Skip to main content

Advertisement

Log in

The unified image encryption algorithm based on composite chaotic system

  • 1187: Recent Advances in Multimedia Information Security: Cryptography and Steganography
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper proposes a fast and unified encryption and decryption algorithm based on a composite chaotic system. By combining Logistic map and Sine map, the New-Logistic-Sine map (NLS map) is obtained. NLS map generated the diffusion key matrix needed in the algorithm process, which can enhance the anti-attack ability of the encryption algorithm. Different from most image cryptography systems, the algorithm adopted in this paper has the same encryption process and decryption process, which can save half of the resources in real applications. Firstly, the Secure Hash Algorithm 256 (SHA256) value of the original image was obtained, and the initial values and control parameters of NLS map and Logistic map were calculated; Secondly, the diffusion key matrix is obtained by iterative the NLS map, and is used to perform the first diffusion of the original image; Thirdly, the permutation key sequence is obtained by iterative the Logistic map, and using the sequence to perform the permutation operation on the image after the first diffusion; Finally, the same diffusion key matrix as the first diffusion operation is used to carry out the second diffusion operation on the displaced image to obtain the final encrypted image. The simulation experiment and security analysis show that the proposed image cryptosystem possessed identical encryption process and decryption process, and the algorithm speed is improved ensure the security of the algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Alawida M, Teh JS, Samsudin A, Alshoura W’H (2019) An image encryption scheme based on hybridizing digital chaos and finite state machine. Signal Process 164:249–266

    Article  MATH  Google Scholar 

  2. Alawida M, Samsudin A, Teh JS, Alkhawaldeh RS (2019) A new hybrid digital chaotic system with applications in image encryption. Signal Process 160:45–58

    Article  Google Scholar 

  3. Belazi A, Abd el-Latif AA, Belghith S (2016) A novel image encryption scheme based on substitution-permutation network and chaos. Signal Process 138:155–170

    Article  Google Scholar 

  4. Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Signal Process 148:124–144

    Article  Google Scholar 

  5. Chai X, Gan Z, Yuan K, Chen Y, Liu X (2019) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing & Application 31(1):219–237

    Article  Google Scholar 

  6. Chen J, Zhu Z-l, Fu C, Zhang L-b, Zhang Y (2015) An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach. Commun Nonlinear Sci Numer Simulat 23(1–3):294–310

    Article  MathSciNet  MATH  Google Scholar 

  7. Chun C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map. Signal Process 143:122–133

    Article  Google Scholar 

  8. Dai Y, Wang X (2012) Medical image encryption based on a composition of Logistic Maps and Chebyshev Maps. 2012 IEEE International Conference on Information and Automation, Shenyang, 210–214. https://doi.org/10.1109/ICInfA.2012.6246810

  9. Farah MAB, Farah A, Farah T (2019) An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics 99:3401–3064

    MATH  Google Scholar 

  10. Hongjun L, Wang X, Kadir A (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12:1457–1466

    Article  Google Scholar 

  11. Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Article  Google Scholar 

  12. Hua Z, Yi S, Zhou Y (2018) Medical image encryption using high-speed scrambling and pixel adaptive diffusion. Signal Process 144:134–144

    Article  Google Scholar 

  13. Jha DP, Kohli R, Gupta A (2016) Proposed encryption algorithm for data security using matrix properties. International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016:86–90. https://doi.org/10.1109/ICICCS.2016.7542316

    Article  Google Scholar 

  14. Kohli R, Kumar M (2013) FPGA implementation of cryptographic algorithms using multi-encryption technique. International Journal of Advanced Research in Computer Science and Software Engineering 3(5):112–120

    MathSciNet  Google Scholar 

  15. Joshua C. D, Jian-Ping Li, Prince C. Addo (2019) An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation. Multimedia Tools & Applications 78:24979–25000

  16. Lin T, Wang X, Meng J (2018) A chaotic color image encryption using integrated bit-level permutation. Multimedia Tools & Applications 77:883–6896

    Google Scholar 

  17. Mohamed KF (2014) A parallel block-based encryption schema for digital images using reversible cellular automata. Engineering Science & Technology, an International Journal 27(2):85–94

    Article  Google Scholar 

  18. Murillo-Escobar MA et al (2017) A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dynamics 87(1):407–425

    Article  MathSciNet  Google Scholar 

  19. Nanrun Z et al (2015) Image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing. Opt Laser Technol 82:121–133

    Google Scholar 

  20. Sara T, Nijad AN (2014) Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci 269:21–34

    Article  MathSciNet  MATH  Google Scholar 

  21. Souyah A, Faraoun KM (2016) Fast and efficient randomized encryption scheme for digital images based on Quadtree decomposition and reversible memory cellular automata. Nonlinear Dynamics 84:715–732

    Article  MathSciNet  Google Scholar 

  22. Taneja N, Raman B (2012) Combinational domain encryption for still visual data. Multimedia Tools & Applications 59:775–793

    Article  Google Scholar 

  23. Taneja N, Raman B, Gupta I (2011) Selective image encryption in fractional wavelet domain. AEUE - International Journal of Electronics and Communications 65(4):338–344

    Article  Google Scholar 

  24. Taneja N, Raman B, Gupta I (2012) Chaos based cryptosystem for still visual data. Multimedia Tools & Applications 61(2):281–298

    Article  Google Scholar 

  25. Taneja N, Bhatnagar RB et al (2013) Joint watermarking and encryption for still visual data. Multimedia Tools & Applications 67(3):593–606

    Article  Google Scholar 

  26. Ying-Qian Z, Wang X-Y (2015) A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 26:10–20

    Article  Google Scholar 

  27. Yong Z (2018) The image encryption algorithm based on chaos and DNA computing. Multimedia tools & applications 77(16):21589–21615

    Article  Google Scholar 

  28. Yong Z (2018) The unified image encryption algorithm based on chaos and cubic S-box. Inf Sci 450:361–377

    Article  MathSciNet  MATH  Google Scholar 

  29. Zhang Y, Tang Y (2018) A plaintext-related image encryption algorithm based on chaos. Multimedia Tools & Applications 77:6647–6669. https://doi.org/10.1007/s11042-017-4577-1

    Article  Google Scholar 

  30. Zheng J, Zheng L, Tang Z (2020) An Image Encryption Algorithm Based on Multichaotic System and DNA Coding. Discret Dyn Nat Soc. Article ID 5982743, pages 16. https://doi.org/10.1155/2020/5982743

  31. Zhou S (2015) Image Encryption Technology Research Based on Neural Network. 2015 International Conference on Intelligent Transportation, Big Data and Smart City, Halong Bay: 462–465. https://doi.org/10.1109/ICITBS.2015.119

  32. Zhu Z, Zhang W, Wong K-w, Yu H (2011) A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 181:1171–1186

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by the National Natural Science Foundation of China (Grant No. 61901074).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiming Zheng.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, J., Zeng, Q. The unified image encryption algorithm based on composite chaotic system. Multimed Tools Appl 82, 22231–22250 (2023). https://doi.org/10.1007/s11042-022-13461-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13461-3

Keywords