Abstract
In this paper, we propose a new 2D sine–cosine cross-chaotic (SC3) map to design an image encryption scheme with high confusion and diffusion capability. We evaluate the maximum Lyapunov exponent (MLE) of the proposed SC3 map to measure its degree of sensitivity to initial conditions and perform bifurcation analysis to find the chaotic region. The proposed chaotic map generates two pseudo-random sequence \(R_1\) and \(R_2\), which are used in confusion (permutation) and diffusion phase, respectively. The confusion layer is designed by shuffling the image pixels, and the diffusion layer is designed by bitwise XOR operation. The strength of the proposed image encryption scheme is evaluated against resistance to the statistical attack (information entropy, correlation coefficient, and histogram analysis), differential attack (NPCR and UACI), and sensitivity to the secret key. The experimental results of both security and performance analysis show that the proposed image encryption scheme is secure enough to resist all the existing cryptanalytic attack and efficient in terms of encryption time.
Similar content being viewed by others
References
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media, New York (2013)
Coppersmith, D.: The data encryption standard (des) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. IJWMC 2(1), 86–93 (2007)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129–2151 (2006)
Liu, H., Kadir, A., Niu, Y.: Chaos-based color image block encryption scheme using s-box. AEU Int. J. Electron. Commun. 68(7), 676–686 (2014)
Wang, M., Wang, X., Zhang, Y., Zhou, S., Zhao, T., Yao, N.: A novel chaotic system and its application in a color image cryptosystem. Opt. Lasers Eng. 121, 479–494 (2019)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
Zhou, Y., Bao, L., Chen, C.P.: A new 1d chaotic system for image encryption. Signal Process. 97, 172–182 (2014)
Hussain, I., Shah, T., Gondal, M.A.: Application of s-box and chaotic map for image encryption. Math. Comput. Model. 57(9–10), 2576–2579 (2013)
Ye, G.: Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit. Lett. 31(5), 347–354 (2010)
Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos Solitons Fractals 21(3), 749–761 (2004)
Diab, H.: An efficient chaotic image cryptosystem based on simultaneous permutation and diffusion operations. IEEE Access 6, 42227–42244 (2018)
Diab, H., El-semary, A.M.: Secure image cryptosystem with unique key streams via hyper-chaotic system. Signal Process. 142, 53–68 (2018)
Hua, Z., Zhou, Y.: Image encryption using 2D logistic-adjusted-sine map. Inf. Sci. 339, 237–253 (2016)
Marton, K., Suciu, A.: On the interpretation of results from the NIST statistical test suite. Sci. Technol. 18(1), 18–32 (2015)
Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat.No. 02CH37353), vol. 2, pp. II–II. IEEE (2002)
Rosenstein, M.T., Collins, J.J., De Luca, C.J.: A practical method for calculating largest lyapunov exponents from small data sets. Phys. D Nonlinear Phenpomena 65(1–2), 117–134 (1993)
Mondal, B., Kumar, P., Singh, S.: A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimed. Tools Appl. 77(23), 31177–31198 (2018)
Mondal, B., Mandal, T.: A novel chaos based secure image encryption algorithm. Int. J. Appl. Eng. Res. 11(5), 3120–3127 (2016)
Mondal, B., Singh, S., Kumar, P.: A secure image encryption scheme based on cellular automata and chaotic skew tent map. J. Inf. Secur. Appl. 45, 117–130 (2019)
Ping, P., Wu, J., Mao, Y., Xu, F., Fan, J.: Design of image cipher using life-like cellular automata and chaotic map. Signal Process. 150, 233–247 (2018)
Wu, X., Kan, H., Kurths, J.: A new color image encryption scheme based on dna sequences and multiple improved 1d chaotic maps. Appl. Soft Comput. 37, 24–39 (2015)
Bhaskar Mondal, T.M.: A light weight secure image encryption scheme based on chaos & dna computing. J. King Saud Univ. Comput. Inf. Sci. 26, 499–504 (2016)
Wang, X., Teng, L., Qin, X.: A novel colour image encryption algorithm based on chaos. Signal Process. 92(4), 1101–1108 (2012)
Çavuşoğlu, U., Kaçar, S., Pehlivan, I., Zengin, A.: Secure image encryption algorithm design using a novel chaos based s-box. Chaos Solitons Fractals 95, 92–101 (2017)
Silva-Garcia, V., Flores-Carapia, R., Renteria-Marquez, C., Luna-Benoso, B., Aldape-Perez, M.: Substitution box generation using chaos: an image encryption application. Appl. Math. Comput. 332, 123–135 (2018)
Zhu, Z., Zhang, W., Wong, Kw., Yu, H.: A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf. Sci. 181(6), 1171–1186 (2011)
Belazi, A., El-Latif, A.A.A., Belghith, S.: A novel image encryption scheme based on substitution–permutation network and chaos. Signal Process. 128, 155–170 (2016)
Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process. 143, 122–133 (2018)
Fu, C., Huang, J.B., Wang, N.N., Hou, Q.B., Lei, W.M.: A symmetric chaos based image cipher with an improved bit-level permutation strategy. Entropy 16(2), 770–788 (2014)
Ping, P., Xu, F., Mao, Y., Wang, Z.: Designing permutation-substitution image encryption networks with henon map. Neurocomputing 283, 53–63 (2018)
Kandar, S., Chaudhuri, D., Bhattacharjee, A., Dhara, B.C.: Image encryption using sequence generated by cyclic group. J. Inf. Secur. Appl. 44, 117–129 (2019)
Zhang, X., Feng, G., Ren, Y., Qian, Z.: Scalable coding of encrypted images. IEEE Trans. Image Process. 21(6), 3108–14 (2012)
Qin, C., Zhou, Q., Cao, F., Dong, J., Zhang, X.: Flexible lossy compression for selective encrypted image with image inpainting. In: IEEE Transactions on Circuits and Systems for Video Technology (2018)
Panwar, K., Purwar, R.K., Jain, A.: Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps. Int. J. Bifurc. Chaos 29(08), 1950103 (2019)
Panwar, K., Purwar, R.K., Jain, A.: Cryptanalysis and improvement of an image encryption scheme using combination of one-dimensional chaotic maps. J. Electron. Imaging 27(5), 053037 (2018)
Al-Shameri, W.F.: Dynamical properties of the Hénon mapping. Int. J. Math. Anal. 6(49), 2419–30 (2012)
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Booz-Allen and Hamilton Inc, Mclean (2001)
Chen, J., Zhu, Z.L., Zhang, L.B., Zhang, Y., Yang, B.Q.: Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 1(142), 340–53 (2018)
Ping, P., Fan, J., Mao, Y., Xu, F., Gao, J.: A chaos based image encryption scheme using digit-level permutation and block diffusion. IEEE Access 6, 67581–67593 (2018)
Acknowledgements
The authors thank the editor and all anonymous reviewers for their comments and suggestions which improved both the technical and editorial quality of the paper.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declared that they have no conflicts of interest to this work.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mondal, B., Behera, P.K. & Gangopadhyay, S. A secure image encryption scheme based on a novel 2D sine–cosine cross-chaotic (SC3) map. J Real-Time Image Proc 18, 1–18 (2021). https://doi.org/10.1007/s11554-019-00940-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-019-00940-4