Skip to main content
Log in

A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. Benefiting from inherent properties such as ergodicity and key-sensitivity; this can potentially improve non-linearity in encrypted data. This paper introduces a hybrid scheme that encrypt color images using multiple chaotic maps such as the two-dimensional Arnold cat map (ACM), Newton-Leipnik dynamic system (NLDS), and a modified version of the Logistic Gaussian chaotic system (LOGAS). To make the scheme plaintext dependent, the input parameters (keys) of the chaotic maps are determined by passing the plaintext color image layers through SHA-512. Initially, the color image layers are shuffled by applying two-dimensional Arnold map scrambling. The permuted pixels were encrypted through a pseudo-random number sequences (PRNS) generated from the NLDS. To strengthen the suggested approach’s security level, the modified LOGAS were utilized to generate dynamic substitution boxes (S-boxes) to substitute the encrypted pixels. Moreover, the proposed approach is tested through various statistical tests. The adjacent pixel correlation and entropy value are close to 0 and 8, respectively. The NPCR and UACI tests values are 99% and 33%, respectively. The encrypted images histograms are flat which is close to optimal value, and the computational time is less than 2.0 sec for the proposed scheme. Thus, these findings indicate the effectiveness and better reliability of the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Ahmad H (2016) A secure image encryption scheme based on chaotic maps and affine transformation. Multimed Tools Appl 75(21):13951–13976

    Article  Google Scholar 

  2. Ahmad J, Khan MA, Hwang SO, Khan JS (2017) A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural computing and applications 28(1):953–967

    Article  Google Scholar 

  3. Ahmad J, Larijani H, Emmanuel R, Mannion M et al (2018) Secure occupancy monitoring system for iot using lightweight intertwining logistic map. In: 2018 10th Computer science and electronic engineering (CEEC). IEEE, pp 208–213

  4. Ahmad J, Masood F, Shah SA, Jamal SS, Hussain I (2020) A novel secure occupancy monitoring scheme based on multi-chaos mapping. Symmetry 12(3):350

    Article  Google Scholar 

  5. Butt KK, Li G, Masood F, Khan S (2020) A digital image confidentiality scheme based on pseudo-quantum chaos and lucas sequence. Entropy 22 (11):1276

    Article  MathSciNet  Google Scholar 

  6. Chai X, Gan Z, Yang K, Chen Y, Liu X (2017) An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and dna sequence operations. Signal Process Image Commun 52:6–19

    Article  Google Scholar 

  7. Chen E, Min L, Chen G (2017) Discrete chaotic systems with one-line equilibria and their application to image encryption. International Journal of Bifurcation and Chaos 27(03):1750046

    Article  MathSciNet  MATH  Google Scholar 

  8. Driss K, Boulila W, Batool A, Ahmad J (2020) A novel approach for classifying diabetes’ patients based on imputation and machine learning. In: 2020 International conference on UK-china emerging technologies (UCET). IEEE, pp 1–4

  9. El Hanouti I, El Fadili H (2021) Security analysis of an audio data encryption scheme based on key chaining and dna encoding. Multimed Tools Appl 80 (8):12077–12099

    Article  Google Scholar 

  10. El Hanouti I, El Fadili H, Zenkouar K (2021) Breaking an image encryption scheme based on arnold map and lucas series. Multimed Tools Appl 80 (4):4975–4997

    Article  Google Scholar 

  11. El Hanouti I, El Fadili H, souhail W, Masood F (2020) A lightweight pseudo-random number generator based on a robust chaotic map. In: 2020 Fourth international conference on intelligent computing in data sciences (ICDS). https://doi.org/10.1109/ICDS50568.2020.9268715. IEEE, pp 1–6

  12. Elkandoz MT, Alexan W, Hussein HH (2019) Logistic sine map based image encryption. In: 2019 signal processing: algorithms, architectures, arrangements, and applications (SPA). IEEE, pp 290–295

  13. Elkandoz MT, Alexan W, Hussein HH (2019) Double-layer image security scheme with aggregated mathematical sequences. In: 2019 International conference on advanced communication technologies and networking (CommNet). IEEE, pp 1–7

  14. Farah MB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, 1–24

  15. Farrag S, alexan W, Hussein H (2019) Triple layer image security using a zigzag embedding pattern. In: 2019 International conference on advanced communication technologies and networking (CommNet’19) Morocco

  16. Farwa S, Shah T, Muhammad N, Bibi N, Jahangir A, Arshad S (2017) An image encryption technique based on chaotic s-box and arnold transform. Int J Adv Comput Sci Appl 8:360–364

    Google Scholar 

  17. Haider D, Ren A, Fan D, Zhao N, Yang X, Shah SA, Hu F, Abbasi QH (2019) An efficient monitoring of eclamptic seizures in wireless sensors networks. Comput Electr Eng 75:16–30

