Skip to main content
Log in

A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The chaotic maps and cryptographic schemes are considered as the standard backbone for digital image encryption process. The pixel rearrangement under digital image encryption process in diversified dimensions is determined to be highly deceiving for pernicious parties. Moreover, the sensitivity of the chaos-based cryptosystem towards the characteristics of unpredictability, initial conditions and ergodic features is considered to be predominant during the process of image encryption. This paper contributes a Fibonacci p-code Traversingand Unified Chaotic Map-based Image Encryption (FPT-UCM-IE) scheme for facilitating three processes that include key stream generation, three-iterations-based scrambling and single round diffusion process. This proposed FPT-UCM-IE scheme initiates the process of key generation using the unified chaotic map. Then, the process of Fibonacci p-code Traversing is employed for facilitating effective act of scrambling, such that the pixel rows and columns are exchanged in a predominant manner. The final single round diffusion process of this proposed FPT-UCM-IE scheme is incorporated for cracking the strong correlations and modifying the pixel value that exist between the neighboring pixel in a simultaneous way. The security investigations of this proposed FPT-UCM-IE scheme aredetermined to be superior enough is resisting common type of attacks that are possible during the process of image encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Agarwal S (2018) Secure image transmission using fractal and 2D-chaotic map. J Imaging 4(1):17–28

    Article  MathSciNet  Google Scholar 

  • Anandkumar R, Kalpana R (2019) Designing a fast image encryption scheme using fractal function and 3D Henon map. J Inform Secur Appl 49:102390

    Google Scholar 

  • Annaby M, Rushdi M, Nehary E (2018) Color image encryption using random transforms, phase retrieval, chaotic maps, and diffusion. Opt Lasers Eng 103:9–23

    Article  Google Scholar 

  • Belazi A, Abd El-Latif AA, Diaconu A, Rhouma R, Belghith S (2017) Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Opt Lasers Eng 88(1):37–50

    Article  Google Scholar 

  • Berthiau G, Siarry P (2001) Etat de l’art des méthodes “d’optimisation globale.” RAIRO Oper Res 35(3):329–365

    Article  MathSciNet  MATH  Google Scholar 

  • Bisht A, Dua M, Dua S (2018) A novel approach to encrypt multiple images using multiple chaotic maps and chaotic discrete fractional random transform. J Ambient Intell Humaniz Comput 10(9):3519–3531

    Article  Google Scholar 

  • Chai X, Gan Z, Lu Y, Zhang M, Chen Y (2016) A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chin Phys B 25(10):100503

    Article  Google Scholar 

  • Chai X, Zheng X, Gan Z, Han D, Chen Y (2018) An image encryption algorithm based on chaotic system and compressive sensing. Sig Process 148(1):124–144

    Article  Google Scholar 

  • Chai X, Zhang J, Gan Z et al (2019a) Medical image encryption algorithm based on Latin square and memristive chaotic system. Multimed Tools Appl 78:35419–35453

    Article  Google Scholar 

  • Chai X, Zheng X, Gan Z, Chen Y (2019b) Exploiting plaintext-related mechanism for secure color image encryption. Neural Comput Appl 2(1):18–29

    Google Scholar 

  • Chandra M, Sharma P (2017) Image encryption based on random scrambling and chaotic gauss iterative map. Int J Comp Appl 157(3):18–23

    Google Scholar 

  • Chen X, Hu C (2017) Adaptive medical image encryption algorithm based on multiple chaotic mapping. Saudi J Biol Sci 24(8):1821–1827

    Article  Google Scholar 

  • Chen G, Kudryashova EV, Kuznetsov NV, Leonov GA (2016) Dynamics of the zeraoulia-sprott map revisited. Int J Bifurc Chaos 26(07):1650126

    Article  MathSciNet  MATH  Google Scholar 

  • Dua M, Wesanekar A, Gupta V, Bhola M, Dua S (2019) Differential evolution optimization of intertwining logistic map-DNA based image encryption technique. J Ambient Intell Humaniz Comput 1(1):23–34

    Google Scholar 

  • Fu C, Zhang G, Zhu M, Chen Z, Lei W (2018) A new chaos-based color image encryption scheme with an efficient substitution keystream generation strategy. Secur Commun Netw 2018(1):1–13

    Article  Google Scholar 

  • Gan Z, Chai X, Han D et al (2019) A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput & Applic 31:7111–7130

    Article  Google Scholar 

  • Gu G, Liu F (2011) Contourlet domain image encryption based on chaos mapping. J Comp Appl 31(3):771–773

