Skip to main content
Log in

An image encryption algorithm based on circular rotation and generalized Feistel structure

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

This paper proposes a new and improved one-dimensional chaotic system (1DL-SCS). After performance testing, it is verified to have better chaotic performance and a larger range of parameters. Based on this, a new image encryption algorithm is proposed. First, the chaotic sequences generated by the hyper-chaotic Chen system are used to perform twice circular rotations for achieving efficient global scrambling. Then we index scramble the image by row using 1DL-SCS and redistribute the pixel points by column, which further breaks the correlation between image pixels and prepares for diffusion. In the diffusion stage, the plaintext is divided into four parts for processing with the improved generalized Feistel structure, and the plaintext sequence in the round function is further divided into two parts, which greatly improves the diffusion efficiency. Through two rounds of iterative operations, a good diffusion effect can be achieved efficiently. Simulation experiment and performance analysis indicates that the algorithm has outstanding advantages such as excellent ciphertext statistical characteristics, and strong resistance to chosen plaintext attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23

Similar content being viewed by others

Data availability

Enquiries about data availability should be directed to the authors.

References

  • Anees A, Siddiqui AM, Ahmed F (2014) Chaotic substitution for highly autocorrelated data in encryption algorithm. Commun Nonlinear Sci Numer Simul 19(9):3106–3118

    ADS  MathSciNet  MATH  Google Scholar 

  • Berger TP, Francq J, Minier M, Thomas G (2015) Extended generalized Feistel networks using matrix representation to propose a new lightweight block cipher: Lilliput. IEEE Trans Comput 65(7):2074–2089

    MathSciNet  MATH  Google Scholar 

  • Brahim AH, Pacha AA, Said NH (2020) Image encryption based on compressive sensing and chaos systems. Opt Laser Technol 132:106489

    MATH  Google Scholar 

  • Chai XL, Zheng XY, Gan ZH, Han DJ, Chen YR (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144

    MATH  Google Scholar 

  • Chai XL, Fu XL, Gan ZH, Lu Y, Chen YR (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    MATH  Google Scholar 

  • Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence. Opt Lasers Eng 56:83–93

    MATH  Google Scholar 

  • Enayatifar R, Abdullah AH, Isnin IF, Altameem A, Lee M (2017) Image encryption using a synchronous permutation-diffusion technique. Opt Lasers Eng 90:146–154

    Google Scholar 

  • Fu C, Chen Z F, Zhao W, Jiang HY (2017) A new fast color image encryption scheme using Chen chaotic system. In: 2017 18th IEEE/ACIS international conference on software engineering, artificial intelligence, networking and parallel/distributed computing (SNDP 2017), pp 121–126

  • Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    MATH  Google Scholar 

  • Kalpana J, Murali P (2015) An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Optik Int J Light Electron Opt 126(24):5703–5709

    CAS  MATH  Google Scholar 

  • Kaneko K (1989) Pattern dynamics in spatiotemporal chaos: Pattern selection, diffusion of defect and pattern competition intermittency. Physica D 34(1–2):1–41

    ADS  MathSciNet  MATH  Google Scholar 

  • Lakshmi C, Thenmozhi K, Rayappan JBB, Amirtharajan R (2020) Hopfield attractor-trusted neural network: an attack-resistant image encryption. Neural Comput Appl 32(15):11477–11489

    Google Scholar 

  • Li YX, Tang WKS, Chen GR (2005) Generating hyperchaos via state feedback control. Int J Bifurc Chaos 15(10):3367–3375

    MATH  Google Scholar 

  • Li XD, Zhou CL, Xu N (2018) A secure and efficient image encryption algorithm based on DNA coding and spatiotemporal chaos. Int J Netw Secur 20(1):110–120

    ADS  CAS  MATH  Google Scholar 

  • Li XS, Xie ZL, Wu J, Li TY (2019) Image encryption based on dynamic filtering and bit cuboid operations. Complexity 2019:1–16

    MATH  Google Scholar 

  • Liao X, Li KD, Yin JJ (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimedia Tools Appl 76(20):20739–20753

    MATH  Google Scholar 

  • Liu X, Song YR, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network. Int J Bifurc Chaos 29(2):1950016

    MathSciNet  MATH  Google Scholar 

  • Liu HJ, Wang XY, Kadir A (2021) Constructing chaos-based hash function via parallel impulse perturbation. Soft Comput 25(16):11077–11086

    MATH  Google Scholar 

  • Luo YL, Du MH, Liu JX (2015) A symmetrical image encryption scheme in wavelet and time domain. Commun Nonlinear Sci Numer Simul 20(2):447–460

    ADS  MATH  Google Scholar 

  • Mansouri A, Wang XY (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46–62

    MathSciNet  MATH  Google Scholar 

  • May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261(5560):459–467

    ADS  CAS  PubMed  MATH  Google Scholar 

  • Naik K, Pal AK, Agrawal R (2018) Selective image encryption using singular value decomposition and arnold transform. Int Arab J Inf Technol 15(4):739–747