    Article  Google Scholar 

  18. Khan JS, Ahmad J (2019) Chaos based efficient selective image encryption. Multidim Syst Sign Process 30(2):943–961

    Article  MathSciNet  MATH  Google Scholar 

  19. Khan J, Ahmad J, Hwang SO (2015) An efficient image encryption scheme based on: Henon map, skew tent map and s-box. In: 2015 6th International conference on modeling, simulation, and applied optimization (ICMSAO). IEEE, pp 1–6

  20. Khan M, Masood F (2019) A novel chaotic image encryption technique based on multiple discrete dynamical maps. Multimed Tools Appl 78 (18):26203–26222

    Article  Google Scholar 

  21. Khan M, Masood F, Alghafis A (2019) Secure image encryption scheme based on fractals key with fibonacci series and discrete dynamical system. Neural Comput Appl, 1–21

  22. Khan M, Masood F, Alghafis A, Amin M, Naqvi SIB (2019) A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and brownian motion. PloS one, vol. 12:14

    Google Scholar 

  23. Khan M, Shah T (2014) A novel statistical analysis of chaotic s-box in image encryption. 3D Research 5(3):16

    Article  Google Scholar 

  24. Lai Q, Akgul A, Li C, Xu G, Çavuşoğlu Ü (2018) A new chaotic system with multiple attractors: dynamic analysis, circuit realization and s-box design. Entropy 20(1):12

    Article  Google Scholar 

  25. Leipnik R, Newton T (1981) Double strange attractors in rigid body motion with linear feedback control. Phys Lett A 86(2):63–67

    Article  MathSciNet  Google Scholar 

  26. Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246

    Article  Google Scholar 

  27. Liang Y, He F, Li H (2019) An asymmetric and optimized encryption method to protect the confidentiality of 3d mesh model. Adv Eng Inform 42:100963

    Article  Google Scholar 

  28. Liang Y, He F, Zeng X (2020) 3D mesh simplification with feature preservation based on whale optimization algorithm and differential evolution. Integrated Computer-Aided Engineering, no. Preprint, 1–19

  29. Masood F, Ahmad J, Shah SA, Jamal SS, Hussain I (2020) A novel hybrid secure image encryption based on julia set of fractals and 3d lorenz chaotic map. Entropy 22(3):274

    Article  MathSciNet  Google Scholar 

  30. Masood F, Boulila W, Ahmad J, Sankar S, Rubaiee S, Buchanan WJ, et al. (2020) A novel privacy approach of digital aerial images based on mersenne twister method with dna genetic encoding and chaos. Remote Sens 12(11):1893

    Article  Google Scholar 

  31. Masood F, Driss M, Boulila W, Ahmad J, Rehman SU, Jan SU, Qayyum A, Buchanan WJ (2021) A lightweight chaos-based medical image encryption scheme using random shuffling and xor operations. Wirel Pers Commun, 1–28

  32. Masood F, Masood J, Zhang L, Jamal SS, Boulila W, Rehman SU, Khan FA, Ahmad J (2021) A new color image encryption technique using dna computing and chaos-based substitution box. Soft Comput, 1–17

  33. Masood J, Shahzad M, Khan ZA, Akre V, Rajan A, Ahmed S, Masood F (2020) Effective classification algorithms and feature selection for bio-medical data using iot. In: 2020 Seventh International Conference on Information Technology Trends (ITT). IEEE, pp 42–47

  34. Matthews R (1989) On the derivation of a “chaotic” encryption algorithm. Cryptologia 13(1):29–42

    Article  MathSciNet  Google Scholar 

  35. Munir N, Khan M, Hazzazi MM, Aijaedi A, Alharbi AR, Hussain I et al (2021) Cryptanalysis of internet of health things encryption scheme based on chaotic maps. IEEE Access 9:105678–105685

    Article  Google Scholar 

  36. Munir N, Khan M, Shah T, Alanazi AS, Hussain I (2021) Cryptanalysis of nonlinear confusion component based encryption algorithm. Integration 79:41–47

    Article  Google Scholar 

  37. Nkandeu YPK, Tiedeu A (2019) An image encryption algorithm based on substitution technique and chaos mixing. Multimed Tools Appl 78 (8):10013–10034

    Article  Google Scholar 

  38. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934

    Article  Google Scholar 

  39. Podlubny I (1998) Fractional differential equations: an introduction to fractional derivatives, fractional differential equations, to methods of their solution and some of their applications. Elsevier, New York

    MATH  Google Scholar 

  40. Qayyum A, Ahmad J, Boulila W , Rubaiee S, Masood F (2020) Chaos-based confusion and diffusion of image pixels using dynamic substitution. IEEE Access 8:140876–140895

