Skip to main content
Log in

A novel design of multiple image encryption using perturbed chaotic map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

For recent decades, the increasing volume of multimedia data has been witnessed, and the data is required technical methods to assure the security for storage and transmission. Chaos-based encryption is one of promising approaches to keep large volume of data confidential. Most of chaos-based algorithms were proposed for single image encryption. Recently, several schemes were proposed for multiple image encryption, and all of them are designed to work in a single round of encryption. In addition, the dynamics of chaotic maps therein are stationary, so it does not provide advantage of uncertainty of chaotic orbits for the security. Moreover, a chaotic map being realized in digital platforms can produce a large number of bits, and so far those bits have not been used efficiently to encrypt larger volume of data. In this paper, a novel design of chaos-based multiple image encryption is proposed using the permutation-diffusion architecture for the first time. Any chaotic map can be employed for the proposed design. Chaotic dynamics are non-stationary by means of perturbation on state variables and control parameters in bit level. Amounts of perturbation are constructed from the coordinate of pixels and the content of plain images respectively in the pixel permutation and diffusion processes, so the proposed design provides the property of authentication. Values of chaotic state variables are represented in fixed-point number, and bits generated by chaotic maps are thoroughly exploited to encrypt multiple images at the same time. The specific example will demonstrate the effectiveness of the proposed design by means of the statistical and security analyses. The simulation results will show its resistance from the attacking method of differential analysis, and those are also compared with those of other existing algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Abdelfatah RI (2020) A new fast double-chaotic based image encryption scheme. Multimed Tools Appl 79(1):1241–1259

    Article  Google Scholar 

  2. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799–17823

    Article  Google Scholar 

  3. Alvarez G, Amigó JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers. Springer, Berlin, pp 257–295

    MATH  Google Scholar 

  4. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos 16 (08):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  5. Banik A, Shamsi Z, Laiphrakpam DS (2019) An encryption scheme for securing multiple medical images. Journal of Information Security and Applications 49:102398

    Article  Google Scholar 

  6. Bhatnagar G, Wu QMJ (2012) Selective image encryption based on pixels of interest and singular value decomposition. Digital Signal Processing 22 (4):648–663

    Article  MathSciNet  Google Scholar 

  7. Bilal M, Imtiaz S, Abdul W, Ghouzali S, Asif S (2014) Chaos based zero-steganography algorithm. Multimed Tools Appl 72(2):1073–1092

    Article  Google Scholar 

  8. Cao LC, Luo YL, Qiu SH, Liu JX (2015) A perturbation method to the Tent map based on Lyapunov exponent and its application. Chin Phys B 24(10):100501

    Article  Google Scholar 

  9. Chai X, Gan Z, Zhang M (2017) A fast chaos-based image encryption scheme with a novel plain image-related swapping block permutation and block diffusion. Multimed Tools Appl 76:15561–15585

    Article  Google Scholar 

  10. Xin Chen J, Liang Zhu Z, Fu C, Yu H (2013) An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt Express 21(23):27873–27890

    Article  Google Scholar 

  11. Chen S, Shu R (2011) Block permutation cipher in chaos with Feistel structure for wireless sensor networks. In: Jin D., Lin S. (eds) Advances in computer science, intelligent system and environment. Springer Berlin Heidelberg, Berlin, pp 391–396

  12. Cheng P, Yang H, Wei P (2015) A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynnamics 79:2121–2131

    Article  Google Scholar 

  13. Cheng S, Wang L, Ao N, Han Q (2020) A selective video encryption scheme based on coding characteristics. Symmetry 12(3):332

    Article  Google Scholar 

  14. Deepak M, Ashwin V, Amutha R (2014) A new multistage multiple image encryption using a combination of chaotic block cipher and iterative fractional fourier transform. In: 2014 First International Conference on Networks Soft Computing (ICNSC2014), pp 360–364

  15. Dhivya R, Padmapriya V, Sundararaman R, Rayappan J, Amirtharajan R (2018) Chaos assisted variable bit steganography in transform domain. Electron Lett 54(2):1332–1334

    Article  Google Scholar 

  16. El Assad S, Noura H (2014) Generator of chaotic sequences and corresponding generating system. US Patent 8,781,116

  17. Fang D, Sun S (2018) A new scheme for image steganography based on hyperchaotic map and DNA sequence. J Inf Hiding Multim Signal Process 9:392–399