    Google Scholar 

  • Gupta A, Singh D, Kaur M (2019) An efficient image encryption using non-dominated sorting genetic algorithm-III based 4-D chaotic maps. J Ambient Intell Humaniz Comput 2(1):34–45

    Google Scholar 

  • Li C, Li H, Li F, Wei D, Yang X, Zhang J (2018a) Multiple-image encryption by using robust chaotic map in wavelet transform domain. Optik 171(1):277–286

    Article  Google Scholar 

  • Li F, Wu H, Zhou G, Wei W (2018b) Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift. J Real-Time Image Proc 1(1):34–46

    Google Scholar 

  • Liu L, Zhang X (2013) Image encryption algorithm based on chaos and bit operations. J Comp Appl 33(4):1070–1073

    Google Scholar 

  • Liu H, Kadir A, Sun X (2017) Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Proc 11(5):324–332

    Article  Google Scholar 

  • Michalewicz Z, Janikow CZ (1991) Genetic algorithms for numerical optimization. Stat Comput 1(2):75–91

    Article  Google Scholar 

  • Parvaz R, Zarebnia M (2018) A combination chaotic system and application in color image encryption. Opt Laser Technol 101(1):30–41

    Article  Google Scholar 

  • Ramalingam B, Ravichandran D, Annadurai AA, Rengarajan A, Rayappan JB (2017) Chaos triggered image encryption - a reconfigurable security solution. Multimed Tools Appl 77(10):11669–11692

    Article  Google Scholar 

  • Rarità L, Stamova I, Tomasiello S (2021) Numerical schemes and genetic algorithms for the optimal control of a continuous model of supply chains. Appl Math Comput 388(2):125464

    MathSciNet  MATH  Google Scholar 

  • Singh P, Yadav A, Singh K (2017) Phase image encryption in the fractional Hartley domain using Arnold transform and singular value decomposition. Opt Lasers Eng 91(1):187–195

    Article  Google Scholar 

  • Sneha PS, Sankar S, Kumar AS (2019) A chaotic colour image encryption scheme combining Walsh-Hadamard transform and Arnold-Tent maps. J Ambient Intell Humaniz Comput 2(1):65–78

    Google Scholar 

  • Suri S, Vijay R (2018) A synchronous intertwining logistic map-DNA approach for color image encryption. J Ambient Intell Humaniz Comput 10(6):2277–2290

    Article  Google Scholar 

  • Tang Z, Yang Y, Xu S, Yu C, Zhang X (2019) Image Encryption with Double Spiral Scans and Chaotic Maps. Secur Commun Netw 2019(1):1–15

    Google Scholar 

  • Wang X, Teng L (2011) An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn 67(1):365–371

    Article  MathSciNet  Google Scholar 

  • Wang X, Liu C, Xu D, Liu C (2016) Image encryption scheme using chaos and simulated annealing algorithm. Nonlinear Dyn 84(3):1417–1429

    Article  MathSciNet  Google Scholar 

  • Wang X, Zhu X, Zhang Y (2018) An image encryption algorithm based on josephus traversing and mixed chaotic map. IEEE Access 6(1):23733–23746

    Article  Google Scholar 

  • Wu J, Liao X, Yang B (2018) Image encryption using 2D Hénon-sine map and DNA approach. Sig Process 153(1):11–23

    Article  Google Scholar 

  • Xu M (2015) A modified chaos-based image encryption algorithm. J Softw 10(8):931–938

    Article  Google Scholar 

  • Zhan K, Wei D, Shi J, Yu J (2017) Cross-utilizing hyperchaotic and DNA sequences for image encryption. J Electr Imaging 26(1):013021

    Article  Google Scholar 

  • Zhang F (2014) A symmetric image encryption scheme based on chaotic Hénon and logistic maps. Adv Commun Technol Syst 1(1):12–21

    Google Scholar 

  • Zhang M, Tong X (2017) Joint image encryption and compression scheme based on IWT and SPIHT. Opt Lasers Eng 90(1):254–274

    Article  Google Scholar 

  • Zhang Y, Wang X (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273(1):329–351

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Anandkumar.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Anandkumar, R., Kalpana, R. A Fibonacci p-code traversing and unified chaotic map-based image encryption algorithm. J Ambient Intell Human Comput 13, 3713–3727 (2022). https://doi.org/10.1007/s12652-021-03659-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-021-03659-y

Keywords

Navigation