Skip to main content
Log in

A novel randomized chaotic bit-level image encryption algorithm based on a novel 2D-CICM hyper-chaotic mapping with CPA-security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we design a novel chaotic mapping and use it to devise a bit-level image encryption algorithm which provides security against chosen plaintext attacks, or CPA-security for short. We also study various properties of the proposed chaotic mapping, such as having two positive Lyapunov exponents. We also evaluate the randomization of the hyperchaotic discretization approach used in the proposed algorithm using the dieharder 3.31.1 test batteries. Our proposed algorithm is a one-round image encryption algorithm, which give faster encryption and decryption in comparison with more complicated multi-round encryption algorithms. Despite its one-round nature, as is shown in the performance evaluation, it provides acceptable and even competitive security compared to recent chaotic image encryption algorithms. Finally, our proposed image encryption algorithm is robust against noise attacks and data loss.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Ali TS, Ali R (2020) A novel medical image signcryption scheme using TLTS and Henon chaotic map. IEEE Access 8:71,974–71,992

    Google Scholar 

  2. Barker E, Dang Q (2020) NIST Special publication 800-57 part 1, revision 5. NIST, Tech Rep 20

  3. Brown RG, Eddelbuettel D, Bauer D (2021) Dieharder: a random number test suite. http://www.phy.duke.edu/~rgb/General/dieharder.php. Accessed 1 June 2021

  4. Cao C, Sun K, Liu W (2018) A novel bit-level image encryption algorithm based on 2d-LICM hyperchaotic map. Signal Process 143:122–133

    Google Scholar 

  5. Chaboki B, Shakiba A (2021) An image encryption algorithm with a novel chaotic coupled mapped lattice and chaotic image scrambling technique. Indones J Electr Eng Comput Sci 21(2):1103–1112

    Google Scholar 

  6. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Google Scholar 

  7. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    MathSciNet  MATH  Google Scholar 

  8. Donner A, Rosner B (1980) On inferences concerning a common correlation coefficient. J R Stat Soc Ser C (Appl Stat) 29(1):69–76

    Google Scholar 

  9. Elizabeth BL, Gayathri J, Subashini S, Prakash AJ (2022) Hide: hyperchaotic image encryption using dna computing. J Real-Time Image Proc 19:429?443

    Google Scholar 

  10. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(06):1259–1284

    MathSciNet  MATH  Google Scholar 

  11. Gagunashvili N (2010) Chi-square tests for comparing weighted histograms. Nucl Instrum Methods Phys Res Sect A Accelerators, Spectrometers Detectors Assoc Equip 614(2):287–296

    Google Scholar 

  12. Gupta K, Silakari S (2012) Novel approach for fast compressed hybrid color image cryptosystem. Adv Eng Softw 49:29–42

    Google Scholar 

  13. Gupta M, Gupta KK, Khosravi MR, Shukla PK, Kautish S, Shankar A (2021) An intelligent session key-based hybrid lightweight image encryption algorithm using logistic-tent map and crossover operator for internet of multimedia things. Wirel Pers Commun 121(3):1857–1878

    Google Scholar 

  14. Hermassi H, Rhouma R, Belghith S (2013) Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52(2):539–549

    Google Scholar 

  15. Hu T, Liu Y, Gong LH, Guo SF, Yuan HM (2017) Chaotic image cryptosystem using DNA deletion and DNA insertion. Signal Process 134:234–243

    Google Scholar 

  16. Hua Z, Jin F, Xu B, Huang H (2018) 2D logistic-Sine-coupling map for image encryption. Signal Process 149:148–161

    Google Scholar 

  17. Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127

    Google Scholar 

  18. Jin X, He Z, Wang Y, Yu J, Xu J (2021) Towards general object-based video forgery detection via dual-stream networks and depth information embedding. Multimed Tools Appl 1–17

  19. Jin X, Su Y, Zou L, Zhang C, Jing P, Song X (2018) Video logo removal detection based on sparse representation. Multimedia Tools Appl 77(22):29,303–29,322

    Google Scholar 

  20. Kadir A, Hamdulla A, Guo WQ (2014) Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN. Optik-Int J Light Electr Opt 125(5):1671–1675

    Google Scholar 

  21. Kaur M, Singh D, Kumar V (2022) Improved seven-dimensional (i7d) hyperchaotic map-based image encryption technique. Soft Comput 26:2689?2698

    Google Scholar 

  22. Khan M (2015) A novel image encryption scheme based on multiple chaotic s-boxes. Nonlinear Dyn 82(1-2):527–533

    MathSciNet  Google Scholar 

  23. Lake DE, Richman JS, Griffin MP, Moorman JR (2002) Sample entropy analysis of neonatal heart rate variability. Am J Phys-Regul Integr Comp Physiol 283(3):R789–R797

