Skip to main content
Log in

A new two-dimensional sine-coupled-logistic map and its application in image encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Chaotic map has some important features such as unpredictability, ergodicity, and complexity. When chaotic map is widely used for information transmission and secure communication, its chaotic performance decides the security of encryption algorithm. For the purpose of improving the chaotic performance, we put forward a novel two-dimensional Sine-coupled-Logistic map (2D-SCLM) in this paper. By comparing with other 2D chaotic maps, 2D-SCLM has more excellent pseudo-random characteristics, unpredictability, and wider range of chaos. For the purpose of studying its application, we put forward an image encryption approach based on 2D-SCLM (SCLM-IEA). Firstly, a flag shape scrambling algorithm is designed to alter the pixel location of the image. Secondly, a cross transform algorithm is developed, the process of scrambling and diffusion is executed simultaneously. Finally, the entire image is processed by a supernumerary diffusion. Simulation experiments and performance analysis signify that SCLM-IEA has more excellent security standard than some algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Algorithm 1
Fig. 14
Algorithm 2
Fig. 15
Algorithm 3
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21

Similar content being viewed by others

Data availability

All data generated or analysed during this study are included in this published article.

References

  1. Alvarez G, Li SJ (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurca Chaos 16(8):2129–2151

    Article  MathSciNet  MATH  Google Scholar 

  2. Basha SM, Mathivanan P, Ganesh AB (2022) Bit level color image encryption using logistic-sine-tent-Chebyshev (LSTC) map. Optik 259:168956

    Article  Google Scholar 

  3. Basu S, Debnath A, Basu A, Das TS (2022) An image data hiding technique using Differential Evolution. Image Hiding Techn Differen Evol Multimed Tools Appl 81:39995–40012. https://doi.org/10.1007/s11042-022-12557-0

    Article  Google Scholar 

  4. Bhattacharjee T, Maity HK, Maity SP (2022) On FPGA implementation in medical secret image sharing with data hiding. Multimed Tools Appl 81(13):18755–18781

    Article  Google Scholar 

  5. Chen Y, Xie SC, Zhang JZ (2022) A novel double image encryption algorithm based on coupled chaotic system. Phys Scr 97(6):065207

    Article  Google Scholar 

  6. Chu R, Zhang SF, Gao XP (2022) A novel 3D image encryption based on the chaotic system and RNA crossover and mutation. Front Phys 10:844966

    Article  Google Scholar 

  7. Elkandoz MT, Alexan W (2022) Image encryption based on a combination of multiple chaotic maps Multimedia Tools and Applications, https://doi.org/10.1007/s11042-022-12595-8

  8. Gao XH (2021) Image encryption algorithm based on 2D hyperchaotic map. Opt Laser Technol 142:107252

    Article  Google Scholar 

  9. Ghorbani A, Saberikamarposhti M, Yadollahi M (2022) Using ribonucleic acid (RNA) and Henon map in new image encryption scheme. Optik 259:168961

    Article  Google Scholar 

  10. Gottwald GA, Melbourne I (2016) The 0–1 test for chaos: a review. In: Chaos detection and predictability. Springer. p. 221-247

  11. Hua ZY, Zhou YC (2016) Image encryption using 2D logistic-adjusted-sine map. Inf Sci 339:237–253

    Article  Google Scholar 

  12. Hua ZY, Zhou YC, Pun CM, Chen CPL (2015) 2D sine logistic modulation map for image encryption. Inf Sci 297:80–94

    Article  Google Scholar 

  13. Hua ZY, Jin F, Xu BX, Huang HJ (2018) 2D logistic-sine-coupling map for image encryption. Signal Process 149:148–161

    Article  Google Scholar 

  14. Hua ZY, Zhou YC, Huang HJ (2019) Cosine-transform-based chaotic system for image encryption. Inf Sci 480:403–419

    Article  Google Scholar 

  15. Li PY, Lo KT (2018) A content-adaptive joint image compression and encryption scheme. IEEE Transac Multimed 20(8):1960–1972

    Article  Google Scholar 

  16. Li TY, Zhang DZ (2021) Hyperchaotic image encryption based on multiple bit permutation and diffusion. Entropy 23(5):510

    Article  MathSciNet  Google Scholar 

  17. Li XL, Ouyang GX, Richards DA (2007) Predictability analysis of absence seizures with permutation entropy. Epilepsy Res 77(1):70–74

    Article  Google Scholar 

  18. Mansouri A, Wang XY (2021) A novel block-based image encryption scheme using a new sine powered chaotic map generator. Multimed Tools Appl 80(14):21955–21978

    Article  Google Scholar 

  19. Nan SX, Feng XF, Wu YF, Zhang H (2022) Remote sensing image compression and encryption based on block compressive sensing and 2D-LCCCM. Nonlinear Dyna 108(3):2705–2729

    Article  Google Scholar 

  20. Ozkaynak F (2014) Cryptographically secure random number generator with chaotic additional input. Nonlinear Dyna 78(3):2015–2020

    Article  MathSciNet  Google Scholar 

  21. Richman JS, Moorman JR (2000) Physiological time-series analysis using approximate entropy and sample entropy. Am J Phys Heart Circ Phys 278:H2039–H2049

    Google Scholar 

  22. Schindler W (2009) Random number generators for cryptographic applications. In: Cryptographic Engineering. Springer, p. 5-23.

