Skip to main content
Log in

A new one-dimensional cosine polynomial chaotic map and its use in image encryption

  • Original Article
  • Published:
The Visual Computer Aims and scope Submit manuscript

Abstract

In this paper, we propose a new real one-dimensional cosine polynomial (1-DCP) chaotic map. The statistical analysis of the proposed map shows that it has a simple structure, a high chaotic behavior, and an infinite chaotic range. Therefore, the proposed map is a perfect candidate for the design of chaos-based cryptographic systems. Moreover, we propose an application of the 1-DCP map in the design of a new efficient image encryption scheme (1-DCPIE) to demonstrate the new map further good cryptographic proprieties. In the new scheme, we significantly reduce the encryption process time by raising the small processing unit from the pixels level to the rows/columns level and replacing the classical sequential permutation substitution architecture with a parallel permutation substitution one. We apply several simulation and security tests on the proposed scheme and compare its performances with some recently proposed encryption schemes. The simulation results prove that 1-DCPIE has a better security level and a higher encryption speed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. Alvarez, Li, Shujun, G.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16(08), 2129–2151 (2006)

    MathSciNet  MATH  Google Scholar 

  2. Boriga, R., Dăscălescu, A.C., Diaconu, A.V.: A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme. Adv. Multimed. 2014, 6 (2014)

    Google Scholar 

  3. Cao, L., Men, C., Ji, R.: Nonlinear scrambling-based reversible watermarking for 2d-vector maps. Vis. Comput. 29(3), 231–237 (2013)

    Google Scholar 

  4. Castro, J.C.H., Sierra, J.M., Seznec, A., Izquierdo, A., Ribagorda, A.: The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1), 1–7 (2005). https://doi.org/10.1016/j.matcom.2004.09.001

    Article  MathSciNet  MATH  Google Scholar 

  5. Chang, H.T., Tsan, C.L.: Image watermarking by use of digital holography embedded in the discrete-cosine-transform domain. Appl. Opt. 44(29), 6211–9 (2005)

    Google Scholar 

  6. Chen, J., Han, F., Qian, W., Yao, Y.D., Zhu, Zl: Cryptanalysis and improvement in an image encryption scheme using combination of the 1d chaotic map. Nonlinear Dyn. 93(4), 2399–2413 (2018)

    Google Scholar 

  7. Chen, J., Zhu, Z.L., Zhang, L.B., Zhang, Y., Yang, B.Q.: Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption. Signal Process. 142, 340–353 (2018)

    Google Scholar 

  8. Chen, S., Lü, J.: Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A 299(4), 353–358 (2002)

    MathSciNet  MATH  Google Scholar 

  9. Ding, H., Zichen, L.I., Yang, Y., You, F., Liu, F.: High quality data hiding in halftone image based on block conjugate. Chin. J. Electron. 27(1), 150–158 (2018)

    Google Scholar 

  10. Ernawan, F., Kabir, M.N.: A block-based RDWT-SVD image watermarking method using human visual system characteristics. Vis Comput 36, 1–19 (2018)

    Google Scholar 

  11. Feng, W., He, Y., Li, H., Li, C.: Cryptanalysis and improvement of the image encryption scheme based on 2d logistic-adjusted-sine map. IEEE Access (2019)

  12. Fu, X.Q., Liu, B.C., Xie, Y.Y., Wei, L., Yong, L.: Image encryption-then-transmission using dna encryption algorithm and the double chaos. IEEE Photon. J. PP(99), 1–1 (2018)

    Google Scholar 

  13. Hu, Y., Xie, X., Liu, X., Zhou, N.: Quantum multi-image encryption based on iteration arnold transform with parameters and image correlation decomposition. Int. J. Theor. Phys. 56(7), 2192–2205 (2017)

    MathSciNet  MATH  Google Scholar 

  14. Hua, Z., Xu, B., Jin, F., Huang, H.: Image encryption using Josephus problem and filtering diffusion. IEEE Access 7, 8660–8674 (2019)

    Google Scholar 

  15. Hua, Z., Zhou, Y.: Image encryption using 2d logistic-adjusted-Sine map. Inf. Sci. 339, 237–253 (2016)

    Google Scholar 

  16. Hua, Z., Zhou, Y.: Exponential chaotic model for generating robust chaos. In: IEEE transactions on systems, man, and cybernetics: systems (2019)

  17. Hua, Z., Zhou, Y., Bao, B. C.: Two-dimensional sine chaotification system with hardware implementation. IEEE Trans. Ind. Inf. (2019)

