2018)

    Article  Google Scholar 

  27. Zhu, H.G., Zhao, Y.R., Song, Y.J.: 2D logistic-modulated-sine-coupling-Logistic chaotic map for image encryption. IEEE Access 7, 14081–14098 (2019)

    Article  Google Scholar 

  28. Li, X.L., Ouyang, G.X., Richards, D.A.: Predictability analysis of absence seizures with permutation entropy. Epilepsy Res. 77(1), 70–74 (2007)

    Article  Google Scholar 

  29. Richman, J.S., Moorman, J.R.: Physiological time-series analysis using approximate entropy and sample entropy. Am. J. Physiol. Heart Circ. Physiol. 278, H2039–H2049 (2000)

    Article  Google Scholar 

  30. Hua, Z.Y., Zhou, Y.C., Huang, H.J.: Cosine-transform-based chaotic mapping for image encryption. Inf. Sci. 480, 403–419 (2019)

    Article  Google Scholar 

  31. Gottwald, G.A., Melbourne, I.: The 0–1 test for chaos: a review. In: Chaos detection and predictability, pp. 221–247. Springer (2016)

  32. Alvarez, G., Li, S.J.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(8), 2129–2151 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  33. Li, P.Y., Lo, K.T.: A content-adaptive joint image compression and encryption scheme. IEEE Trans. Multimed. 20(8), 1960–1972 (2018)

    Article  Google Scholar 

  34. Wang, X.Y., Zhang, M.Z.: An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf. Sci. 579, 128–149 (2021)

    Article  MathSciNet  Google Scholar 

  35. Gao, X.H.: Image encryption algorithm based on 2D hyperchaotic map. Opt. Laser Technol. 142, 107252 (2021)

    Article  Google Scholar 

  36. Wang, X.Y., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)

    Article  MathSciNet  Google Scholar 

  37. Kang, X.J., Ming, A.L., Tao, R.: Reality-preserving multiple parameter discrete fractional angular transform and its application to color image encryption. IEEE Trans. Circuits Syst. Video Technol. 29(6), 1595–1607 (2019)

    Article  Google Scholar 

  38. Mansouri, A., Wang, X.Y.: A novel block-based image encryption scheme using a new sine powered chaotic map generator. Multimed. Tools Appl. 80(14), 21955–21978 (2021)

    Article  Google Scholar 

  39. Li, T.Y., Zhang, D.Z.: Hyperchaotic image encryption based on multiple bit permutation and diffusion. Entropy 23(5), 510 (2021)

    Article  MathSciNet  Google Scholar 

  40. Wang, X.Y., Xue, W.H., An, J.B.: Image encryption algorithm based on LDCML and DNA coding sequence. Multimed. Tools Appl. 80(1), 591–614 (2021)

    Article  Google Scholar 

  41. Xian, Y.J., Wang, X.Y.: Fractal sorting matrix and its application on chaotic image encryption. Inf. Sci. 547, 1154–1169 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  42. Zhu, H.G., Dai, L.W., Liu, Y.T., Wu, L.J.: A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Math. Comput. Simul. 185, 754–770 (2021)

    Article  MathSciNet  MATH  Google Scholar 

  43. Wang, X.Y., Guan, N.N., Yang, J.J.: Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map. Chaos Solitons Fractals 150, 111117 (2021)

    Article  MathSciNet  Google Scholar 

  44. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. 1(2), 31–38 (2011)

    Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (No: MIMS20-M-02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Xuan Chen.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Chen, X. Image encryption algorithm based on cross-scrambling and rapid-mode diffusion. Vis Comput 39, 5041–5068 (2023). https://doi.org/10.1007/s00371-022-02645-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-022-02645-5

Keywords

Navigation