Skip to main content
Log in

Block image encryption based on chaotic map and fractional fourier transformation

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In order to prevent others from illegally accessing sensitive image information on the Internet, image encryption has become more and more important. This paper proposes a novel image encryption scheme based on chaotic map and fractional Fourier transformation. The encryption steps are as follows. Firstly, we divide the image into blocks and select high correlation blocks to perform FRFT transformation. This is because it reduces the overall image correlation and saves time at the same time. Secondly, the key related to plain image will be used to change the pixel values. The key of the encryption algorithm relies on the plain image so that the cipher image is sensitive to both the key and the plain image to resist attacks. Finally, the Baker Map is used to scramble the entire image. The scheme has been verified with indicators such as visual inspection, keyspace, encryption time, entropy, encryption quality, histogram, differential analysis, the effect of noise and the effect of occlusion. The results show that the scheme has high security and can effectively resist different types of attacks. Compare with the other two similar image encryption schemes, the proposed encryption algorithm decreases the encryption time and obtains a better histogram.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Fig. 6
Algorithm 2
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Abdulla AA, Sellahewa H, Jassim SA (2019) Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images. Multimed Tools Appl 78(13):17799–17823

    Article  Google Scholar 

  2. Allah O, Afifi A, El-Shafai W et al (2020) Investigation of chaotic image encryption in spatial and frft domains for cybersecurity applications. IEEE Access PP(99)

  3. Allah O, Alzain MA, El-Sayed HS et al (2020) Secure color image cryptosystem based on chaotic logistic in the frft domain. Multimed Tools Appl 79(21)

  4. Bourbakis N, Alexopoulos C (1992) Picture data encryption using scan patterns. Pattern Recogn 25(6):567–581

    Article  Google Scholar 

  5. Brahim AH, Pacha AA, Said NH (2020) Image encryption based on compressive sensing and chaos systems. Optics & Laser Technology 132

  6. Briggs K (1990) An improved method for estimating liapunov exponents of chaotic time series. Phys Lett A 151(1-2):27–32

    Article  MathSciNet  Google Scholar 

  7. Bwa B, Bfz A, Xwl A (2020) An image encryption approach on the basis of a time delay chaotic system - sciencedirect. Optik 225

  8. Dongare AS, Alvi A, Tarbani N (2017) An efficient technique for image encryption and decryption for secured multimedia application. International Research Journal of Engineering and Technology (IRJET) 4(4):3186–3190

    Google Scholar 

  9. Donoho DL (2006) Compressed sensing. IEEE Transactions on Information Theory 52(4):1289–1306

    Article  MathSciNet  MATH  Google Scholar 

  10. Elhosany HM, Hossin HE, Kazemian HB et al (2012) C9. chaotic encryption of images in the fractional fourier transform domain using different modes of operation. In: 2012 29th national radio science conference (NRSC), IEEE, pp 223–235

  11. Enayatifar R, Abdullah AH, Isnin IF (2014) Chaos-based image encryption using a hybrid genetic algorithm and a dna sequence. Opt Lasers Eng 56 (may):83–93

    Article  Google Scholar 

  12. FIPS P (2001) 197: Advanced encryption standard (aes). National Institute of Standards and Technology 26

  13. Fridrich Jiri (1998) Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation & Chaos 8(06):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  14. Gao H, Zhang Y, Liang S et al (2006) A new chaotic algorithm for image encryption. Chaos, Solitons & Fractals 29(2):393–399

    Article  MATH  Google Scholar 

  15. Henderson HV, Searle S (1979) Vec and vech operators for matrices, with some uses in jacobians and multivariate statistics. Canadian Journal of Statistics 7(1):65–81

    Article  MathSciNet  MATH  Google Scholar 

  16. Hoang TM, Assad SE (2020) Novel models of image permutation and diffusion based on perturbed digital chaos. Entropy 22(5):548

    Article  MathSciNet  Google Scholar 

  17. Liang HR, Tao XY, Zhou NR (2016) Quantum image encryption based on generalized affine transform and logistic map. Quantum Inf Process 15 (7):2701–2724

    Article  MathSciNet  MATH  Google Scholar 

  18. Liao X, Li K, Yin J (2017) Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multimed Tools Appl 76(20):20739–20753

    Article  Google Scholar 

  19. Liao X, Qin Z, Ding L (2017) Data embedding in digital images using critical functions. Signal Processing:, Image Communication 58:146–156

    Google Scholar 

  20. Liao X, Yu Y, Li B et al (2019) A new payload partition strategy in color image steganography. IEEE Trans Circuits Syst Video Technol 30(3):685–696

    Article  Google Scholar 

  21. Noha R, Ahmed HH, El-Khamy SE et al (2017) Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain. J Cent South Univ 24(009):2049–2057

    Article  Google Scholar 

  22. Pareek NK, Patidar V, Sud KK (2006) mage encryption using chaotic logistic map. Image and Vision Computing 24(9):926–934

    Article  Google Scholar 

  23. Pei SC, Yeh MH (1997) Improved discrete fractional fourier transform. Opt Lett 22(14):1047–9

    Article  Google Scholar 

  24. Qiang Z, Ling G, Wei X (2010) Image encryption using dna addition combining with chaotic maps. Math Comput Model 52(11-12):2028–2035

    Article  MathSciNet  MATH  Google Scholar 

  25. Ramadan N, Hossam E, Elkhamy SE (2015) Hybrid ciphering system of images based on fractional fourier transform and two chaotic maps. Journal of Physical Oceanography

  26. Sher KJ, Jawad A (2019) Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing

  27. Standard DE (1999) Data encryption standard. Federal Information Processing Standards Publication, pp 112

  28. Sui L, Xiao Z, Huang C, et al. (2019) Silhouette-free interference-based multiple-image encryption using cascaded fractional fourier transforms. Opt Lasers Eng 113(FEB.):29–37

    Google Scholar 

  29. Tao R, Deng B, Yue W (2006) Research progress of the fractional fourier transform in signal processing. Science in China 49(001):1–25

    MathSciNet  MATH  Google Scholar 

  30. Wang X, Shi Q (2005) New type crisis: hysteresis and fractal in coupled logistic map. Chin J Appl Mech 4:501–506

    Google Scholar 

  31. Wang Y, Zhou S (2011) A novel image encryption algorithm based on fractional fourier transform. IEEE

  32. Wu J, Liao X, Bo Y (2018) Image encryption using 2d hénon-sine map and dna approach. Signal Process 153:11–23

    Article  Google Scholar 

  33. Xiao D, Chen S (2014) Separable data hiding in encrypted image based on compressive sensing. Electronics Lett 50(8):598–600

    Article  Google Scholar 

Download references

Funding

The authors are supported by the Science and technology research project of Hebei higher education Nos.ZD2021011.

The authors have no relevant financial or non-financial interests to disclose.

All data generated or analysed during this study are included in this published article. The code contained in the article is available.

Material preparation, data collection and analysis were performed by Qiao Wang and Wanqing Wu. The first draft of the manuscript was written by Qiao Wang. Wanqing Wu has reviewed and revised the manuscript several times.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiao Wang.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, W., Wang, Q. Block image encryption based on chaotic map and fractional fourier transformation. Multimed Tools Appl 82, 10367–10395 (2023). https://doi.org/10.1007/s11042-022-13675-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13675-5

Keywords

Navigation