    Google Scholar 

  18. Fouda JAE, Effa JY, Sabat SL, Ali M (2014) A fast chaotic block cipher for image encryption. Commun Nonlinear Sci Numer Simul 19(3):578–588

    Article  MathSciNet  MATH  Google Scholar 

  19. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos 08(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  20. Fridrich J, Lisoněk P, Soukal D (2007) On steganographic embedding efficiency. In: Camenisch JL, Collberg CS, Johnson NF, Sallee P (eds) Information hiding. Springer, Berlin, pp 282–296

  21. Fu C, jie Chen J, Zou H, hong Meng W, feng Zhan Y, wen Yu Y (2012) A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt Express 20(3):2363–2378

    Article  Google Scholar 

  22. ul Haq T, Shah T (2020) Algebra-chaos amalgam and DNA transform based multiple digital image encryption. Journal of Information Security and Applications 102592:54

    Google Scholar 

  23. Hilborn R (2001) Chaos And Nonlinear dynamics: an introduction or scientists and engineers 2nd Edition. Oxford University Press, USA

    Google Scholar 

  24. Hoang TM (2021) Perturbed chaotic map with varying number of iterations and application in image encryption. In: 2020 IEEE Eighth International conference on communications and electronics (ICCE), pp 413–418

  25. Hoang TM, Assad SE (2020) Novel models of image permutation and diffusion based on perturbed digital chaos. Entropy 22(5):548

    Article  MathSciNet  Google Scholar 

  26. Huang ZJ, Cheng S, Gong LH, Zhou NR (2020) Nonlinear optical multi-image encryption scheme with two-dimensional linear canonical transform. Opt Lasers Eng 124:105821

    Article  Google Scholar 

  27. Kanso A (2012) Steganographic algorithm based on a chaotic map. Commun Nonlinear Sci Numer Simul 17(8):3287–3302

    Article  MathSciNet  Google Scholar 

  28. Kar N, Mandal K, Bhattacharya B (2018) Improved chaos-based video steganography using DNA alphabets, vol 4. SI: CI & Smart Grid Cyber Security

  29. Katz J, Lindell Y (2014) Introduction to modern cryptography, second Edition, 2nd edn. Chapman and hall/CRC, London

    Book  Google Scholar 

  30. Kennedy M, Riccardo R, Setti G (2000) Chaotic electronics in telecommunications, 1st edn. CRC, Boca Raton

  31. Khalind O, Aziz B (2015) LSB steganography with improved embedding efficiency and undetectability. Comp Sci Info Tech 5(1):89–105

  32. Khan J, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30:943–961

    Article  MathSciNet  MATH  Google Scholar 

  33. Kocarev L, Lian S (2011) Chaos-based Cryptography. Springer, Berlin

    Book  MATH  Google Scholar 

  34. Li X, Meng X, Wang Y, Yang X, Yin Y, Peng X, He W, Dong G, Chen H (2017) Secret shared multiple-image encryption based on row scanning compressive ghost imaging and phase retrieval in the fresnel domain. Opt Lasers Eng 96:7–16

    Article  Google Scholar 

  35. Liu L, Lin J, Miao S, Liu B (2017) A double perturbation method for reducing dynamical degradation of the digital Baker map. International Journal of Bifurcation and Chaos 27(07):1750103

    Article  MathSciNet  MATH  Google Scholar 

  36. Liu L, Liu B, Hu H, Miao S (2018) Reducing the dynamical degradation by bi-coupling digital chaotic maps. International Journal of Bifurcation and Chaos 28(05):1850059

    Article  MathSciNet  MATH  Google Scholar 

  37. Liu L, Miao S (2017) Delay-introducing method to improve the dynamical degradation of a digital chaotic map. Inf Sci 396:1–13

    Article  Google Scholar 

  38. Liu X, Song Y, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network. Int J Bifurcation Chaos 29 (02):1950016

    Article  MathSciNet  MATH  Google Scholar 

  39. Liu Y, Luo Y, Song S, Cao L, Liu J, Harkin J (2017) Counteracting dynamical degradation of digital chaotic Chebyshev map via perturbation. International Journal of Bifurcation and Chaos 27(03):1750033

