Skip to main content
Log in

A new method for image encryption by 3D chaotic map

  • Industrial and Commercial Application
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

Image encryption is sensitive to various attacks due to the high volume of the data and similarity of the pixels in different images. Therefore, the encryption algorithms should have high complexity so that analyses become difficult or even impossible. Also it should have lower time order to quickly encrypt high-volume pictures. This paper presents a new method with a simple algorithm, low time order and high level of output complexity. Three nonlinear chaotic sequences which are known as three-dimensional logistic maps are used for image encryption. These three random sequences are extracted and used for pixels rows and columns permutations. Finally, the pixels are changed column by column with third chaotic sequence using XOR operator. This method is compared with well-known algorithms. The results show that the correlation coefficient is improved on average by 0.0028, NPCR and UACI values by 0.09972.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. Data encryption standard.

  2. International data encryption algorithm.

  3. Advanced encryption standard.

  4. Triple DES.

  5. Cipher block chaining.

  6. Electronic codebook mode.

  7. Unified averaged changed intensity.

References

  1. Lian S (2009) A block cipher based on chaotic neural networks. J Neurocomput 72:1296–1301

    Article  Google Scholar 

  2. Daemen J, Rijmen V (2002) The design of rijndael: AES—The advanced encryption standard. Inf Secur Cryptogr. https://doi.org/10.1007/978-3-662-04722-4

  3. Chen GY, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. J Chaos Solitons Fractals 21:749–76

    Article  MathSciNet  MATH  Google Scholar 

  4. Alsultanny YA (2008) Random-bit sequence generation from image data. J Image Vis Comput 26(4):592–601

    Article  Google Scholar 

  5. Norouzi B, Seyedzadeh SM, Mirzakuchaki S, Mosavi MR (2013) A novel image encryption based on hash function with only two-round diffusion process. J Multimed Syst 20:45–64

    Article  Google Scholar 

  6. Huang X (2012) Image encryption algorithm using chaotic Chebyshev generator. Nonlinear Dyn 67:2411–2417

    Article  MathSciNet  Google Scholar 

  7. Yuzhen L, Xiaodong L, Xin J, Geng Z, Shiming G, Yulu T, Xiaokun Z, Kejun Z, Ziyi W (2015) An image encryption algorithm based on zigzag transformation and 3-dimension chaotic logistic map. In: Proceedings of the international conference (ATIS), pp 3–13

  8. Kabi KK, Saha BG, Chauhan A, Pradhan C (2015) Implementation of new framework for image encryption using Arnold 3D cat map. Adv Intell Syst Comput 339:379–384

    Google Scholar 

  9. Hanchinamani G, Kulkarni L (2015) An efcient image encryption scheme based on a Peter De Jong chaotic map and a RC4 stream cipher. J 3D Res 30:1–15

    Google Scholar 

  10. Chen WH, Luo S, Zheng WX (2016) Impulsive synchronization of reaction diffusion neural networks with mixed delays and its application to image encryption. J IEEE Trans Neural Netw Learn Syst 27:2696–2710

    Article  Google Scholar 

  11. Chai X, Gan Z, Chen Y, Zhang Y (2017) A visually secure image encryption scheme based on compressive sensing. Signal Process 134:35–51

    Article  Google Scholar 

  12. Pawan NK, Narnaware M (2012) 3D chaotic functions for image encryption. Int J Comput Sci 9(3):323–328

    Google Scholar 

  13. Pareek NK, Patidar V, Sud KK (2003) Discrete chaotic cryptography using external key. Phys Lett A 309:75–82

    Article  MathSciNet  MATH  Google Scholar 

  14. Behnia S, Akhshani A, Ahadpour S, Mahmodi H, Akhavan A (2007) A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys Lett A 283:391–396

    Article  MATH  Google Scholar 

  15. Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Phys D 237:2638–2648

    Article  MathSciNet  MATH  Google Scholar 

  16. Akhshani A, Behnia S, Akhavan A, Hassan HA, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt Commun 283(17):3259–3266

    Article  Google Scholar 

  17. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28:656–715

    Article  MathSciNet  MATH  Google Scholar 

  18. Chen U, Mao Y, Chui C (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21:749–761

    Article  MathSciNet  MATH  Google Scholar 

  19. Sam S, Devaraj P, Bhuvaneswaran R (2012) A novel image cipher based on a mixed transformed logistic maps. J Multimed Tools Appl 56(2):315–330

    Article  Google Scholar 

  20. Gupta K, Silakari S (2011) New approach for fast color image encryption using chaotic map. J Inf Secur 2:139–150

    Google Scholar 

  21. Rajput AS, Sharma M (2015) A novel image encryption and authentication scheme using chaotic maps. Adv Intell Syst Comput 320:277–286

    Google Scholar 

  22. Chen G H, Yang C L, Xie S L (2006) Gradient-based structural similarity for image quality assessment. In: Proceedings of international conference on image processing, pp 2929–2932

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmad Shokouh Saljoughi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shokouh Saljoughi, A., Mirvaziri, H. A new method for image encryption by 3D chaotic map. Pattern Anal Applic 22, 243–257 (2019). https://doi.org/10.1007/s10044-018-0765-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-018-0765-5

Keywords

Navigation