Skip to main content
Log in

A fast hybrid image cryptosystem based on random generator and modified logistic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper demonstrates an image encryption technique using a hybrid method. This method consists of two stages. The image is XORed with the Pseudo-Random Number Generator (PRNG) in the first stage. The confusion and diffusion processes are applied by using the Logistic map and its’ three modifications in the second stage. The original Logistic map has a small range of key-space. The three modifications of Logistic map increased key-space range due to expanding the range of the original Logistic map parameter. Multiple tests have been performed on the hybrid method such as security analysis and encryption quality. The hybrid method presented a good evaluation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Chen JX, Zhu ZL, Fu C, Yu H (2015) A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Commun Nonlinear Sci Numer Simul 20:846–860

    Article  Google Scholar 

  2. Elabady NF, Abdalkader HM, Moussa MI, Sabbeh SF (2015) Image encryption based on new one-dimensional chaotic map. ICET, 2nd International Conference on Engineering and Technology, pp 851–892

  3. Elkamchouchi H, Makar M (2005) Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In: Radio Science Conference, Proceedings of the Twenty-Second National. IEEE, NRSC, pp 277–284

  4. Farajallah M, El Assad S, Deforges O (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifur and Chaos 26(02):1650021.1–1650021.21

  5. Gokavarapu S, Kumari SV (2015) A novel encryption using one-dimensional chaotic maps. 49th Annual Convention of the Computer Society of India (CSI) Volume 1. Advances in Intelligent Systems and Computing, vol 337. Springer

  6. Gray R (2010) Entropy and information theory. Springer Verlag

  7. Haliuk S, Krulikovskyi O, Politanskyi L (2016) Analysis of pixels permutations based on discretized Chirikov map. 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), Lviv, pp 519–521

  8. Hua Z, Zhou Y, Pun C-M, Philip Chen CL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94. Elsevier

    Article  Google Scholar 

  9. Kamali S, Shakerian R, Hedayati M, Rahmani M (2010) A new modified version of advanced encryption standard based algorithm for image encryption. In: Electronics and Information Engineering (ICEIE), International Conference On, vol. 1. IEEE, pp V1–141

  10. Kocarev L, Lian S (2011) Chaos-based cryptography. Springer

  11. Kwok HS, Tang WKS (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos, Solitons Fractals 32(4):1518–1529

    Article  MathSciNet  MATH  Google Scholar 

  12. Liu L, Miao S (2016) A new image encryption algorithm based on logistic chaotic map with varying parameter. SpringerPlus 5:289

    Article  Google Scholar 

  13. Martin M, Plastino A, Rosso O (2006) Generalized statistical complexity measures: geometrical and analytical properties. Physica A: Statistical Mechanics and its Applications 369(2):439–462

  14. Mersenne twister. http://en.wikipedia.org/wiki/Mersenne_twister. Accessed 15 Jan 2017

  15. Mukhopadhyay D, Forouzan BA (2011) Cryptography and network security, 2nd edn. Mcgraw Hill Education

  16. Murillo-Escobar, Cruz-Hernández, Abundiz-Pérez, López-Gutiérrez (2016) Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess Microsyst 45(Part B):297–309. Elsevier

    Article  Google Scholar 

  17. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  18. Rohith S, Bhat KN, Hari S, Nandini A (2015) Image encryption and decryption using chaotic key sequence generate by sequence of logistic map and sequence of states of linear feedback shift register. International Conference on Advances in Electronic, Computers and Communications, vol 6, pp 1124–1130

  19. Shu-Jiang X, Ying-Long W, Ji-Zhi W, Min T (2008) A novel image encryption scheme based on chaotic maps. In: Signal Processing, 9th International Conference on. IEEE. ICSP, pp 1014–1018

  20. Stallings W (2005) Cryptography and Network security principles and practices, Fourth edn. Prentice Hall

  21. Volos CK (2013) Image encryption scheme based on coupled chaotic systems. In: JAMB, vol 3, 1, pp 123–149

  22. Wang C, Zhang X, Zheng Z (2017) An efficient image encryption algorithm based on a novel chaotic map. Multimedia Tools and Applications 76(22):24251–24280

    Article  Google Scholar 

  23. Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos, Solitons Fractals 40(5):2191–2199

    Article  MathSciNet  MATH  Google Scholar 

  24. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377. Elsevier

    Article  MathSciNet  Google Scholar 

  25. Zhou Y, Hua Z, Pun C-M, Philip Chen CL (2015) Cascade chaotic system with applications. IEEE Transactions on Cybernetics 45(9):2001–2012

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Osama S. Faragallah.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hemdan, A.M., Faragallah, O.S., Elshakankiry, O. et al. A fast hybrid image cryptosystem based on random generator and modified logistic map. Multimed Tools Appl 78, 16177–16193 (2019). https://doi.org/10.1007/s11042-018-6948-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6948-7

Keywords

Navigation