    Article  Google Scholar 

  41. Seyedzadeh SM, Norouzi B, Mosavi MR, Mirzakuchaki S (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map. Nonlinear Dyn 81(1):511–529

    Article  MathSciNet  MATH  Google Scholar 

  42. Shah SA, Ahmad J, Masood F, Shah SY, Pervaiz H, Taylor W, Imran MA, Abbasi QH (2020) Privacy-preserving wandering behavior sensing in dementia patients using modified logistic and dynamic newton leipnik maps. IEEE Sensors J 21(3):3669–3679

    Article  Google Scholar 

  43. Shah SA, Fioranelli F (2019) Rf sensing technologies for assisted daily living in healthcare: a comprehensive review. IEEE Aerosp Electron Syst Mag 34 (11):26–44

    Article  Google Scholar 

  44. Shah SA, Yang X, Abbasi QH (2019) Cognitive health care system and its application in pill-rolling assessment. International Journal of Numerical Modelling: Electronic Networks, Devices and Fields 32(6):e2632

    Article  Google Scholar 

  45. Shannon CE (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4):656–715

    Article  MathSciNet  MATH  Google Scholar 

  46. Shannon CE, Weaver W (1949) Ch 6: Shannon entropy. The Mathematical Theory of Communication, 51–58

  47. Tang G, Wang S, Lü H., Hu G (2003) Chaos-based cryptograph incorporated with s-box algebraic operation. Phys Lett A 318(4-5):388–398

    Article  MathSciNet  MATH  Google Scholar 

  48. Wang X, Gao S (2021) A chaotic image encryption algorithm based on a counting system and the semi-tensor product. Multimed Tools Appl 80 (7):10301–10322

    Article  Google Scholar 

  49. Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on josephus traversing and mixed chaotic map. IEEE Access 6:23733–23746

    Article  Google Scholar 

  50. Wang X, wang Y, Zhu X, Luo C (2020) A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and dna level. Opt Lasers Eng 125:105851

    Article  Google Scholar 

  51. Wang X, Çavuşoğlu Ü, Kacar S, Akgul A, Pham V-T, Jafari S, Alsaadi FE, Nguyen XQ (2019) S-box based image encryption application using a chaotic system without equilibrium. Appl Sci 9(4):781

    Article  Google Scholar 

  52. Wu Y, He F, Yang Y (2020) A grid-based secure product data exchange for cloud-based collaborative design. International journal of cooperative information systems 29(01n02):2040006

    Article  Google Scholar 

  53. Wu Y, He F, Zhang D, Li X (2015) Service-oriented feature-based data exchange for cloud-based design and manufacturing. IEEE Trans Serv Comput 11(2):341–353

    Article  Google Scholar 

  54. Wu X, Li Y, Kurths J (2015) A new color image encryption scheme using cml and a fractional-order chaotic system. PloS one 3:10

    Google Scholar 

  55. Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on dna encryption and entropy. Nonlinear Dyn 90 (2):855–875

    Article  MathSciNet  MATH  Google Scholar 

  56. Yang X, Fan D, Ren A, Zhao N, Shah SA, Alomainy A, Ur-Rehman M, Abbasi QH (2020) Diagnosis of the hypopnea syndrome in the early stage. Neural Comput Appl 32(3):855–866

    Article  Google Scholar 

  57. Younas I, Khan M (2018) A new efficient digital image encryption based on inverse left almost semi group and lorenz chaotic system. Entropy 20(12):913

    Article  Google Scholar 

  58. Zhang Y-Q, Hao J-L, Wang X-Y (2020) An efficient image encryption scheme based on s-boxes and fractional-order differential logistic map. IEEE Access 8:54175–54188

    Article  Google Scholar 

  59. Zhang Y-Q, He Y, Li P, Wang X-Y (2020) A new color image encryption scheme based on 2dnlcml system and genetic operations. Opt Lasers Eng 128:106040

    Article  Google Scholar 

  60. Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining dna coding and entropy. Multimed Tools Appl 75(11):6303–6319

    Article  Google Scholar 

  61. Özkaynak F (2019) Chaos based substitution boxes as a cryptographic primitives: Challenges and opportunities. Chaotic Model Simul 1:49–57

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jan Sher Khan.

Ethics declarations

There are no potential conflicts of interest, and the research does not include human participants and/or animals. The work has been undertaken to accepted standards of ethics and of professional standards.

Conflict of Interests

The authors declare that they have no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Masood, F., Boulila, W., Alsaeedi, A. et al. A novel image encryption scheme based on Arnold cat map, Newton-Leipnik system and Logistic Gaussian map. Multimed Tools Appl 81, 30931–30959 (2022). https://doi.org/10.1007/s11042-022-12844-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12844-w

Keywords

Navigation