    Article  MathSciNet  MATH  Google Scholar 

  40. Malik DS, Shah T (2020) Color multiple image encryption scheme based on 3D-chaotic maps. Math Comput Simul 178:646–666

    Article  MathSciNet  MATH  Google Scholar 

  41. Masuda N, Jakimoski G, Aihara K, Kocarev L (2006) Chaotic block ciphers: from theory to practical algorithms. IEEE Transactions on Circuits and Systems I: Regular Papers 53(6):1341–1352

    Article  MathSciNet  MATH  Google Scholar 

  42. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  43. Mondal B (2020) A secure steganographic scheme based on chaotic map and DNA computing. In: Sharma DK, Balas VE, Son LH, Sharma R, Cengiz K (eds) Micro-electronics and telecommunication engineering. Springer, Singapore, pp 545–554

  44. Mousavi M, Sadeghiyan B (2021) A new image encryption scheme with Feistel like structure using chaotic s-box and rubik cube based p-box. Multimedia Tools and Applications 80(9):13157–13177

    Article  Google Scholar 

  45. Mukherjee S, Sanyal G (2018) A chaos based image steganographic system. Multimed Tools Appl 77(21):27851–27876

    Article  Google Scholar 

  46. Norouzi B, Mirzakuchaki S (2017) An image encryption algorithm based on DNA sequence operations and cellular neural network. Multimedia Tools and Applications 76(11):13681–13701

    Article  Google Scholar 

  47. Patel S, Bharath K, Rajesh P, Kumar M (2020) Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique. Multimed Tools Appl 79(43):31739–31757

    Article  Google Scholar 

  48. Patro KAK, Acharya B (2018) Secure multi-level permutation operation based multiple colour image encryption. Journal of Information Security and Applications 40:111–133

    Article  Google Scholar 

  49. Patro KAK, Acharya B (2020) A novel multi-dimensional multiple image encryption technique. Multimed Tools Appl 79(19):12959–12994

    Article  Google Scholar 

  50. Patro KAK, Soni A, Netam PK, Acharya B (2020) Multiple grayscale image encryption using cross-coupled chaotic maps. Journal of Information Security and Applications 52:102470

    Article  Google Scholar 

  51. Peng J, Lei L, Han Q, Jia R (2014) A chaos-based block cipher with Feistel structure. In: 2014 IEEE 13Th International conference on cognitive informatics and cognitive computing, pp. 343–348

  52. Peng J, Zhang D (2009) Image encryption and chaotic cellular neural network. In: Machine learning in cyber trust: security, privacy, and reliability. Springer, Boston, pp 183–213

  53. Rehman AU, Khan JS, Ahmad J, Hwang SO (2016) A new image encryption scheme based on dynamic S-Boxes and chaotic maps. 3D Research 7 (1):1–8

    Article  Google Scholar 

  54. Sheela S, Sathyanarayana SV (2022) Generation of chaotic random binary sequences for cryptographic applications. Concurrency and Computation: Practice and Experience 34:e6497

  55. Saeed M (2013) A new technique based on chaotic steganography and encryption text in DCT domain for color image. Journal of Engineering Science and Technology 8:508–520

    Google Scholar 

  56. Sahasrabuddhe A, Laiphrakpam DS (2021) Multiple images encryption based on 3D scrambling and hyper-chaotic system. Inf Sci 550:252–267

  57. Saidi M, Hermassi H, Rhouma R, Belghith S (2017) A new adaptive image steganography scheme based on DCT and chaotic map. Multimed Tools Appl 76(11):13493–13510

    Article  Google Scholar 

  58. Sayed WS, Tolba MF, Radwan AG, Abd-El-Hafiz SK, Soliman AM (2018) Security and efficiency of Feistel networks versus discrete chaos for lightweight speech encryption. In: 2018 30Th international conference on microelectronics (ICM), pp 92–95

  59. Shannon CE (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  60. Sharif A, Mollaeefar M, Nazari M (2017) A novel method for digital image steganography based on a new three-dimensional chaotic map. Multimed Tools Appl 76(6):7849–7867

