Abstract
This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.






Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (nca) for image encryption. Commun Nonlinear Sci Numer Simul 14(11):3743–3749
Amin M, Faragallah OS, Abd El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Commun Nonlinear Sci Numer Simul 15(11):3484–3497
Barsocchi P, Chessa S, Martinovic I, Oligeri G (2013) A cyber-physical approach to secret key generation in smart environments. J Ambient Intell Humaniz Comput 4(1):1–16
Chen X, Li J, Susilo W (2012) Efficient fair conditional payments for outsourcing computations. IEEE Trans Inf Forensics Secur 7(6):1687–1694
Huang C, Nien H (2009) Multi chaotic systems based pixel shuffle for image encryption. Opt Commun 282(11):2123–2127
Kohda T, Tsuneda A (1997) Statistics of chaotic binary sequences. IEEE Trans Inf Theory 43(1):104–112
Kwok H, Tang WK (2007) A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals 32(4):1518–1529
Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689
Li C, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 91(4):949–954
Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27(9):1371–1381
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp 1–5
Li J, Zhang F, Chen X, Kim K, Wong DS (2012) Generic security-amplifying methods of ordinary digital signatures. Inf Sci 201:128–139
Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vis Comput 24(9):926–934
Pisarchik A, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Phys D Nonlinear Phenom 237(20):2638–2648
Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution–diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892
Sang T, Wang R, Yan Y (2001) Generating binary bernoulli sequences based on a class of even-symmetric chaotic maps. IEEE Trans Commun 49(4):620–623
Solak E, Rhouma R, Belghith S (2010) Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 283(2):232–236
Sun F, Lü Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283(10):2066–2073
Tong X, Cui M (2008) Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vis Comput 26(6):843–850
Wang Y, Wong KW, Liao X, Chen G (2011) A new chaos-based fast image encryption algorithm. Appl Soft Comput 11(1):514–522
Xiao D, Liao X, Wei P (2009) Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fractals 40(5):2191–2199
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, X., Zhang, G. & Zhang, X. Image encryption algorithm with compound chaotic maps. J Ambient Intell Human Comput 6, 563–570 (2015). https://doi.org/10.1007/s12652-013-0217-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-013-0217-4