Skip to main content
Log in

A new image encryption scheme based on cyclic elliptic curve and chaotic system

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, several cryptosystems based on chaos have been proposed. Nevertheless, most of them hinder the system performance, security, and suffer from the small key space problem. This paper introduces an efficient symmetric encryption scheme for secure digital images based on a cyclic elliptic curve and chaotic system that can overcome these disadvantages. The cipher encrypts 256-bit of plainimage to 256-bit of cipherimage within eight 32-bit registers. The scheme generates pseudorandom bit sequences for round keys based on a piecewise nonlinear chaotic map. Then, the generated sequences are mixed with the key sequences derived from the cyclic elliptic curve points. Results of statistical and differential analysis demonstrate that the proposed algorithm has adequate security for the confidentiality of digital images. Furthermore, it has key sensitivity together with a large key space and the encryption is fast compared to other competitive algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18

Similar content being viewed by others

References

  1. Akhavan A, Samsudin A, Akhshani A (2011) A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J Frankl Inst. doi:10.1016/j.jfranklin.2011.05.001

  2. Amin M, Abd El-Latif AA (2010) Efficient modified RC5 based on chaos adapted to image encryption. J Electron Imag 19(1)

  3. Amin M, Faragallah OS, Abd El-Latif AA (2010) A chaotic block cipher algorithm for image cryptosystems. Comm Nonlinear Sci Numer Simulat 15:3484–3497

    Article  MATH  MathSciNet  Google Scholar 

  4. Behnia S, Akhshani A, Mahmodi H, Akhavan A (2009) Applications of tripled chaotic maps in cryptography. Chaos, Solitons Fractals 40:505–519

    Article  MATH  MathSciNet  Google Scholar 

  5. Chen G, Mao Y, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21:749–761

    Article  MATH  MathSciNet  Google Scholar 

  6. Deepthi PP, Sathidevi PS (2009) New stream ciphers based on elliptic curve point multiplication. Comput Commun 32:25–33

    Article  Google Scholar 

  7. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory IT-31:469–472

    Article  MathSciNet  Google Scholar 

  8. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos 8(6):1259–1284

    Article  MATH  MathSciNet  Google Scholar 

  9. Gao T, Chen Z (2008) A new image encryption algorithm based on hyper-chaos. Phys Lett A 372:394–400

    Article  MATH  Google Scholar 

  10. Guan Z-H, Huang F, Guan W (2005) Chaos based image encryption algorithm. Phys Lett A 346:153–157

    Article  MATH  Google Scholar 

  11. Hansen T, Mullen GL (1992) Primitive polynomials over finite fields. Math Comput 59(200):639–643

    Article  MATH  MathSciNet  Google Scholar 

  12. Jafarizadeh MA, Behnia S (2002) Hierarchy of chaotic maps with an invariant measure and their compositions. J Nonlinear Math Phys 9(1):1–16

    Article  MathSciNet  Google Scholar 

  13. Li C, Li S, Asim M, Nunez J, Alvarez G, Chen G (2009) On the security defects of an image encryption scheme. Image Vis Comput 27:1371–1381

    Article  Google Scholar 

  14. Li C, Li S, Lo K-T (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Comm Nonlinear Sci Numer Simulat 16:837–843

    Article  MATH  MathSciNet  Google Scholar 

  15. Lian S (2008) Multimedia content encryption: techniques and applications. Auerbach Publications, CRC Press, New York

  16. Lian S (2009) Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons Fractals 40:2509–2519

    Article  MATH  Google Scholar 

  17. Mao Y, Chen G (2005) Chaos-based image encryption. In: Bayro E (ed) Handbook of computational geometry for pattern recognition, computer vision, neuralcomputing and robotics. Springer-Verlag, Berlin, Germany, pp 231–265

  18. Mao Y, Chen G, Lian S (2004) A novel fast image encryption scheme based on 3D chaotic baker maps. Int J Bifurc Chaos 14(10):3613–3624