    Article  Google Scholar 

  61. Shu-Bo L, Jing S, Zheng-Quan X, Jin-Shuo L (2009) Digital chaotic sequence generator based on coupled chaotic systems. Chin Phys B 18 (12):5219–5227

    Article  Google Scholar 

  62. Shuai CHEN, ZHONG XX (2007) Confidential communication through chaos encryption in wireless sensor network. Journal of China University of Mining and Technology 17(2):258–261

    Article  Google Scholar 

  63. Situ G, Zhang J (2006) Position multiplexing for multiple-image encryption. J Opt A Pure Appl Opt 8(5):391–397

    Article  Google Scholar 

  64. Som S, Kotal A, Mitra A, Palit S, Chaudhuri BB (2014) A chaos based partial image encryption scheme. In: 2014 2Nd international conference on business and information management (ICBIM), pp 58–63

  65. Stavroulakis P (2006) Chaos applications in telecommunications. CRC, Boca Raton

    Google Scholar 

  66. Tang G, Liao X (2005) A method for designing dynamical s-boxes based on discretized chaotic map. Chaos, Solitons Fractals 23(5):1901–1909

    Article  MathSciNet  MATH  Google Scholar 

  67. Tang Z, Song J, Zhang X, Sun R (2016) Multiple-image encryption with bit-plane decomposition and chaotic maps. Opt Lasers Eng 80:1–11

    Article  Google Scholar 

  68. Tao S, Ruli W, Yixun Y (1998) Perturbance-based algorithm to expand cycle length of chaotic key stream. Electron Lett 34(1):873–874

    Google Scholar 

  69. Thenmozhi S, Chandrasekaran M (2013) A novel technique for image steganography using nonlinear chaotic map. In: 2013 7Th International conference on intelligent systems and control (ISCO), pp 307–311

  70. Tong XJ, Zhang M, Wang Z, Liu Y, Xu H, Ma J (2015) A fast encryption algorithm of color image based on four-dimensional chaotic system. J Vis Commun Image Represent 33:219–234

    Article  Google Scholar 

  71. Valandar MY, Ayubi P, Barani MJ (2017) A new transform domain steganography based on modified logistic chaotic map for color images. Journal of Information Security and Applications 34:142–151

    Article  Google Scholar 

  72. Valandar MY, Barani MJ, Ayubi P, Aghazadeh M (2019) An integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl 78(8):9971–9989

    Article  Google Scholar 

  73. Wai M, Tam FCM, Lau CKT (2007) Digital communications with chaos: multiple access techniques and performance. Elsevier, Amsterdam

    Google Scholar 

  74. Wang J, Ding Q (2018) Dynamic rounds chaotic block cipher based on keyword abstract extraction. Entropy 20(9):693

  75. Wang L, Cheng H (2019) Pseudo-random number generator based on logistic chaotic system. 21(10):960

  76. Wang Q, Zhang Q, Wei X (2010) Image encryption algorithm based on DNA biological properties and chaotic systems. In: 2010 IEEE Fifth international conference on bio-inspired computing: theories and applications (BIC-TA), pp. 132–136

  77. Wang X, Lin S, Li Y (2021) Bit-level image encryption algorithm based on BP neural network and gray code. Multimed Tools Appl 80(8):11655–11670

    Article  Google Scholar 

  78. Wang X, Zhao D (2011) Multiple-image encryption based on nonlinear amplitude-truncation and phase-truncation in fourier domain. Opt Commun 284(1):148–152

    Article  Google Scholar 

  79. Wang Y, Quan C, Tay C (2014) Nonlinear multiple-image encryption based on mixture retrieval algorithm in fresnel domain. Opt Commun 330:91–98

    Article  Google Scholar 

  80. Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522

    Article  Google Scholar 

  81. Weng H, Zhang C, Chen P, Chen R, Xu J, Liao Y, Liang Z, Shen D, Zhou L, Ke J (2021) A quantum chaotic image cryptosystem and its application in IoT secure communication. IEEE Access 9:20481–20492

    Article  Google Scholar 

  82. Wong KW, Kwok BSH, Law WS (2008) A fast image encryption scheme based on chaotic Standard map. Phys Lett A 372(15):2645–2652

    Article  MATH  Google Scholar 

  83. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci 349-350:137–153

    Article  Google Scholar 

  84. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. In: Cyber journals: multidisciplinary journals in science and technology, journal of selected areas in telecommunications (JSAT)

