Skip to main content
Log in

An innovative technique for image encryption using tri-partite graph and chaotic maps

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this article, the concept of a complete 3-Partite graph is used to substitute the pixels of a color image to achieve encryption. Chen’s chaotic system is deployed to generate vertices of a tri-partite directed graph and then paths are established between these vertices. These paths will serve to perform the substitution of individual pixels. The seeds for the chaotic maps are manipulated by the hash value of the plain image to hinder chosen plaintext attack. The inter and intra correlation of pixels of a three color image in one-dimensional vector is distorted using the non-linear system of equations. The different chaotic maps having divergent features are employed to add up complexity in encryption technique. The extensive experiments are applied on different kinds of images and results are compiled. The results show that the proposed system has a strong robustness against different attacks and prove to be an excellent candidate to encrypt colored digital images. It has high scores for the Number of Pixel Change Rate (NPCR), Unified Average Cipher Intensity (UACI), entropy values, low values for Mean Absolute Error (MAE), Chi-Square and variance of histograms for encrypted images. The palpable lead of proposed system has resilience against transmission impairments such as Gaussian, Salt & Pepper and clipping.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Abd El-Latif AA, Niu X (2013) A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU Int J Electron Commun 67(2):136–143

    Article  Google Scholar 

  2. Alvarez G, Li S (2006) Some basic cryptography requirements for chaos based cryptosystems. Int J Bifurc Chaos 16:2129–2151

    Article  MATH  Google Scholar 

  3. Anees A (2015) An Image Encryption Scheme Based on Lorenz System for Low Profile Applications. 3D Res 6(3):24

    Article  Google Scholar 

  4. Aqeel-ur-Rehman X, Liao AK, Ullah S (2016) A modified (dual) fusion technique for image encryption using SHA-256 hash and multiple chaotic maps. Multimed Tools Appl 75(18):11241–11266

    Article  Google Scholar 

  5. Bhatnagar G, Wu QMJ, Raman B (2013) Discrete fractional wavelet transform and its application to multiple encryption. Inf Sci (NY) 223:297–316

    Article  MathSciNet  MATH  Google Scholar 

  6. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    Article  MathSciNet  MATH  Google Scholar 

  7. Biham E, Shamir A (1993) In: Brickell EF (ed) Differential Cryptanalysis of the Full 16-round DES BT - Advances in Cryptology — CRYPTO’ 92: 12th Annual International Cryptology Conference Santa Barbara, California, USA August 16–20, 1992 Proceedings. Springer, Berlin, pp 487–496

    Chapter  Google Scholar 

  8. Çavuşoğlu Ü, Kaçar S, Pehlivan I, Zengin A (2017) Secure image encryption algorithm design using a novel chaos based S-Box. Chaos, Solitons Fractals 95:92–101

    Article  MATH  Google Scholar 

  9. Chai X (2017) An image encryption algorithm based on bit level Brownian motion and new chaotic systems. Multimed Tools Appl 76(1):1159–1175

    Article  Google Scholar 

  10. Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Commun 52:6–19

    Article  Google Scholar 

  11. Chai X, Fu X, Gan Z, Lu Y, Chen Y (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62

    Article  Google Scholar 

  12. Chen TH, Wu CS (2010) Compression-unimpaired batch-image encryption combining vector quantization and index compression. Inf Sci (NY) 180(9):1690–1701

    Article  Google Scholar 

  13. Chen J, Han F, Qian W et al (2018) Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map. Nonlinear Dyn 93:2399–2413. https://doi.org/10.1007/s11071-018-4332-9

  14. Diaconu AV, Ionescu V, Iana G and Lopez-Guede JM (2016) A new bit-level permutation image encryption algorithm, in: Communications (COMM), 2016 International Conference on (IEEE), pp. 411–416

  15. El-Latif AAA, Li L & Niu X (2014) A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70:1559–1584. https://doi.org/10.1007/s11042-012-1173-2

  16. Fan H, Li M, Liu D, Zhang E (2018) Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter. Signal Process 143:28–41

    Article  Google Scholar 

  17. Firdous A, ur Rehman A & Saad Missen MM (2019) A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Multimed Tools Appl 78:24809–24835. https://doi.org/10.1007/s11042-019-7623-3

  18. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  19. Gan Z, Chai X, Yuan K et al (2018) A novel image encryption algorithm based on LFT based S-boxes and chaos. Multimed Tools Appl 77:8759–8783. https://doi.org/10.1007/s11042-017-4772-0

  20. Gan Z, Chai X, Han D, Chen Y (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput Applic 31:7111–7130

    Article  Google Scholar 

  21. Hsiao H-I, Lee J (2015) Color image encryption using chaotic nonlinear adaptive filter. Signal Process 117:281–309

    Article  Google Scholar 

  22. Kalpana J, Murali P (2015) An improved color image encryption based on multiple DNA sequence operations with DNA synthetic image and chaos. Opt - Int J Light Electron Opt 126(24):5703–5709

    Article  Google Scholar 

  23. Khan M, Shah T (2015) An efficient construction of substitution box with fractional chaotic system. Signal Image Video Process 9(6):1335–1338

