Skip to main content
Log in

An image encryption scheme based on precision limited chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, various chaotic maps have been used for image encryption. However, most of these image encryption algorithms entail a lot of floating-point operations, which slows encryption and increases the difficulty of hardware implementation. In this paper, a 32-bit precision limited piecewise linear & logistic chaotic map called 32-bit PL_PWL&LCM for short is proposed. The proposed system has excellent chaotic characteristics, is easy to realize and does not require long time for initialization. Based on the 32-bit PL_PWL&LCM, an image encryption system is proposed. Security analysis indicates that the proposed IES is robust against statistical attacks, differential attacks and brute force attacks with just one round of encryption. Performance analysis shows that the IES is a fast encryption algorithm with good performance in resisting noise disturbances.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Ahmad J, Khan MA, Ahmed F et al (2018) A novel image encryption scheme based on orthogonal matrix, skew tent map, and XOR operation[J]. Neural Comput & Applic 30(12):3847–3857

    Google Scholar 

  2. Aljawarneh S, Yassein MB (2017) A resource-efficient encryption algorithm for multimedia big data[J]. Multimed Tools Appl 76(21):22703–22724

    Google Scholar 

  3. Aljawarneh S, Yassein MB (2018) A multithreaded programming approach for multimedia big data: encryption system[J]. Multimed Tools Appl 77(9):10997–11016

    Google Scholar 

  4. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems[J]. International Journal of Bifurcation and Chaos 16(08):2129–2151

    MathSciNet  MATH  Google Scholar 

  5. Barakat ML, Mansingka AS, Radwan AG et al (2014) Hardware stream cipher with controllable chaos generator for colour image encryption[J]. IET Image Process 8(1):33–43

    Google Scholar 

  6. Belazi A, El-Latif AAA (2017) A simple yet efficient S-box method based on chaotic sine map[J]. Optik 130:1438–1444

    Google Scholar 

  7. Belazi A, El-Latif AAA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos[J]. Signal Process 128:155–170

    Google Scholar 

  8. Benatti F, Narnhofer H, Sewell GL (1991) A non-commutative version of the Arnold cat map[J]. Lett Math Phys 21(2):157–172

    MathSciNet  MATH  Google Scholar 

  9. Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map[J]. Signal Process 143:122–133

    Google Scholar 

  10. El Assad S, Farajallah M (2016) A new chaos-based image encryption system[J]. Signal Process Image Commun 41:144–157

    Google Scholar 

  11. El-Latif AAA, Li L, Wang N et al (2013) A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces[J]. Signal Process 93(11):2986–3000

    Google Scholar 

  12. El-Latif AAA, Li L, Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system[J]. Multimed Tools Appl 70(3):1559–1584

    Google Scholar 

  13. Gonzalez RC, Woods RE (2007) Digital image processing, 3rd ed. Prentice-Hall Inc., Harlow, U.K.

    Google Scholar 

  14. Hamidouche W, Farajallah M, Sidaty N et al (2017) Real-time selective video encryption based on the chaos system in scalable HEVC extension[J]. Signal Process Image Commun 58:73–86

    Google Scholar 

  15. Hua Z, Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map[J]. Inf Sci 339:237–253

    Google Scholar 

  16. Hua Z, Zhou Y (2017) Design of image cipher using block-based scrambling and image filtering[J]. Inf Sci 396:97–113

    MATH  Google Scholar 

  17. Hua Z, Zhou Y, Huang H (2019) Cosine-transform-based chaotic system for image encryption[J]. Inf Sci 480:403–419

    Google Scholar 

  18. Huang F, Guan ZH (2005) A modified method of a class of recently presented cryptosystems[J]. Chaos, Solitons Fractals 23(5):1893–1899

    MathSciNet  MATH  Google Scholar 

  19. Huang F, Guan ZH (2005) A modified method of a class of recently presented cryptosystems[J]. Chaos, Solitons Fractals 23(5):1893–1899