  85. Xiang H, Liu L (2020) An improved digital Logistic map and its application in image encryption. Multimed Tools Appl 79(41):30329–30355

    Article  Google Scholar 

  86. Xiang T, Wong KW, Liao X (2007) Selective image encryption using a spatiotemporal chaotic system. Chaos 17:023115

    Article  MATH  Google Scholar 

  87. Yang F, Mou J, Sun K (2020) Lossless image compression-encryption algorithm based on BP neural network and chaotic system. Multimed Tools Appl 79:19963

    Article  Google Scholar 

  88. Yang H, Wong KW, Liao X, Zhang W, Wei P (2010) A fast image encryption and authentication scheme based on chaotic maps. Commun Nonlinear Sci Numer Simul 15(11):3507–3517

    Article  MATH  Google Scholar 

  89. Yao W, Wu F, Zhang X, Zheng Z, Wang Z, Wang W, Qiu W (2016) A fast color image encryption algorithm using 4-pixel Feistel structure. PLOS ONE 11(11):e0165937

    Article  Google Scholar 

  90. Yao W, Zhang X, Zheng Z, Qiu W (2015) A colour image encryption algorithm using 4-pixel Feistel structure and multiple chaotic systems. Nonlinear Dyn 81(1):151–168

    Article  MathSciNet  MATH  Google Scholar 

  91. Yavuz E (2019) A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme. Optics & Laser Technology 114:224–239

    Article  Google Scholar 

  92. Ye G, Huang X (2016) A secure image encryption algorithm based on chaotic maps and SHA-3. Security and Communication Networks 9(13):2015–2023. https://doi.org/10.1002/sec.1458

    Google Scholar 

  93. Zarebnia M, Pakmanesh H, Parvaz R (2019) A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images. Optik 179:761–773

    Article  Google Scholar 

  94. Zhang J, Huo D (2019) Image encryption algorithm based on quantum chaotic map and DNA coding. Multimedia Tools and Applications 78 (11):15605–15621

    Article  Google Scholar 

  95. Zhang L, Zhang X (2020) Multiple-image encryption algorithm based on bit planes and chaos. Multimedia Tools and Applications 79(29):20753–20771

    Article  Google Scholar 

  96. Zhang S, Liu L (2021) A novel image encryption algorithm based on SPWLCM and DNA coding. Math Comput Simul 190:723–744

    Article  MathSciNet  MATH  Google Scholar 

  97. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and chaos. Computers & Electrical Engineering 62:401–413

    Article  Google Scholar 

  98. Zhang X, Wang X (2017) Multiple-image encryption algorithm based on mixed image element and permutation. Opt Lasers Eng 92:6–16

    Article  Google Scholar 

  99. Zhang X, Wang X (2018) Multiple-image encryption algorithm based on the 3D permutation model and chaotic system. Symmetry 10:660

    Article  Google Scholar 

  100. Zhang X, Wang X (2019) Multiple-image encryption algorithm based on DNA encoding and chaotic system. Multimedia Tools and Applications 78 (6):7841–7869

    Article  Google Scholar 

  101. Zhou N, Yan X, Liang H (2018) Multi-image encryption scheme based on quantum 3D Arnold transform and scaled Zhongtang chaotic system. Quantum Inf Process 17:338

    Article  MATH  Google Scholar 

  102. Zhou NR, Huang LX, Gong LH, Zeng QW (2020) Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic henon map. Quantum Inf Process 19(9):284

    Article  MathSciNet  Google Scholar 

  103. Zhu H, Tong X, Wang Z, Ma J (2020) A novel method of dynamic s-box design based on combined chaotic map and fitness function. Multimedia Tools and Applications 79(17):12329–12347

    Article  Google Scholar 

  104. Zhu S, Wang G, Zhu C (2019) A secure and fast image encryption scheme based on double chaotic s-boxes. Entropy 21:790

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2018.06.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thang Manh Hoang.

Ethics declarations

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Hoang, T.M. A novel design of multiple image encryption using perturbed chaotic map. Multimed Tools Appl 81, 26535–26589 (2022). https://doi.org/10.1007/s11042-022-12139-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12139-0

Keywords

Navigation