  23. Sheela SJ, Sanjay A, Suresh KV, Tandur D, Shubha G (2022) Image encryption based on 5D hyperchaotic system using hybrid random matrix transform. Multidim Syst Sign Process 33(2):579–595

    Article  MATH  Google Scholar 

  24. Singh SP (2022) A novel chaotic Umbrella map and its application to image encryption. Opt Quant Electron 54(5):266

    Article  MathSciNet  Google Scholar 

  25. Wang XY, Chen X (2021) An image encryption algorithm based on dynamic row scrambling and zigzag transformation. Chaos, Solitons Fractals 147:110962

    Article  MathSciNet  MATH  Google Scholar 

  26. Wang XY, Du XH (2022) Pixel-level and bit-level image encryption method based on logistic-Chebyshev dynamic coupled map lattices. Chaos, Solitons Fractals 155:111629

    Article  MathSciNet  Google Scholar 

  27. Wang XY, Gao S (2020) Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network. Inf Sci 539:195–214

    Article  MathSciNet  MATH  Google Scholar 

  28. Wang XY, Gao S (2020) Image encryption algorithm for synchronously updating Boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36

    Article  MathSciNet  MATH  Google Scholar 

  29. Wang XY, Liu PB (2022) A new full chaos coupled mapping lattice and its application in privacy image encryption. IEEE Transac Circui Syst I: Regular Pap 69(3):1291–1301

    Google Scholar 

  30. Wang XY, Zhang MZ (2021) An image encryption algorithm based on new chaos and diffusion values of a truth table. Inf Sci 579:128–149

    Article  MathSciNet  Google Scholar 

  31. Wang XY, Zhao MC (2021) An image encryption algorithm based on hyperchaotic system and DNA coding. Opt Laser Technol 143:107316

    Article  Google Scholar 

  32. Wang XY, Liu C, Jiang DH (2021) A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci 574:505–527

    Article  MathSciNet  Google Scholar 

  33. Wang XY, Xue WH, An JB (2021) Image encryption algorithm based on LDCML and DNA coding sequence. Multimed Tools Appl 80(1):591–614

    Article  Google Scholar 

  34. Wang XY, Guan NN, Yang JJ (2021) Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map. Chaos, Solitons Fractals 150:111117

    Article  MathSciNet  Google Scholar 

  35. Wen Y, Su JM, Hong Y, Gong PS (2022) Hybrid mapping algorithm based on 1-DCM and Lorenz. IET Image Process. https://doi.org/10.1049/ipr2.12501

  36. Wu Y, Noonan JP, Agaian S (2011) NPCR and UACI randomness tests for image encryption. Cyber J: Multidiscip, J SciTechnol, J Selec Areas Telecommun 1(2):31–38

    Google Scholar 

  37. Xian YJ, Wang XY (2021) Fractal sorting matrix and its application on chaotic image encryption. Inf Sci 547:1154–1169

    Article  MathSciNet  MATH  Google Scholar 

  38. Xiao YT, Tong XJ, Zhang M, Wang Z (2022) Image lossless encoding and encryption method of SPECK based on 1D chaotic map. Phys Scr 97(5):055211

    Article  Google Scholar 

  39. Xiao YT, Tong XJ, Zhang M (2022) Image lossless encoding and encryption method of EBCOT Tier1 based on 4D hyperchaos. Multimed Syst 28(3):727–748.

  40. Yahi A, Bekkouche T, Daachi ME, Diffellah N (2022) A color image encryption scheme based on 1D cubic map. Optik 249:168290

    Article  Google Scholar 

  41. Yang C, Pan P, Ding Q (2022) Image encryption scheme based on mixed chaotic Bernoulli measurement matrix block compressive sensing. Entropy 24(2):273

    Article  MathSciNet  Google Scholar 

  42. Yousif SF, Abbound AJ, Alhumaima RS (2022) A new image encryption based on bit replacing, chaos and DNA coding techniques. Multimed Tools Appl 81:27453–27493. https://doi.org/10.1007/s11042-022-12762-x

    Article  Google Scholar 

  43. Zhu HG, Zhao YR, Song YJ (2019) 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access 7:14081–14098

    Article  Google Scholar 

  44. Zhu HG, Dai LW, Liu YT, Wu LJ (2021) A three-dimensional bit-level image encryption algorithm with Rubik's cube method. Math Comput Simul 185:754–770

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103), Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (No: MIMS20-M-02).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingyuan Wang or Xuan Chen.

Ethics declarations

Conflict of interest

authors declared that they have no conflicts of interest to this work.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Chen, X. & Zhao, M. A new two-dimensional sine-coupled-logistic map and its application in image encryption. Multimed Tools Appl 82, 35719–35755 (2023). https://doi.org/10.1007/s11042-023-14674-w

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-14674-w

Keywords

Navigation