    MathSciNet  MATH  Google Scholar 

  20. Joshi M, Singh K (2008) Color image encryption and decryption for twin images in fractional Fourier domain[J]. Opt Commun 281(23):5713–5720

    Google Scholar 

  21. L'Ecuyer P, Simard R (2007) TestU01: AC library for empirical testing of random number generators[J]. ACM Transactions on Mathematical Software (TOMS) 33(4):22

    MATH  Google Scholar 

  22. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Opt Lasers Eng 90:238–246

    Google Scholar 

  23. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps[J]. Computers & Mathematics with Applications 59(10):3320–3327

    MathSciNet  MATH  Google Scholar 

  24. Liu H, Wang X (2012) Image encryption using DNA complementary rule and chaotic maps[J]. Appl Soft Comput 12(5):1457–1466

    Google Scholar 

  25. Marton K, Suciu A (2015) On the interpretation of results from the NIST statistical test suite[J]. Sci Technol 18(1):18–32

    Google Scholar 

  26. Mondal B, Kumar P, Singh S (2018) A chaotic permutation and diffusion based image encryption algorithm for secure communications[J]. Multimed Tools Appl 77(23):31177–31198

    Google Scholar 

  27. Muhammad K, Hamza R, Ahmad J et al (2018) Secure surveillance framework for IoT systems using probabilistic image encryption[J]. IEEE Transactions on Industrial Informatics 14(8):3679–3689

    Google Scholar 

  28. Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F et al (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos[J]. Signal Process 109:119–131

    Google Scholar 

  29. Nagaraj N (2012) One-time pad as a nonlinear dynamical system[J]. Commun Nonlinear Sci Numer Simul 17(11):4029–4036

    MathSciNet  MATH  Google Scholar 

  30. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map[J]. Signal Process 138:129–137

    Google Scholar 

  31. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map[J]. Image Vis Comput 24(9):926–934

    Google Scholar 

  32. Ping P, Xu F, Mao Y et al (2018) Designing permutation–substitution image encryption networks with Henon map[J]. Neurocomputing 283:53–63

    Google Scholar 

  33. Rhouma R, Arroyo D, Belghith S (2009) A new color image cryptosystem based on a piecewise linear chaotic map[C]//2009 6th international multi-conference on systems, signals and devices. IEEE:1–6

  34. Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding[J]. Multimed Tools Appl 76(5):6229–6245

    Google Scholar 

  35. Wang X, Xu D (2014) A novel image encryption scheme based on Brownian motion and PWLCM chaotic system[J]. Nonlinear Dynamics 75(1–2):345–353

    Google Scholar 

  36. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos[J]. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  37. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption[J], Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT). 1(2):31–38

  38. Zhou N, Zhang A, Zheng F et al (2014) Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing[J]. Opt Laser Technol 62:152–160

    Google Scholar 

  39. Zhou G, Zhang D, Liu Y et al (2015) A novel image encryption algorithm based on chaos and line map[J]. Neurocomputing 169:150–157

    Google Scholar 

  40. Zhou Y, Hua Z, Pun CM, Chen CL (2015) Cascade chaotic system with applications[J]. IEEE transactions on cybernetics 45(9):2001–2012

    Google Scholar 

  41. Zhu Z, Zhang W, Wong K et al (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Inf Sci 181(6):1171–1186

    Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for their very helpful comments that helped improve the presentation of this paper. This work is supported in part by National Key R&D Program of China 2019YFB1706003, China Postdoctoral Science Foundation 2019 M663358, National Natural Science Foundation of China 61902082 and China grant U1636215.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhaoquan Gu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, H., Deng, L. & Gu, Z. An image encryption scheme based on precision limited chaotic system. Multimed Tools Appl 79, 19387–19410 (2020). https://doi.org/10.1007/s11042-020-08826-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08826-5

Keywords