  18. Hua, Z., Zhou, Y., Huang, H.: Cosine-transform-based chaotic system for image encryption. Inf. Sci. 480, 403–419 (2019)

    Google Scholar 

  19. Huang, L., Cai, S., Xiao, M., Xiong, X.: A simple chaotic map-based image encryption system using both plaintext related permutation and diffusion. Entropy 20(7), 535 (2018)

    Google Scholar 

  20. IEEE standard for binary floating-point arithmetic. Institute of Electrical and Electronics Engineers, New York (1985)

  21. Kaur, M., Kumar, V.: Fourier-mellin moment-based intertwining map for image encryption. Mod. Phys. Lett. B 32(9), 1850115 (2018)

    MathSciNet  Google Scholar 

  22. Kay, S., Nagesha, V.: Methods for chaotic signal estimation. IEEE Trans. Signal Process. 43(8), 2013–2016 (1995)

    Google Scholar 

  23. Li, C., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)

    Google Scholar 

  24. Li, Gd, et al.: Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform. Vis. Comput. 35(9), 1267–1277 (2019)

    Google Scholar 

  25. Liu, H., Kadir, A., Sun, X.: Chaos-based fast colour image encryption scheme with true random number keys from environmental noise. IET Image Process. 11(5), 324–332 (2017)

    Google Scholar 

  26. Liu, L., Miao, S.: A new simple one-dimensional chaotic map and its application for image encryption. Multimed. Tools Appl. 77(16), 21445–21462 (2018)

    Google Scholar 

  27. Liu, X., Xiao, H., Panchi, L.I., Zhao, Y.: Design and implementation of color image encryption based on qubit rotation about axis. Chin. J. Electron. 27(4), 137–145 (2018)

    Google Scholar 

  28. Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. Inf. Sci. 433, 188–203 (2018)

    MathSciNet  MATH  Google Scholar 

  29. Luong, Q.: A blind image watermarking using multiresolution visibility map. J. Glob. Optim. 49(3), 435–448 (2011)

    MathSciNet  MATH  Google Scholar 

  30. Muhammad, K., Hamza, R., Ahmad, J., Lloret, J., Wang, H.H.G., Baik, S.W.: Secure surveillance framework for iot systems using probabilistic image encryption. IEEE Trans. Ind. Inf. PP(99), 1–1 (2018)

    Google Scholar 

  31. Pak, C., Huang, L.: A new color image encryption using combination of the 1d chaotic map. Signal Process. 138, 129–137 (2017)

    Google Scholar 

  32. Pincus, S.: Approximate entropy (apen) as a complexity measure. Chaos Interdiscip. J. Nonlinear Sci. 5(1), 110–117 (1995)

    MathSciNet  Google Scholar 

  33. Pincus, S.M.: Approximate entropy as a measure of system complexity. Proc. Natl. Acad. Sci. 88(6), 2297–2301 (1991)

    MathSciNet  MATH  Google Scholar 

  34. Seo, J.S., Yoo, C.D.: Localized image watermarking based on feature points of scale-space representation. Pattern Recognit. 37(7), 1365–1375 (2004)

    MATH  Google Scholar 

  35. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949). https://doi.org/10.1002/j.1538-7305.1949.tb00928.x

    Article  MathSciNet  MATH  Google Scholar 

  36. Stallings, W.: Cryptography and network security: principles and practice. Int. J. Eng. Comput. Sci. 01(01), 121–136 (2012)

    Google Scholar 

  37. Tang, J., Yu, Z., Liu, L.: A delay coupling method to reduce the dynamical degradation of digital chaotic maps and its application for image encryption. In: Multimedia Tools and Applications, pp. 1–24 (2019)

  38. Vaidyanathan, S., Akgul, A., Kaçar, S., Çavuşoğlu, U.: A new 4-d chaotic hyperjerk system, its synchronization, circuit design and applications in rng, image encryption and chaos-based steganography. Eur. Phys. J. Plus 133(2), 46 (2018)

    Google Scholar 

  39. Wang, B., Wei, X., Zhang, Q.: Cryptanalysis of an image cryptosystem based on logistic map. Opt. Int. J. Light Electron. Opt. 124(14), 1773–1776 (2013)

    Google Scholar 

  40. Wang, C., Wang, H., Ji, Y.: Multi-bit wavelength coding phase-shift-keying optical steganography based on amplified spontaneous emission noise. Opt. Commun. 407, 1–8 (2018)

    Google Scholar 

  41. Wang, M., Wang, X., Zhang, Y., Gao, Z.: A novel chaotic encryption scheme based on image segmentation and multiple diffusion models. Opt. Laser Technol. 108, 558–573 (2018)