    Article  MATH  MathSciNet  Google Scholar 

  19. Morain F (1990) Building cyclic elliptic curves modulo large primes. LNCS 547:328–336

    MathSciNet  Google Scholar 

  20. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic Map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  21. Patidar V, Pareek NK, Purohit G, Sud KK (2010) Modified substitution–diffusion image cipher using chaotic standard and logistic maps. Comm Nonlinear Sci Numer Simulat 15:2755–2765

    Article  MATH  MathSciNet  Google Scholar 

  22. Patidar V, Pareek NK, Sud KK (2009) A new substitution–diffusion based image cipher using chaotic standard and logistic maps. Comm Nonlinear Sci Numer Simulat 14:3056–3075

    Article  Google Scholar 

  23. Pisarchik AN, Zanin M (2008) Image encryption with chaotically coupled chaotic maps. Physica D 237:2638–2648

    Article  MATH  MathSciNet  Google Scholar 

  24. Rhouma R, Belghith S (2008) Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Phys Lett A 372:5973–5978

    Article  MATH  Google Scholar 

  25. Rhouma R, Belghith S (2008) Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Phys Lett A 372:5790–5794

    Article  MATH  Google Scholar 

  26. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution–diffusion based image cipher. Comm Nonlinear Sci Numer Simulat 15:1887–1892

    Article  MATH  MathSciNet  Google Scholar 

  27. Ronald L, Rivest MJB, Robshaw R, Sidney and Yin YL (1998) “The RC6TM block cipher”, version1.1. URL: ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6v11.pdf

  28. Sathyanarayana SV, Aswatha Kumar M, Hari Bhat KN (2010) Random binary and non-binary sequences derived from random sequence of points on cyclic elliptic curve over finite field GF(2m) and their properties. Inf Secur J: A Glob Perspect 19(2):84–94

    Google Scholar 

  29. Sathyanarayana SV, Aswatha Kumar M, Hari Bhat KN (2011) Symmetric key image encryption scheme with key sequences derived from random sequence of cyclic elliptic curve points. Int J Netw Secur 12:137–150

    Google Scholar 

  30. Schneier B (1996) Applied cryptography—protocols, algorithms, and source code in C, 2nd edn. Wiley, Hoboken

    MATH  Google Scholar 

  31. Sun F, Liu S, Li Z, Lü Z (2008) A novel image encryption algorithm based on spatial chaos map. Chaos,Solitons Fractals 38:631–640

    Article  MATH  MathSciNet  Google Scholar 

  32. The USC-SIPI image database, http://sipi.usc.edu/database/database.php

  33. Wang K, Pei, Zou L, Song A, He Z (2005) On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 343(6):432–439

    Article  MATH  Google Scholar 

  34. Wong K-W, Kwok BS-H, Law W-S (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372:2645–2652

    Article  MATH  Google Scholar 

  35. Zhou Q, Wong K-W, Liao X, Xiang T, Hu Y (2008) Parallel image encryption algorithm based on discretized chaotic map. Chaos, Solitons Fractals 38:1081–1092

    Article  Google Scholar 

Download references

Acknowledgments

The authors wish to thank all the anonymous reviewers for their suggestions to improve this paper. This work is supported by the National Natural Science Foundation of China (60832010, 61100187), the Fundamental Research Funds for the Central Universities (Grant No. HIT. NSRIF. 2010046), the China Postdoctoral Science Foundation (2011M500666) and Higher Education Commission of Egypt.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmed A. Abd El-Latif.

Rights and permissions

Reprints and permissions

About this article

Cite this article

El-Latif, A.A.A., Li, L. & Niu, X. A new image encryption scheme based on cyclic elliptic curve and chaotic system. Multimed Tools Appl 70, 1559–1584 (2014). https://doi.org/10.1007/s11042-012-1173-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-012-1173-2

Keywords

Navigation