Skip to main content
Log in

A novel trigonometric 3D chaotic map and its application in a double permutation-diffusion image encryption

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, we introduce a new three-dimensional cosines-sinus-cosines (3D-CSC) chaotic system. The performance evaluations of the proposed system exhibit a high chaotic behavior, an infinite chaotic range of its three control parameters, and a high sensitivity to initials conditions and control parameters. Especially, when compared with other existing 3D chaotic systems. Additionally, it is possible to extend the dimensions of 3D-CSC to 3 times N while maintaining the same high level of performance, and also incorporate additional control parameters of 3D-CSC. Furthermore, we present an innovative application of 3D-CSC in the development of a novel image encryption algorithm with enhanced security features. Our proposed algorithm utilizes a permutation-diffusion architecture applied in four distinct steps, including recursive XOR operation, arithmetic modular, and chaotic circular shift (both horizontal and vertical). This suggested method can be applied to various sorts of images (real-life images, medical images, biometric images). Obtained results demonstrate that the proposed algorithm combined with 3D-CSC is reliable and more powerful than other previous encryption algorithms, in terms of high-security level against statistical and differential attacks, a large keyspace, and its significant sensitivity. Moreover, despite the complexity of its architecture, it exhibits a high-speed level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

Data availability

The data used to support the funding of this study are in USC-SIPI image dataset at https://sipi.usc.edu/database/

References

  1. Ajmal H, Saleem PM (2020) Implementation of image enhancement using steganography. JCR. 7:1738–1743. https://doi.org/10.31838/jcr.07.05.296

    Article  Google Scholar 

  2. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16:2129–2151

    Article  MathSciNet  Google Scholar 

  3. Azoug SE, Bouguezel S (2016) A non-linear preprocessing for opto-digital image encryption using multiple-parameter discrete fractional Fourier transform. Opt Commun 359:85–94

    Article  Google Scholar 

  4. Bekkouche T, Bouguezel S (2018) A recursive nonlinear pre-encryption for opto-digital double random phase encoding. Optik 158:940–950. https://doi.org/10.1016/j.ijleo.2017.12.142

    Article  Google Scholar 

  5. Bekkouche T, Diffellah N, Ziet L (2019) Hybrid image encryption based on digital pre-encryption and optical single random phase encoding. Opt Appl 49:559–569

    Google Scholar 

  6. Bigdeli N, Farid Y, Afshar K (2012) A robust hybrid method of image encryption based on Hopfield neural network. Comput Electr Eng 38:356–369. https://doi.org/10.1016/j.compeleceng.2011.11.019

    Article  Google Scholar 

  7. Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations. Opt Lasers Eng 88:197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009

    Article  Google Scholar 

  8. Florence M (2019) Lilly, and Dhina S, enhanced secure sharing of PHR’s in cloud using user usage based attribute based encryption and signature with keyword search. Clust Comput 22:13119–13130

    Article  Google Scholar 

  9. Girdhar A, Kapur H, Kumar VA (2021) A novel grayscale image encryption approach based on chaotic maps and image blocks. Appl Phys B Lasers Opt 127:39

    Article  Google Scholar 

  10. Hafsa A, Sghaier A, Malek J, Machhout M (2021) Image encryption method based on improved ECC and modified AES algorithm. Multimed Tools Appl 80:19769–19800. https://doi.org/10.1007/s11042-021-10700-x

    Article  Google Scholar 

  11. Herbadji D, et al (2019) A tweakable image encryption algorithm using an improved logistic chaotic map. IIETA 407–417, https://doi.org/10.18280/ts.360505

  12. Herbadji D, Belmeguenai A, Derouiche N, Liu H (2020) Colour image encryption scheme based on enhanced quadratic chaotic map. IET Image Process 14:40–52. https://doi.org/10.1049/iet-ipr.2019.0123

    Article  Google Scholar 

  13. Jolfaei A, Wu XW, Muthukkumarasamy V (2016) On the security of permutation-only image encryption schemes. IEEE Trans Inf Forensics Sec 11:235–246. https://doi.org/10.1109/TIFS.2015.2489178

    Article  Google Scholar 

  14. Kang X, Guo Z (2020) A new color image encryption scheme based on dna encoding and spatiotemporal chaotic system. Signal Process Image Commun 80:115670

    Article  Google Scholar 

  15. Kelkar K, Tuckley K (2020) DCT based reversible watermarking technique for medical images with improved quality of watermarked image. JCR. 7:1433–1439. https://doi.org/10.31838/jcr.07.05.255

    Article  Google Scholar 

  16. Li C, Zhang Y, Xie EY (2019) When an attacker meets a cipher-image in 2018: A year in review. J Info Secur Appl 48:2214–2226. https://doi.org/10.1016/j.jisa.2019.102361

    Article  Google Scholar 

  17. Liu H, Kadir A, Xu C (2020) Color image encryption with cipher feedback and coupling chaotic map. Int J Bifurcation Chaos 30:2050173

    Article  MathSciNet  Google Scholar 

  18. Liu, H, Liu, J, Ma, C (2022) Constructing dynamic strong S-box using 3D chaotic map and application to image encryption. Multimed Tools Appl. https://doi.org/10.1007/s11042-022-12069-x

  19. Lui C, Ding Q (2020) A color image encryption scheme based on a novel 3D chaotic mapping. Hindawi, https://doi.org/10.1155/2020/3837209