    Google Scholar 

  42. Wang, M., Wang, X., Zhang, Y., Zhou, S., Zhao, T., Yao, N.: A novel chaotic system and its application in a color image cryptosystem. Opt. Lasers Eng. 121, 479–494 (2019)

    Google Scholar 

  43. Wang, X., Feng, L., Li, R., Zhang, F.: A fast image encryption algorithm based on non-adjacent dynamically coupled map lattice model. Nonlinear Dyn 1–28 (2019)

  44. Wang, X., Gao, S.: Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf. Sci. 507, 16–36 (2020)

    MathSciNet  Google Scholar 

  45. Wang, X., Qin, X., Liu, C.: Color image encryption algorithm based on customized globally coupled map lattices. Multimed. Tools Appl. 78(5), 6191–6209 (2019)

    Google Scholar 

  46. Wang, X., Zhou, G., Dai, C., Chen, J.: Optical image encryption with divergent illumination and asymmetric keys. IEEE Photon. J. PP(99), 1–1 (2017)

    Google Scholar 

  47. Wang, Y., Wong, K.W., Liao, X., Xiang, T., Chen, G.: A chaos-based image encryption algorithm with variable control parameters. Chaos Solitons Fract. 41(4), 1773–1783 (2009)

    MATH  Google Scholar 

  48. Wen, W., Zhang, Y., Su, M., Zhang, R., Chen, Jx, Li, M.: Differential attack on a hyper-chaos-based image cryptosystem with a classic bi-modular architecture. Nonlinear Dyn. 87(1), 383–390 (2017)

    Google Scholar 

  49. Wolf, A., Swift, J.B., Swinney, H.L., Vastano, J.A.: Determining lyapunov exponents from a time series. Phys. D Nonlinear Phenom. 16(3), 285–317 (1985)

    MathSciNet  MATH  Google Scholar 

  50. Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013). https://doi.org/10.1016/j.ins.2012.07.049

    Article  MathSciNet  MATH  Google Scholar 

  51. Xiaofu, W., Songgeng, S.: A general efficient method for chaotic signal estimation. IEEE Trans. Signal Process. 47(5), 1424–1428 (1999)

    Google Scholar 

  52. Xu, J., Mao, X., Jin, X., Jaffer, A., Lu, S., Li, L., Toyoura, M.: Hidden message in a deformation-based texture. Vis. Comput. 31(12), 1653–1669 (2015)

    Google Scholar 

  53. Yang, Z., Guo, X., Chen, Z., Huang, Y., Zhang, Y.J.: RNN-STEGA: linguistic steganography based on recurrent neural networks. IEEE Trans. Inf. Forensics Secur. PP(99), 1–1 (2018)

    Google Scholar 

  54. Yao, S., Chen, L., Chang, G., He, B.: A new optical encryption system for image transformation. Opt. Laser Technol. 97, 234–241 (2017)

    Google Scholar 

  55. Zhang, X., Wang, X.: Multiple-image encryption algorithm based on mixed image element and chaos. Comput. Electr. Eng. 92, 6–16 (2017)

    Google Scholar 

  56. Zhang, Y., He, Q., Xiang, Y., Zhang, L.Y., Liu, B., Chen, J., Xie, Y.: Low-cost and confidentiality-preserving data acquisition for internet of multimedia things. IEEE Int. Things J. 5(5), 3442–3451 (2017)

    Google Scholar 

  57. Zhang, Y., Li, Y., Wen, W., Wu, Y., Chen, Jx: Deciphering an image cipher based on 3-cell chaotic map and biological operations. Nonlinear Dyn. 82(4), 1831–1837 (2015)

    MathSciNet  MATH  Google Scholar 

  58. Zhou, R.G., Luo, J., Liu, X.A., Zhu, C., Wei, L., Zhang, X.: A novel quantum image steganography scheme based on LSB. Int. J. Theor. Phys. 57(1), 1–16 (2018)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (No: 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203), Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013), Key R&D Projects of Liaoning Province (No: 2019020105-JH2/103). Jinan City ‘20 uinversities’ funding projects Introducing Innovation Team Program (No:2019GXRC031)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xingyuan Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Talhaoui, M.Z., Wang, X. & Midoun, M.A. A new one-dimensional cosine polynomial chaotic map and its use in image encryption. Vis Comput 37, 541–551 (2021). https://doi.org/10.1007/s00371-020-01822-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00371-020-01822-8

Keywords

Navigation