    Google Scholar 

  24. Li S, Chen G, Cheung A, Bhargava B, Lo KT (2007) On the design of perceptual mpeg-video encryption algorithms. IEEE Trans Circ Syst Video Technol 17(2):214–223

    Google Scholar 

  25. Lindell Y, Katz J (2014) Introduction to modern cryptography, Chapman and hall/CRC, London

  26. Liu H, Wang X, Kadir A (2013) Color image encryption using choquet fuzzy integral and hyper chaotic system. Optik-Int J Light Electr Opt 124 (18):3527–3533

    Google Scholar 

  27. Liu H, Wang X, et al. (2012) Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 12(5):1457–1466

    Google Scholar 

  28. Liu W, Sun K, Zhu C (2016) A fast image encryption algorithm based on chaotic map. Opt Lasers Eng 84:26–36

    Google Scholar 

  29. Liu X, Song Y, Jiang GP (2019) Hierarchical bit-level image encryption based on chaotic map and Feistel network. Int J Bifurcation Chaos 29 (02):1950,016

    MathSciNet  MATH  Google Scholar 

  30. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurcation Chaos 14(10):3613–3624

    MathSciNet  MATH  Google Scholar 

  31. Niu Y, Zhang X, Han F (2017) Image encryption algorithm based on hyperchaotic maps and nucleotide sequences database. Comput Intell Neurosci 2017:1–11

    Google Scholar 

  32. Norouzi B, Mirzakuchaki S, Seyedzadeh SM, Mosavi MR (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497

    Google Scholar 

  33. Ortakci Y, Abdullah MY (2021) Performance analyses of aes and 3des algorithms for encryption of satellite images. In: Ben Ahmed M, Rakıp Karaş İ, Santos D, Sergeyeva O, Boudhir AA (eds) Innovations in smart cities applications, vol 4. Springer International Publishing, Cham, pp 877–890

  34. Pak C, Huang L (2017) A new color image encryption using combination of the 1d chaotic map. Signal Process 138:129–137

    Google Scholar 

  35. Rhouma R, Meherzi S, Belghith S (2009) OCML-Based colour image encryption. Chaos, Solitons Fractals 40(1):309–318

    MATH  Google Scholar 

  36. Richman JS, Moorman JR (2000) Physiological time-series analysis using approximate entropy and sample entropy, vol 278

  37. Rostami MJ, Shahba A, Saryazdi S, Nezamabadi-pour H (2017) A novel parallel image encryption with chaotic windows based on logistic map. Comput Electr Eng 62:384–400

    Google Scholar 

  38. Shakiba A (2019) A novel randomized one-dimensional chaotic chebyshev mapping for chosen plaintext attack secure image encryption with a novel chaotic breadth first traversal. Multimedia Tools Appl 78:34773–34799. https://doi.org/10.1007/s11042-019-08071-5

    Google Scholar 

  39. Shakiba A (2019) A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the chebyshev mappings and one-time pad. J King Saud Univ-Comput Inf Sci 33:562–571. https://doi.org/10.1016/j.jksuci.2019.03.003

    Google Scholar 

  40. Shakiba A (2019) Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks. J Inf Optim Sci 40(3):725–750

    MathSciNet  Google Scholar 

  41. Shakiba A (2020) Generating dynamic S-boxes using 1D Chebyshev chaotic maps. J Comput Secur 7:1–17. https://doi.org/10.22108/jcs.2020.116547.1023

    Google Scholar 

  42. Shakiba A (2020) A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm. Multimedia Tools Appl 79(43):32,575–32,605

    Google Scholar 

  43. Shakiba A (2021) A novel 2d cascade modulation couple hyperchaotic mapping for randomized image encryption. Multimed Tools Appl 80:17983–18006

    Google Scholar 

  44. Shakiba A, Hooshmandasl MR, Meybodi MA (2016) Cryptanalysis of multiplicative coupled cryptosystems based on the chebyshev polynomials. Int J Bifurcation Chaos 26(07):1650,112

    MathSciNet  MATH  Google Scholar 

  45. Shakiba A, Hooshmandasl MR, Meybodi MA (2016) Cryptanalysis of multiplicative coupled cryptosystems based on the chebyshev polynomials. Int J Bifurcation Chaos 26(07):1650,112

    MathSciNet  MATH  Google Scholar 

  46. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423

    MathSciNet  MATH  Google Scholar 

  47. Souyah A, Faraoun KM (2016) An image encryption scheme combining chaos-memory cellular automata and weighted histogram. Nonlinear Dyn 86(1):639–653