    Article  MathSciNet  Google Scholar 

  24. Kulsoom A, Xiao D, ur Rehman A, Abbas SA (2016) An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules. Multimed Tools Appl 75(1):1–23

    Article  Google Scholar 

  25. Kumar M, Vaish A (2017) An efficient encryption-then-compression technique for encrypted images using SVD. Digit Signal Process A Rev J 60:81–89

    Article  Google Scholar 

  26. Li B, Liao X, Jiang Y (2018) A novel image encryption scheme based on logistic map and dynatomic modular curve. Multimed Tools Appl 77(7):8911–8938

    Article  Google Scholar 

  27. Liu H, Jin C (2017) A novel color image encryption algorithm based on quantum chaos sequence. 3D Res 8(1):4

    Article  Google Scholar 

  28. Liu H, Wang X (2010) Color image encryption based on one-time keys and robust chaotic maps. Comput Math Appl 59(10):3320–3327

    Article  MathSciNet  MATH  Google Scholar 

  29. Liu H, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput J 12(5):1457–1466

    Article  Google Scholar 

  30. Liu H, Wang X, Kadir A (2013) Color image encryption using Choquet fuzzy integral and hyper chaotic system. Opt - Int J Light Electron Opt 124(18):3527–3533

    Article  Google Scholar 

  31. Liu Y, Tong X, Ma J (2016) Image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 75(13):7739–7759

    Article  Google Scholar 

  32. Liu Z, Tiecheng X, Wang J (2018) Image encryption technology based on fractional two-dimensional triangle function combination discrete chaotic map coupled with menezes-vanstone elliptic curve cryptosystem. Discret Dyn Nat Soc 2018(4585083):24. https://doi.org/10.1155/2018/4585083

  33. Pak C, Huang L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137

    Article  Google Scholar 

  34. Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 14(7):3056–3075

    Article  Google Scholar 

  35. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution–diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892

    Article  MathSciNet  MATH  Google Scholar 

  36. Silva-García VM, Flores-Carapia R, Rentería-Márquez C, Luna-Benoso B, Aldape-Pérez M (Sep. 2018) Substitution box generation using Chaos: an image encryption application. Appl Math Comput 332:123–135

    MathSciNet  MATH  Google Scholar 

  37. ur Rehman A, Liao X (2019) A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Multimed Tools Appl 78(2):2105–2133

    Article  Google Scholar 

  38. ur Rehman A, Liao X, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74(13):4655–4677

    Article  Google Scholar 

  39. ur Rehman A, Liao X, Ashraf R, Ullah S, Wang H (2018) A Color Image Encryption Technique using Exclusive-OR with DNA Complementary Rules based on Chaos Theory and SHA-2. Int J Light Electron Opt 159:348–367

    Article  Google Scholar 

  40. ur Rehman A, Xiao D, Kulsoom A, Hashmi MA, Abbas SA (2019) Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules. Multimed Tools Appl 78(7):9355–9382

    Article  Google Scholar 

  41. Wang H, Xiao D, Chen X, Huang H (2017) Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map. Signal Process 144:444–452

    Article  Google Scholar 

  42. Wang X, Wang S, Zhang Y, Luo C (2018) A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems. Opt Lasers Eng 103:1–8

    Article  Google Scholar 

  43. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Article  Google Scholar 

  44. Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI randomness tests for image encryption. Cyber J Multidiscip J Sci Technol J Sel Areas Telecommun:31–38

  45. Wu X, Kan H, Kurths J (2015) A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps. Appl Soft Comput 37:24–39

    Article  Google Scholar 

  46. Wu J, Liao X, Yang B (2017) Color image encryption based on chaotic systems and elliptic curve ElGamal scheme. Signal Process 141:109–124

    Article  Google Scholar 

  47. Yang B, Liao X (2018) A new color image encryption scheme based on logistic map over the finite field ZN. Multimed Tools Appl 77:21803–21821

  48. Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Appl Soft Comput J 11(8):5092–5098

    Article  Google Scholar 

  49. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic S-Box. Inf Sci (NY) 450:361–377

    Article  MathSciNet  MATH  Google Scholar 

  50. Zhang X, Nie W, Ma Y, Tian Q (2017) Cryptanalysis and improvement of an image encryption algorithm based on hyper-chaotic system and dynamic S-box. Multimed Tools Appl 76(14):15641–15659

    Article  Google Scholar 

  51. Zhou Y, Agaian S, Joyner VM, and Panetta K (2008) Two fibonacci p-code based image scrambling algorithms. Proceedings SPIE, Image Processing: Algorithms and Systems VI 6812:681215. https://doi.org/10.1117/12.766591

  52. Zhou Y, Panetta K, Agaian S, Chen CLP (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608

    Article  Google Scholar 

  53. Zhou Y, Panetta K, Agaian S, Chen CLP (2013) (n, k, p)-gray code for image systems. IEEE Trans Cybern 43(2):515–529

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aqeel ur Rehman.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

ur Rehman, A., Liao, X. & Wang, H. An innovative technique for image encryption using tri-partite graph and chaotic maps. Multimed Tools Appl 80, 21979–22005 (2021). https://doi.org/10.1007/s11042-021-10692-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10692-8

Keywords

Navigation