    MATH  Google Scholar 

  • Ping P, Wu JJ, Mao YC, Xu F, Fan JY (2018) Design of image cipher using life-like cellular automata and chaotic map. Signal Process 150:233–247

    MATH  Google Scholar 

  • Rajagopalan S, Poori S, Narasimhan M, Rethinam S, Kuppusamy CV, Balasubramanian R, Annamalai VMP, Rengarajan A (2020) Chua’s diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality. IET Image Proc 14(7):1354–1365

    Google Scholar 

  • Ueta T, Chen GR (2000) Bifurcation analysis of Chens equation. Int J Bifurc Chaos 10(8):1917–1931

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Chen X (2021) An image encryption algorithm based on dynamic row scrambling and Zigzag transformation. Chaos Solitons Fractals 147:110962

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Gao S (2020a) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Gao S (2020b) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Liu PB (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Trans Circuits Syst I Regul Pap 69(3):1291–1301

    MATH  Google Scholar 

  • Wang XY, Yang JJ (2020) A novel image encryption scheme of dynamic S-boxes and random blocks based on spatiotemporal chaotic system. Optik Int J Light Electron Opt 217:164884

    MATH  Google Scholar 

  • Wang XY, Yang JJ (2021) A privacy image encryption algorithm based on piecewise coupled map lattice with multi dynamic coupling coefficient. Inf Sci 569:217–240

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Zhang MZ (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Feng L, Zhao HY (2019) Fast image encryption algorithm based on parallel computing system. Inf Sci 486:340–358

    MATH  Google Scholar 

  • Wang XY, Li YP, Jin J (2020) A new one-dimensional chaotic system with applications in image encryption. Chaos Solitons Fractals 139:110102

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Liu C, Jiang DH (2021a) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    MathSciNet  MATH  Google Scholar 

  • Wang XY, Ren Q, Jiang DH (2021b) An adjustable visual image cryptosystem based on 6D hyperchaotic system and compressive sensing. Nonlinear Dyn 104:4543–4567

    MATH  Google Scholar 

  • Wu Y, Zhou YC, Noonan JP, Agaian S (2014) Design of image cipher using Latin squares. Inf Sci 264:317–339

    MathSciNet  MATH  Google Scholar 

  • Wu XJ, Kan HB, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    MATH  Google Scholar 

  • Wu XJ, Wang DW, Kurths J, Kan HB (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349:137–153

    MATH  Google Scholar 

  • Wu JH, Liao XF, Yang B (2018) Image encryption using 2D Hénon-Sine map and DNA approach. Signal Process 153:11–23

    MATH  Google Scholar 

  • Xian YJ, Wang XY (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169

    MathSciNet  MATH  Google Scholar 

  • Xian YJ, Wang XY, Teng L (2022) Double parameters fractal sorting matrix and its application in image encryption. IEEE Trans Circuits Syst Video Technol 32(6):4028–4037

    MATH  Google Scholar 

  • Xu L, Li Z, Li J, Hua W (2016) A novel bit-level image encryption algorithm based on chaotic maps. Opt Lasers Eng 78:17–25

    MATH  Google Scholar 

  • Ye GD, Zhao HQ, Chai HJ (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83(4):2067–2077

    MathSciNet  MATH  Google Scholar 

  • Zhang X, Zhou Z, Niu Y (2018) An image encryption method based on the feistel network and dynamic DNA encoding. IEEE Photonics J 10(4):1–14

    MATH  Google Scholar 

  • Zhou RG, Wu Q, Zhang MQ, Shen CY (2013) Quantum image encryption and decryption algorithms based on quantum image geometric transformations. Int J Theor Phys 52(6):1802–1817

    MathSciNet  MATH  Google Scholar 

  • Zhou YC, Hua ZY, Pun CM, Chen CLP (2014) Cascade chaotic system with applications. IEEE Trans Cybern 45(9):2001–2012

    PubMed  MATH  Google Scholar 

  • Zou CY, Zhang Q, Wei XP, Liu CJ (2020) Image encryption based on improved Lorenz system. IEEE Access 8:75728–75740

    MATH  Google Scholar 

Download references

Funding

This work is supported by the National Natural Science Foundation of China (Nos: 61701070), the Fundamental Research Funds for the Central Universities (Nos: 3132023252), China Postdoctoral Science Foundation (No: 2020M680933), the Doctoral Start-up Foundation of Liaoning Province (No: 2018540090).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Programming, simulation experiments and writing the first draft of the manuscript were performed by YW. Acquisition of the financial support and the revision of the paper were performed by LT. Material preparation, data collection and analysis were performed by XW. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Lin Teng.

Ethics declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.

Ethical approval

All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards. This article does not contain any studies with animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Y., Teng, L. & Wang, X. An image encryption algorithm based on circular rotation and generalized Feistel structure. Soft Comput 28, 4335–4358 (2024). https://doi.org/10.1007/s00500-023-08747-z

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-023-08747-z

Keywords

Navigation