Abstract
The color image encryption algorithm based on the chaos theory is not strong enough. In this paper, we proposed a color image chaos encryption algorithm combining Cyclic Redundancy Check (CRC) and nine palace map. Firstly, the pixel data of the plain image were moved and shuffled based on the theory of nine palace map. And the R, G and B components were extracted and converted into a binary sequence matrix that was then cyclically shifted based on the technology of generating CRC code. Finally, the encrypted image was derived from the XOR operation with random key matrix. The average entropy of encrypted image by our algorithm is 7.9993, which is slight improved compared with the coupled hyper chaotic Lorenz algorithm in previous studies. In addition, the algorithm has the advantages of large key space, high key sensitivity, anti-robust attack, and feasible encryption efficiency.











Similar content being viewed by others
References
AqeelurRehman LX, Hahsmi MA et al (2018) An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos[J]. Optik 153
Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos[J]. Signal Process 128:155–170
Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems[J]. Multimed Tools Appl 76(1):1159–1175
Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197–213
Chen W B, Xin Z (2006) Image encryption algorithm based on Henon chaotic system[C]// International Conference on Image Analysis and Signal Processing. IEEE 1–6
Chen J, Zhang Y, Qi L et al (2018) Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression[J]. Opt Laser Technol 99
Fu C, Chen ZF, Zhao W et al (2017) A new fast color image encryption scheme using chen chaotic system[C]// Ieee/acis international conference on software engineering, artificial intelligence, NETWORKING and parallel/distributed computing. IEEE:121–126
Hua Z, Yi S, Zhou Y (2017) Medical image encryption using high-speed scrambling and pixel adaptive diffusion[J]. Signal Process 144
Kadir A, Aili M, Sattar M (2017) Color image encryption scheme using coupled hyper chaotic system with multiple impulse injections[J]. Optik – Int J Light Electron Opt 129:231–238
Kanafchian M, Fathi-Vajargah BA (2017) Novel image encryption scheme based on Clifford attractor and Noisy logistic map for secure transferring images in navy [J]. Int J e-Navig Maritime Econ 6:53–63
Kanso A, Ghebleh M (2017) An algorithm for encryption of secret images into meaningful images [J]. Opt Lasers Eng 90:196–208
Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography[J]. Signal Process 125(C):187–202
Lan R, He J, Wang S, et al. (2018) Integrated Chaotic Systems for Image Encryption [J]. Signal Processing
Li Y, Dai W, Ming Z et al (2016) Privacy protection for preventing data over-collection in Smart City[J]. IEEE Trans Comput 65(5):1339–1350
Liu H, Jin CA (2017) Novel color image encryption algorithm based on quantum Chaos sequence[J]. 3D Res 8(1):4
Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps[J]. Comput Math Appl 59(10):3320–3327
Mahesh M, Srinivasan D, Kankanala M et al (2015) Image cryptography using discrete Haar wavelet transform and Arnold cat map [C]// international conference on communications and signal processing. IEEE:1849–1855
Martin K, Lukac R, Plataniotis KN (2005) Efficient encryption of wavelet-based coded color images [J]. Pattern Recogn 38(7):1111–1115
Mollaeefar M, Sharif A, Nazari M (2015) A novel encryption scheme for colored image based on high level chaotic maps[J]. Multimed Tools Appl 76:1–23
Parvaz R, Zarebnia M (2017) A combination chaotic system and application in color image encryption[J]
Ping P, Xu F, Mao Y et al (2017) Designing permutation-substitution image encryption networks with Henon map[J]. Neurocomputing
Qiu H, Memmi G (2014) Fast Selective Encryption Method for Bitmaps Based on GPU Acceleration[C]// IEEE International Symposium on Multimedia. IEEE
Qiu H, Memmi G, Noura H (2017) An efficient secure storage scheme based on information fragmentation[C]// IEEE international conference on Cyber Security & Cloud Computing. IEEE
Sankpal PR, Vijaya PA (2014) Image encryption using chaotic maps: a survey[C]// international conference on Signal & Image Processing. IEEE:102–107
Sokouti M, Sokouti BA (2018) PRISMA-compliant systematic review and analysis on color image encryption using DNA properties[J]. Comput Sci Rev 29:14–20
Sosa C, Sutton B C, Huang H H (2010) PicFS: The Privacy-Enhancing Image-Based Collaborative File System[C]// IEEE International Conference on Parallel & Distributed Systems. IEEE Computer Society
Su Y, Tang C, Chen X et al (2017) Cascaded Fresnel holographic image encryption scheme based on a constrained optimization algorithm and Henon map[J]. Optics & Lasers in. Engineering 88:20–27
Teng L, Wang X, Meng J (2017) A chaotic color image encryption using integrated bit-level permutation[J]. Multimed Tools Appl 77(10):1–14
Wang X, Zhang HL (2015) A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Opt Commun 342:51–60
Ye G, Huang X (2017) An efficient symmetric image encryption algorithm based on an intertwining logistic map[M]. Elsevier Science Publishers B. V
Ye C, Xiong Z, Ding Y et al (2014) Joint fingerprinting and encryption in hybrid domains for multimedia sharing in social networks[J]. J Vis Lang Comput 25(6):658–666
Ye C, Xiong Z, Ding Y et al (2016) Joint fingerprinting and encryption in the DWT domain for secure M2M communication[J]. Int J Sec Appl 10(1):125–138
Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos [J]. Optics & Lasers in. Engineering 92:6–16
Zhang YQ, Wang XY, Liu J et al (2016) An image encryption scheme based on the MLNCML system using DNA sequences[J]. Opt Lasers Eng 82:95–103
Zhang Y, Qiu M, Tsai CW et al (2017) Health-CPS: healthcare cyber-physical system assisted by cloud and big data[J]. IEEE Syst J 11(1):88–95
Zhou N, Chen W, Yan X et al (2018) Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system[J]. Quantum Inf Process 17(6):137
Zhu L, Li W, Liao L et al (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping[C]// international conference on intelligent information hiding and multimedia. IEEE Comput Soc:601–604
Wu Y, Hu F, Min G et al(2017) Big Data and Computational Intelligence in Networking[M].Taylor & Francis/CRC, Boca Raton
Cheng X, Wu Y, Min G et al (2018) Network Function Virtualization in Dynamic Networks: A Stochastic Perspective[J]. IEEE J Sel Areas Commun 36(10):2218–2232
Ma Y, Wu Y, Ge J et al (2018) An Architecture for Accountable Anonymous Access in the Internet-of-Things Network[J]. IEEE Access 6:14451–14461
Huang C, Min G, Wu Y et al (2017) Time Series Anomaly Detection for Trustworthy Services in Cloud Computing Systems[J]. IEEE Transactions on Big Data (99):1–1
Acknowledgements
This work was supported by the National Natural Science Foundation of China (No.61502154, 61370092), Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (T201410), the MOE (Ministry of Education in China) Project of Humanities and Social Sciences (17YJCZH203).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Xiong, Z., Wu, Y., Ye, C. et al. Color image chaos encryption algorithm combining CRC and nine palace map. Multimed Tools Appl 78, 31035–31055 (2019). https://doi.org/10.1007/s11042-018-7081-3
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-7081-3