Skip to main content
Log in

An image encryption algorithm based on Baker map with varying parameter

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Because of the excellent properties, such as unpredictability, randomness, aperiodicity, sensitive dependence on initial conditions and parameters, chaotic systems become popular in security applications. However, for a fixed chaotic system, with the development of chaos theory, the chaotic orbits may be estimated and their parameters or initial values may be predicted. In this paper, we introduce a parameter-varying Baker map (PVBM), whose output signal is non-stationary. The varying parameters disrupt the phase space of the system, which can resist the phase space reconstruction attacks and chaotic signal estimation technologies effectively. To investigate its applications, we propose a new image encryption algorithm, which is combined with chaotic shuffling and chaotic substitution. Simulation results demonstrate the proposed algorithm have high security as well as to resist various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Alireza J, Abdolrasoul M (2011) Image encryption using chaos and block copher. Comput Inform Sci 4(1):172–185

    Google Scholar 

  2. Appel U, Brandt AV (1983) Adaptive sequential segmentation of piecewise stationary time series. Inf Sci 29:27–56

    Article  MATH  Google Scholar 

  3. Chatzis SP, Demiris Y (2012) A reservior-driven non-stationary hidden Markov mode. Pattern Recogn 45:3985–3996

    Article  MATH  Google Scholar 

  4. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MathSciNet  MATH  Google Scholar 

  5. Chen CS, Wang T, Kou YZ, Chen XC, Li X (2013) Improvement of trace-driven I-Cache timing attack on the RSA algorithm. J Syst Softw 86(1):100–107

    Article  Google Scholar 

  6. Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250

    Article  MATH  Google Scholar 

  7. Hermassi H, Rhouma R, Belghith S (2011) Security analysis of image cryptosystems only or partially based on a chaotic permutation. J Syst Softw 85(9):2133–2144

    Article  Google Scholar 

  8. Hua ZY, Zhou YC, Pun CM, Philip Chen CL (2015) 2D Sine Logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  9. Huang XL (2012) Image encryption algorithm using chaotic chebyshev generator. Nonlinear Dyn 67(4):2411–2417

    Article  MathSciNet  Google Scholar 

  10. Hussain I, Shah T (2013) Application of S-box and chaotic map for image encryption. Math Comput Model 57(9–10):2576–2579

    Article  MATH  Google Scholar 

  11. Khan M, Shah T, Mahmood H, Gondal MA (2013) An efficient method for the construction of block cipher with multi-chaotic systems. Nonlinear Dyn 71(3):489–492

    Article  MathSciNet  Google Scholar 

  12. Liu LM (2010) Checking of time series stationarity. J Shengyang Nor Univ 28(3):357–359

    Google Scholar 

  13. Liu LF, Miao SX (2016) A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer Plus 5(1):289

    Article  Google Scholar 

  14. Pincus SM (1991) Approximate entropy as a measure of system complexity. Proc Nat Acad Sci 88:2297–2301

    Article  MathSciNet  MATH  Google Scholar 

  15. Pincus SM, Kalman RE (1997) Not all (possibly) ‘random’ sequences are created equal. Proc Nat Acad Sci 94(6):3513–3518

    Article  MathSciNet  MATH  Google Scholar 

  16. Rukhin A et al (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Dept. Commer., Nat. Inst. Stand. Technol., Gaithersburg, MD, USA, Tech. Rep. 800–22

  17. Sun F, Lu Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283:2066–2073

    Article  Google Scholar 

  18. Tang Y, Wang ZD, Fang JA (2010) Image encryption using chaotic coupled map latices with time-varying delays. Commun Nonlinear Sci Numer Simul 15(9):2456–2468

    Article  MathSciNet  MATH  Google Scholar 

  19. Tong XJ, Wang Z, Zhang M, Liu Y, Xu H, Ma J (2015) An image encryption algorithm based on the perturbed high-dimensional chaotic map. Nonlinear Dyn 80:1493–1508

    Article  MathSciNet  MATH  Google Scholar 

  20. Wang XY, Guo K (2014) A new image alternate encryption algorithm based on chaotic map. Nonlinear Dyn 76:1943–1950

    Article  MATH  Google Scholar 

  21. Wang ZN, Huang XB, Li NG, Song XN (2012) Image encryption based on a delayed fractional-order chaotic logistic system. Chinese Physics B 21(5):050506

    Article  Google Scholar 

  22. Wang X, Teng L, Qin X (2012) A novel color image encryption algorithm based on chaos. Signal Process 93(4):1101–1108

    Article  Google Scholar 

  23. Won YJ, Hyoungshick K (2010) An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Non Sci Num Simulat 15(12):3998–4006

    Article  MathSciNet  MATH  Google Scholar 

  24. Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5):2191–2199

    Article  MathSciNet  MATH  Google Scholar 

  25. Ye G (2010) Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 31(5):347–354

    Article  Google Scholar 

  26. Ye G, Wong KW (2013) An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn 71(1–2):259–267

    Article  MathSciNet  Google Scholar 

  27. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284:2775–2780

    Article  Google Scholar 

  28. Zhang M, Tong XJ (2014) A new chaotic map based image encryption schemes for several image formats. J Syst Softw 98:140–154

    Article  Google Scholar 

  29. Zhang YQ, Wang XY (2014) Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 77:687–698

    Article  Google Scholar 

  30. Zhang XP, Zhao ZM (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion. Nonlinear Dyn 75:319–330

    Article  Google Scholar 

  31. Zhou Q, Liao X (2012) Collision-based flexible image encryption algorithm. J Syst Softw 85:400–407

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (NSFC) under grants no. 61601215.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lingfeng Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, L., Miao, S. An image encryption algorithm based on Baker map with varying parameter. Multimed Tools Appl 76, 16511–16527 (2017). https://doi.org/10.1007/s11042-016-3925-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3925-x

Keywords

Navigation