  20. Luong M, Do QB, Beghdadi A (2011) A blind image watermarking using multi-resolution visibility map. J Glob Optim 49:435–448. https://doi.org/10.1007/s10898-010-9570-4

    Article  Google Scholar 

  21. Mansouri A, Wang X (2020) A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme. Inf Sci 520:46–62. https://doi.org/10.1016/j.ins.2020.02.008

    Article  MathSciNet  Google Scholar 

  22. Marsaglia G (2003) Random number generator. JMASM. 2:2–13. https://doi.org/10.22237/jmasm/1051747320

    Article  Google Scholar 

  23. Midoun MA, Wang X, Talhaoui MZ (2021) A sensitive dynamic mutual encryption system based on a new 1D chaotic map. Opt Lasers Eng 139:106485. https://doi.org/10.1016/j.optlaseng.2020.106485

    Article  Google Scholar 

  24. Muhammad K, Ahmad J, Rehman NU, Jan Z, Sajjad M (2017) Cisska-lsb: color image steganography using stego key-directed adaptive lsb substitution method. Multimed Tools Appl 76(6):8597–8626. https://doi.org/10.1007/s11042-016-3383-5

    Article  Google Scholar 

  25. Murillo-Escobar MA, et al (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos, signal process 109 119–131, https://doi.org/10.1016/j.sigpro.2014.10.033

  26. Najm H, Hoomod HK (2021) A New Wot Cryptography Algorithm based on GOST and a Novel 5d Chaotic System. iJIM 15:184–199. https://doi.org/10.3991/ijim.v15i02.19961

    Article  Google Scholar 

  27. Pak C, Huanga L (2017) A new color image encryption using combination of the 1D chaotic map. Signal Process 138:129–137. https://doi.org/10.1016/j.sigpro.2017.03.011

    Article  Google Scholar 

  28. Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption opt. Laser Technol 101:30–41. https://doi.org/10.1016/j.optlastec.2017.10.024

    Article  Google Scholar 

  29. Radhika KR, Nalini MK (2017) Biometric Image Encryption using DNA sequences and Chaotic Systems, in: Proceedings of the Int. Conf. on Recent Advances in Electronics and Communication Technology (ICRAECT), Bangalore, India, 164–168

  30. Rukhin A, et al (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Special Publication 800–22

  31. Sahari ML, Boukemara I (2018) A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption. Nonlin Dyn 94:723–744. https://doi.org/10.1007/s11071-018-4390-z

    Article  Google Scholar 

  32. Shahna KU, Mohamed A (2020) A novel image encryption scheme using both pixel level and bit level permutation with chaotic map. Appl Soft Comput 90:106162

    Article  Google Scholar 

  33. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  Google Scholar 

  34. Shariatzadeh M, Rostami MJ, Eftekhari M (2021) Proposing a novel dynamic AES for image encryption using a chaotic map key management approach. Optik. 246:0030–4026. https://doi.org/10.1016/j.ijleo.2021.167779

    Article  Google Scholar 

  35. Silva-Garca VM, Flores-Carapia R, Rentera-Márquez C et al (2015) Cipher image damage and decisions in real time. J Electron Imaging 24:013012

    Article  Google Scholar 

  36. Stoyanov B, Nedzhibov G (2020) Symmetric key encryption based on rotation-translation equation, MDPI 73, https://doi.org/10.3390/sym12010073

  37. Talhaoui MZ, Wang X, Midoun MA (2020) A new one-dimensional cosine polynomial chaotic map and its use in image encryption. The Vis Comput 37:541–551. https://doi.org/10.1007/s00371-020-01822-8

    Article  Google Scholar 

  38. Tewari A, Brij BG (2020) Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags. Int J Semant Web Inf Syst (IJSWIS) 16(3):20–34

    Article  Google Scholar 

  39. Valandar MY (2019) al, an integer wavelet transform image steganography method based on 3D sine chaotic map. Multimed Tools Appl 78:9971–9989. https://doi.org/10.1007/s11042-018-6584-2

    Article  Google Scholar 

  40. Wadi SM, Zainal N (2021) Rapid encryption method based on AES algorithm for grey scale HD image encryption, Procedia. Technology. 11:51–56. https://doi.org/10.1016/j.protcy.2013.12.161

    Article  Google Scholar 

  41. Yahi A, Bekkouche T, Daachi MH, Dieffallah N (2021) A color image encryption scheme based on 1D cubic map, Optik. In press, https://doi.org/10.1016/j.ijleo.2021.168290

  42. Yamni M et al (2020) Fractional charlier moments for image watermarking, Signal Process 171, https://doi.org/10.1016/j.sigpro.2020.107509

  43. Yu M, Yin X, Liu W (2021) Secure halftone image steganography based on density preserving and distorsion fusion, Signal Process 188, https://doi.org/10.1016/j.sigpro.2021.108227

  44. Zhou RG, Luo J, Liu XA, Zhu C, Wei L, Zhang X (2018) A novel quantum image steganography scheme based on LSB. Int J Theor Phys 57:1–16

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yahi Amina.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Amina, Y., Bekkouche, T., Daachi, M.E.H. et al. A novel trigonometric 3D chaotic map and its application in a double permutation-diffusion image encryption. Multimed Tools Appl 83, 7895–7918 (2024). https://doi.org/10.1007/s11042-023-15858-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-023-15858-0

Keywords