    MathSciNet  Google Scholar 

  48. Stergiou C, Psannis KE (2017) Recent advances delivered by mobile cloud computing and internet of things for Big data applications: a survey. Int J Netw Manag 27(3):e1930

    Google Scholar 

  49. Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of iot and cloud computing. Futur Gener Comput Syst 78:964–975

    Google Scholar 

  50. Stergiou C, Psannis KE, Plageras AP, Ishibashi Y, Kim BG (2018) Algorithms for efficient digital media transmission over IoT and cloud networking. J Multimedia Inf Syst 5(1):27–34

    Google Scholar 

  51. Wang X, Teng L, Qin X (2012) A novel colour image encryption algorithm based on chaos. Signal Process 92(4):1101–1108

    MathSciNet  Google Scholar 

  52. Wang X, Wang Q, Zhang Y (2015) A fast image algorithm based on rows and columns switch. Nonlinear Dyn 79(2):1141–1149

    MathSciNet  Google Scholar 

  53. Wang X, Wang X, Zhao J, Zhang Z (2011) Chaotic encryption algorithm based on alternant of stream cipher and block cipher. Nonlinear Dyn 63 (4):587–597

    MathSciNet  Google Scholar 

  54. Wei X, Guo L, Zhang Q, Zhang J, Lian S (2012) A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system. J Syst Softw 85(2):290–299

    Google Scholar 

  55. Wolf A, Swift JB, Swinney HL, Vastano JA (1985) Determining lyapunov exponents from a time series. Phys D Nonlinear Phenom 16(3):285–317

    MathSciNet  MATH  Google Scholar 

  56. Wu X, Wang D, Kurths J, Kan H (2016) A novel lossless color image encryption scheme using 2d dwt and 6d hyperchaotic system. Inf Sci 349:137–153

    Google Scholar 

  57. Wu X, Wang K, Wang X, Kan H (2017) Lossless chaotic color image cryptosystem based on DNA encryption and entropy. Nonlinear Dyn 90 (2):855–875

    MathSciNet  MATH  Google Scholar 

  58. Yan W, Ding Q (2021) A novel s-box dynamic design based on nonlinear-transform of 1d chaotic maps. Electronics 10(11):1313

    Google Scholar 

  59. Yang YG, Tian J, Lei H, Zhou YH, Shi WM (2016) Novel quantum image encryption using one-dimensional quantum cellular automata. Inf Sci 345:257–270

    Google Scholar 

  60. Ye G, Pan C, Huang X, Zhao Z, He J (2018) A chaotic image encryption algorithm based on information entropy. Int J Bifurcation Chaos 28 (01):1850,010

    MathSciNet  MATH  Google Scholar 

  61. Ye G, Wong KW (2012) An efficient chaotic image encryption algorithm based on a generalized arnold map. Nonlinear Dyn 69(4):2079–2087

    MathSciNet  Google Scholar 

  62. Yin Q, Wang C (2018) A new chaotic image encryption scheme using breadth-first search and dynamic diffusion. Int J Bifurcation Chaos 28(04):1850,047

    MathSciNet  Google Scholar 

  63. Zhang Y (2018) The unified image encryption algorithm based on chaos and cubic s-box. Inf Sci 450:361–377

    MathSciNet  MATH  Google Scholar 

  64. Zhang Y, Xiao D (2014) An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun Nonlinear Sci Numer Simul 19(1):74–82

    MATH  Google Scholar 

  65. Zhang Y, Zhang LY, Zhou J, Liu L, Chen F, He X (2016) A review of compressive sensing in information security field. IEEE Access 4:2507–2519

    Google Scholar 

  66. Zhen P, Zhao G, Min L, Jin X (2016) Chaos-based image encryption scheme combining dna coding and entropy. Multimed Tools Appl 75(11):6303–6319

    Google Scholar 

  67. Zhou W, Wang X, Wang M, Li D (2022) A new combination chaotic system and its application in a new bit-level image encryption scheme. Opt Lasers Eng 149(106):782

    Google Scholar 

  68. Zhou Y, Hua Z, Pun CM, Chen CP (2015) Cascade chaotic system with applications. IEEE Trans Cybernet 45(9):2001–2012

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Shakiba.

Ethics declarations

Conflict of Interests

The author declares that he has no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shakiba, A. A novel randomized chaotic bit-level image encryption algorithm based on a novel 2D-CICM hyper-chaotic mapping with CPA-security. Multimed Tools Appl 82, 17631–17657 (2023). https://doi.org/10.1007/s11042-022-13708-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-13708-z

Keywords

Navigation